HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH



Similar documents
Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

HIPAA Information Security Overview

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security Rule Compliance

HIPAA Security Alert

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

HIPAA Compliance Guide

CHIS, Inc. Privacy General Guidelines

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security Series

Policies and Compliance Guide

HIPAA Security Rule Compliance and Health Care Information Protection

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

How To Write A Health Care Security Rule For A University

HIPAA Security Checklist

C.T. Hellmuth & Associates, Inc.

Healthcare Compliance Solutions

HIPAA Security Matrix

VMware vcloud Air HIPAA Matrix

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

SECURITY RISK ASSESSMENT SUMMARY

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

ITS HIPAA Security Compliance Recommendations

White Paper. Support for the HIPAA Security Rule PowerScribe 360

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Healthcare Compliance Solutions

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

Krengel Technology HIPAA Policies and Documentation

HIPAA and Mental Health Privacy:

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security

HIPAA Compliance Guide

Support for the HIPAA Security Rule

Huseman Health Law Group 3733 University Blvd. West, Suite 305-A Jacksonville, Florida Telephone (904) Facsimile (904)

787 Wye Road, Akron, Ohio P F

Datto Compliance 101 1

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Telemedicine HIPAA/HITECH Privacy and Security

A Technical Template for HIPAA Security Compliance

Guide: Meeting HIPAA Security Rules

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

HIPAA COMPLIANCE REVIEW

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures

State HIPAA Security Policy State of Connecticut

Procedure Title: TennDent HIPAA Security Awareness and Training

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

Security Is Everyone s Concern:

HEALTH CARE ADVISORY

HIPAA Security and HITECH Compliance Checklist

Policy Title: HIPAA Security Awareness and Training

HIPAA Security: Complying with the HIPAA Security Rule Implementation Specifications Are You Correctly Addressing Them?

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

HIPAA BASIC ELEMENTS FOR COMPLIANCE WITH THE SECURITY REGULATIONS. Perform a Risk Analysis. Pointers for Drafting Policies & Procedures CHECKLISTS

Lessons Learned from HIPAA Audits

An Effective MSP Approach Towards HIPAA Compliance

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon

HIPAA Training for Hospice Staff and Volunteers

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

HIPAA Security Policies and Procedures

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

HIPAA/HITECH: A Guide for IT Service Providers

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

Security Framework Information Security Management System

FINAL May Guideline on Security Systems for Safeguarding Customer Information

HIPAA HANDBOOK. Keeping your backup HIPAA-compliant

HIPAA: In Plain English

WHITEPAPER. Evolve your network strategy to meet new threats and achieve expanded business imperatives. Introduction... 1 The HIPAA Security Rule...

Preparing for the HIPAA Security Rule

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Network Security for End Users in Health Care

Why Lawyers? Why Now?

HIPAA Security Training Manual

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Security Compliance, Vendor Questions, a Word on Encryption

Security It s an ecosystem thing

AOA HIPAA SECURITY REGULATION COMPLIANCE MANUAL

Overview of the HIPAA Security Rule

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Transcription:

HIPAA Security Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

What is this? Federal Regulations August 21, 1996 HIPAA Became Law October 16, 2003 Transaction Codes and Identifiers Deadline April 14, 2003 Privacy Deadline April 21, 2005 Security Deadline

You ve got to have goals Everyone who sees, hears or handles PHI must keep it confidential and follow these rules, even if the individual does not have direct patient contact.

What is PHI? Protected Health Information: PHI is any health information that can be used to identify a patient and which relates to the patient, healthcare services provided to the patient, or the payment for these services.

What is this? 40+ Pages of very fine print 164.306 Security standards: General rules. (a) General requirements. Covered entities must do the following: (1) Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits. (2) Protect against any reasonably anticipated threats or hazards to the security or integrity of such information. (3) Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under subpart E of this part. (4) Ensure compliance with this subpart by its workforce.

