Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Similar documents
Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

Statement of Policy. Reason for Policy

HIPAA OVERVIEW ETSU 1

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA 101: Privacy and Security Basics

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

COMPLIANCE ALERT 10-12

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

HIPAA Compliance for Students

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

My Docs Online HIPAA Compliance

HIPAA and Privacy Policy Training

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Presented by Jack Kolk President ACR 2 Solutions, Inc.

The ReHabilitation Center Buffalo Street. Olean. NY

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Patient Privacy and HIPAA/HITECH

HIPAA WEBINAR HANDOUT

STANDARD ADMINISTRATIVE PROCEDURE

M E M O R A N D U M. Definitions

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Five Rivers Medical Center, Inc Medical Center Drive Pocahontas, AR Notification of Security Breach Policy

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Overview of the HIPAA Security Rule

HIPAA-G04 Limited Data Set and Data Use Agreement Guidance

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

2014 Core Training 1

HIPAA Training for Hospice Staff and Volunteers

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

What do you need to know?

The Basics of HIPAA Privacy and Security and HITECH

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

MCCP Online Orientation

HIPAA Privacy and Security

HIPAA and You The Basics

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

HIPAA ephi Security Guidance for Researchers

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Table of Contents INTRODUCTION AND PURPOSE 1

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

NORTH CAROLINA COMMUNITY CARE INC. Privacy Policy Manual

HIPAA Training for Staff and Volunteers

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

SECURITY RISK ASSESSMENT SUMMARY

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

What s New with HIPAA? Policy and Enforcement Update

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

what your business needs to do about the new HIPAA rules

PHI- Protected Health Information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

Health Information Privacy Refresher Training. March 2013

SaaS. Business Associate Agreement

Business Associate Management Methodology

Department of Health and Human Services Policy ADMN 004, Attachment A

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

Transcription:

Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1

WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514 O Protect our information assets 2

HOW is it to be done? O Implement policies and procedures O Federal Standards O National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 O Federal Information Processing Standards (FIPS) O California State (and business associates) O State Information Management Manual (SIMM) O Best Practices 3

Three Categories of Safeguards O Administrative Safeguards O Physical Safeguards O Technical Safeguards 4

Administrative Safeguards O Implement policies, procedures, and processes O Implement Privacy and Security Training O Develop a complaint process 5

Physical Safeguards O Implement physical barrier. O Store confidential files in locked cabinets O Use card keys O Properly destroy physical and electronic data O Use locked security bins for confidential shredding O Do not leave confidential papers at printers, copiers and fax machines O Do not leave confidential papers unsecured O Confidential information should not be left unsecured at any worksite (e.g., office, home, hotel, remote location, etc.), or at any time when in transit between work locations (e.g., airplane, train, automobile, restaurant, etc.). 6

Physical Safeguards (continued) O Basic Safeguard Tips include: O Electronic storage media shall be kept locked O Keep locked doors secured (do not prop open) O Report unauthorized people in restricted areas O Never share codes, passwords, identity cards, or keys 7

Technical Safeguards O Protection of Health Information depends on everyone being conscientious O Software applications designed to limit access O Encrypt ALL end user devices (USB, laptops, etc.) O Implement minimum password standards O Use anti-virus and anti-malware protection O Enforce the principle of least privilege O Use auditing software that tracks and monitors access 8

WHY is it done? O It s the law and it s our responsibility O Promotes public trust/confidence O Eliminates possible fines/sanctions O Avoids lawsuits O Follows best practices 9

Consequences O Harm to individuals O Lawsuits O Disciplinary action O Criminal prosecution O Embarrassment O Loss of public trust/confidence O Sanctions, fines, and/or other monetary damages 10

Examples of Sanctions O Incident: The HHS Office for Civil Rights (OCR) began its investigation following a breach report submitted by WellPoint. The report indicated that security weaknesses in an online application database left the electronic protected health information (ephi) of 612,402 individuals accessible to unauthorized individuals over the Internet. O Penalties: The managed care company WellPoint Inc. has agreed to pay the U.S. Department of Health and Human Services (HHS) $1.7 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules. 11

