Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015



Similar documents
Business Associates, HITECH & the Omnibus HIPAA Final Rule

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

BUSINESS ASSOCIATES AND BUSINESS ASSOCIATE AGREEMENTS

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HIPAA Compliance Guide

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

Sustainable Compliance: A System for Ongoing Audit Readiness

HIPAA Compliance Guide

New HIPAA regulations require action. Are you in compliance?

Use & Disclosure of Protected Health Information by Business Associates

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Business Associate Liability Under HIPAA/HITECH

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell. Topics Covered Part One. Topics Covered Part Two.

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HIPAA Privacy and Information Security Management Briefing

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Isaac Willett April 5, 2011

Cloud Computing and HIPAA Privacy and Security

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY

Datto Compliance 101 1

OCR/HHS HIPAA/HITECH Audit Preparation

University Healthcare Physicians Compliance and Privacy Policy

Business Associate Management Methodology

HIPAA BUSINESS ASSOCIATE AGREEMENT

Definitions: Policy: Duties and Responsibilities: The Privacy Officer will have the following responsibilities and duties:

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Our Commitment to Information Security

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

HIPAA Compliance: Are you prepared for the new regulatory changes?

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Dissecting New HIPAA Rules and What Compliance Means For You

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Managing Privacy and Security Challenges of Patient EHR Portals

OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR Court Reporters and HIPAA

Business Associate Agreement (BAA) Guidance

Security Is Everyone s Concern:

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

COMPLIANCE ALERT 10-12

Business Associate Compliance With HIPAA: Findings From a Survey of Covered Entities and Business Associates

Transcription:

Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015 James B. Wieland, Principal, Ober Kaler David Holtzman, VP of Compliance, CynergisTek

Welcome The slides for today s webinar are available at the right side of your screen in the Handouts pane. Type your questions into the Questions pane. We ll answer as many as we can at the end of the program. After the program, you ll receive an email with a link to a survey. Please take a moment to fill that out and give us your feedback. 2

Agenda Who We Are Cloud Statistics for Health Care HIPAA and the Cloud Requirements Vendor Management Data Loss Prevention Questions 3

Who We Are: David Holtzman Vice President of Compliance Services, CynergisTek, Inc. Subject matter expert in health information privacy policy and compliance issues involving the HIPAA Privacy, Security, and Breach Notification Rules Experienced in developing, implementing, and evaluating health information privacy and security compliance programs Former senior advisor for health information technology and the HIPAA Security Rule, Office for Civil Rights 4

Who We Are: Jim Wieland Shareholder in Ober Kaler and chair of the firm s Health Care Information Privacy, Security and Technology practice. Advises clients on all aspects of federal and state privacy laws, including breach notification. Assists clients in negotiating all types of technology contracts in the health care sector. Works extensively with data use agreements, including state and federal forms of DUA. Chair of the HIMSS Legal Advisory Task Force. 5

Cloud Statistics for the Health Care Industry 6

2014 HIMSS Analytics 83% of IT health care organizations are currently using cloud services The most common cloud-based applications: Hosting of clinical applications and data Health information exchange (HIE) Backups & data recovery 23.4% of IT health care organizations chose public clouds for deploying their cloud applications 7

Cloud Services and Risk According to Forbes and Skyhigh Networks, approximately 90% of cloud services are high or medium risk http://info.skyhighnetworks.com/rs/274-aup-214/images/wp-cloud- Adoption-Report-Q2-2015-Healthcare.pdf Measured attributes include: Data encryption ISO 27001 Certification Multifactor authentication On average, 6.8 TB of data are sent to cloud services each month by health care organizations based on measurements from Q2 2015 8

HIPAA & the Cloud Computing Vendor 9

Cloud Vendors are Business Associates Agents, contractors, and others hired to do the work of, or to work for, the HIPAA Covered Entity, and such work requires the use or disclosure of protected health information (PHI) Definition specifically calls out Health Information Organization (or HIE) E-Prescribing Gateway Data transmission services with routine access PHR providers working on behalf of covered entity Subcontractors to a business associate 10

