Richard Gadsden Information Security Office Office of the CIO Information Services



Similar documents
HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Conducting Your HIPAA Risk Analysis Top Ten Steps

Overview of the HIPAA Security Rule

HIPAA: Compliance Essentials

HIPAA Security Rule Compliance

CHIS, Inc. Privacy General Guidelines

HIPAA Compliance Review Analysis and Summary of Results

SCDA and SCDA Member Benefits Group

Privacy & Security Matters: Protecting Personal Data. Privacy & Security Project

The Practical Guide to HIPAA Privacy and Security Compliance

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

The HIPAA Audit Program

HIPAA Compliance Guide

HIPAA and HITECH Compliance for Cloud Applications

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

2016 OCR AUDIT E-BOOK

How To Protect Your Health Care From Being Hacked

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

C.T. Hellmuth & Associates, Inc.

MUSC Information Security Policy Compliance Checklist for System Owners Instructions

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

HIPAA Privacy & Security Rules

HIPAA Information Security Overview

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA and Mental Health Privacy:

Information Security Program CHARTER

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Security Alert

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Montclair State University. HIPAA Security Policy

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

HIPAA Compliance Guide

Health Insurance Portability and Accountability Act (HIPAA) Compliance Audit Final Report

VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data

Policy Title: HIPAA Security Awareness and Training

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

Security Controls What Works. Southside Virginia Community College: Security Awareness

InfoGard Healthcare Services InfoGard Laboratories Inc.

SECURITY RISK ASSESSMENT SUMMARY

My Docs Online HIPAA Compliance

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA in an Omnibus World. Presented by

Securing the Cloud Infrastructure

State HIPAA Security Policy State of Connecticut

HIPAA Security COMPLIANCE Checklist For Employers

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Procedure Title: TennDent HIPAA Security Awareness and Training

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

Bridging the HIPAA/HITECH Compliance Gap

Assessing Your HIPAA Compliance Risk

Security Is Everyone s Concern:

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Datto Compliance 101 1

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

HIPAA Security Compliance Reviews

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Big Data, Big Risk, Big Rewards. Hussein Syed

Nine Network Considerations in the New HIPAA Landscape

HIPAA Security & Compliance

Transcription:

Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO Information Services Sharon Knowles Information Assurance Compliance MUSC Medical Center

Overview Information Security Fundamentals HIPAA Security vs. HIPAA Privacy How the two regulations differ MUSC's compliance strategy New Security Responsibilities Enterprise Covered Entities System Owners Other individuals

Information Security Process The goal: protection of information assets from threats to their: availability integrity confidentiality Security is a process... not a product not really a state either not set it and forget it

Information Security A Risk Management Process Risk management the process for making security decisions Steps in the process identify significant risks evaluate possible controls implement the most cost effective set of controls that will keep risks within acceptable levels Caveat: zero risk is not attainable

MUSC's Information Security Policy System Owners Are Responsible For... Ensuring that accurate and thorough risk assessments are conducted and documented at appropriate points in the lifecycle of the System, beginning prior to the System's implementation, and that the findings are applied to the effective management of risks over the entire life of the System. Ensuring that appropriate System specific policies, procedures and safeguards are developed and implemented, to comply with all applicable MUSC policies, any applicable Entity policies, and all applicable laws and regulations.

Information Assurance Standard of Due Care duty is to protect against all reasonably anticipated threats by implementing reasonable and appropriate safeguards Reasonable and appropriate ideally, minimum but sufficient controls must avoid unacceptable risks must avoid unnecessary expense

Reasonable and Appropriate How to achieve? the risk management process assessment of risk evaluation and selection of controls approval, funding, implementation, operation How to verify? the compliance process documentation audits and other reviews

Information Assurance Compliance Process Document the level of assurance Are all security responsibilities clearly defined and understood? Is a sound (risk based and cost conscious) decision making process being followed? Are security procedures documented? Are procedures being followed? Are controls working as intended?

