Workarounds in Healthcare, a Risky Trend. Produced by. media



Similar documents
Featuring industry research by. Produced by

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

Meaningful Use and Security Risk Analysis

How Technology Executives are Managing the Shift to BYOD

How To Manage Mobile Device Management In Healthcare

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

BYOD BEST PRACTICES GUIDE

EMBRACING SECURE BYOD

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

HIPAA Compliance and the Protection of Patient Health Information

Strategies for Writing a HIPAA-Friendly BYOD Policy

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Six Steps Healthcare Organizations Can Take to Secure PHI on Mobile Devices

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Secure File Sharing for HIPAA Compliance: Protecting PHI

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

The Impact of HIPAA and HITECH

Internet threats: steps to security for your small business

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

HIPAA and Cloud IT: What You Need to Know

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Why Lawyers? Why Now?

Top 5 Reasons to Choose User-Friendly Strong Authentication

Overview of the HIPAA Security Rule

HIPAA Security Rule Changes and Impacts

Boost Healthcare Security and Patient Care with Imprivata Enhanced VDI

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

OCTOBER 2013 PART 1. Keeping Data in Motion: How HIPAA affects electronic transfer of protected health information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

HIPAA, PHI and . How to Ensure your and Other ephi are HIPAA Compliant.

Intralinks Survey Report

Securing Health Data in a BYOD World

Getting Hip to the HIPAA and HITECH Act Compliance

Best Practices for DLP Implementation in Healthcare Organizations

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Use Bring-Your-Own-Device Programs Securely

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

HIPAA compliance audit: Lessons learned apply to dental practices

Endpoint Virtualization for Healthcare Providers

efolder White Paper: Cloud-enabling the File Server for the Mobile Workforce

Insert Partner logo here. Financial Mobility Balancing Security and Success

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

HEALTHCARE & SECURITY OF DATA IN THE CLOUD

Montclair State University. HIPAA Security Policy

The CIO s Guide to HIPAA Compliant Text Messaging

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Second Annual Benchmark Study on Patient Privacy & Data Security

HIPAA Violations Incur Multi-Million Dollar Penalties

Healthcare to Go: Securing Mobile Healthcare Data

Bridging the HIPAA/HITECH Compliance Gap

Endpoint protection for physical and virtual desktops

Anatomy of a Healthcare Data Breach

Document Imaging Solutions. The secure exchange of protected health information.

The Must Have Tools To Address Your Compliance Challenge

A Comprehensive Plan to Simplify Endpoint Encryption

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

Tuesday, June 5, 12. Mobile Device Usage

Security Is Everyone s Concern:

HIPAA: Bigger and More Annoying

"Secure insight, anytime, anywhere."

Healthcare Insurance Portability & Accountability Act (HIPAA)

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

2015 VORMETRIC INSIDER THREAT REPORT

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Mobile Devices in Healthcare: Managing Risk. June 2012

The Business Case for Healthcare Access Solution

Samsung Mobile Security

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Managing Mobile Device Security

Virtual Desktop.. Infrastructure Goes Mobile..

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

How To Handle A Bring Your Own Device (Byod) In A Business

CA Technologies Healthcare security solutions:

5 HIPAA-Compliant Best Practices for Mobile Devices in Healthcare

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

The Business Case for Security Information Management

HIPAA and HITECH Compliance for Cloud Applications

The Maximum Security Marriage:

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

A Guide to Consumerization & Building a BYOD Policy June 2012

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Top Ten Technology Risks Facing Colleges and Universities

EasiShare Whitepaper - Empowering Your Mobile Workforce

Guideline on Safe BYOD Management

Transcription:

