Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
|
|
|
- Lillian Jefferson
- 10 years ago
- Views:
Transcription
1 Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS
2 Technology requirements to comply with the DEA criteria for EPCS include: A method for identity proofing prescribers. The ability to assign different access levels to prescribers. Two-factor authentication for prescription signing that includes two of the following modalities: something you have, something you are, or something you know. Controls on prescriptions to prevent signed orders from being changed or allowing duplicate orders to be filled. Ongoing audit trail for all activities from identity proofing to prescription signing. Auditing and reporting for all discrepancies (such as unauthorized access attempts). The DEA Interim Final Rule (IFR) allowing electronic prescribing of controlled substances (EPCS) is designed to help healthcare organizations ensure that a provider is legally authorized to prescribe controlled substances. It stipulates thorough authentication credentialing to ensure that only verified providers can order electronic prescriptions. Imprivata Confirm ID helps organizations meet these requirements by establishing a secure, auditable chain of trust for the entire EPCS process. Imprivata Confirm ID streamlines provider identity proofing, supports supervised enrollment, and offers two-factor authentication for prescription signing. Imprivata Confirm ID meets regulatory requirements and gives care providers a fast, secure, and easy-to-use solution for prescribing controlled substances electronically. This paper describes how Imprivata Confirm ID addresses several DEA requirements for EPCS. Full compliance requires a combination of processes and technologies beyond the scope of this paper, however. For a more detailed discussion on the practices, see A Quick Guide to EPCS. How Imprivata Confirm ID Creates a Secure, Auditable Chain of Trust The DEA IFR contains a number of requirements designed to track and audit the connection between practitioners and the signatures they use to order electronic prescriptions for controlled substances. Imprivata Confirm ID helps secure, audit, and verify this end-to-end process, starting with identity proofing and extending to the act of signing prescriptions. Figure 1 shows the end-to-end EPCS process and the aspects addressed by Imprivata Confirm ID. Figure 1: Imprivata Confirm ID helps organizations meet several key DEA requirements for EPCS
3 Imprivata Confirm ID supports each phase of this process through a combination of processes and technologies, including: Streamlined identify proofing (institutional and individual) Supervised enrollment of authorized prescribers FIPS-compliant biometric fingerprint readers and tokens that meet two-factor authentication requirements for e-prescription signing Comprehensive auditing and retention of permissions and authorized two-factor authentication credentials Complete audit reports Integration with all leading EMR systems and e-prescribing applications Imprivata Confirm ID provides dedicated signing workflows for the approval process and audits all approval process events. Identity Proofing To enable EPCS, the DEA IFR requires confirmation of the identity of all providers authorized to prescribe controlled substances. The rule allows two types of identity proofing: institutional (hospitals can identity proof providers internally) or individual (providers can use a third-party credential service provider). For institutions, Imprivata Confirm ID streamlines the identity-proofing process by enabling administrators to easily assign specific roles and responsibilities for identity proofing and retaining records for audit and reporting purposes. For individual practitioners, Imprivata Confirm ID integrates with GSAapproved third-party credential service providers to satisfy the DEA identityproofing requirements for EPCS. Access Control After identity proofing, hospitals and institutions must give practitioners appropriate access controls for e-prescribing systems, as well as two-factor authentication credentials (described in the next section). For DEA compliance, at least two separate individuals must be involved in approving or changing access controls for individual providers. Imprivata Confirm ID provides dedicated signing workflows for the approval process and audits all approval process events. For individual practices and non-institutional registrants, the individual who receives the identity proofing and credentials from a GSA-approved thirdparty credential service provider uses those credentials to set access controls for other members of the practice.
4 Imprivata Confirm ID helps hospitals and practices link the physical identity of authorized prescribers to their electronic prescriptions for controlled substances. Supervised Enrollment Imprivata Confirm ID streamlines the process of enrolling credentials for providers once they have been sufficiently identity-proofed. This includes enrolling their credentials to align with the two-factor authentication modalities they are permitted to use for EPCS. Administrators can assign individuals responsible for supervised enrollment, separating them from individuals in charge of identity proofing (as mandated by the DEA interim final rule). Because this process is also automated, administrators can provide a complete audit trail to demonstrate compliance. Two-Factor Authentication The DEA EPCS requirements mandate that two of the following approved authentication modalities be used when signing a prescription: Something the prescriber knows (such as a password or knowledge question) Something the prescriber has (such as a token or phone) Something the prescriber is (a biometric, such as a fingerprint scan) Imprivata Confirm ID supports the two-factor authentication modalities allowed by the DEA for EPCS, giving organizations the flexibility to select the two-factor authentication option that best fits provider workflow requirements based on how, when, and where EPCS will take place. Supported modalities include: One-Time Password Tokens Imprivata Confirm ID offers the option of using tokens that generate one-time passwords (OTPs). Imprivata Confirm ID provides out of the box support for FIPS compliant OTPs. With this approach, a physician carries a small hardware device that generates a one-time password as a second authentication factor, functioning as the something the prescriber has modality. Biometric Authentication The DEA IFR mandates that the biometrics used for EPCS must meet FIPS-201 Personal Identity Verification (PIV) requirements and have a false match rate of less than 1 in 1,000. Imprivata Confirm ID offers a fingerprint biometric authentication that meets FIPS-201 requirements. Imprivata uses HTTPS between the client device and the server to secure biometric data in transit between authorized systems. All biometric data is transmitted using symmetric encryption and secured on the server using AES encryption. Further, templates are sent to the Imprivata Confirm ID server within the context of a proprietary session. The server maintains session state, and only accepts the template for authentication once per session. This design protects EPCS systems from replay attacks that capture data and attempt to use it later.
