The Second National HIPAA Summit



Similar documents
An Introduction to HIPAA and how it relates to docstar

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA Security Alert

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Information Security Overview

C.T. Hellmuth & Associates, Inc.

HIPAA Compliance Guide

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA: In Plain English

HIPAA Security Rule Compliance

Healthcare Compliance Solutions

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

VMware vcloud Air HIPAA Matrix

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Security Controls What Works. Southside Virginia Community College: Security Awareness

HIPAA Compliance Guide

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

How To Write A Health Care Security Rule For A University

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Intel Enhanced Data Security Assessment Form

HIPAA Security Series

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

HIPAA Security: Complying with the HIPAA Security Rule Implementation Specifications Are You Correctly Addressing Them?

A Technical Template for HIPAA Security Compliance

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Datto Compliance 101 1

plantemoran.com What School Personnel Administrators Need to know

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

FINAL May Guideline on Security Systems for Safeguarding Customer Information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

Newcastle University Information Security Procedures Version 3

Procedure Title: TennDent HIPAA Security Awareness and Training

HIPAA Audit Risk Assessment - Risk Factors

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

HIPAA: Compliance Essentials

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

HIPAA Security Matrix

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

The Practical Guide to HIPAA Privacy and Security Compliance

White Paper. Support for the HIPAA Security Rule PowerScribe 360

An Effective MSP Approach Towards HIPAA Compliance

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

HIPAA and Mental Health Privacy:

Hengtian Information Security White Paper

ipatch System Manager - HIPAA Compliance

HIPAA Compliance: Are you prepared for the new regulatory changes?

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Security Checklist

IT - General Controls Questionnaire

HIPAA Security Compliance Reviews

Altius IT Policy Collection Compliance and Standards Matrix

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

HIPAA/HITECH Compliance Using VMware vcloud Air

CHIS, Inc. Privacy General Guidelines

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

What Virginia s Free Clinics Need to Know About HIPAA and HITECH

Information Blue Valley Schools FEBRUARY 2015

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Music Recording Studio Security Program Security Assessment Version 1.1

Retention & Destruction

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

HIPAA PRIVACY AND SECURITY AWARENESS

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

Policy Title: HIPAA Security Awareness and Training

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

Transcription:

HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice Manager, Enterprise Security This document is provided for educational purposes, as is without any warranty of any kind, either expressed or implied.

Presentation Outline Many organizations are searching for guidance on how to implement HIPAA Security Standards. This presentation offers some ideas and the policies, procedures and documentation required by HIPAA. Part 1 Overview What is HIPAA... 1 Administration Simplification (Diagram) Security Goals Observations HIPAA is More About Change than Technology (Diagram) Part 2 What is Required... 2 Policies, Procedures, Forms & Memos (Diagram) Security Policies Administrative Procedures (Table) Physical Safeguards (Table) Technical Security (Table) Transmission Security (Table) Elements of a Security Program (Diagram & Table)... 5 Part 3 Getting Started... 6 Roles and Responsibilities Security Planning Policies and Procedures Workstations Media Controls (CIA) Part 4 Implementation... 8 Certification of Systems Training, Education and Awareness (TEA) Configuration Management Incident Report and Handling Part 5 Changing the Culture... 9 Today s Situation Resource Considerations Part 6 Conclusion... 9 2001, Healthcare Computing Strategies, Inc. i

Implementation of the HIPAA Security Rule Documentation and Procedures 1. Overview What is HIPAA? HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Public Law 104-191 All titles have been implemented except: Title II, Subtitle F - Administrative Simplification Title I: Insurance Portability Title II: Administrative Simplification Title III: Medical Savings and Tax Deduction Title IV: Group Health Plan Provisions Title V: Revenue Offset Provisions Title II: Administrative Simplification EDI Security Privacy Security Requirements Administrative Physical Technical Technical Procedures Safeguards Services Mechanisms 12 Requirements 6 Requirements 5 Requirements (Data at rest) 1 Requirement (with 7 Features) (Data in transit) 2001, Healthcare Computing Strategies, Inc. 1

Is security a business enabler or an expense? Security Goals Confidentiality Integrity Availability Observations Cannot attempt to impose monolithic solutions Continuous development process Two Year Requirement - Opportunity for assessment Need for a Best Practices document HIPAA is More About Change, than Technology Culture Trillion dollar cottage industry Caring is sharing Highly proprietary Operations New Policies & Procedures Process redesign Official guidelines Technology Medical Highly sophisticated Essential Information Heterogeneous By necessity 2. What is Required High Level Policies Procedures Low Level Forms & Memo Detail 2001, Healthcare Computing Strategies, Inc. 2

Security Policies Administrative Physical Technical Formal mechanism for processing records Information access control Sanction Policy Assigned security responsibility Media controls Physical access controls Workstation use Authorization control Administrative Procedures Policy Proc. Form Memo Certification Chain of trust partner agreement Contingency plan Disaster Recovery Emergency Mode Access Procedures Formal mechanism for processing records Release of Information Confidentiality Agreements Information access control Request for UserID & Password Role-Based Authorization Internal audit Personnel security Clearances (Background Checks) Security configuration management Change Control Inventory (Property Pass) Security Testing Security incident procedures Security management process Security Policy (Overall) Risk Analysis & Management Sanction Policy Termination procedures Exit Interview Checklist Training Attendance Sheet, Test, etc. 2001, Healthcare Computing Strategies, Inc. 3