Workarounds in Healthcare, a Risky Trend. Produced by media

When healthcare workers bring their own laptop computers, tablets and smartphone devices to work, and use them to perform workarounds a way to bypass an organization s systems and processes to accomplish an activity the likelihood that patient data privacy and security may be compromised is increased significantly. This is further exacerbated by healthcare worker use of powerful collaboration apps, social media and texting, and builds upon old risks of USB keys and personal email. Even though the use of workarounds poses serious implications for managing data security, a majority of healthcare workers use this practice anyway, according to a new international survey of healthcare workers. A recent survey, conducted in January 2013 by HIMSS Media and sponsored by Intel Corporation, relied on responses from 674 frontline healthcare workers from around the globe, most of whom (67 percent) are employed at organizations with 500 or more employees. Among the doctors, physician assistants and nurse practitioners, as well as chief information officers, IT directors and other healthcare executives surveyed, 21 percent (Graph 1) of respondents said they practice workarounds every day, while another 30 percent said they sometimes use this method to perform their tasks. Figure 1 How commonly do workarounds happen in your organization, which may involve the use of alternative tools such as personal devices/apps or social media that may be out of compliance with policy? Sometimes...30.0% Every Day...21.5% Rarely...21.5% Don t Know...18.0% Never... 9.1% 18.0% 9.1% 21.5% 30.0% 21.5% Workaround trend: Endangering privacy and security of patient information Workarounds enable healthcare workers to access, share and store patient information outside the hospital s IT network. For example, a healthcare worker may use a file transfer app on a personal device to exchange unencrypted patient records. Importantly, risks associated with these workarounds apply not only to personal devices, but also to corporate devices, and even where a thin client or VDI compute model is being used. Another aspect of workarounds is that they are not purely a client device phenomenon since in many cases they involve sensitive healthcare data moving through or being stored in side clouds, whether for exchanging information via technologies such as file or note sharing, social media, personal email or texting. Workarounds are not in compliance with the healthcare organization s security policies and procedures, and devices may not have the proper encryption technology, antitheft software or identity protection applications that can adequately support a hospital s patient data security and privacy policies. This poses risk to the confidentiality of patient information, and increases risk of breaches. Furthermore, this practice can compromise the integrity of the patient record since patient information moving in workaround side channels may not be updated in the patient record leading to an incomplete or out of date electronic health record. In a best case scenario this can lead to suboptimal healthcare; in the worst case it can compromise patient safety. Still, healthcare workers said they resort to workarounds because their organizations IT infrastructure prevents them from performing their jobs effectively. For example, 45 percent (Graph 2) of those surveyed said workarounds are easier to use than the current system in place, while 40 percent identified their IT department as too slow to enable new technologies. The poll also revealed that 35 percent of respondents said the frustrations of having multiple layers of login to enter the system drove them to use workarounds, and 24 percent said workarounds helped them deliver better care. Additionally, 22 percent said their healthcare organizations list of approved apps is too restrictive, 15 percent said web browser-based apps don t always work because the organization has limited network coverage, and 14 percent said separate hardware tokens required for login, and associated usability issues, make using workarounds much more attractive. Workarounds are also popular with the 154 survey respondents located outside North America 47 percent of whom are based in Europe, 19 percent in the Middle East, and 17 percent in the Asian Pacific region. According to these respondents, half said their number one reason for using workarounds is that their IT department is too slow to enable new technologies, 42 percent cited workarounds as being easier to use and 29 percent identified workarounds as being a process that helps them deliver better healthcare. The need for IT department responsiveness The survey results point to a lack of actual organizational responsiveness of the IT department within the healthcare organization; if they are too slow in enabling new technology that alone can compel people to use workarounds, said David Houlding, healthcare privacy and security lead

