Securing Patient Portals



Similar documents
Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA and HITECH Compliance for Cloud Applications

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Secure Endpoint Management. Presented by Kinette Crain and Brad Lewis

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

Sustainable Compliance: A System for Ongoing Audit Readiness

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Assessing Your HIPAA Compliance Risk

Bridging the HIPAA/HITECH Compliance Gap

HITRUST CSF Assurance Program

HIPAA Privacy and Information Security Management Briefing

HIPAA and Mental Health Privacy:

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

HIPAA COMPLIANCE PLAN FOR 2013

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality

Healthcare and IT Working Together KY HFMA Spring Institute

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

HIPAA Compliance Guide

HIPAA Summit. March 10, Phyllis A. Patrick, MBA, FACHE, CHC Phyllis A. Patrick & Associates LLC

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

HIPAA in an Omnibus World. Presented by

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

HIPAA Compliance: Are you prepared for the new regulatory changes?

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

HIPAA Security & Compliance

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

HIPAA: Compliance Essentials

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

OIG Security Audits of EHR Incentive Program Participants

ALERT LOGIC FOR HIPAA COMPLIANCE

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

Security Is Everyone s Concern:

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Joe Dylewski President, ATMP Solutions

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Document Imaging Solutions. The secure exchange of protected health information.

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

HIPAA Security Rule Compliance

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

SECURETexas Health Information Privacy & Security Certification Program FAQs

New HIPAA regulations require action. Are you in compliance?

What can HITRUST do for me?

Transcription:

Securing Patient Portals What you need to know to comply with HIPAA Omnibus and Meaningful Use Brian Selfridge, Partner, Meditology Services, LLC Blake Sutherland, VP Enterprise Business, Trend Micro

Brian Selfridge, Meditology 12+ years experience in healthcare IT security and compliance leadership Previously CISO of AtlantiCare and healthcare security practice at PricewaterhouseCoopers Published author, certified CISSP and Info systems security and info assurance by CNSS & NSA Leads Meditology s IT Risk Management practice Meditology is dedicated to delivering expertise and leadership in information privacy and security, compliance, and audit, specifically for healthcare. 2

Blake Sutherland, Trend Micro 15+ years experience in security Helped to bring Cloud Security to the forefront at Third Brigade acquired by Trend Micro Experience with HITRUST Trend Micro Incorporated, a global leader in security so<ware, strives to make the world safe for exchanging digital informadon. Our innovadve security soludons for consumers, businesses and governments protect informadon on mobile devices, endpoints, gateways, servers and the cloud. 3

Agenda Introductions Healthcare Industry Trends Incentives & Penalties Patient Portal Security Requirements How to Address Security Requirements Trend Micro Security for Patient Portals Questions 4

HEALTHCARE INDUSTRY TRENDS 5

Healthcare Industry Trends The move to 3 rd party hosted applications is shifting security administration, but not the risk Market and regulatory pressures are driving rapid portal adoption Mandatory breach notification under HITECH is increasing visibility for data loss events Oversight from federal and state agencies is ramping up o OCR o CMS o State Attorneys General 6

INCENTIVES & PENALTIES 7

Incentives & Penalties Patient Portals and Meaningful Use (MU) o HITECH provides $19.2 billion in incentive payments to promote EHR adoption o Requires certified EHR technology and deployment of a secure patient portal o Incentive payments scale from individual providers to large health systems o MU also establishes penalties in future years for providers that have not met requirements 8

Incentives & Penalties (continued) HIPAA / HITECH / Omnibus o Penalties can be up to $1.5 million per year per violation Covered En*ty OCR Fine New York and Presbyterian Hospital (NYP) Columbia University (CU) WellPoint Inc. Affinity Health Plan, Inc. Idaho State University Shasta Regional Medical Center Skagit County Adult & Pediatric Dermatology, P.C. $4,800,000 $4,800,000 $1,700,000 $1,215,780 $400,000 $275,000 $215,000 $150,000 9

PATIENT PORTAL SECURITY REQUIREMENTS 10

MU Security Requirements 11

Portal Security Scope (1) Risk Analysis AdministraDve HIPAA Security Rule Physical Technical (2) Secure Messaging PaDents Download Data ARRA / MU PaDent Portal Requirements Reminders EducaDonal Materials 12

