Beyond Good Practice: Why HIPAA only addresses part of the data security problem



Similar documents
The Impact of HIPAA and HITECH

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Vulnerability Management Policy

General HIPAA Implementation FAQ

VA Medical Device Protection Program (MDPP)

Healthcare Compliance Solutions

M E M O R A N D U M. Definitions

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Overview of the HIPAA Security Rule

Office of Inspector General

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

InfoGard Healthcare Services InfoGard Laboratories Inc.

HIPAA Employee Compliance Program TRAINING MANUAL

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Security Series

Security Issues in Cloud Computing

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Enterprise Security Solutions

Information Security for Managers

Information Blue Valley Schools FEBRUARY 2015

Big Data, Big Risk, Big Rewards. Hussein Syed

HIPAA Security Rule Compliance

CloudCheck Compliance Certification Program

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

DOD Medical Device Cybersecurity Considerations

HIPAA Compliance: Are you prepared for the new regulatory changes?

Standard Operating Procedure Information Security Compliance Requirements under the cabig Program

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002

Alert. Client PROSKAUER ROSE LLP. HIPAA Compliance Update: Employers, As Group Health Plan Sponsors, Will Be Affected By HIPAA Privacy Requirements

Security Controls What Works. Southside Virginia Community College: Security Awareness

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

INFORMATION SECURITY California Maritime Academy

Standards for Security Categorization of Federal Information and Information Systems

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

HIPAA and HITECH Compliance for Cloud Applications

Specific observations and recommendations that were discussed with campus management are presented in detail below.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

C.T. Hellmuth & Associates, Inc.

HIPAA: In Plain English

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Security Alert

My Docs Online HIPAA Compliance

DATA SECURITY AGREEMENT. Addendum # to Contract #

Notice of Privacy Practices

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

Achieving HIPAA Security Rule Compliance with Lumension Solutions

ALERT LOGIC FOR HIPAA COMPLIANCE

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

White Paper Strengthening Information Assurance in Healthcare

Data Management Policies. Sage ERP Online

Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum

HIPAA Security Compliance Reviews

John Essner, CISO Office of Information Technology State of New Jersey

Business Associates, HITECH & the Omnibus HIPAA Final Rule

NIST National Institute of Standards and Technology

Data Breach Response Planning: Laying the Right Foundation

The HIPAA Security Rule: Theory and Practice

Information Technology Engineers Examination

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Transcription:

Beyond Good Practice: Why HIPAA only addresses part of the data security problem Jeff Collmann, Ph.D. ISIS Center, Georgetown University Medical Center

Beyond Good Practice HIPAA: the difficulties of good practice Software vulnerabilities in biomedical devices Organizing network operations and security

Health Insurance Portability and Accountability Act of 1996 Prevent loss of health insurance upon change in jobs Administrative Simplification Regulations Transaction and Code Set Standards Privacy of all individual health information Security of electronic individual health information Identifiers

HIPAA Security as Good Practice No data security standards in 1996 HHS sought industry advice, including NIST, DoD, textbooks, commercial practice, emerging guidelines Health care industry behind commercial practice Final Security Rule: February 2003 Compliance date: April 21, 2005

HIPAA Security as Good Practice Developing administrative judgment: What but not how 22 Standards 40 Implementation specifications Required and Addressable Three types of rules Administrative Physical Technical

HIPAA Security as Good Practice Standard: Security Management Process Text: Implement policies and procedures to prevent, detect, contain, and correct security violations. Implementation Specifications: Required Risk Analysis Risk Management Sanction Policy Information System Activity Review

HIPAA Security as Good Practice Standard: Transmission Security Text: Implement technical security mechanisms to guard against unauthorized access to protected health information that is being transmitted over an electronic communications network. Implementation Specifications: Addressable Integrity Controls Encryption

HIPAA Security as Good Practice HIPAA s heart: managing data security risks Adapt to scale of operations Assess and learn to manage new threats and vulnerabilities to breaches of confidentiality, integrity and availability using good practice

Difficulties of Good Practice Risk Management Ongoing cycle of assessing, implementing, monitoring, and revising Assesses technical and organizational threats IT specialists conduct technical vulnerability scans Multidisciplinary team should conduct comprehensive risk assessments Requires new types of work among new constellations of people

Difficulties of Good Practice OCTAVE sm : self-directed information security risk assessment process Comprehensive approach Multidisciplinary team SM - Operationally Critical Threat, Asset, and Vulnerability Evaluation and OCTAVE are service marks of Carnegie Mellon University.

Difficulties of Good Practice

Difficulties of Good Practice An interdisciplinary team Clinical staff Health information managers Information technology staff

Difficulties of Good Practice

Difficulties of Good Practice OCTAVE sm Integrates mission with information assets, business process and security risk management Builds consensus from diverse perspectives on information management But, entails costs Much time and effort across the enterprise Productivity losses of staff from primary duties Staff resistance Fails if relegated to IT only

Beyond Good Practice Software vulnerabilities in Computerized Biomedical Devices Approaches to organizing network operations and security

Vulnerabilities in Biomedical Devices Medical devices subject to FDA regulation 510K review for safety and efficacy Software patches require testing and revalidation Only vendors can perform repairs, testing and revalidation Physicians worry about patient safety Medical devices with unpatched software pose threat to entire network

Vulnerabilities in Biomedical Devices Medical devices subject to FDA regulation Vendors not include this type of repair and testing in standard maintenance agreement Negotiations among vendors and customer representatives (VHA, DoD, HIMSS) just begun Vulnerabilities proliferating

Vulnerabilities in Biomedical Devices Does this pose a major problem for networked systems? Air Force TCNO alerts that affected medical devices: 15 April 2002 to 14 April 2003 Type of Operating System UNIX Windows Total Average Alerts per month.83 3.08 3.91

Vulnerabilities in Biomedical Devices Revolving Threat for Air Force Medical Service Waiver can extend time for individual device Before existing patches installed and tested, new vulnerabilities emerge Number and time required for patches creates chronic problem for large networks with tens or hundreds of medical devices Thus, performing the good practice of applying patches cannot alone secure such medical networks Requires contractual and architectural solutions

Architecting Reform Good practice does not address the architecture of network operation and security management One Air Force, One Network program redirects network management from decentralized to centralized approach

Architecting Reform Existing decentralized network management architecture

Architecting Reform Each Air Force facility develops its own approach to network management and security, including military treatment facilities Great complexity, cost, and autonomy Great diversity in hardware, software and local architecture No central visibility of expense or bulk discounts Little central oversight of activities or effectiveness Maximum flexibility to respond to local conditions

Architecting Reform One Air Force, One Network centralized three-tiered management

Architecting Reform Air Force Communications Agency develops common approach to network management and security, including military treatment facilities Less complexity, cost, and autonomy Common approach to hardware and software producing unified deployment and bulk discounts Centralized budgeting Centralized management based at headquarters of 13 Air Force Major Commands Minimum flexibility: Functional adaptations require negotiation with central command (eg HIPAA or biomedical devices)

Conclusions Implementing good information security practice in health care organizations requires new types of work among new constellations of people Networked, computerized medical devices pose chronic security vulnerabilities to their host networks Managing network operations and security requires balancing flexibility with central control