MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Health Insurance Portability and Accountability Act (HIPAA)
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Center for Risk Management of Engineering Systems University of Virginia Linking the Economics of Cyber Security and Corporate Reputation Barry Horowitz.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Privacy and Security Workgroup: Big Data Public Hearing December 8, 2014 Deven McGraw, chair Stan Crosley, co-chair.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Chapter Extension 22 Managing Computer Security Risk © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 13: Data Security & Disaster Recovery Database Management Systems.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Office of Compliance & Corporate Integrity Patient Privacy and Security of Patient Information Ray Braeunig, CHC, CHPC, CHRC Chief Compliance & Privacy.
HIPAA EFFECTS OF HEALTH CARE LEGISLATION. Evaluation of the influences of HIPAA  How it affected health care system  How it works as a law  Changes.
The 2009 HIMSS Security Survey: Insights into the Status of Healthcare Security Implementation sponsored by Symantec Meeting of the HIT Standards Committee,
Chapter 3: Legal and ethical issues
Insuring Against Catastrophes. Lesson Goals: Assess risks Determine and develop risk management strategies Define insurance types and how they relate.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Securing Patient-Related Data: The Impact of HIPAA Module VI NUR 603 Russ McGuire.
MODULE TWO: Ethical and Legal Issues. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Define.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Financial Climate: Challenges for Regulation 15 May 2009.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
CRISIS-MANAGEMENT PLANNING Every business should develop a Security Crisis-Management team.
Working with HIT Systems
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Incident Documentation Campus Security Officer Training.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Culture Clash: Law, Business and Technology Mitch Dembin Chief Security Advisor (US) Microsoft Corporation.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Ethical & Legal Issues MODULE FIVE:. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Understand.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Draft - Enterprise Risk Management Risk Universe
Information Security Program
Encrypted from CDS Office Technologies
2015 Orientation to HIPAA Privacy Rule Compliance
RISK MANAGEMENT IN MUNICIPALITIES
Chapter 3: IRS and FTC Data Security Rules
HCS 545 Education for Service-- snaptutorial.com.
HCS 483 PAPERS Lessons in Excellence -- hcs483papers.com.
HCS 545 Teaching Effectively-- snaptutorial.com
HCS 545 Education for Service-- tutorialrank.com
We want to hear from you! chime16.org/evals
LifeBridge Health Sinai Hospital Orientation.
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
LO1 - Know about aspects of cyber security
Evaluation and assessment
School of Medicine Orientation Information Security Training
Presentation transcript:

MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph

include-420-and-69-password-hat-tips-007-pi % 4-digit PINs that are “1234” 20% 4-digit PINs that begin with “19” Are We Security Savvy?

s 50% Organizations that were victims of at least one cyberattack in 2011 $5.5m Average cost of a data breach in 2011 (down from 2010!) Big Impact

Cascading damages Hacker attacks a corporate network Network outage, data loss, information theft Loss of productivity, revenue, quality of care Tarnished reputation, loss of trust Legal liability, loss of profitability From Greisiger (2006) – NetDiligence Corporate Presentation

Spending on IT Security $151 billion projected for 2012 (Financial Times, 2011) 5.6% of total enterprise IT spending Emerging executive position: The Chief Information Security Officer – To whom should the CISO report?

Regulating Information: Financial Services Gramm–Leach–Bliley Act of 1999 Financial Privacy Rule Safeguards Rule Pretexting Protection

Regulating Information: Healthcare The Health Insurance Portability and Accountability Act of 1996 (HIPAA) The Patient Safety and Quality Improvement Act of 2005 (PSIQA) What is the purpose of each law? What is its implication for the information technology function? Source:

How do you protect against a breach? Inventory systems Assessing where vulnerabilities exist Determine tolerance for a breach Account for corporate culture What is the role of the CISO? Is this consistent with the “lessons learned” from CareGroup?