5 Audit and Reporting Imprivata Confirm ID offers detailed reporting capabilities to establish a secure, auditable chain of trust for the entire EPCS process. Imprivata Confirm ID helps organizations demonstrate and prove compliance with DEA and state-level EPCS requirements by delivering comprehensive reports that document the identity proofing, supervised enrollment, and prescription signing processes, including unauthorized access attempts and other potential discrepancies. Imprivata Confirm ID also stores audit records for at least two years to meet DEA specifications, but this timeframe can be configured for longer record keeping periods, in accordance with individual state requirements. Summary Imprivata Confirm ID is a fast, secure solution that creates an auditable chain of trust for the entire EPCS process. Imprivata Confirm ID helps hospitals and practices link the physical identity of authorized prescribers to their electronic prescriptions for controlled substances. It streamlines provider identityproofing, enables supervised enrollment, and enforces two-factor authentication requirements for prescription signing while maintaining a comprehensive audit trail throughout the entire EPCS process. Imprivata Confirm ID streamlines the process of enrolling credentials for providers once they have been sufficiently identity-proofed. For more information, visit
6 About Imprivata Imprivata is a leading provider of authentication and access management solutions for the healthcare industry. Imprivata s single sign-on, authentication management and secure communications solutions enable fast, secure and more efficient access to healthcare information technology systems to address multiple security challenges and improve provider productivity for better focus on patient care. Over 2 million care providers in more than 1,000 healthcare organizations worldwide rely on Imprivata solutions. Imprivata is the category leader in the 2012 and 2013 Best in KLAS Software & Services Report for SSO, and SSO market share leader according to HIMSS Analytics. For further information please contact us at: or visit us online at Offices in: Lexington, MA USA Santa Cruz, CA USA Uxbridge, UK Paris, France Nuremberg, Germany Den Haag, Netherlands Copyright 2014 Imprivata, Inc. All rights reserved. Imprivata and OneSign are registered trademarks of Imprivata, Inc. in the U.S. and other countries. All other trademarks are the property of their respective owners. WP-Confirm-ID-V1-1214
A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS)
A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) The Federal Drug Enforcement Administration (DEA) regulates prescriptions of controlled substances that have risks for abuse.
SAML for EPCS (Electronic Prescription of Controlled Substances)
SAML for EPCS (Electronic Prescription of Controlled Substances) Discussion Slides for review in the OASIS Security Services (SAML) TC August, 2014 DEA Regulation Compliance with New York s istop law-
VASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
How to Optimize Epic Clinical Workflows with Imprivata
How to Optimize Epic Clinical Workflows with Imprivata Imprivata OneSign gives care providers fast, secure access to patient information by combining single sign-on with strong authentication enabling
BEYOND IDENTITY PROOFING: How EHRs Can Become More Than Just Vendors
BEYOND IDENTITY PROOFING: How EHRs Can Become More Than Just Vendors INTRODUCTION The implementation of electronic prescribing, or e-prescribing, is one of the most the groundbreaking changes in healthcare.
20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals You know your care providers need faster access to patient data, and that accessing applications and searching
DEA's New Proposed Regulations For E-Prescribing
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 [email protected] DEA's New Proposed Regulations For E-Prescribing
California State Board of Pharmacy and Medical Board of California
California State Board of Pharmacy and Medical Board of California Transmission and Receipt of Electronic Controlled Substance Prescriptions Pursuant to DEA Interim Final Rule (IFR): Electronic Prescriptions
E-Prescribing of Controlled Substances (EPCS) New York State Board for Podiatry
E-Prescribing of Controlled Substances (EPCS) As of March 27, 2015 it will be mandatory for practitioners, excluding veterinarians, to issue electronic prescriptions for controlled and non-controlled substances.