architect at the Intel Healthcare IT Program Office. Having usable healthcare solutions and security is important but equally important is that a healthcare organizations IT department needs to be responsive in enabling new technologies otherwise people will bypass them. Figure 2 What factors motivate the use of workarounds in your organization? Workarounds are easier to use... 45.0% IT Department is too slow to enable new technologies...40.1% Multiple layers of login required... 35.5% Workarounds help deliver better care...24.3% In the Bring Your Own Device (BYOD) era, where healthcare workers use their own smartphones, tablets and laptops to perform health-related tasks, respondents also indicated that a personal smartphone is their number one device of choice (59 percent) (Graph 3) to help them conduct workarounds as they deliver better care at a faster pace. Personal tablets came in second with 50 percent and 39 percent cited personal laptops or notebooks. The healthcare community must guard against situations such as a nurse taking a photo of a patient s wound on their tablet and then sending that photo to a doctor who retrieves it on his tablet, yet that photo is never entered into the electronic health record. Linda Harrington Vice President and Regional Chief Nursing Informatics Officer Catholic Health Initiatives Healthcare organization list of approved apps is too restricted...22.3% Other...17.7% Web browser-based apps don t work with limited/no network coverage...15.3% Separate hardware tokens required for login; usability issues... 14.2% Mobile Device management is too intrusive (personal privacy concerns)...13.1% Access to apps running on remote servers through thin client interface doesn t work with limited/no network coverage... 12.9% Apps designed for full display, keyboard and mouse are unusable through thin client interface on mobile device... 9.8% Workarounds help reduce the cost of care...... 9.2% Slow encryption...8.0% Systems are compromised because they aren t effectively managed or patched...6.8% Systems are infected with malware because security is not strong enough...2.4% I have worked in healthcare environments, and have observed and spoken with nurses about workarounds. When nurses use workarounds it s a way of communicating to me that the technology is not working in the way they need it to work, said Linda Harrington, vice president and regional chief nursing informatics officer at Catholic Health Initiatives, a national nonprofit health organization based in Englewood, CO. Harrington said the use of mobile devices enhances the reach and speed of connecting different members of the healthcare team and thus will be a key factor in gaining greater efficiency and lowering costs in healthcare. However, if the right training, regulations and security policies are not in place, the use of workarounds on mobile devices can contribute to the incompleteness of clinical documentation, and worse, can raise the risk of data breaches. The healthcare community must guard against situations such as a nurse taking a photo of a patient s wound on their tablet and then sending that photo to a doctor who retrieves it on his tablet, yet that photo is never entered into the electronic health record, Harrington said. Sometimes end-users with very good intentions can get ahead of the technology if you will, and it does create issues. While many other countries around the world don t have laws that financially penalize health organizations when data breaches occur, in the United States the federal government fines health organizations if a data breach has caused harm to their patients. In fact, a much more aggressive stand has been taken by federal authorities since the Health Information Technology for Economic and Clinical Health Act (HITECH Act) became law in 2009. The law stipulates that Health Insurance Portability and Accountability Act (HIPAA) covered entities (hospitals, health plans, a group of medical professionals and so on) that uncover a data breach affecting 500 or more individuals must provide the U.S. Department of Health and Human Services (HHS) Secretary with a notice of the breach without unreasonable delay and no later than 60 days after the breach has been discovered. Since the law was signed, HHS estimates that as of February 21st there were 543 breaches that have affected 500 or more individuals. In fact, these breaches of health information have affected more than 21 million individuals. According to HHS s latest estimates, 23 percent of breaches of 500 or more individuals involved theft of a laptop, while roughly 14 percent involved stolen tablets, smartphones and other portable electronic devices. To prevent data breaches of patient information that occur on mobile devices, HHS included language in the Meaning Use Stage 2 final rule, which was released August 2012, that called for mobile devices to be encrypted to protect personally identifiable health data stored on the device. Curbing workaround usage One health organization that has embraced mobile devices and reduced the use of workarounds is Beth Israel Deaconess Medical Center (BIDMC), where John Halamka, the hospital s chief information officer, has implemented encryption technology on 5,000 smartphones, 1,000 tablets and 2,000 laptops that healthcare workers use daily at the preeminent Boston, MA-based academic medical center. According to Halamka, BIDMC implemented a policy in September 2012 disallowing BYODs that are not encrypted from using the hospital s network. As a result of this policy, 600 smartphones

