HSyE HIPAA Training. Summer 2015
|
|
|
- Cleopatra Oliver
- 10 years ago
- Views:
Transcription
1 HSyE HIPAA Training Summer 2015
2 Agenda What is HIPAA PII Electronic Security Data Files Desktops Internet Security Home/Outside Network Security Personal Laptops Cell Phones/ Tablets Physical Security Reporting Incidents Upcoming Security Improvements HIPAA Videos!
3 What is HIPAA?
4 Health Insurance Portability and Accountability Act Governmental policy enforcing security measures on patient health information (PHI) and personal identification information (PII) Says we cannot have a breach and must train employees on how to prevent breaches HSyE is a Business Associate under HIPAA and so has to follow the same rules/regulations that hospitals do However, as we are not a hospital, those regulations are implemented differently
5 Types of HIPAA Entities Covered Entities Hospitals Health Plans Providers Clearinghouses Business Associates (HSyE) Does one or more of the following Data Analysis Data Aggregation Claims Processing Quality Assurance Legal Services Accounting Similar Actions Source:
6 HIPAA Compliance for Dummies Each line of data is a person, treat it like a person Pretend that a hacker or bad guy got a hold of the information. What would happen? Could he identify a person? Could a patient s identity be stolen? Would he know about a patient s medical conditions? What if the patient was a very private person? Think of how a hacker or bad guy could get a hold of the information. How can you protect it?
7 What is PII?
8 What is Sensitive? If any person would not like the information published, it is sensitive If a news outlet would enjoy doing an expose on the information, it s sensitive If identity theft, blackmail, or another crime could be committed using the information, it s sensitive Examples: anything containing PII (can identify any person) any info about hospital X having issue Y (hospital X kills 5 people/year with CT radiation!) doctor X being an outlier in measure Y (Dr. X prescribes more opiates than all other doctors!) etc.
9 Identifying PII To desensitize data, remove Names Addresses Phone Numbers Social Security Numbers (SSN) Zip Codes (for zip codes with not a lot of people) Credit Card numbers address Date of Birth (DOB) if accompanied by a place and/or time of birth Workplace/job etc Fun Fact: 87% of the US population can be uniquely identified by just gender, zip code, and DOB.¹ ¹ Sweeney, Latanya. Simple Demographics Often Identify People Uniquely
10 Electronic Security Measures
11 Electronic Security At HSyE Northeastern prevents almost all electronic threats This means that if an adverse event occurred, there is a 99% chance it was due to user error Good news is that HSyE is currently a small target Bad news is that Macs used to be small targets Other bad news is that Northeastern is not a small target
12 Preventing Leaks: Data Use As soon as you get a data file, check it for PII and remove all info possible If 100% of PIIs cannot be removed or you are not 100% sure that all PII has been removed, encrypt the file Do not unencrypted files with raw or aggregated data Store all project-related files on the data server (coming soon!)
13 Good practices in file encryption Do not be scared of encryption. All Office programs and Adobe can do it for you When communicating the password, do not send it via IM, text message, or in the same as the file. Ideally, call the person you are sending the file to and tell them the password verbally Good passwords are easy to remember and do not have to be written down Passwords that are sentences (or 4 words) are actually harder to hack than a single dictionary word with common substitutions (like A = 4 and so on) Also consider using a phone keypad to encode letters to numbers to add security. Like MGH = 644
14 Why can t I just tell the person I m sending the file to to just delete it after? 1. s can be intercepted 2. addresses can be messed up (eg: Samy s is [email protected] so if someone accidentally ed the file to [email protected], that would be a breach) 3. Deleted files are not actually deleted (fun facts guys!) Deleted files can be recovered You can bypass this in 2 ways 1. You can encrypt the file before deleting it so the 1 s and 0 s are all scrambled and can t be recovered 2. You can use a program to make all the 0 s in that section into 1 s or to make all the 1 s in that section into 0 s == HSyE
15 Preventing Leaks: Desktop Use Our desktops are pretty secure (Thanks Northeastern!) but user error can still cause issues There are 3 major ways that your desktop can be the source of a leak: 1. You don t lock your desktop before leaving for more than 5 minutes (they do not lock automatically!) 2. You expose protected/sensitive information to others by a) ing unencrypted files b) Leaving files open for others to read c) Sharing protected/sensitive information with others not on the same project 3. You infect the computer (due to antivirus and firewalls, this has to be done forcibly and not accidentally.)
