A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK



Similar documents
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

HIPAA Requirements and Mobile Apps

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Healthcare Compliance Solutions

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Overview of the HIPAA Security Rule

Research Information Security Guideline

Document Imaging Solutions. The secure exchange of protected health information.

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Don t Let A Security Breach Put You Out of Business

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

HIPAA Compliance: Efficient Tools to Follow the Rules

BYOD. Bring Your Own Device - Mobile Device Management.

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

THE IMPORTANCE OF ENCRYPTION IN THE HEALTHCARE INDUSTRY

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015

HIPAA ephi Security Guidance for Researchers

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013

Best Practices for DLP Implementation in Healthcare Organizations

Why Encryption is Essential to the Safety of Your Business

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

SECURITY RISK ASSESSMENT SUMMARY

Lessons Learned from HIPAA Audits

Our Commitment to Information Security

What s New with HIPAA? Policy and Enforcement Update

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA COMPLIANCE PLAN FOR 2013

Security Compliance, Vendor Questions, a Word on Encryption

InfoGard Healthcare Services InfoGard Laboratories Inc.

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

HIPAA Compliance and the Protection of Patient Health Information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

Security Is Everyone s Concern:

HIPAA PRIVACY AND SECURITY AWARENESS

Sustainable Compliance: A System for Ongoing Audit Readiness

Transcription:

A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK Chris Apgar Andy Nieto 2015 OVERVIEW How to get started assessing your risk What your options are how to protect PHI What s the budget Balancing the need to encrypt with getting work done Maintaining ease of use and efficient workflow Mobile devices and encryption Q&A 1

HOW TO GET STARTED ASSESSING YOUR RISK Encryption decision making starts with knowing your risk aversion level Risk determinations not made in a vacuum need to look at whole environment Risk analysis is a great place to start Remember Meaningful Use (MU) Stage 2 requires assessing risks to data at rest (stored data) HOW TO GET STARTED ASSESSING YOUR RISK Yes the HIPAA Security Rule lists encryption (at rest in in transit) as addressable implementation specifications On the other hand OCR fining entities for lost unencrypted laptops and OCR emphasized need for encryption in 2014 HIPAA/CLIA Rule Don t just focus on compliance/regulatory risks Important to know where data is and where it s going 2

HOW TO GET STARTED ASSESSING YOUR RISK Start with a sound infrastructure including: Policies and procedures Role based access control Workforce training Audit controls Incident response planning (including breach) Contingency planning And so forth HOW TO GET STARTED ASSESSING YOUR RISK Make a detailed compliance project/risk assessment plan Don t assume you know where your data is Key risks how can data walk out the front door? Do you know who your vendors are are they an even bigger risk? 3

HOW TO GET STARTED ASSESSING YOUR RISK A good place to start your desktops and mobile devices Mobile devices and portable media represent one of the highest risks to healthcare organizations today Risk to reputation, risk of lost business, risk of legal action and risk of a visit from OCR HOW TO GET STARTED ASSESSING YOUR RISK Next place to look transmission of PHI and other sensitive data Unencrypted email may result in interception and breach Unsecure secure websites may lead to unauthorized access Use of secure transport a must for HIPAA transactions, large files that can t be emailed and so forth Just password protecting does not work 4

WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI When looking for a vendor, keep in mind the NIST encryption standards Secure email solutions are affordable and effective Some support large file transfer solutions Costs range from less than $100 per user per year to well over $100,000 to implement Assess solution that works for you and implement! WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Mobile device and portable media encryption: Pre-boot encryption for laptops Encrypted USB drives Tablets and smartphones Apple natively encrypted but need strong passcode Android need to turn on encryption Windows need to turn on encryption 5

WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Large file transfer Dedicated transmission of HIPAA covered transactions Secure file transfer protocol (SFTP) Use cloud vendors for data sharing (e.g., Box, ShareFile, etc.) Direct project HIEs and secure transmission between EHRs WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Secure web portals including patient portals Most secure websites use secure socket layers (SSL) for encryption SSL no longer an accepted NIST standard Where feasible use transport layer security (TLS) Keep in mind many websites do not support TLS 6

WHAT YOUR OPTIONS ARE HOW TO PROTECT PHI Does it always need to be encrypted not necessarily Determine what compensating security controls are present If data stored in secure data center or other secure facility, it may not need to be encrypted Balance response time with security of data For Discussion Today What s the budget Using encryption appropriately 14 7

What s the Budget 15 What s the budget 16 8

What s the budget Source: Infographic from Shred-it. Data from Ponemon Institute 2010 Benchmark Study on Patient Privacy and Data Security 17 What s the budget 18 9

What s the budget 19 What s the budget 20 10

What s the budget 21 Role of budgeting security Prevention Vigilance Training Ease of Use Cost Security Functionality 22 11

Using encryption appropriately Engaging in the workflow is imperative. If you don t use it, it does not matter. 24 12

Using encryption appropriately 25 Using encryption appropriately Look for opportunities to increase security and efficiency» Replacing fax machines with Direct» Replacing couriers with encrypted email» Get actionable data not a picture of the data Leverage technology to improve workflow and insure privacy and security 26 13

Efficient workflow in action using Direct 27 Using encryption appropriately Protecting PHI is not the end game Protecting information, efficient information flow, and getting actionable information is the goal 28 14

Using encryption appropriately 29 MAINTAINING EASE OF USE AND EFFICIENT WORKFLOW If it s not easy, it won t get used Select tools that support your organization s work environment Know your data transfer points where data enters and leaves your organization Look for solutions that are in your budget, secure those transfer points and will actually be used by your workforce 15

MAINTAINING EASE OF USE AND EFFICIENT WORKFLOW Ask the question will the solution work within the current work environment (e.g., within your EHR, within Microsoft Outlook, etc.) Training is crucial if they don t know how to use it or even know it s there, it won t happen You need to enforce it proper sanctions need to be realistic or can your solution support policy enforcement? MOBILE DEVICES AND ENCRYPTION In 2014 Concentra agreed to pay OCR $1,725,220 following the theft of an unencrypted laptop Also in 2014 QCA agreed to a $250,000 for the same reason In February 2014 the HIPAA/Clinical Laboratory Improvements Amendments (CLIA) rule was finalized The preamble to the rule included an edict you need to encrypt 16

MOBILE DEVICES AND ENCRYPTION The myth encrypting laptops will slow everything down It all depends on the solution Tablets and smart phones are easy to encrypt, may come encrypted and encryption is included at no cost (not necessarily true for older mobile devices) If it can be easily carried out the door, it should be encrypted Mobile devices some stats 64% of physicians use email on a smartphone 1 30% of physicians email patients 1 80% of physicians use smartphones for work 1 93% of adults would choose a doctor who will email them 2 85% of hospitals allow clinicians and staff to connect personal devices to hospital network 3 69% view patient info on mobile 3 96% physicians use smartphone as primary device to support clinical communications 4 1. Kantar Media Sources & Interactions Study, September 2014- Medical/Surgical addition 2. Catalyst Healthcare Research Study, May 2014, What s Reasonable? 3. Caradigm Infographic, http://www.caradigm.com/en-us/resources/#privacybreachesthreatenhealthcareorganizations 4. Point of Care Communications for Physicians 2014, Spyglass Consulting Group 34 17

Mobile Devices and Encryption Communication on mobile devices is here and growing BYOD policy is a must have Encrypt data in motion»email» Text messaging 35 Questions? Andy Nieto Health IT Strategist, DataMotion 973-532-5718 AndyN@datamotion.com Chris Apgar, CISSP CEO & President, Apgar & Associates capgar@apgarandassoc.com 503-384-2538 36 18