LA BioMed Secure Email

Similar documents
HIPAA-Compliant Research Access to PHI

HIPAA COMPLIANCE. What is HIPAA?

De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "

University of Cincinnati Limited HIPAA Glossary

HIPAA OVERVIEW ETSU 1

Statement of Policy. Reason for Policy

HIPAA and You The Basics

De-Identification of Clinical Data

How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

UPMC POLICY AND PROCEDURE MANUAL

Xerox Encryption Recipient Guide. Cisco Registered Envelope Service

HIPAA ephi Security Guidance for Researchers

HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets

HIPAA COMPLIANCE INFORMATION. HIPAA Policy

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

HIPAA 101: Privacy and Security Basics

HIPAA POLICY REGARDING DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION AND USE OF LIMITED DATA SETS

Health Insurance Portability & Accountability Act (HIPAA) Compliance Application

What is Covered by HIPAA at VCU?

HIPAA Compliance for Students

Encryption. Cisco Ironport. using. Click here to begin

Guidance for using the East Sussex County Council Secure system

De-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013

HIPAA-G04 Limited Data Set and Data Use Agreement Guidance

Secure A Guide for Users

Winthrop-University Hospital

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

How To Encrypt An From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Encryption Solution (For Partners)

IRB Application for Medical Records Review Request

Legal Insight. Big Data Analytics Under HIPAA. Kevin Coy and Neil W. Hoffman, Ph.D. Applicability of HIPAA

North Shore LIJ Health System, Inc. Facility Name

700 Fox Glen Barrington, Illinois ph: [847] fx: [847]

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

2010 i2b2/va Challenge Rules of Conduct

IMAP and SMTP Setup in Clients

How To Set Up Your

Outlook 2010 Setup Guide (POP3)

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Information Privacy and Security Program Title:

Set Up Setup with Microsoft Outlook 2007 using POP3

The De-identification of Personally Identifiable Information

4. No accounting of disclosures is required with respect to disclosures of PHI within a Limited Data Set.

Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Windows XP Exchange Client Installation Instructions

Unity Error Message: Your voic box is almost full

Secure Outgoing Mail (SMTP) Setup Guide

How to use Certificate in Outlook Express

Defender EAP Agent Installation and Configuration Guide

Configuring Outlook to send mail via your Exchange mailbox using an alternative address

How to Set Up Outlook 2007 and Outlook 2010 for Hosted Microsoft Exchange if the Program is Already Installed

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

UC Irvine Health Secure Mail Message Center

Memorandum. Factual Background

Archiving User Guide Outlook Plugin. Manual version 3.1

How to set up Outlook Anywhere on your home system

Other Procedures That Relate To Using MS Outlook All Of These Procedures Are Available For Download In PDF Format From The Any Key Press Website

Secure transaction guidelines for external users with Commission personnel.

Microsoft Office 365 how to make a booking for meeting rooms and resource calendars

Exostar LDAP Proxy / Secure Setup Guide. This document provides information on the following topics:

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

User s Guide for OpenERP Microsoft Outlook Free Plug-in 1.0 By Axelor

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Migrating from MyYSU Mail to Office 365 Microsoft Outlook 2010

ACS Encryption Recipient Guide

4. Click Next and then fill in your Name and address. Click Next again.

You may use port 587 if port 25 is blocked by your internet provider. This does not apply to customers using PolarComm internet.

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2010

DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)

Release Notes for Cisco IronPort Security Plug-in 7.3.1

State of Wisconsin Division of Enterprise Technology (DET) Enterprise Encryption Service Offering Definition (SOD)

Djigzo S/MIME setup guide

Plesk Control Panel Adding accounts

PaperClip. em4 Cloud Client. Setup Guide

Transcription:

INFORMATION SYSTEMS LA BioMed Secure Email Los Angeles Biomedical Research Institute at Harbor-UCLA 1124 W Carson St Bldg E2.5 Phone 310.222.1212

