HITRUST CSF Assurance Program
|
|
|
- Jody Little
- 10 years ago
- Views:
Transcription
1 HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010
2 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment CSF Assurance Program Overview Case Study
3 Presenters John Christiansen Faculty, Information School at University of Washington Managing Director/Attorney, Christiansen IT Law Michael Frederick Chief Information Security Officer, Baylor Health Care System Cliff Baker Chief Strategy Officer, HITRUST
4 Regulatory Background
5 Legal Background Roots of Meaningful Use U.S. Office of National Coordinator for Health Information Technology (ONC) (est. 2004) National Health Information Network (NHIN), regional and local health information organizations (RHIOs and LHIOs), interoperable electronic health records, EHR certification, etc. Health Information Technology for Economic and Clinical Health Act (HITECH Act), part of American Recovery and Reinvestment Act of 2009 (ARRA) Enhanced privacy and security protections, standards development and certification infrastructure for EHRs and health information exchange Financial incentives for EHRs
6 Legal Background Financial incentives Eligible professionals (EPs) may seek incentive under Medicare or Medicaid (not both) Medicare: Up to $18,000 in calendar year 2011 or 2012, to five year cap of $44,000 Medicaid: Maximum of $63,750 over six years, $21,250 maximum in first year Single employer (physician practice, etc.) may aggregate all EP incentives
7 Legal Background Financial incentives Hospitals Both Medicare and Medicaid possible Complicated formula, base of $2 million for up to 1,149 acute care inpatient discharges for prior 12 months, plus $200 for each additional discharge up to 23,000, to maximum of $6,370,200, plus transition factors Multi-campus hospital systems under same provider number considered one hospital (with some adjustments) Possible legislative fix in Congress
8 Legal Background Financial incentives Must demonstrate compliance with meaningful use criteria Stage 1 criteria: published in July 2010 (our current concern) Stage 2 to be issued 2011 Stage 3 to be issued 2013
9 Legal Background How to get the money Medicare hospitals EPs must attest, through secure mechanism approved by CMS, that they have satisfied the required objectives and associated measures of Calendar years 2011 and after (no provision for demonstration), except that EPs using certified EHR need not attest until CFR 495.8;
10 Legal Background How to get the money Medicaid providers must attest: This is to certify that the foregoing information is true, accurate, and complete. I understand that Medicaid EHR incentive payments submitted under this provider number will be from Federal funds, and that any falsification, or concealment of a material fact may be prosecuted under Federal and State laws. (42 CFR )
11 Legal Background 42 CFR (a) (EPs), (b) (hospitals): Stage 1 objectives and associated measures (d)(15)(eps), (f)(14)(hospitals): (i) Objective. Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities. (ii) Measure. Conduct or review a security risk analysis in accordance with the requirements under 45 CFR (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.
12 Legal Background The objective is appropriate technical capabilities The measure is whether a HIPAA risk analysis has been conducted, security updates have been implemented and security deficiencies have been corrected Is the risk analysis only required to consider technical capabilities? Probably not.
13 Legal Background Measure: Can you attest that you have implemented/ complied with the Risk Analysis standard without looking at non-technical risks? The standard: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. (45 CFR (a)(1)
14 Legal Background Measure: Can you attest that you have implemented security updates and corrected security deficiencies without looking at non-technical risks? The standard: A security update would be required if any security deficiencies were identified during the risk analysis. A security update could be updated software for certified EHR technology to be implemented as soon as available, to changes in workflow processes, or storage methods or any other necessary corrective action that needs to take place in order to eliminate the security deficiency or deficiencies identified in the risk analysis.
15 Legal Background What are appropriate technical capabilities? The ONC final rule specifies certain capabilities that must be in certified EHR technology. For the objective we simply mean that a technical capability would be appropriate if it protected the electronic health information created or maintained by the certified EHR technology. All of these capabilities could be part of the certified EHR technology or outside systems and programs that support the privacy and security of certified EHR technology. We could not develop an exhaustive list. It depends.
16 Legal Background HIPAA risk analysis standard The required risk analysis is also a tool to allow flexibility for entities in meeting the requirements of this final rule. The risk analysis requirement is designed to allow entities to look at their own operations and determine the security risks involved. The degree of response is determined by the risks identified. Application of HIPAA Risk Analysis to EHR technical capabilities for determination of appropriate updates and corrections requires analysis of EHR administrative, physical safeguards to identify possible technical risks
17 Legal Background Risks associated with attestation A commenter indicated that attestation is an insufficient means to hold providers accountable for the expenditure of public funds and to protect against fraud and abuse. We likewise are concerned with the potential fraud and abuse. However, Congress for the HITECH Act specifically authorized submission of information as to meaningful use through attestation. CMS is developing an audit strategy to ameliorate and address the risk of fraud and abuse.