What is this? Safeguards and Standards Administrative Physical Technical Implementation Specifications Required (You have to do this) (You still have to do this)

Hot Topics Risk Assessments Activity Review and Logs Awareness and Training PHI in Email Wireless, Mobile Devices Shadow copies, unmanaged PHI Encryption

Awareness and Training 164.308(5)(i) Implement a security awareness and training program for all members of its workforce (including management) (A) Security reminders (B) Protection from malicious software (C) Log-in monitoring (D) Password management

Risk Management 164.308 Administrative safeguards. (1)(a)(ii)(A) Risk analysis (Required). Conduct accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. (1)(a)(ii)(B) Risk management (Required). Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with 164.306(a).

Risk Management Why do we need this? Who will accept the risks? What is the determination process? Who will be involved determination process?

Physical Security 164.310 Physical safeguards. Physical safeguards are physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.

Facilities Systems Physical Security Access Control Policies and Documentation Systems Servers & Workstations Media Removable Magnetic, CD-Rs Rs,, Memory Keys, etc. Surplused Systems

Physical Security Equipment such as PCs, servers, mainframes, fax machines, and copiers must be afforded appropriate physical controls. Computer screens, copiers, fax machines, and printers must be situated in such a way that they cannot be accessed or viewed by the public. Computers must use password-protected screen savers.

Physical Security PCs that are used in open areas must be adequately secured to protect against theft or unauthorized access. Servers and mainframes must be contained in a secured area that is capable of limiting and monitoring physical access. Sealed envelopes marked CONFIDENTIAL should be used when mailing PHI.

Appropriate Disposal of Data Procedures for the appropriate disposal apply to PHI and Confidential Information. Hard copy materials such as paper or microfiche must be properly shredded or placed in a secured bin for shredding later. Magnetic media such as diskettes, tapes, or hard drives must be degaussed (subjected to a strong magnetic field) or electronically shredded using approved software and procedures. CD ROM disks must be rendered unreadable by shredding, defacing the recording surface, or breaking. No PHI or CI should be placed in the regular trash!

Activity Review 164.306(a)(D) Information system activity review (Required). Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.

Activity Review Auditing is a human-driven process Application logs? System logs Windows Event Logs Additional tracking has to be turned on Netware NetWare events are server-specific settings; that is, they must be enabled on each NCP Server object in the tree

Activity Review Networking Devices Firewalls, Routers, Switches Syslog? SNMP traps? Other Security Devices Anti-Virus Clients Intrusion Detection Intrusion Prevention Content Filters

Administrative Safeguards Security Management Process Risk Analysis Risk Management Sanction Policy I.S. Activity Review Required Required Required Required

Administrative Safeguards Assigned Security Responsibility Workforce Security Authorization and/or Supervision Workforce Clearance Procedure Termination Procedures

Administrative Safeguards Information Access Management Isolating Healthcare Clearinghouse Required Access Authorization Access Establishment and Modification

Administrative Safeguards Security Awareness and Training Security Reminders Protection from Malicious Software Login Monitoring Password Management

Administrative Safeguards Security Incident Procedures Evaluation Business Associate Contracts

Administrative Safeguards Contingency Plan Data Backup Plan Disaster Recovery Plan Emergency Mode Operation Plan Testing and Revision Procedure Applications and Data Criticality Required Required Required

Physical Safeguards Facility Access Controls Contingency Operations Facility Security Plan Access Control and Validation Maintenance Records

Physical Safeguards Workstation Use Workstation Security Device and Media Controls Disposal Required Media Re-use Required Accountability Data Backup and Storage

Technical Safeguards Access Control Unique User ID Emergency Access Procedure Automatic Logoff Encryption and Decryption Audit Controls Required Required

Technical Safeguards Integrity Mechanism to Authenticate ephi Integrity Person or Entity Authentication Transmission Security Integrity Controls Encryption

Thank you Questions?