Table of Contents Intended Audience... 1 Purpose... 1 When to Encrypt an Email... 1 HOWTO Send a Secure Email... 2 (a) Method 1 (Most Versatile)... 2 (b) Method 2... 3 What will the recipient see when he/she receives the email?... 5 What will I see if the recipient responds to the encrypted email?... 7

Intended Audience LA BioMed employees/volunteers with any variation of a labiomed.org, obgyn.humc.edu or emedharbor.edu email address. Purpose This document will show the LA BioMed employees/volunteers how to send an encrypted email to an outside organization email address such as joe@yahoo.com. When to Encrypt an Email Anytime Protect Health Information (PHI) is being communicated outside of the organization via email. Under HIPAA, PHI is defined as any information about health status, provision of health care, or payment for health care that can be linked to an individual. The 18 identifiers of PHI according to HIPAA 1996: 1. Names; 2. All geographical subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000. 3. dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older; 4. Phone numbers; 5. Fax numbers; 6. Electronic mail addresses; 7. Social Security numbers(ssn); 8. Medical record numbers; 9. Health plan beneficiary numbers; 10. Account numbers; 11. Certificate/license numbers; 12. Vehicle identifiers and serial numbers, including license plate numbers; 13. Device identifiers and serial numbers; 14. Web Universal Resource Locators (URLs); 15. Internet Protocol (IP) address numbers; 16. Biometric identifiers, including finger, retinal and voice prints; 17. Full face photographic images and any comparable images; and 18. Any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data) 1

HOWTO Send a Secure Email There are two methods for sending a secure email from an LA BioMed email address to an email recipient outside of the LA BioMed organization. (a) Method 1 (Most Versatile) Prerequisites Any email client that is configured to use the LA BioMed email servers. Examples of email clients include Microsoft Outlook, Entourage, Thunderbird, etc This also includes LA BioMed webmail at https://mailhost.labiomed.org and Smart phones that are configured for LA BioMed email. Sending a Secure Email There is only one step to encrypt an email and it will work whether you are composing a new email, forwarding an email, or replying to an email. Please note that you will receive a read receipt once the recipient reads the encrypted email. 1. Type [Secure Message] in the subject of the email. See Figure 1. Important: Make sure you type [Secure Message] exactly as it appears above including the brackets. You must include the brackets! Figure 1 2

(b) Method 2 Prerequisites Microsoft Outlook 2003 or 2007 running on a 32bit version of Windows XP or Windows Vista. Outlook must be configured to use the LA BioMed email servers. You will also need to have the Ironport Outook plug-in installed. Installing the Plug-in 1. Go to Start -> Run on your computer 2. Type or paste \\thor.rei.edu\deploy\ironportplugins-outlook\secureemail and hit OK. See Figure 2. Figure 2 3. Double click OutlookDesktopFlag_6.5.0_003.msi to install the plug-in and take all of the defaults on the install. 3

Sending a Secure Email Using the Outlook Plug-In This will work whether you are composing a new email, forwarding an email, or replying to an email. Please note that you will receive a read receipt once the recipient reads the encrypted email. 1. Compose your email as you normally would. 2. Instead of clicking Send, click "Secure Message" and your message will be sent securely. Note: Make sure clicking the "Secure Message" button is the last thing you do because it will send your email. See Figure 3. Figure 3 4

What will the recipient see when he/she receives the email? The recipient of the email will receive an email with an attachment titled securedoc.html. See Figure 2. They will be required to click and run the attachment which will then take them to the Cisco Registered Envelope Service. See Figure 3. If it s the first time they have been to the Cisco Registered Envelope Service they will need to register by answering a series of questions. See Figures 4 and 5. Any subsequent time they receive an encrypted email from LA BioMed, they will just need to sign in to view it. Figure 4 Figure 5 5

Figure 6 Figure 7 6

What will I see if the recipient responds to the encrypted email? If the recipient responds to your encrypted email, you will need to go through the same steps they did. This means if you have not previously registered with the Cisco Registered Envelope Service you will need to do so. Please see What will the recipient see when he/she receives the email? section for details. 7