Business Associate or Conduit? Provides transmission services of PHI in any form Including temporary storage of PHI incidental to transmission service Examples: postal service, couriers and telephone companies Service provider that provides storage of PHI is a BA even if agreement with the CE or BA does not contemplate Any access to PHI Access only on a random or incidental basis Persistence of custody; not the degree of access 11

BA of a BA: Downstream Contractors Each entity directly responsible for requirements of the Security Rule & certain provisions of Privacy Rule Liability even if the parties fail to enter into a written BA agreement In the event of a breach of unsecured PHI chain of reporting would follow the chain of contracting in reverse Cloud Based Data Storage Cloud Based EHR Vendor Hospital 12

Vendor Management to Ensure Data Safeguards 13

Look at Vendor Relationships Implement a process to evaluate who is a BA, and who is not a BA (i.e., conduit); and sub-bas Keep BAA forms compliant with HITECH language Include language required by the Privacy Rule Consider using the OCR BAA Template Add language to protect yourself from an agent issue Manage your BA Agreements Keep a BAA tickler Assign who is responsible for managing BAAs 14

Vendor Security Life Cycle Requirements Definition Pre-Contract Due Diligence Contract Security Specifications Define Performance Monitoring Breach Notification Contract Termination Documentation Terminate Monitor Contract Select 15

Defining Requirements Examine Scope of Effort Determine What Level of Minimum Necessary Identify Security Requirements Develop SLAs for Security Incorporate into RFI, RFP and/or SOW Classify Vendor 16

Due Diligence: Pre-Contract Tailor requests to scope of contract Security standard followed Include security questionnaire Request documentation Review third party assessments Proof of Training Conduct site visit Security Incident history 17

Contract Security Specifications Define expectations, material changes, subcontractors Minimum Necessary Transmission, storage & processing Incident response Indemnification/Cyberinsurance Audit/monitoring Reporting requirements Contingency operations 18

Maintenance For contracts lasting more than 6 months Periodic audits of key processes Testing of contingency plans/operations Renewal of third party assessments 19

Breach Notification Timeliness of notifications Assistance in investigation/risk assessment Indemnification for certain costs Notifications to public 20

Contract Termination Termination for cause vs. end of contract Disposition of data if in receipt User/system access Reminder of Minimal Necessary Other continued responsibilities 21

Cloud Standards and Integration 22

Models of Cloud Services Public Cloud Service provider makes computing resources such as apps & storage to multiple organizations available over the Internet Private Cloud Vendor provides computing resources like Public Cloud in a proprietary architecture, dedicated to a single organization Hybrid Cloud Mix of on-premises private cloud and public cloud with orchestration between the platforms Allows workload to move between private and public clouds as computing needs and costs change 23

Cloud Security Shared Responsibility Model Amazon Web Services (AWS) Vendor protects data centers and servers on which data is stored Application security and data is customer responsibility Customers can purchase additional security services Data encryption User authentication Access logs/audit/monitoring 24

Data Loss Prevention 25

Key Benefits Identifies storage locations of PHI or other sensitive data Identifies data being sent to the Internet/Cloud Restricts cleartext transmissions of data Allows for policy driven management of data storage Minimizes the likelihood of breaches Identifies user training gaps or issues 26

Implementation Considerations Important aspects: Data fingerprinting Email integration Web content filter/proxy integration Endpoint protections Consider implications of utilizing SSL intercept Requires resources for appropriate management 27

Questions? Type your questions into the Questions pane. We ll answer as many as we can. 28

More Questions? Contact Us. James B. Wieland Principal Ober Kaler jbwieland@ober.com David Holtzman Vice President of Compliance Services, CynergisTek, Inc. david.holtzman@cynergistek.com @HITprivacy