DATA SECURITY FOR MEDICAL RESEARCH

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Digital Certificate Installation & User Guide For Class-2 Certificates.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Microsoft Passport Waldemar Swiercz.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information Security Technological Security Implementation and Privacy Protection.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Explain the purpose of an operating system
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
University Health Care Computer Systems Fellows, Residents, & Interns.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Policies and Security for Internet Access
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
Welcome to Zoom Training
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Computers in the Ambulatory Care Setting
IT Security Awareness Day October 19, 2016
East Carolina University
Tim Carter Sales Director Sybase Confidential Propriety.
What this activity will show you
Power BI Security Best Practices
Security of Mobile Operating Systems
Tim Carter Sales Director Sybase Confidential Propriety.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2016 Minnesota Assessment Conference
Cloud Storage Services
Get Office 2016 with Office 365 and get down to business
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Final HIPAA Security Rule
Digital $$ Quiz Test your knowledge.
County HIPAA Review All Rights Reserved 2002.
Keeping Member Data Safe
Information Security Awareness
Installation & User Guide
Chapter 3: Protecting Your Data and Privacy
REDCap and Data Governance
HIPAA & PHI TRAINING & AWARENESS
Designing IIS Security (IIS – Internet Information Service)
Introduction to the PACS Security
G061 - Network Security.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

DATA SECURITY FOR MEDICAL RESEARCH

What is PHI? Protected health information about the health staus, provision of health care, or payment for health that can be linked to a specific individual. PHI applies under laws in the US (HIPAA) and many other countries, e.g. eu (EU Data Proection Directive/epPrivacy Directive). Examples: 1. Names 2. Addresses 3. Dates 4. Phone and fax numbers 5. Email addresses and mobile device identifiers 6. Government ID numbers 7. Medical records numbers 8. Biometric information (fingerprints, face/hand scan/image Some laws prohibit collection of this information, while others require proper safeguards to be in place. Encryption is the most common safeguard in use.

How can participant's PHI be protected while using the internet? 1. De-identification a. Remove or omit identifying elements when data is collected b. Study design should reflect need to protect identifying data by avoiding collection or using encryption 2. Encryption a. Web-based tools must use encryption to protect PHI transmitted over the internet. Enable web encryption by using Transport Layout Security (TLS), also called SSL. URLs must begin with https://www and a lock symbol, indicating PHI is protected between you and the web site. b. Use of TLS/SSL is evident to the end user. c. Note that sites using TLS/SSL during data transmission may not be designed for use with PHI. d. Defer to your organization's requirements for PHI protection (see laws pertaining to PHI protection).

con't PHI protection while using the internet? 3. Use proper authentication of individual users, through passwords (see later on creating a good password). 4. System gives users minimal permission to access data necessary. Not everyone is a system account administrator. 5. Sessions are limited. The system logs off automatically when the user is idle. 6. Data should be classified so that the system provides greater protections and limitations to more sensitive PHI, or greater or lesser protections to all PHI. 7. The use of audit logging allows administrators to know who has access to PHI, as well as when, whether, and how it has been modified. 8. The system has integrity by backing up information and protecting information from corruption or loss. The system obscures PHI information if unauthorized access occurs, including chile transmitting data. 9. Always install the latest software updates, which may include security enhancements.

How can participant's PHI be protected while using Microsoft Word?

How can participant's PHI be protected while using storage devices Use a storage device that automatically encrypts data. Example: Ironkey is the brand name of a family of encrypted USB and hard drive portable storage devices. The IronKey™ Cryptochip protects your critical data by keeping encryption key management on the device, where it's safe and protected. Only after the user logs in with an authorized password will the drive unlock data and applications.

How can participant's PHI be protected while using hosted and cloud-based services 1. Check with your institution to understand the correct web address to access the service. 2. Determine how data is handled by the service. Review terms and conditions and communicate with the company providing the service to answer these questions: a. How is access to the study data controlled? Can others see the data without your permission?   b. If data can be shared between users, can they create, modify, or delete the data within your study? c. Ensure that you have control over the study data, the ability to delete the data and study details from the service entirely. 4. Use established electronic tool available online to researchers, reducing the need to handle technical IT and security challenges involved. Examples: SherlockMD and REDCap

con't hosted and cloud-based services SherlockMD is a “cloud service”. 1. There is no software download necessary to use the tool. Collected data is processed and warehoused within a secure cloud running on Amazon’s best-of-breed data center technology. 2. It is independent of any particular research institution, so it is very easy for independent researchers use it without waiting for an institution to configure user accounts and software. 3. It is available to use on the desktop in a web browser or on a mobile device. 4. The use of TLS/SSL to ensure all data is securely encrypted from your browser to the service. 6. It enforces the use of strong passwords and authorization levels

con't hosted and cloud-based services REDCap is a “cloud service”. 1. REDCap enforces the use of strong passwords and authorization levels to ensure the studies it can be safely and securely shared with collaborators using the same service. 2. It is available to use on the desktop in a web browser or on a mobile device. 3. Websites and mobile apps can use TLS/SSL to ensure all data is securely encrypted from the browser to the service. 4. RedCap is a “hosted” service. An institution downloads the software and configures it to run on it's own network/website, then provides access to the tool and the data.

con't How can participant's PHI be protected while using hosted and cloud-based services Mobile devices 1. If PHI will be captured or stored on mobile device, configure it to use the built-in mobile device encryption if available. 2. iOS iPhone and iPad The device will automatically encrypt everything stored inside, but ONLY when using a password. Create a 6-digit numeric or alphanumeric password in the Settings menu.

con't PHI protection while using mobile devices 3. Android a. Device encryption is enable directly in the Settings menu. b. To ensure the security of this setting, ensure the device will lock with a regular password, PIN, or pattern lock. c. Always install the latest software updates, which may include security enhancements.

con't PHI protection while using mobile devices 4. The value of mobile apps for protecting PHI a. Mobile apps and websites use SSL/TLS to ensure data is securely encrypted from the browser to the service. b. Encrypts secure data even when not in use with standard "AES 256-bit encryption. c. Encrypts when data is lost or stolen. d. Enforces the use of strong passwords. Strong password have 10 characters mixing upper/lower case letters, numbers, symbols, and punctuation. e. Mobile apps require multiple levels of authorization. 5. Sources of mobile apps a. Google Play b. Apple App Store c. Directly by your affiliated institution.

Summary Recommendations When evaluating a too to protect PHI: 1. Omit or de-identify identifying health information before submitting it online. 2. Use an online service that uses encryption in transmission. 3. Ensure the service or tool requires user accounts and requires strong passwords to protect access to data. 4. Select a service or tool the provides for deleting data if necessary. 5. Configure the device or workstation to safeguard access to the service, tool and data, such as passwords and auto-locks. 6. Encrypt the data in case the device is lost or stolen. 7. If it is an institution providing the security service, comply with its guidelines for PHI date protection and use.