HIPAA: Security Rule vs. Privacy Rule Security is more than just privacy confidentiality, integrity, availability PHI vs. ephi all electronic ( computerized ) PHI is subject to both the Privacy Rule and the Security Rule telephone and fax communications are subject to the Privacy Rule, but not the Security Rule Covered Entities (CEs) responsible for compliance with both regulations

Security vs. Privacy: MUSC Overall HIPAA compliance strategy Organizational: MUSC OHCA comprised of 4 CEs Privacy Rule strategy policies were set by each MUSC Entity Security Rule strategy One set of enterprise wide security policies these policies apply to all MUSC Entities not just for HIPAA/ePHI, but for all types of protected information 16 new policies and 1 updated policy were issued by the Office of the President in Feb 2005

MUSC's Security Policies Computer Use Policy (updated) Information Security Policies (new) Information Security, Risk Management, Evaluation, Workforce Security, Awareness and Training, Incident Response, Contingency Plan, Workstation Use, Device and Media Controls, Access Control, Network Access, Audit Controls, Person or Entity Authentication, Data Integrity, Encryption, Documentation

New Security Responsibilities Enterprise (Office of the CIO) Covered Entities (CEs) System Owners and System Administrators Managers and Supervisors Workforce members

Responsibilities: OCIO Information Security Office (ISO) will: Document security architecture and plans Coordinate development of enterprise policies, standards, guidelines Manage Enterprise level safeguards Develop shared tools and services Direct MUSC's incident response team Conduct vulnerability assessments

Covered Entities Each Entity will designate an Information Assurance Compliance Officer (IACO), who will: Monitor compliance (system owners, system administrators, managers, supervisors, workforce members) Report violations of policy to appropriate enforcement authorities Ensure access to documentation and training

System Owners Each System must have a designated System Owner, who will: Assess and manage security risks Risk assessments and risk management plans must be documented if the system contains protected information (e.g. ephi) Ensure that appropriate safeguards are implemented Some safeguards are required only if the System contains protected information (e.g. ephi) Also, designate a System Administrator

MUSC Risk Management Standards Standards established for managing risk at 4 stages in the System life cycle Initiation Development/Procurement Implementation Post Implementation aka Existing Systems

Existing Systems i.e. Post Implementation Stage Have you... Registered your system? Designated a System Administrator? Conducted a System risk assessment? Implemented appropriate safeguards? administrative measures physical security measures technical measures document, document, document...

Step 1.0: Review MUSC Policies, Standards and Guidelines URL: http://www.musc.edu/security

Step 2.0: Document Current System Environment and Personnel Deliverable: Security Documentation, Section 2 (System Identification) System Name Key System Personnel Functional Description Key Components System Boundaries Relationships with other systems interfaces, interdependencies

Step 3.0: Document Current System Specific Security Procedures and Other Controls Deliverable: Security Documentation, Section 3 (Current System Procedures) Use the MUSC Information Security Policy Compliance Checklist for System Owners as a guide http://www.musc.edu/security/tools

Step 4.0: Identify and Analyze Potential Issues Deliverable: Risk Analysis Worksheet http://www.musc.edu/security/tools Priorities Address policy compliance gaps identified using the Policy Checklist, or any other assessments Decide how to address other risks identified through formal risk analysis process

Step 5.0: Develop Security Plan Deliverable: Security Plan Summary http://www.musc.edu/security/tools Document your plan for resolving all known compliance gaps who what when

Step 6.0: Execute Security Plan Deliverables Document changes made to system procedures and other controls (Section 3, Current System Procedures) Progress and status reports as required by your Entity's IACO

Are We There Yet? Security is never finished Repeat the risk management cycle as warranted by conditions respond to environmental, operational, policy, and/or regulatory changes Evaluate the effectiveness of your System's security measures until your System is retired Set it and forget it? Not an option!