18 Legal Background Risks associated with attestation CMS (Medicare) and states may review an EP, eligible hospital or CAH s demonstration of meaningful use. (42 CFR 495.8) States required to annually collect and verify information regarding the efforts to adopt, implement, or upgrade certified EHR technology and the meaningful use of said technology before making any payments to providers. (42 CFR )
19 Legal Background Risks associated with attestation States required to Ensure the qualifications of the providers who request Medicaid EHR incentive payments Detect improper payments Refer suspected cases of fraud and abuse to the Medicaid Fraud Control Unit Take corrective action in the case of improper EHR payment incentives to Medicaid providers. (42 CFR )
20 Legal Background Risks associated with attestation HITECH incentives audits HIPAA compliance investigations Security breach investigations Federal/state false claims act penalties Whistleblower (qui tam) lawsuits Federal/state program disqualification Criminal/civil fraud actions
21 Legal Background Managing risks associated with attestation Risk analysis is a process, not a product Follow HIPAA flexible factors and reasonable and appropriate standards in determining updates and corrections Show due diligence in risk identification and update and correction implementation Use appropriate professional expertise Incorporate best practices information from industry, professional communities Strongly consider use of outside expertise
22 Legal Background Supporting attestation Make sure attesting officer is properly informed about risks, updates, corrections, etc. Create and retain supporting documentation file In any field where officer does not have appropriate expertise, ensure s/he is briefed and provided with supporting documentation from appropriate experts Good business judgment is the attesting officer s best friend Show your work! Document risk analysis process and findings Document implementation of updates and corrections Providers must retain documentation supporting their demonstration of meaningful use for 6 years after attestation HIPAA has same document retention period John R. Christiansen, Esq., Christiansen IT Law
23 CSF Assurance Program Simplified Risk Assessment
24 Overview of CSF Assurance Program Efficient risk assessment process Referenced by Office of Civil Rights in risk assessment guidance dance.pdf Designed to cost-effectively gather the information about security controls that is required to appropriately understand and mitigate risk Leverages defined, reasonable controls in the HITRUST Common Security Framework, the most broadly adopted security control framework in the healthcare industry Streamlines risk determination analysis by prioritizing areas based on analysis for breach data for the healthcare industry Formal and credible report for internal and external reporting Benchmarking data Recommendations for remediation
25 Risk Assessment Methodology (NIST, ISO) Likelihood Impact Risk Controls Residual Risk HITRUST Risk Areas Determined based upon analysis of breach data Significantly simplified for organizations HITRUST Common Security Framework Reasonable practice
26 Key Components of CSF Assurance Program Standardized tools and processes Questionnaire Focus assurance dollars to efficiently assess risk exposure Measured approach based on risk and compliance Ability to escalate assurance level based on risk Worksheet for reporting compliance Report Output that is consistently interpreted across the industry Cost effective and rigorous assurance Multiple assurance options based on risk Quality control processes to ensure consistent quality and output across CSF Assessors
27 High Risks for Healthcare Organizations Insecure and/or unauthorized removable/transportable media and laptops (internal and external movements) Insecure and/or unauthorized external electronic transmissions of covered information Insecure and/or unauthorized remote access by internal and third-party personnel Insider snooping and data theft Malicious code and inconsistent implementation and update of prevention software Inadequate and irregular information security awareness for the entire workforce Lack of consistent network isolation between internal and external domains Insecure and/or unauthorized implementation of wireless technology Lack of consistent service provider, third-party and product support for information security Insecure web development and applications Ineffective password management and protection Ineffective disposal of system assets
28 Questionnaire Common Healthcare Information Protection (CHIP) Questionnaire: Innovative approach to assess the quality of information protection practices in an efficient manner Focus on the security capabilities and outcomes of an organization Leverages key measures and benchmarking Structured according to the highrisk areas identified in the CSF, which reflect the controls required to mitigate the most common sources of breaches for the industry
29 Benchmark Data PRISMA SCORE Organization Benchmark Orgs