16 Preventing Leaks: Internet use If there were rules for the internet, #1 would be don t click on things you don t trust Trusted sites/programs can have malicious ads Do not trust ANY free software Phishing When in doubt, google the name of the software. If any result on the first page is something like How do I remove X? or Virus Alert! or anything similar, DO NOT INSTALL IT All toolbars are viruses and all toolbars are dumb. Anything that says it will make your computer faster will make it slower
17 Preventing Leaks: Internet use All YouTube video downloaders/youtube to mp3/4 converters are viruses All coupon websites/apps/toolbars/programs are viruses Two antiviruses are worse than 1 Use Symantec (it s free through NU). Do not install any free AV without consulting the internet/samy When in doubt, ask Samy. Her other job is her undoing these bad decisions for people.
18 Example: What not to trust
19 A new threat: fake URLs VALID URLS INVALID URL
20 Electronic Security Outside HSyE HSyE/Northeastern Accessed by your computer at your home network (SharePoint or VPN) Accessed by a hacker who got into your home network VPN You Bad Guy
21 Wireless Network Security The Internet WPA2-Enterprise Individual Credentials WPA2 Shared Password
22 Personal Computer Policy The largest risk to any data at HSyE comes from personal computer use Starting 5/1/15, personal computer use will require authorization from a staff member and a signed note from Samy(only certified office technician, can also do this in 5-15min) saying that your computer does not have any malware that can compromise our data Eg: cryptolocker All personal machines need up-to-date Antivirus (even/especially Macs), OS, Java, Adobe, etc (everything!) and only computers with win7 or newer (or OSX 10.8 or newer) are allowed Eg: Java on OSX After a machine is done being used, unencrypted data files will need to be both deleted and sanitized (deleted!= sanitized) Only secure wireless networks (NUWave, WPA2, secure password, secure admin panel) can be used (Samy also has a router certification if you want to bring one in to make sure it s safe)
23 Real World Example
24 N = 10 Overall PCs Macs Severely Infected Infected Clean Severely Infected Infected Clean Severely Infected Infected Clean
25 Other Personal Electronic Devices PHONES GET VIRUSES TOO Install apps from Norton, McAfee, or AVG (ALL FREE!!!) Do not text sensitive info (the fact that we are doing a project with hospital X about issue Y is sensitive) Do not download secure HSyE attachments on your phone/tablet Password protect/lock your phone/tablet/etc so if it is lost/stolen, no one can get your account, downloaded files, etc. Only connect to secured wireless networks Ex: Nuwave, not Nuwave-guest
26 This just in: I m always right.
27 It s not just Android
28 5 min break: GET AN ANTIVIRUS NOW Android AVG Avast Avira Norton McAfee Kaspersky Malwarebytes Avira Norton McAfee Trend Micro iphone
29 Physical Security Measures
30 HSyE Office When you leave the office for the day, clear off all sensitive papers from your desk (if papers have PII/PHI, lock them in your desk drawer if possible) When disposing of sensitive papers, shred them, don t throw away/recycle (shredder coming soon!) When there are visitors to the office, they should be escorted/monitored at all times (aka just not left alone with computers) Be aware of conversations that may contain sensitive information, especially around visitors Make sure that 243 and 253 are locked when empty
31 Reporting Incidents
32 Hey Samy, I did a bad If you commit a HIPAA violation (or are not sure whether or not you committed a HIPAA violation), report it to a HIPAA committee member (Dr. Haas, Sarah B, Samy) immediately as there are some things we legally have to respond to within a certain timeframe If you know of a HIPAA violation (past, present, or future), report it to the HIPAA committee If the violation is accidental, the only consequence will be further education. As is done in some hospitals, if you make a mistake, you must become an expert/advocate of that mistake to help prevent others from making it If you see a system vulnerability that could lead to a violation, please notify the committee so we can try to mitigate the risk
33 Future System Improvements
34 Upcoming Security Features: Secure HSyE Data Drive Only accessible from Northeastern (wireless or wired) Everyone will need account Will be used to store all project files. SharePoint will be for administrative/training files Secure shredder Fun Audits: If I catch you doing good things, you get a candy. Otherwise, you get a picture of a sad puppy (or just no candy)
35 HIPAA Videos
36 We re too special for normal HIPAA videos No videos exist for our specific type of HIPAA Business Associate, just for hospitals and maybe the companies that shred medical records / transcribe them FUN PROJECT TIME
37 Recap
38 Policy Recap Electronic Remove as much PII as possible from data sets Get authorization (there s a form!) before using personal machines Encrypt potentially sensitive files before ing Lock your machine when you leave for more than 5min Be aware of potential malicious software and avoid downloading any Don t enable data theft Physical Don t leave papers with sensitive information lying around Shred sensitive papers instead of throwing away/recycling them Don t discuss sensitive information in front of non-hsye employees