Required Policies, Procedures, and Documents (Continued) Physical Safeguards Policy Proc. Form Memo Assigned security responsibility Media controls Accountability (Liability Agreements) Backups Disposal Physical access controls Escort procedures Visitor sign-in log sheet Policy/guideline on workstation use Secure workstation location Security awareness training Technical Security Policy Proc. Form Memo Access control Procedure for Emergency Access Audit controls Logs Authorization control Request for UserID and System Access Data authentication Entity authentication Transmission Security Policy Proc. Form Memo Communications/network controls (Access controls, Alarm, Audit trail, Encryption, Entity authentication, Event reporting, Integrity controls, Message authentication.) Optional: Software Use Modem Use Internet and E-Mail Usage Classification of Information (Assignment of Data Ownership) 2001, Healthcare Computing Strategies, Inc. 4

Elements of a Security Program Secure your enterprise and compliance will follow. Steve Hunt, GIGA 12/99 Four Cycle Process: Manage Assess Prevent Detect Manage 1. Roles and Responsibilities (Planning and hiring) 2. Security Planning 3. Policy and Procedures 4. Security Management Assess 5. Risk Assessment (Organizing) 6. PC Workstation Security (Laptop & Portable) 7. Systems Security (Servers & Mainframes) 8. Communication Security (Network) 9. Software (Operating System & Application) 10. Media Controls & Information Security The real threat lies not necessarily in the distant chance of the interception of patient information in transmission, but the storage and management of the information once it is received. Encrypting patient information during transmission is due diligence. But once the information is received and decrypted, what level of protection is applied to the information? Prevent 11. Certification of Systems (Directing) 12. Training, Education & Awareness 13. Physical & Personnel Security 14. Access Control (Physical, Logical, & Remote) 15. Configuration Management 16. Contingency & Disaster Recovery Detect 17. Audit Trails (Controlling) 18. Audit Controls & Alarms 19. Incident Reporting & Handling 20. Program Review (Internal Audit) 2001, Healthcare Computing Strategies, Inc. 5

3. Getting Started Roles and Responsibilities Assign Security Responsibility Information Security Manager / Officer Privacy Officer Assignments Responsibilities include: 1) The use of security measures 2) The conduct of personnel Establish a What attributes do you think a good security manager needs? Security Planning Brief management and leadership on HIPAA and its impacts Establish a Determine resources required: Budgets, staff, equipment, etc. Policies and Procedures Review and update existing policies and procedures Create new policies and procedures What are the fallacies of policy? 2001, Healthcare Computing Strategies, Inc. 6

Workstations (Then and Now ) Hardware Software Location Support Malicious Code Misuse & Abuse Mainframes & Terminals Custom Designed Centralized Few; Highly Skilled Few Rare Guideline on Workstation Use (Includes laptops) Documented instructions/procedures delineating the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings, of a specific computer terminal site or type of site, dependant upon the sensitivity of the information accessed from that site. Part of Physical safeguards to guard data integrity, confidentiality, and availability on the matrix. Information protection (Log off) File storage and deletion Disposal procedures Monitor position Donut Strike Media Controls (CIA) Controlled access to media (E: Patient information stored on a server) Accountability Liability Agreements Data backup, storage and Protecting Patient Information Printed Faxed Stored Paper and electronic media Transmitted CIA = Confidentiality, Integrity, & Availability 2001, Healthcare Computing Strategies, Inc. 7

4. Implementation Certification of Systems What? The technical evaluation performed as part of, and in support of, the accreditation process that establishes the extent to which a particular computer system or network design and implementation meet a pre-specified set of security requirements. This evaluation may be performed internally or by an external-accrediting agency. Part of administrative procedures to guard data integrity, confidentiality, and availability. Training, Education and Awareness (TEA) Training = Education = Awareness = The goal of TEA Changing Behaviors Configuration Management What is the difference? Documentation Change control Security Testing (After significant changes to system) Anti-virus updates Are there procedures for the implementation of software patches and security advisories? Incident Report and Handling Can associates identify an unauthorized use of patient information? Do associates know how to report security incidents? Will associates report an incident? Do those investigating security incidents know how to preserve evidence? 2001, Healthcare Computing Strategies, Inc. 8

5. Changing the Culture Today s Situation Limited resources for security Privacy is not a market differentiator Most believe Up until HIPAA, few incentives for security How long does it take to change an organization s culture? Resource Considerations Time - 26 months from final rule posting Money - Cost of compliance unknown People - Skilled staff in EDI and security Vendors - Hardware and software 6. Conclusion Determine what are the policies, procedures, and forms your organization will use to prove compliance. Get started now by building a good security program and HIPAA compliance will follow. Everyone is still struggling along - No organization can claim to be compliant because the final rules are not published. Thanks for attending! It is our hope that this presentation served your needs. We welcome your feedback. If we can be of help to you in the future, please contact us at: E-mail: jcparmigiani@hcs-is.com Voice: (410) 750-2060 E-mail: trwalsh@hcs-is.com Voice: (913) 696-1573 2001, Healthcare Computing Strategies, Inc. 9

E:\Cygnus Stuff\HIPAA Presentations\Session 403 - Security Regs.do Created on