Information Security Training

Slides:



Advertisements
Similar presentations
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Advertisements

Privacy and Information Security Training ( ) VUMC Privacy Website
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Protecting Sensitive Information PA Turnpike Commission.
Practical Information Management
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Privacy Act United States Army (Managerial Training)
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
Ticket Training Tuesday Properly Safeguarding Personally Identifiable Information (PII)
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Awareness Training
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
Lewis Creek Systems, LLC
Privacy & Information Security Basics
East Carolina University
Lewis Creek Systems, LLC
HIPAA Privacy & Security
2015 Orientation to HIPAA Privacy Rule Compliance
Privacy & Confidentiality
HIPAA Online Student Orientation
Understanding HIPAA Dr. Jennifer Lu.
HIPAA Basic Training for Privacy and Information Security
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Overview.
The Health Insurance Portability and Accountability Act
Corporate Compliance.
Move this to online module slides 11-56
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Protecting Student Data
The Health Insurance Portability and Accountability Act
School of Medicine Orientation Information Security Training
Presentation transcript:

Information Security Training 2018

Privacy & Security Compliance RCHSD is Committed to Privacy & Security Compliance Our goals with this training module are to Assist you with meeting compliance obligations; Help you understand key elements of privacy and security compliance to protect patient privacy and honor our promise to patients, families and regulators to keep medical records and patient information confidential. Upon completing this module you will understand: How to help protect the privacy of patient information; Common risks to privacy and security; How to describe safeguards used to protect patient information and information assets; Your compliance obligation to prevent privacy breaches and report suspected breaches when they occur.

The Number of Breaches per year in Health Care is Increasing Exponentially

DHHS Reported Incidents Our Information is Valuable DHHS Reported Incidents Marin Healthcare District – September, 2016 Ransomware infected systems operated by the covered entity’s business associate, Marin Medical Practice Concepts, Inc. During the restoration process, one of the backup systems failed, causing the loss of protected health information…… Medical College of Wisconsin – September, 2016 An unauthorized third-party comprised the protected health information found in an employee’s email account for a period of three days. The compromised email account contained the PHI of 3,225 individuals. The types of PHI involved in the breach included full names, home addresses, dates of birth, medical record numbers, diagnoses, and/or treatment information, and the social security numbers of two patients…

HIPAA and the Security Rule Covered entities are required to adhere to U.S. Department of Health and Human Services (HHS) developed regulations protecting the security of certain health information These regulations form the security rule, which establish national standards to protect individuals’ electronic PHI Requires appropriate security controls to ensure the following is applied to all electronic PHI Confidentiality – Ensuring information is not improperly disclosed; Integrity – Ensuring data is accurate, complete and has not been altered in an unauthorized manner; Availability – Systems are accessible upon demand by those authorized to use them to help care for our patients.

Information Security Goals The Security Rule and Information Security Goals The goal of RCHHC is safeguard our information and to comply with HIPAA Security Rule requirements by implementing administrative, physical and technical safeguards. RCHHC employees, contractors and affiliates have a personal responsibility to protect information and systems by: Adhering to email and internet security principles Following best practices for computer access Reporting incidents

Protecting PHI & Other Sensitive Information in Email Correspondence Consider whether the email you’re sending to an email address outside RCHSD contains PHI or other sensitive/confidential information. Remember, you should always ask yourself, “Should this type of information be leaving our organization?” or “Does the recipient have a need to know this information?” PHI or sensitive information sent by e-mail MUST be encrypted first using an approved encryption method NEVER use unauthorized public portal sites such as Box, DropBox, iCloud. If email doesn’t meet your requirements, contact the service desk

Email Encryption If you need to send PHI or sensitive information, you must encrypt your message with one of these methods: Select the Encrypt & Send “ZixSelect” button right above your send key when you open an email (if you don’t have this button, call the Service Desk at ext. 5177), OR Include the word Secure in the subject line of your email. IMPORTANT: Before you hit send, make sure your email is only addressed to those you want to send it to.

