Identity Management: Securing Information in the HIPAA Environment



Similar documents
<Insert Picture Here> Oracle Identity And Access Management

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Identity and Access Management The road to sustained compliance

Canada Health Infoway

Cloud Services Catalog with Epsilon

Enterprise Content Management Solutions for Solving Health Payers Business Problems

SAM Enterprise Identity Manager

C21 Introduction to User Access

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

I n t e r S y S t e m S W h I t e P a P e r F O R H E A L T H C A R E IT E X E C U T I V E S. In accountable care

Delivering value to the business with IAM

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Identity and Access Management Point of View

CA Records Manager. Benefits. CA Advantage. Overview

Governance, Risk & Compliance for Public Sector

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky

The Unique Alternative to the Big Four. Identity and Access Management

Sun and Oracle: Joining Forces in Identity Management

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

CA Service Desk Manager

KEEPING IT SIMPLE A PRAGMATIC APPROACH TO IDENTITY MANAGEMENT

Protecting Regulated Information in Cloud Storage with DLP

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Table of Contents. Preface CPSA Position How EMRs and Alberta Netcare are Changing Practice Evolving Standards of Care...

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

Answers to Top BRMS Questions

Automated User Provisioning

Compliance and Security Solutions

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Secure network guest access with the Avaya Identity Engines portfolio

How can Identity and Access Management help me to improve compliance and drive business performance?

Enterprise Identity Management Reference Architecture

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

IBM Software A Journey to Adaptive MDM

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Sendmail and PostX: Simplifying HIPAA Compliance. Providing healthcare organizations with secure outbound, inbound and internal

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

Integrated Identity and Access Management Architectural Patterns

HIPAA/HITECH Act Implementation Guidance for Microsoft Office 365 and Microsoft Dynamics CRM Online

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Innovations in Pharma Sales Operations

Current Challenges in Managing Contract Lifecycle Management

Benefits of Image-Enabling the EHR

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Privacy and Security within an Interoperable EHR

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Gabriel Magariño. Software Engineer. Overview Revisited

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Bridging the HIPAA/HITECH Compliance Gap

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

Identity & access management solution IDM365 for the Pharma & Life Science

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

Identity & Access Management new complex so don t start?

Choosing an SSO Solution Ten Smart Questions

EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA

The Value of Vulnerability Management*

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Key Issues for Identity and Access Management, 2008

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Transcription:

Identity Management: Securing Information in the HIPAA Environment Mark Dixon Chief Identity Officer North American Software Line of Business Sun Microsystems 1

Agenda Challenges we Face Identity and Access Management Consent Management How Sun Can Assist You 2

Agenda Challenges we Face Identity and Access Management Consent Management How Sun Can Assist You 3

Healthcare Industry's Increasing Reliance On Digital Records Significant Challenges and Trends Enhancing security and privacy. Increasing cost efficiency. Improving quality of service. Complexity factors: > Multi-enterprise environments. > Regional and national healthcare exchanges and healthcare information networks. > Wide diversity of healthcare IT systems. 4

The Impact of HIPAA/HITECH Security, Privacy and Confidentiality are foundational to the transformation of the healthcare environment. Robert Kolodner Director of the Office National Coordinator Department of Health and Human Services 5

Consent Informed consent is more than simply getting a patient to sign a written consent form. It is a process of communication between a patient and physician that results in the patient's authorization or agreement to undergo a specific medical intervention. American Medical Association 6

Conflicting Challenges Addressing Multiple Business Goals Portals Extranets Web Services Dynamic User Base Operations Improve Access and Service Corporate Governance Privacy Demands Addressing Security & Compliance Risk Management Increasing Efficiencies Help Desk Compliance Mandates Integration Development 7

Agenda Challenges we Face Identity and Access Management Consent Management How Sun Can Assist You 8

Identity and Access Management Who has access to what, when? DEFINE ASSIGN AUDIT ENFORCE 9

Key IAM Enablers for HIPAA/HITECH 1.Assign and control user access rights. 2.Adjust user access rights when responsibilities change. 3.Revoke user access upon termination. 4.Manage allocation of user credentials. 5.Enforce segregation of duties (SOD) policies. 6.Provide uniform access policy. 7.Manage access based on business roles. 10

Key IAM Enablers for HIPAA/HITECH (cont.) 8.Enforce secure access policies. 9.Enforce informed-consent principles. 10.Extend access control to business associates. 11.Verify access rights. 12.Conduct periodic compliance assessments. 13.Provide automated reports. It is all about securing applications, data, and users in order to protect the patient and provider. 11

ROI for Identity and Access Management Reduce risk of non-compliance. Cut administration and help desk costs for users/identities. Enhance employee productivity. Boost security while enabling agility. Lower long-term Infrastructure costs. Reduce new application on-boarding costs. Strategic Support for new Revenue Opportunities. > Federation enabler. > Eases Acquisitions, mergers, expansions. 12

