Managing data security and privacy risk of third-party vendors
|
|
|
- Kerrie Burns
- 10 years ago
- Views:
Transcription
1 Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected health information (PHI), with cloud providers, consultants, business process outsourcers, thirdparty transaction processors, and other business associates has become standard business practice. Yet, inevitably, as data moves out of the organization s protected infrastructure into that of a third-party vendor, a certain degree of control is relinquished. Organizations must remain vigilant and engaged in assessing risks to their data, even though it resides at a vendor location. The negative publicity that health care providers, health plans and other entities covered by the Health Insurance Portability and Accountability Act (HIPAA) can encounter when having to post a data breach on the U.S. Department of Health and Human Services website is painful enough, but the potential impact of a lawsuit brought under the Health Information Technology for Economic and Clinical Health (HITECH) Act can be devastating. In spite of that, a number of breaches of PHI are occurring daily, and many are caused by third-party vendors. Health care providers can t afford to wait for federal regulators to perform audits on business associates, but must be proactive in protecting their information assets. How can they do so when entrusting them to third parties? Moreover, how can they ensure compliance with a changing landscape of security and privacy regulations? At issue is the fact that many thirdparty vendors, which store, process or transmit personally identifiable information (PII), electronic PHI (ephi) and intellectual property (IP) on behalf of users, may not have appropriate controls in place to secure the data, manage risk, or enable users to meet their privacy and security obligations. Even when an organization outsources data management and processing activities, regulations often require that it retain responsibility for ensuring that its data is protected. The onus is on organizations to select vendors with a robust approach to risk management. In order to do so, they need to carefully vet vendors prior to selection and then actively monitor their security and privacy control environments throughout the life of the contract. Monitoring third-party data security and privacy risk requires a strong and effective process for ongoing vendor management that starts long before the contract is even signed.
2 What is at risk? Data breaches resulting from the use of third-party vendors are growing and have become exceedingly expensive to manage. In fact, according to a recent study by the Ponemon Institute, 39 percent of data breaches in 2010 involved thirdparty organizations such as outsourcers, contractors, consultants and business partners. 1 In a study conducted in 2011, the percentage of health care data breaches caused by third-party vendors was 46 percent. 2 These breaches tend to be very expensive to resolve. For instance, the average organizational cost of a data breach in 2010 increased to $7.2 million, up 7 percent from $6.8 million in Total breach costs have grown every year since Data breaches in 2010 cost their companies an average of $214 per compromised record, up $10 (5 percent) from In the event of a breach, companies may also face fines, civil penalties and legal repercussions. Numerous lawsuits have been filed against health care providers that breach PHI. Some lawsuits seek damages that run into the millions. For academic medical centers, theft of research IP is another growing threat, with global losses estimated to be in the billions of dollars. According to the FBI, the rise of digital technologies and internet file-sharing networks provides the means by which trade secrets, proprietary products, plans and schematics may be stolen. Much of the theft takes place outside of the United States, where privacy laws may be lax and more difficult to enforce. Security and compliance In addition to HIPAA HITECH, most health care organizations must comply with rules and regulations that address the handling of information assets, such as the Payment Card Industry (PCI) Data Security Standard (DSS) requirements, Clinical Laboratory Improvement Amendments (CLIA) and others. Many of these rules and regulations apply not only to user organizations that collect the information, but increasingly to third-party vendors that provide outsourced services. There may be other rules and regulations to consider, depending on where your organization does business. For example, a growing number of states (e.g., Massachusetts, California, Texas, Michigan) now have their own privacy and security laws, and many other states are considering them. European Union countries, along with other international governments, also have specific data privacy and security laws. Interestingly, a Ponemon Institute study revealed a difference in view between cloud providers and users about who is primarily responsible for security in the cloud. 4 Nearly seven in 10 (69%) third-party vendors saw users of their cloud service as being primarily responsible for their own data security, while only 35 percent of users perceived themselves to be mostly responsible. This apparent confusion about who is responsible for data security may lead users to become complacent about securing their data, since they may assume that their third-party vendor has strong security and privacy controls in place, when, in fact, that vendor may not. Simply put, users need to take a more proactive approach toward ensuring that their data is adequately protected. 1 Ponemon Institute, LLC Annual Study: U.S. Cost of a Data Breach (March 2011). 2 Ponemon Institute, LLC Second Annual Benchmark Study on Patient Privacy & Data Security (December 2011). 3 Ponemon Institute, LLC Annual Study: U.S. Cost of a Data Breach (March 2011). 4 Ponemon Institute, LLC. Security of Cloud Computing Providers Study (April 2011). 2