Electronic Prescribing In New York State
Electronic Prescribing In New York State Joshua S. Vinciguerra, Director Bureau of Narcotic Enforcement October 28, 2015 October 28, 2015 2 Overview Review the problem & e-prescribing mandate Describe
Electronic Prescribing of Controlled Substances
Electronic Prescribing of Controlled Substances (EPCS) This document, as well as the software described in it, is provided under a software license agreement with STI Computer Services, Inc. Use of this
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
Healthcare Information Security Today
Healthcare Information Security Today 2015 Survey Analysis: Evolving Threats and Health Info Security Efforts WHITE PAPER SURVEY BACKGROUND The Information Security Media Group conducts an annual Healthcare
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge
Electronic Prescriptions for Controlled Substances (EPCS)
Electronic Prescriptions for Controlled Substances (EPCS) Michael Burger Director, Clinical Product Management Director, Strategic Clinical Initiatives Washington, DC July 12, 2006 Emdeon Corporation WebMD
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
May 21, 2010. Docket No. DEA-218. Dear Drug Enforcement Administration;
May 21, 2010 Drug Enforcement Administration Attention: DEA Federal Register Representative/ODL 8701 Morrissette Drive Springfield, VA 22152 [email protected] Re: Docket No. DEA-218 Dear Drug
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Boost Healthcare Security and Patient Care with Imprivata Enhanced VDI
White Paper Boost Healthcare Security and Patient Care with Imprivata Enhanced VDI Erik Willey 12.12.2014 SUMMARY: Imprivata OneSign offers an easy-to-implement solution that works seamlessly within a
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions
Overview McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions What is EPCS? EPCS stands for Electronic Prescribing of Controlled Substances. Our
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
5 Day Imprivata Certification Course Agenda
Class time consists of a break in the morning and afternoon as well as an allotted time for lunch. Lengths of breaks are at the discretion of the instructor based on the time to cover material. 5 Day Imprivata
Strong Authentication for Healthcare
Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc. All All Rights Reserved. 1 1 Entrust is a registered trademark
Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006
Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
E-Signature. The Pharmacy Perspective
E-Signature The Pharmacy Perspective Prescriptions arrive at a pharmacy today... Written by a prescriber ( not always on a prescription pad). Do not always know the prescriber s s handwriting legibility
How To Control A Record System
Thermo Scientific Qtegra Intelligent Scientific Data Solution (ISDS) Software for 21 CFR Part 11 Compliant Laboratories Technical Note 43106 Key Words Compliance, Electronic Records, 21 CFR Part 11 Goal
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Identity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES
FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES EPCS Revised: April 2015 NEW YORK STATE DEPARTMENT OF HEALTH Bureau of Narcotic Enforcement 1-866-811-7957 www.health.ny.gov/professionals/narcotic
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES
FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES EPCS Revised: October 2014 NEW YORK STATE DEPARTMENT OF HEALTH Bureau of Narcotic Enforcement 1-866-811-7957 www.health.ny.gov/professionals/narcotic
HIPAA Security Matrix
HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Strong Identity Authentication for First Responders
Strong Identity Authentication for First Responders Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards Entrust Inc. All
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
EPCS FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES. Revised: January 2016
FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES EPCS Revised: January 2016 NEW YORK STATE DEPARTMENT OF HEALTH Bureau of Narcotic Enforcement 1-866-811-7957 www.health.ny.gov/professionals/narcotic
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Re: Docket No. DEA-218, Electronic Prescriptions for Controlled Substances
American Society of Health-System Pharmacists 7272 Wisconsin Avenue Bethesda, Maryland 20814 (301) 657-3000 Fax: (301) 664-8877 www.ashp.org Drug Enforcement Administration Attention: DEA Federal Register
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Protect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
Chapter 1, OneSign Authentication Methods Chapter 2, Two-Factor Authentication in OneSign Chapter 3, Emergency Access Privileges
OneSign Authentication Management Guide Imprivata OneSign Authentication Management comes in a non-intrusive, easy-toimplement appliance that requires no modifications to your network. Users can use strong
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
LogMeIn HIPAA Considerations
LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section
InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc.
InfoGard Healthcare Services 10 Steps To Protect My Covered Entity From Breach Your Presenters Alan Martin Account Manger Marvin Byrd Security Engineer Test and Certification Laboratory Healthcare Payment
You Can Survive a PCI-DSS Assessment
WHITE PAPER You Can Survive a PCI-DSS Assessment A QSA Primer on Best Practices for Overcoming Challenges and Achieving Compliance The Payment Card Industry Data Security Standard or PCI-DSS ensures the
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Virtual desktops in hospitals: streamlining clinical workflows
Virtual desktops in hospitals: streamlining clinical workflows How providers leverage Citrix and Imprivata solutions to optimize clinical workflows improving quality of care, while complying with industry
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