30 HIPAA Compliance Scorecard Standardized output that is consistently interpreted across the industry HIPAA Compliance Scorecard produced for each HIPAA security requirement
31 Assurance Multiple assurance options: Self reporting Remote testing conducted by a CSF Assessor that includes interviews with key personnel and the review of organization charts, policies, procedures and other third-party testing that may have recently been conducted On-site assessment conducted by a CSF Assessor that includes remote testing and the review of system configurations and physical walk-throughs
32 Conducting your Meaningful Use Risk Assessment Five steps to getting started with the CSF Assurance program: 1. Visit for more information on performing your meaningful use risk assessment* 2. Identify your scope 3. Perform a self assessment using the Common Healthcare Information Protection (CHIP) Questionnaire and the Compliance Worksheet** 4. Submit your CHIP to HITRUST as instructed in the questionnaire 5. Obtain a HITRUST CSF Validated Report with benchmarking data * For other assurance options, including remote and on-site assessments via a third party CSF Assessor, please visit ** A Compliance Worksheet only needs to be completed where a compliance scorecard is required
33 CSF Assessors 32
34 Case Study
35 Background on BCHS Information Security Baylor Health Care System is a not-for-profit medical network that serves seven counties in the Dallas-Fort Worth metro area through more than a dozen hospitals and medical centers. 20,000 employees Baylor Health Care System (BHCS) has a dedicated department, the Office of Information Security (OIS), assigned the responsibility of information security reporting to the Chief Information Security Officer. Department has three groups: Information Assurance, Monitoring and Response, and Identity Management. All three groups consists of 22 dedicated full-time employees Variety of certifications including CISSP, CISA, CBLE, CBCP, CeH, GIAC, and HITRUST CSF Practitioner.
36 BCHS Deployed Security Tools Host-based firewalls Workstation encryption Asset management and recovery Compliance configuration management for servers and workstations Wireless access point control and management Anti-malware Anti-spyware Inventory scanning Vulnerability scanning Web application vulnerability scanning Hard drive disk wiping Copy machine disk wiping Intrusion prevention system Enterprise class perimeter firewalls Web proxy gateway and encryption Log aggregation and correlation Intrusion detection system SFTP server SSL VPN Identity, access, and role management Multifactor authentication security tokens Remote access gateway Online learning tool
37 Steps in BCHS Approach to Security Risk Assessment 1. Determine Scope 2. Prepare for Assessment 3. Report 4. Track and Measure Progress Applications, interfaces, infrastructure -Focus on high risk areas -Identify individuals responsible for key control areas -Conduct top down enterprise control analysis -Do not get stuck in the weeds Report on findings and remediation plan -Track progress against industry benchmarks -Focus on measures HITRUST Scoping Template -HITRUST High Risk List -HITRUST CHIP -HITRUST/NIST PRISMA -HITRUST CSF Validated Report -Corrective Action Plan Template HITRUST CSF Validated Report
38 Background on BCHS Information Security Interview roles: Web application manager Internal audit Security assurance manager (risk management, business continuity management, vulnerability management, training and awareness, security policies) Monitoring and response manager Server engineering Desktop engineering Human resources Access and identity management Application developer
39 Background on BCHS Information Security Documents review: Asset inventory with risk classification Network diagram Organization chart Business Associate Agreement template Risk assessment program Application assessment questionnaires Sample web application assessments Sample network vulnerability assessments Sample attack and penetration report Project/engagement hierarchy
40 Background on BCHS Information Security Documents review (continued): Business continuity management program Business Impact Analysis templates Business continuity plan template Disaster recovery plan template Sample business continuity and disaster recovery plans Sample security awareness and training materials Policies and standards framework Policy and standards third party review report Incident monitoring and response program and associated procedures Security council charter
41 Lessons Learned Healthcare providers have challenges you will have gaps Assessment methodology Sound NIST based approach Very efficient approach Credibility with executives and regulators Positions us well for meaningful use but also helps us address longer term goals and maintain HIPAA compliance
42 For More Information: For more information on the CSF Assurance Program visit: For a list of HITRUST CSF Assessors visit: For assistance, contact: [email protected]
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Assessment Process. 2013 HITRUST, Frisco, TX. All Rights Reserved.