Agenda Challenges we Face Identity and Access Management Consent Management How Sun Can Assist You 13

Consent Management Essential to meet privacy/security requirements is typically dispersed among several organizations Many stakeholders Multiple jurisdictions Highly dependent on context/situation 14

Consent Management Challenges Privacy Legislation > Multiple jurisdictions > Who is able to perform the override without consent? Auditing requirements > Must provide an audit trail of who performed what action, whether the action was successful or not Privacy Officer within each Organization > Identifying their responsibilities and accountabilities associated to EHRs > Need for a business role within the Access Model > Depending on the implementation can receive a near real time notification of an override without consent 15

Consent Management Concepts Override with consent > The patient (or their representative) has consented to allow the user access to the patients data. > The consent is realized through a keyword Override without consent ( break the glass ) > The user has either not obtained the consent or unable to obtain the consent of the patient and desires to access the patient's information > arrives in an acute care facility unconscious is an example where the user is unable to obtain the consent of the patient. 16

Functionality: Identity and Roles Identity and Roles > > > > s Providers Access Rights Roles map business responsibilities to access rights Override Rights > Only users with specific roles can perform override without consent Identity and Role 17

Functionality: Consent Registry Consent Permissions > > > > s Organizations Users System-wide mask (everyone) Consent Management Registry Fine gained access > Include or exclude > Accommodate multiple jurisdictions 18

Functionality: Master Index Requests Master Master Index Index Access Access Services Services Federated Access... Index to all patient records, regardless of location records reside in many locations Enable correlation of patient data across multiple repositories Provide secure service to govern data access 19

Functionality: Administration Administrative Viewer > Supports only System Wide Mask (everyone) > Specific role enables distributed or centralized Service Governance > Has existing functionality to enforce > Can be enabled or disabled to utilize consent management testing 20

Consent Management Architecture Applications Applications Applications Applications Applications Applications Applications Applications Applications Applications Applications Applications Applications Applications Web Portals Web Portals Consent and Consent organization consent Management Management Registry profiles Registry Identities, roles and Identity Identity access control and and Role Role credentials Federated Access Master Master Index Access Access Services Services... Index to all patient records, regardless of location records reside in many locations 21

British Columbia HIAL and IDAM Health Information Access + Service Provider Consent Management + Identity Management 22

Pragmatic Issues: Devil in the Details Legislative/policy driving implementation details Process adaptation resulting from policy changes Linking accountable persons to support staff Uniform understanding of roles across organizations 23

Agenda Challenges we Face Identity and Access Management Consent Management How Sun Can Assist You 24

Sun's Vision: Bright Future of Healthcare Connectivity and Compliance Sun is committed to the sharing of information technology to power health information networks that provide secure, regulated access to patient data. 25

HIPAA Identity Management Platform Sun IAM Suite Enables Compliance Sun Identity Management solves HIPAA/HITECH IT requirements: > Enterprise security. > Regulatory compliance and risk management. > Operational efficiencies. Addresses both HIPAA risk and compliance pain points: > Automates access certification and re-certification process. > Improves internal audit operational efficiencies. Rated the market LEADER by Gartner and Forrester. Directory Server EE High-performance Directory Virtual Directory Services Secure Store for Users and Authorization Policies Identity Manager Automated User Provisioning Account and Password Sync Approvals and Workflows OpenSSO Enterprise Web Single Sign-On Federation Web Services Security Role Manager Role Management Access Certification Identity Auditing 26

Why Sun IAM for HIPAA Compliance? Product Strategy and Expertise Simple Open Proven Sun IAM solutions are 100% Java technology and easy to deploy, configure, and use. Web browser-based access to all functionality. Open architecture makes applying Sun IAM solutions to multiple networked resources faster and simpler. Open source, transparency. Sun manages billions of user identities, and its solutions have received positive recognition from industry analysts and experts. Minimizes risk and compliance violations. 27

Implementation Success Identity Identity Management Management is a journey, is a journey, not not aa project project or or event. event. Assess Assess where where you you are are in in the the process. process. Outline a strategy Outline a strategy that that fits fits your your organization. organization. 28

Sun IAM Healthcare Customers Simple Open Proven 29

More Information, and Downloads Sun HIPAA/HITECH Compliance Whitepaper https://www.sun.com/offers/details/identity_access_management.xml Sun Identity and Access Management http://www.sun.com/software/identity/index.jsp Sun Identity Manager http://www.sun.com/software/products/identity_mgr/index.xml Sun Role Manager http://www.sun.com/software/products/rolemanager/index.xml Sun OpenSSO Enterprise http://www.sun.com/opensso Sun Directory Server Enterprise Edition http://www.sun.com/dsee 30

Identity Management: Securing Information in the HIPAA Environment Mark Dixon mark.g.dixon@sun.com www.discoveringidentity.com 31