PwC Health Industries Viewpoint on Third Party Risk Management
|
|
|
- Louisa Bridges
- 10 years ago
- Views:
Transcription
1 November 2013 PwC Health Industries Viewpoint on Third Party Risk Management Significant others: How companies can effectively manage the risks of third party relationships
2 Are vendors more trouble than they re worth? For companies, that s a multibillion-dollar question. Data breaches at vendors and other third-parties are costlier than in-house breaches, and the number of incidents is rising. Data breaches resulting from vendors and other third-parties continue to make news: In January 2013, an orthopedic clinic contracted with a third party vendor to transfer old x-ray films into electronic format. The x-ray films, including full names and date of birth of over 17,000 patients, were provided to the vendor, but the clinic never received the electronic version of the films and discovered they were the victims of a scam. The clinic has recommended that the patients remain vigilant by reviewing their account statements and monitoring their credit reports, as they have no way of knowing whether or how patient information may have actually been used.¹ In today's environment, it would be nearly impossible to find a company that doesn't contract with multiple vendors and interact frequently with other third parties. But the convenience and flexibility of engaging third parties comes with significant risks, including the potential for regulatory penalties related to vendor incidents penalties that have soared in recent years, costing companies billions of dollars. Preventing risk events at third-party service providers has always been a challenge, but now the stakes are far higher. Over the past three years, the number of security incidents at companies in the health industries attributed to partners and vendors has risen increasing from 16% in 2010 to 26% in 2012 alone (see Figure 1).² The most recent PwC Global State of Information Security Survey sheds some light on the problem. Although 68% of companies in the health industries respondents expressed confidence that their security activities are effective, only 40% require third-parties to comply with their policies. Over the past 36 months, the number of security incidents attributed to customers, partners, vendors, and other third-parties has escalated. Figure 1: Number of security incidents attributed to vendors³ Partner or vendor ¹ Vendor Scam Results in Data Breach Involving 17k Patients, Healthcare Informatics, March 10, 2013 ² PwC 2013 Global State of Information Security Survey. ³ PwC Analysis based on PwC 2013, 2012, and 2011, Global State of Information Security Surveys. (Not all factors shown. Totals do not add up to 100%.) PwC 2 16% 18% 28% 0% 5% 10% 15% 20% 25% 30%
3 Customers are voting with their feet. Research shows that companies in the health industries experience higher-thannormal churn (customer turnover) following a security breach. Looking beyond just the significant financial penalties, organizations that suffer security breaches open the door to other serious consequences: The resulting reputational damage can nibble away at an institution s customer base and, eventually, take a bite out of its bottom line Additional consequences can include increased vulnerability to litigation, depressed market value and share price, and the possibility of regulatory enforcement actions When reputations are tarnished after a security event, customers tend to bolt. They don t really care whether the breach originates within the institution itself or within a vendor organization. Financial and reputational damage ensues regardless of the source. As customer attrition grows, revenue shrinks, and the pinch is felt at the bottom line. As shown in Figure 2, Healthcare with it s postbreach churn rate of 4.5 percent is tied with Financial Services for highest turnover rate of the industries surveyed. This indicates that health industry companies are highly vulnerable to customer loss following a security breach. Figure 2: Customer churn following a breach by industry 1 Financial Services Healthcare Pharmaceutical Services Transportation Consumer Industrial Technology Hospitality Media Communications Retail Public 0.3% 1.3% 1.5% 2.0% 2.7% 2.6% 2.5% 2.9% 3.3% 3.8% 4.2% 4.5% 4.5% ¹ Symantec and Ponemon Institute, 2013 Cost of Data Breach Study United States, May 2013 PwC 3