MU & Portal Security Myths Source: The Office of the Na-onal Coordinator for Health Informa-on Technology (ONC), 2014. hap://www.healthit.gov/sites/default/files/pdf/privacy/privacy- and- security- guide- chapter- 2.pdf 13

HOW TO ADDRESS SECURITY REQUIREMENTS 14

Risk Assessment Process There is no single prescriptive method that guarantees compliance with the Security Rule, but a typical security risk assessment includes the following steps: o Assess risks and identify potential threats to the confidentiality, integrity and availability of ephi. o Respond to risks by creating a Corrective Action Plan and prioritizing remediation efforts. o Continuously monitor changes that may affect security controls and update the Corrective Action Plan. Monitor Results Respond to Risks Assess Risks 15

Determination of Risk Relevant Threats Internal and External VulnerabiliDes Degree of harm that may occur Likelihood that harm will occur 16

Corrective Action Plan Degree of Risk Threats & VulnerabiliDes RemediaDon Priority Correc*ve Ac*on Plan Start & End Date Owner Milestones 17

Monitor Risks Key Performance Indicators Monitor Risk Changes to systems, environment Compliance CAP Progress 18

Sharing the Risk Third- party snafus are adributed for 41 percent of breaches. Over the past three years, the number of security incidents at companies adributed to partners and vendors has risen increasing from 20% in 2010 to 28% in 2012. 76% of data breaches analyzed by TrustWave resulted from a third- party which introduced the security deficiencies that were uldmately exploited. 19

Technical Vulnerabilities Identify potential vulnerabilities to the patient portal through technical testing including: o Application-level vulnerabilities o Supporting infrastructure and platforms o Web servers o Databases o Access and authentication Assess against standards such as HITRUST and the Open Web Application Security Project (OWASP) Conduct routine scanning to identify vulnerabilities over time 20

21 Source: OWASP, 2014 haps://www.owasp.org/index.php/top_10_2013

Technical Vulnerabilities Encryption Requirements o Stage 2 of MU specifically requires addressing the encryption and security of data stored and transmitted via the certified EHR technology o Verify encryption is in place and actively protecting ephi Encryption Solutions o Encrypt data at rest including in backups, laptops, and mobile devices o Use Extended Validation (EV) SSL certificates to secure all transactions and communications on the portal and to visually indicate to visitors that the site is secure. 22

What to look for in a PaDent Portal Security SoluDon Blake Sutherland

Trend Micro Security for PaDent Portals Patient Portal Landscape Patient Portal Vendors Epic MyChart Cerner Patient Portal RelayHealth Portal McKesson My Care Plus Intuit Health Portal AllScripts Portal eclinicalworks Portal Jardog s FollowMyHealth NextGen Third Party / Cloud Hosted Data Center Home Health PaDent Portal Claims EHR Billing Human Resources AnalyDcs Security for Patient Portals Web site: DS for Web Apps Data: SecureCloud Data Center: Deep Security Advanced Threats: Deep Discovery Endpoints: OfficeScan, Email Encryption, InterScan Web Security, InterScan Messaging Security, ScanMail EHR Human Resources Claims Patient Portal web app PaDent Portal Pharmacy Home Health Lab AnalyDcs Billing / Finance EHR Lab Patient Portal On-Premise Data Center Medical Devices 24

RecommendaDon Reminder You need a Patient Portal security approach that addresses: Routine risk assessment and corrective action tracking Comprehensive vulnerability detection Actionable insight on vulnerabilities for faster mitigation Security for your entire ecosystem including patient portal, data center, medical devices, end user devices and sensitive data Trend Micro can help. Request your Patient portal health check today! webappsecurity.trendmicro.com 25

Questions? Thank you for your time 26

Contact Us Brian Selfridge Meditology Services brian.selfridge@meditologyservices.com Blake Sutherland Trend Micro Blake_sutherland@trendmicro.com For more information visit webappsecurity.trendmicro.com 27 2014 Meditology Services, Atlanta, GA. All Rights Reserved