Example of Sanctions (continued) O Incident: Cignet, of Prince George s County, MD denied 41 patients, on separate occasions, access to their medical records when requested. This is a violation of the HIPAA Privacy Rule, which requires that a covered entity provide a patient with a copy of their medical records within 30 (and no later than 60) days of the patient s request. The company also failed to cooperate with the Office for Civil Rights investigation. O Penalties: The fine for the initial violation was $1.3 million OCR concluded that Cignet s committed willful neglect to comply with the Privacy Rule. The fine for these (civil money penalty) violations was $4.3 million. 12

Anatomy of a Breach O What it is NOT: O Unintentional acquisition, access, or use of protected health information by a workforce member acting under the authority of a covered entity or business associate. O Inadvertent disclosure of protected health information from a person authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the covered entity or business associate. O If the covered entity or business associate has a good faith belief that the unauthorized individual, to whom the impermissible disclosure was made, would not have been able to retain the information. 13

Anatomy of a Breach O What it IS: O An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. 14

Terms/Definitions Personal Information (PI) as defined by the Information Practices Act (Civil Code section 1798.3) is broadly defined as: any information that is maintained by an agency that identifies or describes an individual, including, but not limited to, Name Social Security number Physical Description Home address Home telephone number Education Financial matters Medical or employment history It includes statements made by, or attributed to, the individual. 15

Terms/Definitions (continued) Personal Notice Triggering Information as defined by the Information Practices Act (Civil Code section 1798.29) is more narrowly defined as unencrypted computerized data, specifically: - Name (plus) one or more of the following: O SSN O DL number/state ID number O Financial account number, or O Medical or health insurance information - State policy is to notify in cases of breaches of notice-triggering information, no matter what format 16

Terms/Definitions (continued) O Medical information, as defined by the Information Practices Act (Civil Code section 1798.29), means any information regarding an individual s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional. O Health insurance information, as defined by the Information Practices Act (Civil Code section 1798.29), means an individual s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individual s application and claims history, including any appeals records. 17

Terms/Definitions (continued) O Protected Health Information (PHI): Data are individually identifiable if they include any of the 18 types of identifiers for an individual or if the provider or researcher is aware that the information could be used, either alone or in combination with other information, to identify an individual. O Individually identifiable health information (IIHI) (as defined by the Code of Federal Regulations (45 C.F.R. 160.103), is information, including demographic data, that relates to: the individual s past, present or future physical or mental health or condition, the provision of health care to the individual, or the past, present, or future payment for the provision of health care to the individual 18

18 Individual Identifiers 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Name Address (all geographic subdivisions smaller than state, including street address, city, county, or ZIP code) All elements (except years) of dates related to an individual (including birth date, admission date, discharge date, date of death, and exact age if over 89) Telephone numbers FAX number Email address Social Security number Medical record number Health plan beneficiary number Account number Certificate/license number Any vehicle or other device serial number Device identifiers or serial numbers Web URL IP address Finger or voice prints Photographic images Any other unique identifying number, characteristic, or code 19

The Cost of a Breach O Fines are increasing: When HIPAA was first enacted, the maximum penalty for a HIPAA violation was $250,000. Now the maximum penalty is $1.5 million (criminal fine limits) O Fines (civil) can now be levied by each State s Attorney General 20

Costly Breaches O Min-$50K Max-$250K (per individual) O The number of individuals affected O (1,000 * $50K = $$$$$$$$$) O Federal reporting is a lengthy process 21

What s in a name? O Covered Entity O Business Associate O 62% of data breaches involved a business associate, according to HHS.gov O Business Associate of a Business Associate O Vendor/Resource/Service Provider O Contractor O It doesn t matter! 22

DDS Breaches 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Other Thefts 23

Reporting Protocol (SIMM5340-B) O Health & Human Services (HHS-Office of Civil Rights) O California Technology Agency (OIS) O State Attorney General O ENTAC O DDS (ISO@dds.ca.gov) O Regional Center (when in doubt, contact DDS) O Vendor/Resource Provider 24

Whom to contact O DDS Security Officer: O ISO@dds.ca.gov (Bryan Johnson) O DDS Privacy Officer O privacy@dds.ca.gov (Elizabeth Beth Hibbert) 25

References O NASCIO Heart of the Matter O NIST National Institute of Standards and Technology (FIPS) O SAM 5300 - Information Security O SIMM Incident (Breach) Reporting O 5340A Incident response instructions O 5340B Incident submission form O 5340C Notification information and examples 26