A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK
|
|
|
- Katherine Mason
- 10 years ago
- Views:
Transcription
1 A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK Chris Apgar Andy Nieto 2015 OVERVIEW How to get started assessing your risk What your options are how to protect PHI What s the budget Balancing the need to encrypt with getting work done Maintaining ease of use and efficient workflow Mobile devices and encryption Q&A 1
2 HOW TO GET STARTED ASSESSING YOUR RISK Encryption decision making starts with knowing your risk aversion level Risk determinations not made in a vacuum need to look at whole environment Risk analysis is a great place to start Remember Meaningful Use (MU) Stage 2 requires assessing risks to data at rest (stored data) HOW TO GET STARTED ASSESSING YOUR RISK Yes the HIPAA Security Rule lists encryption (at rest in in transit) as addressable implementation specifications On the other hand OCR fining entities for lost unencrypted laptops and OCR emphasized need for encryption in 2014 HIPAA/CLIA Rule Don t just focus on compliance/regulatory risks Important to know where data is and where it s going 2
3 HOW TO GET STARTED ASSESSING YOUR RISK Start with a sound infrastructure including: Policies and procedures Role based access control Workforce training Audit controls Incident response planning (including breach) Contingency planning And so forth HOW TO GET STARTED ASSESSING YOUR RISK Make a detailed compliance project/risk assessment plan Don t assume you know where your data is Key risks how can data walk out the front door? Do you know who your vendors are are they an even bigger risk? 3
4 HOW TO GET STARTED ASSESSING YOUR RISK A good place to start your desktops and mobile devices Mobile devices and portable media represent one of the highest risks to healthcare organizations today Risk to reputation, risk of lost business, risk of legal action and risk of a visit from OCR HOW TO GET STARTED ASSESSING YOUR RISK Next place to look transmission of PHI and other sensitive data Unencrypted may result in interception and breach Unsecure secure websites may lead to unauthorized access Use of secure transport a must for HIPAA transactions, large files that can t be ed and so forth Just password protecting does not work 4
5 WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI When looking for a vendor, keep in mind the NIST encryption standards Secure solutions are affordable and effective Some support large file transfer solutions Costs range from less than $100 per user per year to well over $100,000 to implement Assess solution that works for you and implement! WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Mobile device and portable media encryption: Pre-boot encryption for laptops Encrypted USB drives Tablets and smartphones Apple natively encrypted but need strong passcode Android need to turn on encryption Windows need to turn on encryption 5
6 WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Large file transfer Dedicated transmission of HIPAA covered transactions Secure file transfer protocol (SFTP) Use cloud vendors for data sharing (e.g., Box, ShareFile, etc.) Direct project HIEs and secure transmission between EHRs WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Secure web portals including patient portals Most secure websites use secure socket layers (SSL) for encryption SSL no longer an accepted NIST standard Where feasible use transport layer security (TLS) Keep in mind many websites do not support TLS 6
7 WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Does it always need to be encrypted not necessarily Determine what compensating security controls are present If data stored in secure data center or other secure facility, it may not need to be encrypted Balance response time with security of data For Discussion Today What s the budget Using encryption appropriately 14 7
8 What s the Budget 15 What s the budget 16 8
9 What s the budget Source: Infographic from Shred-it. Data from Ponemon Institute 2010 Benchmark Study on Patient Privacy and Data Security 17 What s the budget 18 9
10 What s the budget 19 What s the budget 20 10
11 What s the budget 21 Role of budgeting security Prevention Vigilance Training Ease of Use Cost Security Functionality 22 11
12 Using encryption appropriately Engaging in the workflow is imperative. If you don t use it, it does not matter
13 Using encryption appropriately 25 Using encryption appropriately Look for opportunities to increase security and efficiency» Replacing fax machines with Direct» Replacing couriers with encrypted » Get actionable data not a picture of the data Leverage technology to improve workflow and insure privacy and security 26 13
14 Efficient workflow in action using Direct 27 Using encryption appropriately Protecting PHI is not the end game Protecting information, efficient information flow, and getting actionable information is the goal 28 14
15 Using encryption appropriately 29 MAINTAINING EASE OF USE AND EFFICIENT WORKFLOW If it s not easy, it won t get used Select tools that support your organization s work environment Know your data transfer points where data enters and leaves your organization Look for solutions that are in your budget, secure those transfer points and will actually be used by your workforce 15
16 MAINTAINING EASE OF USE AND EFFICIENT WORKFLOW Ask the question will the solution work within the current work environment (e.g., within your EHR, within Microsoft Outlook, etc.) Training is crucial if they don t know how to use it or even know it s there, it won t happen You need to enforce it proper sanctions need to be realistic or can your solution support policy enforcement? MOBILE DEVICES AND ENCRYPTION In 2014 Concentra agreed to pay OCR $1,725,220 following the theft of an unencrypted laptop Also in 2014 QCA agreed to a $250,000 for the same reason In February 2014 the HIPAA/Clinical Laboratory Improvements Amendments (CLIA) rule was finalized The preamble to the rule included an edict you need to encrypt 16
