Cloud Computing in a HIPAA- Compliant World. NRTRC Telemedicine Conference Dean Oswald March 25, 2014



Similar documents
PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

HIPAA Compliance Guide

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Healthcare Compliance Solutions

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

HIPAA Security Matrix

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

Datto Compliance 101 1

HIPAA Security Checklist

HIPAA COMPLIANCE REVIEW

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA Security Rule Compliance

A Technical Template for HIPAA Security Compliance

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

HIPAA Information Security Overview

HIPAA Compliance Guide

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Security Series

VMware vcloud Air HIPAA Matrix

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

SECURITY RISK ASSESSMENT SUMMARY

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Security Is Everyone s Concern:

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

How To Write A Health Care Security Rule For A University

HIPAA Security Alert

HIPAA Security COMPLIANCE Checklist For Employers

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

HIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon

Krengel Technology HIPAA Policies and Documentation

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA Compliance: Are you prepared for the new regulatory changes?

An Effective MSP Approach Towards HIPAA Compliance

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

The Second National HIPAA Summit

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

ITS HIPAA Security Compliance Recommendations

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

HIPAA Security and HITECH Compliance Checklist

Policies and Compliance Guide

Achieving HIPAA Security Rule Compliance with Lumension Solutions

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA Security: Complying with the HIPAA Security Rule Implementation Specifications Are You Correctly Addressing Them?

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Making Leaders Successful Every Day

John Essner, CISO Office of Information Technology State of New Jersey

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

Bridging the HIPAA/HITECH Compliance Gap

NET ACCESS HIPAA COMPLIANT FLEXCloud

HIPAA Security Policies & Procedures (HITECH updated)

C.T. Hellmuth & Associates, Inc.

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics

HIPAA and Mental Health Privacy:

An Introduction to HIPAA and how it relates to docstar

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

AOA HIPAA SECURITY REGULATION COMPLIANCE MANUAL

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

itrust Medical Records System: Requirements for Technical Safeguards

HIPAA: In Plain English

CHIS, Inc. Privacy General Guidelines

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

Implementing HIPAA Compliance with ScriptLogic

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures

efolder White Paper: HIPAA Compliance

Transcription:

Cloud Computing in a HIPAA- Compliant World NRTRC Telemedicine Conference Dean Oswald March 25, 2014

Agenda Cloud overview Infrastructure-as-Service overview HIPAA-compliant IaaS Risk cost speed tradeoffs Responsibility matrix for HIPAA requirements New technologies Customer Examples Recap 2

Why is it called the cloud? Network Cloud Originally network shorthand for: Magic happens in here and we don t know/care how it works. 3

Evolution toward the cloud 4

IT decisions balance conflicting goals Reliability DR Compliance Security Must Have Nice to Have Ease of Use Risk Features CapEx OpEx Staff Cost Speed Deployment Upgrades Scalability 5

Cloud computing is like a miracle drug Higher overall reliability Lower overall risk Risk Features Adequate features, growing Applications delivered via web browser Reduces CapEx Lower & usage based OpEx Reduces staff Cost Speed Faster deployment Automatic upgrades Huge scalability 6

Cloud computing service models 7

What is Infrastructure-as-a-Service (IaaS)? 8

Infrastructure-as-a-Service benefits An excellent option for healthcare organizations that are: Facing the expense of a technology or hardware refresh Ready to implement EMR and EHR solutions that require complex environments Short-staffed due to changing needs or loss of experienced IT professionals Desiring a Disaster Recovery environment outside their own region Concerned about ephi security or other compliance issues (HIPAAcompliant providers) Seeking a more predictable cost structure 9

HIPAA-compliant IaaS Added requirements based on HIPAA and/or HITECH-Act regulations External auditor assesses organizational, administrative, physical and technical controls Validation of compliance with policies and procedures by review of logs, configuration, records and interview of personnel Evaluation and validation of architecture, including interviews of personnel responsible for design and implementation, for Technical Safeguards Validation of physical controls deployed in the environment Privacy Rule requires Business Associate agreement 10

A common control design assessment model 11

Example requirements: Administrative Safeguards Standard Requirement ES Client Both Security Management Process HIPAA 164.308(a)(1)(i) Workforce Security HIPAA 164.308(a)(3)(i) Information Access Management HIPAA 164.308(a)(4)(i) Security Awareness and Training HIPAA 164.308(a)(5)(i) Risk Analysis and Management Sanction Policy Information System Activity Review Authorization and/or Supervision Workforce Clearance Procedures Termination Procedures Isolating Healthcare Clearinghouse Function N/A N/A N/A Access Authorization Access Establishment and Modification Security Reminders Protection from Malicious Software Log-in Monitoring Password Management 12

Example requirements: Physical Security Standard Requirement ES Client Both Facility Access Controls HIPAA 164.310(a)(1) Device and Media Controls HIPAA 164.310(d)(1) Contingency Operations Facility Security Plans Access Control and Validation Procedures Maintenance Records Disposal Media Re-use Accountability Data Backup and Storage 13

Example requirements: Technical Safeguards Access Control HIPAA 164.312(a)(1) Integrity HIPAA 164.312(c)(1) Standard Requirement ES Client Both Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption Mechanism to Authenticate Electronic Protected Health Information Transmission Security HIPAA 164.312(e)(1) Integrity Controls Encryption 14

RTO decision drives your options 16

New technologies ease compliance SSD with flash storage Always on encryption Meets data-at-rest requirement Protects against drive theft or loss in transit or maintenance A combination of software-based and ASIC-accelerated encryption for no performance loss 17

Customer example #1 Oregon-based Hospital Large skilled internal IT staff Significant assets already in place Hardware refresh provided opportunity to improve DR Solution Primary infrastructure in EasyStreet colocation 9-cabinet cage Redundant/diverse connectivity DR infrastructure located at hospital site Data replication/dr playbook managed by hospital IT 18

Customer example #2 Arizona-based healthcare provider New green-field clinical information system Complicated modern application Extremely high availability/performance required Solution HOT/HOT Disaster Recovery Solution (RPO 1 hour, RTO 4 hours) Identical dedicated private clouds in Beaverton and Phoenix Multiple replication techniques used Database / storage / hypervisor based DR playbook jointly developed by customer and EasyStreet 19

Recap The cloud delivered as Infrastructure-as-a-Service is an excellent option for healthcare organizations Ensure you re in compliance with your IaaS provider Have them sign a Business Associate agreement Request a Responsibility Matrix Your IaaS provider can help balance the risk/cost/speed or hot/warm/cold requirements that are right for your organization New technologies overcome risk/cost/speed limitations Inline encrypted storage 20

Thank you! Call 503-671-1884 Email gdoswald@easystreet.com 21