3 What can you do to protect yourself? Organizations that are considering the use of third-party services need to perform appropriate due diligence when selecting and managing their relationships with vendors. Data security, privacy and compliance considerations should be top of mind. During the due diligence process, organizations should ask a number of key questions about data security and privacy considerations: Data protection How will data be protected? What controls does the vendor have in place for intrusion detection, perimeter security, physical security, timely application of security patches, and data leak prevention, among other safety measures? Data access Who will have access to our data, and how can we confirm this? Does the vendor have the right security controls to protect our data? How will the provider ensure that others (e.g., those whose data resides on the same server as ours) are not able to view our data? Data security What policies and procedures are in place to detect, prevent and mitigate incidences of identity theft? Have there been any instances of identity theft experienced by the third-party vendor within the last two years? Does the vendor scan employee and company social media platforms for potential breaches of customer data? How are incidents and breaches reported? Will we receive notification if a breach to our data occurs? Disaster recovery and business continuity planning Does the third party have a disaster recovery plan? In the event of a disaster, how will the vendor protect our information assets? Can we get our data back if the vendor goes out of business? Contract and controls compliance verification Does the potential vendor allow third-party verification or provide such verification on its own? Attestation reports if vendors have them can offer a useful perspective on a vendor s security and privacy control environment. The AICPA s Service Organization Control SM (SOC) reports specifically its SOC 2 SM and SOC 3 SM reports provide service auditors and service organizations with reporting options that address controls related to security, availability, processing integrity, confidentiality and privacy. These reports help vendors demonstrate the strength of their controls to current and would-be customers; however, it is up to prospective users to evaluate these reports with care. Users must carefully read and thoroughly understand their content, evaluate any findings in the context of the outsourcer s services that they are considering, and determine how weaknesses in their own user control environment may affect the overall control environment. During the due diligence process, organizations should ask a number of key questions about data security and privacy considerations. 3
4 Establishing an effective vendor management program If your organization does not currently have a vendor management process, putting one in place can seem insurmountable. We generally recommend that our clients approach vendor management as a three-stage process: first, identify and implement quick wins ; second, establish a standardized, streamlined vendor management process; and third, enhance the vendor management process with ongoing attention to vendor risk management. 1. Identify and implement quick wins. For many companies, a vendor inventory either does not exist or is out-of-date. Business associate agreements (BAAs) or service level agreements, likewise, may not be kept up-to-date. As a result, the first step is to identify the vendor population by determining which vendors have access to confidential or sensitive data and how much PII/ePHI is collected, used or disclosed by those vendors. If a SOC 2 or SOC 3 report is not available, conduct a quick privacy and security risk assessment against the inventoried vendors by using surveys, questionnaires or on-site visits. Questionnaires should inquire about a range of controls related to financial stability, adoption and enforcement of robust security and privacy controls, performance, and other crucial topics. Identify the control gaps and risk-rank gaps for each vendor. Based on these risk assessment results, flag high-risk vendors. Once high-risk vendors have been identified, focus on getting them to mitigate the most immediate risks by implementing data protection solutions, digital rights management, or other actions to minimize data security and compliance risks. 2. Develop a streamlined vendor management process. Going forward, it is a good idea to develop and implement a standard process for assessing and monitoring changes to vendors data security and privacy risk environments, in addition to looking at the traditional set of vendor management criteria such as financial stability, ethics, manufacturing/service quality, order fulfillment and invoice accuracy. The results of vendor questionnaires, on-site inspections and attestations may be compared from year to year, in order to identify potential degradation in the security control environment. 3. Establish an ongoing vendor risk management approach. When outsourcing or co-sourcing high-risk business functions, such as processing health claims or tracking account transactions, consider establishing strategic vendor relationships, as well as adopting a centralized approach to managing the vendor population and associated risks. Often internal audit takes the responsibility for managing and evaluating vendor risks. Through this process, many organizations can pare down the number of vendors to which they entrust their information assets. In so doing, organizations may be able to reduce the vendor risk and at the same time, take advantage of special discounts to decrease vendor costs. 4