4 Drivers for Third Party Risk Management Market drivers Substantial reliance on third parties Vendor sourcing decisions that often overlook key risks Incomplete populations of vendors or vendors with sensitive data Inconsistent risk assessment and review practices across organizations Business model necessitates exchange of PHI Complexities in managing third party risk, such as: - Identifying what risks really matter - Selecting which third parties to review - Taking effective action when an issue is found 1996 July 01 Nov 01 May 02 May 07 Aug 03 Oct 13 Mar 13 OCC Third Party Relationships Mar 12 Omnibus HIPAA Rule Jan 11 CFPB Bulletin July 10 PCI-DSS v2.0 Payment Card Mar 10 Industry Data Security Standard Jan 10 Wash. H.B (2010 WA Data Security Law) 201 Mass. Code Regs. 17 MA Data Security Law Nov 09 NRS 603A NV Data Security Law GLBA Gramm-Leach Bliley Act Regulatory drivers HITECH Act Health Information Technology for Economic and Clinical Health Act H.F MN Plastic Card Security Act California Privacy Bill SB 1386 OCC Bulletin (Foreign-Based Third-Party Service Providers) OCC Bulletin (Oversight and Management of Third-Party Relationships) HIPAA Health Insurance Portability and Accountability Act PwC 4
5 Following the release of the HIPAA Final Rule in January 2013, a cursory search finds references to Business Associates 1,358 times, evidencing a strong focus on vendor relationships. 1 Companies in the health industries need to monitor their third party relationships for compliance with regulatory requirements, including First Tier, Downstream, and Related Entities (FDR): Payers must have a robust program in place to monitor their FDR relationships Health Insurance Portability and Accountability Act (HIPAA): Companies in the health industries can be held responsible for vendors lack of adherence to HIPAA regulations related to Protected Health Information Health Information Technology Act (HITECH): Among other requirements, HITECH extended the liability of Covered Entities under HIPAA to their Service Providers Food and Drug Administration (FDA): Organizations regulated by the FDA are required to have strong vendor controls in place for a range of sectors including Drugs, Medical Devices, Food, Cosmetics and Tobacco Products Stark Law: Prohibits physician referrals of designated health services for Medicare and Medicaid patients if the physician has a financial relationship with that entity Good x Practice(GxP): A series of quality guidelines and regulations used in sectors such as pharmaceuticals, medical device, cosmetics and food. Manufacturers must establish and maintain procedures to ensure that all products conform to traceability and accountability requirements for all parties that contributed to the development and production of the products 1 PwC 5
6 Although the industry is making strides to strengthen third party risk management (TPRM), we have observed that most organizations have not yet adopted stratification a leading practice in managing third party risk. Types of data that typically need to be protected: Intellectual Property (IP) Personally Identifiable Information (PII) Payment Card Industry (PCI) Protected Health Information (PHI) Adding to the challenge of effectively managing vendorrelated risk, we see today s companies also struggling with: Implementing formal enterprise-wide TPRM governance (Compliance and Enterprise risk management, etc.) Maintaining an accurate and complete inventory of vendors Incorporating other third-party relationships into their TPRM programs (e.g., business partners, joint ventures, distribution channels, attorneys, utilities, etc.) Establishing standard operational risk methodologies and policies Identifying/using TPRM key risk indicators Implementing and using technology to adequately support the TPRM program, taking some of the burden from the business Staying ahead of, and effectively complying with, changing regulatory requirements Our observations are underscored by the results of PwC s Global State of Information Security Survey 2013: 69% of the surveyed companies lack an accurate inventory of locations or jurisdictions where data is stored 1 74% of companies do not have a complete inventory all third parties that handle personal data of its employees and customers 1 73% of companies lack incident response processes to report and manage breaches to third parties that handle data 1 1 PwC 2013 Global State of Information Security Survey PwC 6
7 An effective and efficient VRM program can benefit all facets of the enterprise. Here are some of the comments our clients have sh ared with us regarding their TPRM challenges. With careful planning, each can be overcome. We don't have a program to continuously evaluate and re-classify vendors based on assessment results. We have no pre-contract TPRM process in place. I have operational staff focused on VRM and they aren't risk and controls specialists. We have inadequate resources to assess our high risk population on an ongoing basis. We don't centrally manage our TPRM. My vendors have vendors. How do we address the risks associated with those, subcontractor vendors? We were told by our vendor that their SSAE16 is enough. Is that sufficient? PwC 7
