HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers



Similar documents
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Cloud Security and Managing Use Risks

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Services Overview

HIPAA Compliance: Are you prepared for the new regulatory changes?

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Data Privacy, Security, and Risk Management in the Cloud

Big Data, Big Risk, Big Rewards. Hussein Syed

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

5 Cornerstones of Compliance

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Clinical Trials in the Cloud: A New Paradigm?

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Isaac Willett April 5, 2011

Cloud Security Trust Cisco to Protect Your Data

HIPAA Compliance Guide

HIPAA Compliance Guide

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Security Considerations for the Cloud

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

Datto Compliance 101 1

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Securing the Microsoft Cloud

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

HIPAA BUSINESS ASSOCIATE AGREEMENT

Client Security Risk Assessment Questionnaire

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

M E M O R A N D U M. Definitions

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Compliance and the Cloud: What You Can and What You Can t Outsource

Cloud Computing: Legal Risks and Best Practices

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

BMC s Security Strategy for ITSM in the SaaS Environment

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Cloud models and compliance requirements which is right for you?

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

BUSINESS ASSOCIATE AGREEMENT

Information Security Program

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

STATE OF NEW JERSEY Security Controls Assessment Checklist

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Regulatory Update with a Touch of HIPAA

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Use & Disclosure of Protected Health Information by Business Associates

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Rogers Insurance Client Presentation

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Logging In: Auditing Cybersecurity in an Unsecure World

This form may not be modified without prior approval from the Department of Justice.

Cloud Computing Trends, Examples & What s Ahead

HIPAA Security Rule Compliance

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST

Our Commitment to Information Security

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

The CIO s Guide to HIPAA Compliant Text Messaging

Information Technology: This Year s Hot Issue - Cloud Computing

Security in the Cloud: Visibility & Control of your Cloud Service Providers

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES

Intel Enhanced Data Security Assessment Form

Managing Cloud Computing Risk

A Guide to. Cloud Services for production workloads

Transcription:

How to Effectively Collaborate with Cloud Providers

Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting provider that operates multiple enterprise class data centers located in Austin, Texas and Raleigh, North Carolina. As an SSAE 16 SOC II Audited, PCI and HIPAA compliant company, OnRamp specializes in working with companies in the Healthcare, Financial, Education and other industries meet the rigorous compliance requirements associated with the storage and transmission of sensitive data. A leader in the development of OnRamp s HIPAA Compliant Hosting Solutions, Chad brings a wealth of experience, expertise and intimate knowledge of data privacy and security issues.

Agenda Overview of Topics Covered Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA Cloud Adoption in Healthcare - Benefits HIPAA in the Cloud - Obstacles Key Concerns for Working with Cloud Providers Health IT Cloud Forecast

Evolution in the Cloud HIPAA in the Cloud In-House Colocation Private Cloud Public Cloud

Evolution in the Cloud HIPAA in the Cloud Public Clouds Multi-tenant Environment Shared Equipment Typically Pay-as-you-go Less Control Over Hardware Performance - Noisy Neighbors No Physical Access to Equipment Hard or Impossible to Inspect/Audit Private Clouds Single Tenant Environment Dedicated Equipment Customized Solutions Guaranteed Performance (Single Tenant) Easy to Inspect/Audit Suited for Secured Confidential Information & Core Systems

Evolution in the Cloud HIPAA in the Cloud

Evolution in the Cloud HIPAA in the Cloud Public vs. Private Cloud - Key Concern How do I achieve auditable compliance?

Evolution in the Cloud HIPAA in the Cloud CONFIDENTIALITY AVAILABILITY INTEGRITY SENSITIVE DATA SENSITIVE DATA BANKING E-COMMERCE GOVERNMENT HEALTHCARE

GLBA gives the authority to eight federal agencies to administer and enforce the Financial Privacy Rule and the Safeguards Rule which govern the collection and disclosure of personal financial information and requires financial institutions to implement and maintain safeguards to protect customer information

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements that prescribe operational and technical controls to protect cardholder data.

FISMA is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or manmade threats.

HIPAA gives the Department of Health and Human Services the authority to mandate the use of standards for the interchange of patient health information and to mandate the steps entities must take to provide for the security and privacy of patient health information.

The Adoption of Cloud Computing for Healthcare Companies HIPAA in the Cloud - Adoption & Use 83% of Healthcare Provider Organizations are using Cloud Services w/ SaaS-Based Applications being the most popular (66.9%) and 9.3% plan to adopt cloud services. 83% of Healthcare Providers use Cloud Services

83% Hybrid Hosting

Disassociation with Infrastructure In a physical IT environment, the key components of a compute infrastructure are easily identified and the safety of the data stored within the environment can easily be determined. In a cloud infrastructure, the location of these components, whether they are properly configured, and whether they even exist is not always clear.

Considerations - Compliant Collaboration Collaboration between in-house employees and subcontractors is necessary to meet and maintain compliance

Considerations - Security / Compliance Risk associated with storing electronic protected health information (ephi) on platforms or within environments that do not have HIPAA compliant hosting processes, systems, and procedures.

Considerations - Compliant Encryption Ensuring compliance with NIST standards for all compute, storage and transmission media used to handle ephi.

Considerations - Media Sanitization Ensuring compliance with NIST standards for appropriately rendering storage media unusable, unreadable, or indecipherable.

Considerations - Security Incident Response Cloud users and providers must prepare for security incidents and adequately detect, report, forensically examine, mitigate and contain and eradicate risk associated with the incidents.

Considerations Availability / Uptime EPHI must be appropriately available to authorized users. This often requires a Disaster Recovery (DR) or secondary site to maintain availability in the case of a cloud outage.

Evaluating Providers Approach to Evaluating Cloud Providers 83%

Evaluating Providers Negotiating with Subcontractors Employee Training Media Handling & Sanitization Policies Information System Development Lifecycle Cooperative Policies Coordinated Incident Response

Negotiating with Subcontractors Subcontractor Negotiations Business Associates Agreements Should reflect division of responsibilities Should include (but usually do not) the Administrative, Technical, and Physical measures the customer must still take to protect ephi Realistic patient access, amendment and accounting of access request handling

Negotiating with Subcontractors Subcontractor Negotiations Indemnification & Limitations of Liability Indemnifications were specifically excluded from the Omnibus rule despite many requests to address them. Vendors won t accept indemnifications normally. Limitations of Liability contain the amount of risk accepted and facilitate pricing of vendor products

Negotiating with Subcontractors Subcontractor Negotiations Privacy Injury Liability & Insurance Privacy Injury Liability - Breach notification, credit monitoring and other expenses related to a breach are usually handled by customer. Insurance Breach notifications and other remediation are conducted by Covered Entity their insurance should cover these costs.

How OnRamp is addressing HIPAA in the Cloud Colocation Space Private Cloud Environment Backups SAN Storage Internet

The future of HIPAA in the cloud HIPAA in the Cloud

Q&A HIPAA in the Cloud Q&A

Thank you! HIPAA in the Cloud Thank you!