5 Develop ongoing processes for evaluation and monitoring Ultimately, health care providers should put in place a consistent process to assess, monitor and manage risks related to vendor operations. (See Establishing an effective vendor management program on the previous page.) Even though many organizations execute vendor agreements with service providers, too few of them build protections into the contract to support an ongoing program to monitor and assess vendor control risks. For example, organizations may insist on a right-to-audit provision that gives them the authority to periodically audit and monitor controls on-site, whether or not a SOC 2 or SOC 3 reporting process is in place. If the vendor is not willing to allow the provision particularly if a SOC report or similar attestation report is not available the user organization may wish to reconsider its options. Looking ahead The use of third-party vendors for key business functions has become standard business practice, but the security control environments of vendors vary greatly. It is essential for organizations to be vigilant in assessing risks to their data, even when they reside at a vendor location. History shows that vendor data breaches may result in fines, civil penalties and loss of the public s trust. In the event of a data breach, anticipated cost efficiencies and other benefits can evaporate as a result of costly breaches and enforcement actions. Intellectual property may be similarly at risk, which can cost the organization dearly in terms of lost investment and reputation. Health care providers considering the use of third-party vendors need to ask themselves, Once we share our information assets with third-party vendors, will we still be in compliance? Those that wish to answer affirmatively must be prepared to spend time vetting their vendors and carefully monitoring their security and privacy control environments over time. For more information Jan Hertzberg Managing Director Business Advisory Services [email protected] About Grant Thornton The people in the independent firms of Grant Thornton International Ltd provide personalized attention and the highest quality service to public and private clients in more than 100 countries. Grant Thornton LLP is the U.S. member firm of Grant Thornton International Ltd, one of the six global audit, tax and advisory organizations. Grant Thornton International Ltd and its member firms are not a worldwide partnership, as each member firm is a separate and distinct legal entity. Content in this publication is not intended to answer specific questions or suggest suitability of action in a particular case. For additional information on the issues discussed, consult a Grant Thornton client service partner. Grant Thornton LLP All rights reserved U.S. member firm of Grant Thornton International Ltd 5
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
Lessons Learned from HIPAA Audits
Lessons Learned from HIPAA Audits October 29, 2012 Tony Brooks, CISA, CRISC Partner - IT Assurance and Risk Services HORNE LLP AGENDA HIPAA/HITECH Regulations Breaches and Fines OCR HIPAA/HITECH Compliance
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @
Checklist for Breach Readiness Enabling a Resilient Organization Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Facts about breach violation impact
Nine Network Considerations in the New HIPAA Landscape
Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant
PCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015
Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University
Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box 80278 Portland, OR 97280 503-384-2538 877-376-1981 503-384-2539 Fax
Please Read This business associate audit questionnaire is part of Apgar & Associates, LLC s healthcare compliance resources, Copyright 2014. This questionnaire should be viewed as a tool to aid in evaluating
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2
MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania
Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
HIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Cyber, Security and Privacy Questionnaire
Cyber, Security and Privacy Questionnaire www.fbinsure.com Please note: This is an electronic application. When completed please save and email to: Ed McGuire [email protected] Cyber, Security & Privacy
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16
NEW PERSPECTIVES on Healthcare Risk Management, Control and Governance www.ahia.org Journal of the Association of Heathcare Internal Auditors Vol. 32, No. 3, Fall, 2013 Professional Fee Coding Audit: The
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
[Company Name] HIPAA Security Awareness and Workforce Training Program Manual
[Company Name] HIPAA Security Awareness and Workforce Training Program Manual The Importance of Security Awareness Training 4 Data Security Breaches 5 What is Information Security? 6 Roles and Responsibilities
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
Cyber Security An Exercise in Predicting the Future
Cyber Security An Exercise in Predicting the Future Paul Douglas, August 25, 2014 AUDIT & ACCOUNTING + CONSULTING + TAX SERVICES + TECHNOLOGY I www.pncpa.com I www.pntech.net What is Cyber Security? Measures
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
Customer-Facing Information Security Policy
Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper
ARRA HITECH Stimulus HIPAA Security Compliance Reporter White Paper ARRA HITECH AND ACR2 HIPAA SECURITY The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems,
HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help
HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR 2463. Court Reporters and HIPAA
Court Reporters and HIPAA OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR 2463 1 What Exactly is HIPAA? HIPAA is an acronym for the Health Insurance Portability and Accountability Act
WHITE PAPER. PCI Basics: What it Takes to Be Compliant
WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through
My Docs Online HIPAA Compliance
My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several
Data Security Standard (DSS) Compliance. SIFMA June 13, 2012
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance SIFMA June 13, 2012 EisnerAmper Consulting Services Group Overview of EisnerAmper Fifth fhlargest accounting firm in the Metro New York
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com
HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist www.riskwatch.com Introduction Last year, the federal government published its long awaited final regulations implementing the Health
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 Policy and Procedure Templates Reflects modifications published in the Federal Register
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule
HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
The Basics of HIPAA Privacy and Security and HITECH
The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability
Vendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