Figure 3 What types of workarounds help deliver better care more quickly? (Choose all that apply) Personal smartphones... 59.3% Personal tablets...49.6% Text messaging...39.8% Personal laptops/notebooks...38.6% Personal email...31.6% Paper based workarounds... 20.9% Personal apps for file transfer, note sharing, communications or other purposes...20.3% Personal USB keys...19.1% Photos using personal devices/apps... 16.9% Other... 11.7% Video using personal devices/apps... 8.3% had to be taken out of service because they were models of personal smartphones that were not compatible with the encryption requirements that we have, he said. While Halamka insists that each device that links to the hospital network must have encryption and use antitheft software and password authentication technology, he also pointed out following security policies is equally important to a patient data security strategy. There s nothing like motivating a doctor by saying if you do a workaround you ll be fired; oh and did I mention the million-dollar fine the hospital will have to pay if we have a patient data breach, he said. To further strengthen security and privacy of health information, HHS announced in January the release of the final omnibus rule that makes sweeping changes to the HI- PAA privacy and security rules and expands many of the requirements to protect health information to business associates of health organizations such as contractors and subcontractors. Increased penalties will apply for noncompliance based on the level of negligence with a maximum penalty of $1.5 million per violation. The balancing act: quality of care, workflow and security However, even while there is greater urgency to protect patient data, a significant number of survey respondents (36 percent) said they think healthcare workers using workarounds are aware of the associated privacy and security risks, yet use this practice anyway. Why? Because they are frustrated with the current system (53 percent), workarounds make the job easier (52 percent), risks are perceived to be insignificant (37 percent), improving the quality of patient care takes priority over security (29 percent) and improving efficiency and reducing the cost of patient care takes precedent over security (29 percent). They [healthcare workers] are compelled to do workarounds to get their job done even though many know that it may not be in keeping with their organization s privacy and security policy. Nancy Vuckovic Senior Ethnographer Intel Corp. The results of this survey indicate that frontline healthcare workers are taking action to streamline workflows and be more efficient, said Nancy Vuckovic, senior ethnographer at Intel Corp. They are compelled to do workarounds to get their job done even though many know that it may not be in keeping with their organization s privacy and security policy. It is notable that workarounds are occurring in an environment where respondents describe themselves as knowledgeable about their organization s privacy and security policies. Indeed, half of the respondents said they are very familiar with and know in detail their organization s privacy and security policy, while another 47 percent said they are somewhat familiar with and know the general point of these policies. Furthermore, 68 percent said their organization s policy on security is enforced via audits, 62 percent said verbal warnings are used and 60 percent said they receive warning documents in employees files. Effective training is emerging as a critical part of a successful privacy and security practice. Sixty-three percent said they receive online security training and half said they attend in-person training classes. Fifty-seven percent of respondents also said their organization provides security training during new employee orientation, 56 percent said they receive security training annually, and 38 percent said they obtain security training on demand and as needed. There s a contradiction here, Vuckovic said. In some sense there is a fair amount of training going on, but because workarounds are occurring frequently it appears that training is not particularly effective at conveying the risks of this practice. Part of the problem could be that only 44 percent of respondents said their organizations have a policy enabling BYOD; 33 percent said they did not, 16 percent said a policy is currently being created and 8 percent said they did not know. The survey also found 54 percent identified security risks as a barrier that limits their organization s ability to make use of new technologies that could improve healthcare. With regard to encryption, while a majority of respondents (58 percent) did not feel that security solutions such as encryption are too complex to keep their organization from implementing these technologies, 20 percent said they did share the idea that solutions such as encryption are complex enough to prevent their organization from adopting such software. Deploying a three-pronged strategy In conclusion, as mobile devices continue to be used by frontline healthcare workers both to monitor patients as well as to deliver patient care anywhere and anytime, health CIOs, IT managers and other healthcare executives must develop a privacy and security strategy that minimizes workarounds. Health IT leaders must also craft a mobile management strategy that balances the need to implement security tools with the requirements of healthcare workers to perform their tasks with user-friendly tools that speeds up their workflow while alleviating their fears that security technology limits their opportunities to explore new applications. Healthcare IT managers need to convey to their clinicians that security technology is an enabler that can help them deliver improved care in a user-friendly way while minimizing the risk of security incidents such as breaches, Intel s Houlding said. Hardware-based technologies such as encryption acceleration, hardware based remote lock and wipe, and 2-factor

Healthcare IT managers need to convey to their clinicians that security technology is an enabler that can help them deliver improved care in a user-friendly way while minimizing the risk of security incidents such as breaches. David Houlding Healthcare Privacy & Security Lead Architect Intel Healthcare IT Program Office authentication can provide healthcare workers with usable security and strong safeguards to protect patient data. These technologies also enhance the users experience while increasing productivity and worker satisfaction. Intel strongly recommends healthcare organizations embrace a practical three-pronged strategy to embrace trends and technologies that improve care, while minimizing risks of workarounds: 1. Be aware of the use of workarounds in your healthcare organization, update your policy, procedures risk assessments, and implement effective training. Be explicit in addressing the practice of workarounds and help healthcare workers understand the hidden risks, rationale for safeguards, proper procedures, and their roles and responsibilities. Be creative in implementing effective training, continually. 2. To mitigate the highest priority risks in your risk assessments, implement safeguards that are not only strong, but usable, to avoid cumbersome security controls compelling the use of workarounds. Examples of usable safeguards may include hardware based 2-factor authentication without the usability issues of separate hardware tokens, high performance hardware accelerated encryption, and hardware based remote lock and wipe technology. 3. Ensure that your IT department within your healthcare organization is agile and responsive in evaluating, securing and enabling timely use of new technologies by frontline healthcare workers to improve care. This strategy also helps minimize the use of work arounds motivated by healthcare worker frustration with perceptions that IT departments are moving too slowly or being overly restrictive for example on apps approved for use. Copyright 2013 Intel Corporation. All rights reserved. Intel and the Intel Logo are trademarks of Intel Corporation in the and/or other countries. *Other names and brands may be claimed as the property of others. U.S. A DIVISION OF HIMSS MEDIA Produced by MedTech Media, a division of HIMSS Media. 2013 71 Pineland Drive, Suite 203, New Gloucester, ME 04260 207.688.6270 www.medtechmedia.com