8 Program execution Vendor stratification All too often, companies in the health industries fail to adopt vendor stratification. We observe many organizations applying the same level of risk analysis to all of their vendors, rather than identifying those vendor services deemed to carry the greatest risk and then prioritizing their focus accordingly. The first step in the stratification process is to understand which vendors and services are in scope from an active risk management perspective. Once this subset of vendors has been identified and prioritized, due diligence assessments are performed for the vendors, depending on the level of internal versus vendor-owned controls. The results of these assessments help establish the appropriate monitoring and control requirements that should be maintained for each vendor. This stratification approach focuses resources on the vendor relationships that matter most, limiting unnecessary work for lower-risk relationships. Illustrative risk factors included in a vendor stratification program Vendor stratification prioritizes higher-risk services and vendors Level of due diligence and active risk monitoring Service risks: Volume of financial transactions processed Concentration associated with service Sensitivity risk of the data to which the vendor could potentially have access Compliance and regulatory risks related to the service Customer and financial impact Vendor risks: Location of the vendor (subject to multinational laws, regulations, Safe Harbor, etc.) Previous data or security breaches Extent of outsourcing performed by the vendor Performance history Total third party # Remove categories that don t pose risk Stratify third parties into risk categories Prioritize high risk vendors for review Higher risk: on-site reviews Moderate risk: desktop reviews Lower risk: vendor self assessments PwC 8
9 An effective and efficient VRM program can benefit all facets of the enterprise. A n effective and efficient TPRM program may provide benefits to various facets of the enterprise. Cost Reduced cost of managing third party risk through stratification, process simplification, and use of technology Greater transparency into the costs of third party risk management Quality Higher quality third party risk management throughout the vendor lifecycle Tighter controls over third parties that pose significant risk Consistent approach to assessing third parties and risks they present Standardization Improved quality, efficiency, timeliness and accuracy of TPRM stemming from automated workflows and reporting tools Streamlined and standardized processes for supplier on-boarding, risk profiling, and ongoing monitoring and oversight Greater benefits realized from scorecards and dashboards through use of standardized key performance indicators (KPIs) and key risk indicators (KRIs) Risk More effective monitoring of due diligence activities and their frequency, as now driven by both inherent and residual risks Greater agility in responding to changing regulatory requirements and other TPRM challenges as they arise Flexibility and efficiency Tighter focus on specific controls associated with those relationships found to pose the greatest risk, now made possible through vendor stratification Limited resources now able to be refocused based on identified organizational priorities Enhanced ability to quickly undertake new initiatives when opportunities arise such as launching new services Ability to locate vendor replacements more rapidly as needed Shareholder value Improved compliance with Federal laws and regulations, thereby reducing or eliminating altogether any fines and penalties that could prohibit services and impact the bottom line Less intense scrutiny by the regulatory community Appropriately trained and placed resources PwC 9