Email Data Loss Prevention RCHSD utilizes a Data Loss Prevention technology that blocks emails sent by users which contain unencrypted PHI. If you receive a blocked email notification, review your sent email, make any corrections and resend.  If you feel your email has been blocked in error, please contact the Compliance Department at rchsdcompliance@rchsd.org.   The Compliance Department receive copies of blocked emails and will monitor those emails accordingly. 

Social Engineering Social engineering is defined as manipulating and exploiting human behavior in order to gain unauthorized access to a system or to information. Common targets are: Passwords Employee’s personal data Other sensitive information

Phishing Attacks Phishing emails (or texts) is an example of social engineering where an attacker seeks information or access through a targeted message. They typically alert you to a problem or request information and often include links that could introduce malware or expose information when clicked. These emails look real and often pretend to be from another employee or from IT.

Information Security Best Practices E-mail and Internet Information Security Best Practices Do’s and Do Not’s Do Encrypt emails containing PHI, PII, or other sensitive data. Do report suspicious emails to phishing@rchsd.org Do Not Click on suspicious links in e-mail or on internet sites Do Not respond to email or text messages that ask for personal information like credit card numbers, Social Security numbers, passwords, etc. Do Not use a personal device to access or store PHI if the device has not been approved Do Not open attachments from untrusted sources

Preventing Unauthorized Access Use strong passwords and commit them to memory Never use the same password for your work account as for your personal account. Recent compromises on commercial sites (Yahoo!, LinkedIn, etc.) have exposed personal passwords! DO NOT write down passwords! Never leave a workstation that is logged in unattended: Lock your computer screen by pressing Ctrl-Alt-Delete whenever you leave a desk or work area, and be sure to secure the application you are using Log off of your computer when you leave work each day

Preventing Unauthorized Disclosure Never leave laptops or devices that contain PHI unattended in open areas such as cars, restaurants or waiting rooms Never leave printers unattended when printing sensitive information Never leave your computer monitor open towards public view when sensitive information is being accessed Report suspicious activities to the Service Desk Report suspected HIPAA violations through the Safety Reporting System (SRS).

Your Role in Privacy and Security Compliance Understand the reasons for confidentiality and agree to abide by our confidentiality policies and procedures; Keep patient information confidential at all times including electronic, written and verbal information; Report suspected or known violations of confidentiality and security such as: Unauthorized or suspicious visitors; Logged-on but unattended workstations; Uncontrolled access to areas that house equipment and/or PHI; Passwords on Post-it™ notes; Staff accessing records without a need to know.

Reporting Breaches or Other Security Concerns Call the Chief Information Security Officer! Use the Safety Reporting System Call the Compliance Hotline!! Reporting is Everyone’s Responsibility…do you know the Safety Penquin?

If You Have Concerns There are a number of resources available to you. Please do not hesitate to call if you have questions, suggestions or concerns: Contact Christina Galbo, Chief Compliance & Privacy Officer at (858) 966-8541 or cgalbo@rchsd.org. Contact Melody Herbert, Privacy Compliance Manager at (858) 966-1700 ext. 2483 or mherbert@rchsd.org. Contact the IT Security Department at (858) 966-8746 or _ITSecuritygroup@rchsd.org Call the confidential Compliance Hotline at (877) 862- 4228.

Reporting a Concern to the Compliance Hotline There may be times when your concerns cannot be properly addressed through the normal chain of command; Available seven days a week including all holidays; Your confidentiality and anonymity are guaranteed to the extent permitted by law; Your call will not be recorded or traced; All allegations will be thoroughly investigated and verified before any action is taken.

Compliance Hotline 1-877-862-4228 Do You Have a Concern? Make the right call Compliance Hotline 1-877-862-4228 24 HOUR TELEPHONE HOTLINE Staffed by trained personnel Independent from RCHHC Important that sufficient detail is shared This hotline should be used to report concerns about potential violations and to receive follow-up information in confidence

Non-Retaliation You will not be retaliated against for voicing a legitimate concern to RCHSD, or to an outside entity. If you feel you are a victim of retaliation, please report your concerns to the Compliance Department immediately to initiate an investigation.