Assessment Process Assessment Process Define Scope The assessment scope gives context to the security controls and those organizations and individuals relying on the results Organization scope defines
HIPAA COMPLIANCE PLAN FOR 2013
HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences
Health & Life sciences breach security program David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences Overview 1. Healthcare Security Research / Directions 2. Healthcare
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
How to Use the NYeC Privacy and Security Toolkit V 1.1
How to Use the NYeC Privacy and Security Toolkit V 1.1 Scope of the Privacy and Security Toolkit The tools included in the Privacy and Security Toolkit serve as guidance for educating stakeholders about
HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality
HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.
Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits
HIPAA Security Rule & Live Hack Tod Ferran, CISSP, QSA Intro Tod Ferran, CISSP, QSA 25 years working with IT and physical security 2 years PCI and HIPAA security consulting, performing entity compliance
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
HIPAA Compliance Review Analysis and Summary of Results
HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY S OVERSIGHT OF THE TESTING
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY S OVERSIGHT OF THE TESTING AND CERTIFICATION OF ELECTRONIC HEALTH
Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh
Effectively Completing and Documenting a Risk Analysis Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS Session Objectives Identify the difference between risk analysis and risk assessment
HIPAA and HITRUST - FAQ
A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are
Healthcare Management Service Organization Accreditation Program (MSOAP)
ELECTRONIC HEALTHCARE NETWORK ACCREDITATION COMMISSION (EHNAC) Healthcare Management Service Organization Accreditation Program (MSOAP) For The HEALTHCARE INDUSTRY Version 1.0 Released: January 2011 Lee
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm
Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security
Strategies for Integra.ng the HIPAA Security Rule
Strategies for Integra.ng the HIPAA Rule Kaiser Permanente: Charles Kreling, Execu.ve Director Sherrie Osborne, Director Paulina Fraser, Director Professional Strategies S21 2013 Fall Conference Sail to
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview
IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
TORCH Meaningful Use Assessment Program
TORCH Meaningful Use Assessment Program TORCH Meaningful Use Assessment Program Introduction & Background This is a significant and challenging time for the healthcare industry. With the unprecedented
Data Breach, Electronic Health Records and Healthcare Reform
Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
What can HITRUST do for me?
What can HITRUST do for me? Dr. Bryan Cline CISO & VP, CSF Development & Implementation [email protected] Jason Taule Chief Security & Privacy Officer [email protected] Introduction
Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire
Compliance, Security and Risk Management Relationship Advice Andrew Hicks, Director Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control panel on
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Healthcare and IT Working Together. 2013 KY HFMA Spring Institute
Healthcare and IT Working Together 2013 KY HFMA Spring Institute Introduction Michael R Gilliam Over 7 Years Experience in Cyber Security BA Telecommunications Network Security CISSP, GHIC, CCFE, SnortCP,
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Securing Patient Portals
Securing Patient Portals What you need to know to comply with HIPAA Omnibus and Meaningful Use Brian Selfridge, Partner, Meditology Services, LLC Blake Sutherland, VP Enterprise Business, Trend Micro Brian
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
Current IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
HIPAA Privacy and Information Security Management Briefing
HIPAA Privacy and Information Security Management Briefing Karen Pagliaro-Meyer Privacy Officer [email protected] (212) 305-7315 Soumitra Sengupta Information Security Officer [email protected] (212)
CA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013
Greenway Marketplace Hear from GSG Compliance & White Plume November 14, 2013 Marketplace Mission Statement To enhance the Greenway customer user experience by offering innovative, forwardthinking technologies
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
What is required of a compliant Risk Assessment?
What is required of a compliant Risk Assessment? ACR 2 Solutions President Jack Kolk discusses the nine elements that the Office of Civil Rights requires Covered Entities perform when conducting a HIPAA
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Sustainable Compliance: A System for Ongoing Audit Readiness
View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013 Agenda Sustainable Compliance at St. Charles Health System
HIPAA Security Compliance Reviews
HIPAA Security Compliance Reviews Elizabeth S. Holland, MPA Office of E-Health Standards and Services Centers for Medicare & Medicaid Services U.S. Department of Health and Human Services 1 2 What is HIPAA?
InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc.
InfoGard Healthcare Services 10 Steps To Protect My Covered Entity From Breach Your Presenters Alan Martin Account Manger Marvin Byrd Security Engineer Test and Certification Laboratory Healthcare Payment
OIG Security Audits of EHR Incentive Program Participants
OIG Security Audits of EHR Incentive Program Participants April 12-16, 2015 David G. Schoolcraft and Elana R. Zana Attorneys Ogden Murphy Wallace, P.L.L.C. 1 DISCLAIMER: The views and opinions expressed
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