10 PwC offers a range of services with various entry points through the TPRM lifecycle, helping clients assess their current state programs and develop a road map for designing, building, and improving their current programs. Program Diagnostic Perform a high level assessment of the current TPRM function, identifying gaps against needs and leading practices. Assess Transformational Roadmap Execute a comprehensive program review resulting in an end-state blueprint and roadmap to desired state, including anticipated level of effort and costs. Program Management Office Outsource or co-source the TPRM program, including project planning, execution, and reporting. Vendor Assessments Using PwC's global network of firms and service delivery centers, perform the following for specified vendors: on-site or remote reviews or development of selfassessments to be used by vendors. Sustain Vendor Stratification Perform a risk assessment and determine a risk score for all outsourced services and vendors. Help develop the client's strategy to respond to that risk. Transform Function Build/Rebuild Assist in building and implementing a new TPRM office, including the operating model, governance and structure, policies & procedures, processes and controls, and reporting framework. Technology Enablement Integrate processes into new or existing technology platforms. PwC 10
11 PwC Health Industries Practice PwC s Health Industries Practice serves all segments of the healthcare industry, including providers, payers, entitlements, suppliers, and employers, helping them meet the challenges of today s changing environment. By understanding the needs and issues of each segment, as well as the complex interrelationships of these sectors, we are able to help our clients address issues and take advantage of opportunities. We place a top priority on the continued growth of our healthcare industry practice. We invest heavily to develop the resources and services our clients need to prosper today and meet the challenges of the future. Along with audit, tax, and advisory services, we deliver a wide range of industry-focused services, including governance, risk and compliance, Medicare reimbursement consulting, medical management, actuarial consulting, network development, transaction consulting, and Digital Health. Our professionals include certified public accountants, tax professionals, physicians, nurses, information system professionals, management consultants, health policy analysts, actuaries, financial advisors, and data analysts. The Firm s professionals are recognized industry-wide for their innovation in analyzing, developing and implementing strategic options for clients. PwC s Health Research Institute Through PwC's Health Research Institute, we provide new intelligence, perspective and analysis on trends affecting health-related industries, including healthcare providers, pharmaceuticals, life sciences and payers. PwC was the first of the Big Four firm to invest in a dedicated healthcare research unit. The Institute helps executive decisionmakers and stakeholders navigate chance through a process of research and collaborative exchange that draws on a network of more than 4,000 professionals with day-to-day experience in the health industries. PwC 11
12 To have a deeper conversation, please contact: Terry Puchley (213) [email protected] TR Kane (216) [email protected] Rob Stouder (317) [email protected] Tiffany-Anne Gallagher (973) [email protected] Dan Morrison (415) [email protected] PwC 12
13 2013 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. PwC refers to the US member firm, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.
PwC Viewpoint on Third Party Risk Management
www.pwc.com PwC Viewpoint on Third Party Risk Management November 2013 Significant others: How companies can effectively manage the risks of vendor relationships Are vendors more trouble than they re worth?
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Risk Management: IT Vendor Management and Outsourcing
www.pwc.com Risk Management: IT Vendor Management and Outsourcing Definitions Third Party is any entity not under direct business control of a given organization. Many people equate third parties with
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Developing and Maintaining a World-Class Third Party Risk Assessment Program
Developing and Maintaining a World-Class Third Party Risk Assessment Program Presented by: Tom Garrubba, Senior Director, The Santa Fe Group/Shared Assessments Program Monday, September 15, 2014 - IIA
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS 2015-2016: CHANGE, CHALLENGES AND CHOICE
THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS 2015-2016: CHANGE, CHALLENGES AND CHOICE As demand for data sharing grows, healthcare organizations must move beyond data agreements and masking to achieve
Metrics by design A practical approach to measuring internal audit performance
Metrics by design A practical approach to measuring internal audit performance September 2014 At a glance Expectations of Internal Audit are rising. Regulatory pressure is increasing. Budgets are tightening.
Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use
Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Vendor Risk Management in the New Regulatory Environment. kpmg.com
Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
Managing the Shadow Cloud
Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized
2014 Vendor Risk Management Benchmark Study
2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Emptoris Contract Management Solution for Healthcare Providers
Emptoris Contract Management Solution for Healthcare Providers An Emptoris White Paper Emptoris, an IBM Company www.emptoris.com CMS-HP-4/12 Emptoris Contract Management Solution for Healthcare Providers
2012 HIPAA Privacy and Security Audits
Office of the Secretary Office for Civil Rights (OCR) 2012 HIPAA Privacy and Security Audits Linda Sanches OCR Senior Advisor, Health Information Privacy Lead, HIPAA Compliance Audits OCR 1 Agenda Background
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance
Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Arm Stakeholders with Critical Information to Assess 3rd Party Relationships and Comply with the Foreign Corrupt Practices Act
ROLE OF CONTRACT MANAGEMENT IN A HEALTHCARE COMPLIANCE PROGRAM DESIGN
ROLE OF CONTRACT MANAGEMENT IN A HEALTHCARE COMPLIANCE PROGRAM DESIGN John Riley Vice President of Sales MediTract, Inc. Session Overview Overview of Compliance Regulations affecting Contract Management
Healthcare Internal Audit: In a Time of Transition
The 2015 State of the Internal Audit Profession Study Healthcare Internal Audit: In a Time of Transition The healthcare industry in the United States is facing many challenges with the enactment of legislation
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
Third-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk
THE UH OH MOMENT Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk By Lois Coatney, Chuck Walker and Joseph Yacura, ISG Directors www.isg-one.com INTRODUCTION A top
Empower loss prevention with strategic data analytics
www.pwc.com/us/lossprevention January 2015 Empower loss prevention with strategic data analytics Empower loss prevention with strategic data analytics Amid heightened levels of business competition and
EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY
Bridging The Gap Between Healthcare & Hipaa Compliant Cloud Technology and outsource computing resources to external entities, would provide substantial relief to healthcare service providers. Data stored
CORL Dodging Breaches from Dodgy Vendors
CORL Dodging Breaches from Dodgy Vendors Tackling Vendor Security Risk Management in Healthcare Introductions Cliff Baker 20 Years of Healthcare Security experience PricewaterhouseCoopers, HITRUST, Meditology
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Meeting the HIPAA Training and Business Associate Requirements Questions and Answers, with HIPAA Security Expert Mike Semel
Meeting the HIPAA Training and Business Associate Requirements Questions and Answers, with HIPAA Security Expert Mike Semel Questions Answers 1 Is a Business Associate (BA) responsible for assuming a Covered
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014
OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2 Linda Sanches, MPH Senior Advisor, Health Information Privacy HCCA Compliance Institute March 31, 2014 Agenda Background Audit Phase
CA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
State of Compliance 2014 Healthcare provider industry brief
Delve into the full analysis of the 2014 State of Compliance Survey at: pwc.com/us/ stateofcompliance State of Compliance 2014 Healthcare provider industry brief Introduction The healthcare provider industry
Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration.
Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration. May 2011 Advisory Consulting Table of contents Transform data from a hindrance
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
Vendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Paul M. Phillips, CFA Attorney, Adams and Reese Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay 2014 EastPay.
ELECTRONIC HEALTH RECORDS. Nonfederal Efforts to Help Achieve Health Information Interoperability
United States Government Accountability Office Report to Congressional Requesters September 2015 ELECTRONIC HEALTH RECORDS Nonfederal Efforts to Help Achieve Health Information Interoperability GAO-15-817
By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN
Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the
What can HITRUST do for me?
What can HITRUST do for me? Dr. Bryan Cline CISO & VP, CSF Development & Implementation [email protected] Jason Taule Chief Security & Privacy Officer [email protected] Introduction
Your world runs on applications. Secure them with Veracode.
Application Risk Management Solutions Your world runs on applications. Secure them with Veracode. Software Security Simplified Application security risk is inherent in every organization that relies on
AML Topics Using analytics to get the most from your transaction monitoring system
www.pwc.com AML Topics Using analytics to get the most from your transaction monitoring system March 2011 Contents Components of the AML Compliance Program... 1 Transaction Monitoring... 1 Transaction
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
HIPAA and HITRUST - FAQ
A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are
Customer Data and Reputational Risk in the Pharmaceutical Industry
1 Customer Data and Reputational Risk in the Pharmaceutical Industry Sensitive Data: A Chain of Trust Organizations of all types, from banks to government agencies to healthcare providers, are taking steps
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
Addressing Risk in Partner / Contractor Selection and Onboarding. Michael Davidson VP Quality Systems and Compliance March 2014
Addressing Risk in Partner / Contractor Selection and Onboarding Michael Davidson VP Quality Systems and Compliance March 2014 Industry Trends Pfizer Overview Pfizer s Approach Risk Based Robust Due Diligence
Change is happening: Is your workforce ready? Many power and utilities companies are not, according to a recent PwC survey
January 2012 Change is happening: Is your workforce ready? Many power and utilities companies are not, according to a recent PwC survey At a glance Our utilities-industry survey shows that many companies
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER
FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER As a board-level discussion topic at all financial institutions (FI) today, operational risk is real and public disclosure of significant
what your business needs to do about the new HIPAA rules
what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or
HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com
HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist www.riskwatch.com Introduction Last year, the federal government published its long awaited final regulations implementing the Health
Transforming life sciences contract management operations into sustainable profit centers
Point of View Generating life sciences Impact Transforming life sciences contract management operations into sustainable profit centers Globally, life sciences companies spend anywhere from $700 million
IDENTIFYING VENDOR RISK THE CRITICAL FIRST STEP IN CREATING AN EFFECTIVE VENDOR RISK MANAGEMENT PROGRAM
IDENTIFYING VENDOR RISK THE CRITICAL FIRST STEP IN CREATING AN EFFECTIVE VENDOR RISK MANAGEMENT PROGRAM HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655 THE CRITICAL FIRST STEP IN
Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.
Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate
Physician Enterprise The Importance of Charge Capture, Business Intelligence and Being a Data Driven Organization
Physician Enterprise The Importance of Charge Capture, Business Intelligence and Being a Data Driven Organization Executive Summary Physician-hospital alignment is a key strategy for most hospitals across
RISK MANAGEMENT PROGRAM THAT WORKS FOUR KEYS TO CREATING A VENDOR. HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655
FOUR KEYS TO CREATING A VENDOR RISK MANAGEMENT PROGRAM THAT WORKS HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655 FOUR KEYS TO CREATING A VENDOR RISK MANAGEMENT PROGRAM THAT WORKS
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
THE IMPORTANCE OF EMAIL ENCRYPTION IN THE HEALTHCARE INDUSTRY
THE IMPORTANCE OF EMAIL ENCRYPTION IN THE HEALTHCARE INDUSTRY EXECUTIVE SUMMARY Email is a critical business communications tool for organizations of all sizes. In fact, a May 2009 Osterman Research survey
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Third-Party Risk Management for Life Sciences Companies
April 2016 Third-Party Risk Management for Life Sciences Companies Five Leading Practices for Data Protection By Mindy Herman, PMP, and Michael Lucas, CISSP Audit Tax Advisory Risk Performance Crowe Horwath
Dissecting New HIPAA Rules and What Compliance Means For You
Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
Compliance Risk Management Survey A Point of View
FINANCIAL SERVICES Compliance Risk Management Survey A Point of View July 2014 kpmg.com Compliance Risk Management Survey A Point of View 3 Introduction As the financial crisis unfolded, regulators looked
Vendor Security Risk Management
ISACA San Francisco Fall Conference 2007 Vendor Security Risk Management Dan Morrison September 17, 2007 Topics of Discussion Context-Information, operations &
Business Associate Management Methodology
Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates
WHITE PAPER Third-Party Risk Management Lifecycle Guide
WHITE PAPER Third-Party Risk Management Lifecycle Guide Develop and maintain compliant third-party relationships by following these foundational components of a best-practice assessment program. Third
Supply Chain Management Build Connections
Build Connections Enabling a business in manufacturing Building High-Value Connections with Partners and Suppliers Build Connections Is your supply chain responsive, adaptive, agile, and efficient? How