17 MOBILE DEVICES AND ENCRYPTION The myth encrypting laptops will slow everything down It all depends on the solution Tablets and smart phones are easy to encrypt, may come encrypted and encryption is included at no cost (not necessarily true for older mobile devices) If it can be easily carried out the door, it should be encrypted Mobile devices some stats 64% of physicians use on a smartphone 1 30% of physicians patients 1 80% of physicians use smartphones for work 1 93% of adults would choose a doctor who will them 2 85% of hospitals allow clinicians and staff to connect personal devices to hospital network 3 69% view patient info on mobile 3 96% physicians use smartphone as primary device to support clinical communications 4 1. Kantar Media Sources & Interactions Study, September Medical/Surgical addition 2. Catalyst Healthcare Research Study, May 2014, What s Reasonable? 3. Caradigm Infographic, 4. Point of Care Communications for Physicians 2014, Spyglass Consulting Group 34 17
18 Mobile Devices and Encryption Communication on mobile devices is here and growing BYOD policy is a must have Encrypt data in motion» » Text messaging 35 Questions? Andy Nieto Health IT Strategist, DataMotion [email protected] Chris Apgar, CISSP CEO & President, Apgar & Associates [email protected]
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
HIPAA Requirements and Mobile Apps
HIPAA Requirements and Mobile Apps OCR/NIST 2013 Annual Conference Adam H. Greene, JD, MPH Partner, Washington, DC Use of Smartphones and Tablets Is Growing 2 How Info Sec Sees Smartphones Easily Lost,
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE
WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE INTRODUCTION The healthcare industry is driven by many specialized documents. Each day, volumes of critical information are sent to and from
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)
Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box 80278 Portland, OR 97280 503-384-2538 877-376-1981 503-384-2539 Fax
Please Read This business associate audit questionnaire is part of Apgar & Associates, LLC s healthcare compliance resources, Copyright 2014. This questionnaire should be viewed as a tool to aid in evaluating
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
Document Imaging Solutions. The secure exchange of protected health information.
The secure exchange of protected health information. 2 Table of contents 3 Executive summary 3 The high cost of protected health information being at risk 4 The compliance officer s dilemma: keeping PHI
Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP
Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? You receive a phone call from your CEO. They just received
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
Don t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
HIPAA Compliance: Efficient Tools to Follow the Rules
Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability
BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
THE IMPORTANCE OF EMAIL ENCRYPTION IN THE HEALTHCARE INDUSTRY
THE IMPORTANCE OF EMAIL ENCRYPTION IN THE HEALTHCARE INDUSTRY EXECUTIVE SUMMARY Email is a critical business communications tool for organizations of all sizes. In fact, a May 2009 Osterman Research survey
This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in
This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American
= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015
The Importance of Mobile Device Management in HIT Mario Cruz OFMQ Chief Information Officer An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906 0123. Step 2: Enter code 2071585#.
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013
View the Replay on YouTube Sustainable HIPAA Compliance: Enhancing Your Epic Reporting FairWarning Executive Webinar Series October 17, 2013 Today s Panel Chris Arnold FairWarning VP of Product Management
Best Practices for DLP Implementation in Healthcare Organizations
Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
SECURITY RISK ASSESSMENT SUMMARY
Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected
Lessons Learned from HIPAA Audits
Lessons Learned from HIPAA Audits October 29, 2012 Tony Brooks, CISA, CRISC Partner - IT Assurance and Risk Services HORNE LLP AGENDA HIPAA/HITECH Regulations Breaches and Fines OCR HIPAA/HITECH Compliance
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
What s New with HIPAA? Policy and Enforcement Update
What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final
OCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
HIPAA COMPLIANCE PLAN FOR 2013
HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt
Security Compliance, Vendor Questions, a Word on Encryption
Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center [email protected]
InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc.
InfoGard Healthcare Services 10 Steps To Protect My Covered Entity From Breach Your Presenters Alan Martin Account Manger Marvin Byrd Security Engineer Test and Certification Laboratory Healthcare Payment
Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @
Checklist for Breach Readiness Enabling a Resilient Organization Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Facts about breach violation impact
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
HIPAA Compliance and the Protection of Patient Health Information
HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance
How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy
Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy What is HIPAA? Health Insurance Portability and Accountability Act (HIPAA) is broad federal legislation that includes
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
Sustainable Compliance: A System for Ongoing Audit Readiness
View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013 Agenda Sustainable Compliance at St. Charles Health System