39 FUN QUIZ!!!
40 Can I work on CMS Projects at home if I m taking a sick day? YES NO
41 Can I work on CMS Projects at home if I m taking a sick day? YES NO personal wireless networks are not secure enough for healthcare data. However, you can work on internal projects, literature reviews, and other non-sensitive things that do not require connecting to the data server / secure information
42 Can I load my project files onto my laptop to work on while I m at a conference? YES NO
43 Can I load my project files onto my laptop to work on while I m at a conference? YES NO Conference networks are not guaranteed to be secure (and are likely less secure than your home network). Also, personal laptops cannot have data on them without approval A good rule of thumb for Wi-Fi is to treat it like a restroom.
44 My laptop is faster than my desktop, can I use it instead? YES NO
45 My laptop is faster than my desktop, can I use it instead? YES As long as you have approval and a signed laptop approval form, you can use your personal computer. However, speed alone is probably not enough of a reason to use your personal machine. Valid reasons include: testing software/program run speeds on a different platform, using different software we don t have, bringing live demos to health system meetings, etc NO
46 My project requires some PII. What do I do? A. Just encrypt everything B. Delete all unnecessary PII, then encrypt everything C. We can t do those projects D. all the unencrypted data to Samy and have her deal with it E. Give up and look at pictures of corgis on BuzzFeed
47 My project requires some PII. What do I do? A. Just encrypt everything B. Delete all unnecessary PII, then encrypt everything C. We can t do those projects My name is Samy and I approve this corgi D. all the unencrypted data to Samy and have her deal with it E. Give up and look at pictures of corgis on BuzzFeed
48 Questions?
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Introduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
IT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: [email protected] Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
Keeping Data Safe. Patients, Research Subjects, and You
Keeping Data Safe Patients, Research Subjects, and You How do hackers access a system Hackers Lurking in Vents and Soda Machines By NICOLE PERLROTH APRIL 7, 2014 New York Times SAN FRANCISCO They came
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice
Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail
Why you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
Cyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.
PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO [email protected] Objectives Discuss hot topics in cyber security and database
Management and Storage of Sensitive Information UH Information Security Team (InfoSec)
Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security
Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any
LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan
LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
HIPAA Privacy & Security Rules
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
How to prevent computer viruses in 10 steps
How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
CLEAR LAKE BANK & TRUST COMPANY Internet Banking Customer Awareness & Education Program For Businesses
CLEAR LAKE BANK & TRUST COMPANY Internet Banking Customer Awareness & Education Program For Businesses Introduction Clear Lake Bank & Trust Company is committed to protecting your business, personal, and
FTC Fact Sheet Identify Yourself
FTC Fact Sheet Identify Yourself 5 10 15 20 25 30 35 40 You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
Senaca Shield Presents 10 Top Tip For Small Business Cyber Security
Senaca Shield Presents 10 Top Tip For Small Business Cyber Security Presented by Liam O Connor www.senacashield.com [email protected] #Senacashield Small businesses need cyber security too. This slide
2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE About the Author. Acknowledgments. Introduction. Chapter 1 Understanding the Threats. Quantifying the Threat.
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
SecuritySecuritySecurity!
SecuritySecuritySecurity! It was the best of times and the worst of times... I suspect Dickens would be quite surprised to learn how prophetic his words would be over 150 years after he penned them. THE
Free and Legal Software You Can Download By Tom Krauser
Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in
This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American
PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security
PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security 1 CME Disclosure Statement The Northwell Health adheres to the ACCME s new Standards for Commercial Support. Any
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015
The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Introduction to Cyber Security
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Introduction
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
ecommercial SAT ecommercial Security Awareness Training Version 3.0
ecommercial SAT ecommercial Security Awareness Training Version 3.0 Welcome The goal of this training course is to provide you with the information needed to assist in keeping your online banking account
This guide will go through the common ways that a user can make their computer more secure.
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office [email protected]
CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office [email protected] Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:
