Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
Woodland Hills School District Computer Network Acceptable Use Policy.
Ethics, Privacy and Information Security
David Assee BBA, MCSE Florida International University
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Online Safety 2.02 Remember the rules of online safety.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Aaron Cauchi Nurse Informatics
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Eliza de Guzman HTM 520 Health Information Exchange.
Working with HIT Systems
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Online Safety 2.02 Remember the rules of online safety.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Health Insurance Portability and Accountability Act By Bradley Gleich.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Computer Security Keeping you and your computer safe in the digital world.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
East Carolina University
Hotspot Shield Protect Your Online Identity
Network Security (the Internet Security)
Homeland Security: Computer Protection
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER PRIVACY.
Computer Ethics.
Final HIPAA Security Rule
Lesson 2: Epic Security Considerations
Part 3.
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Setting the Standard for Security Electronic health information must be confidential, have integrity, and be available. Each provider must protect against threats or hazards to the security of the information.

Practical Security Safeguards For our system At our workstation When using and the Internet

Safeguarding Our System

What Are the Potential Risks to Our System? Theft Vandalism Snooping Environment

How Can We Minimize the Risks? Protect Physical Access Control location Lock equipment Use screen filters Label laptops Lock or shut down

Protecting System Access Identifying Who are you? Authenticating Something you know Something you have Something you are

Protecting System Access… Authorizing Rights and permissions Accounting Audit trails and logs

Protecting System Access Manage your Password! Choose a strong password! Don’t share it with anyone! Don’t write it down on a Post-It! Don’t “Save This Password!”

Protecting System Access… Remove default passwords Control software loaded on system Remove unused software Consider automatic log-off Consider encryption for sending sensitive information

Minimizing the Risks…. Education of the Workforce Who are the Data owners Data users Data custodians And what can they do?

Minimizing the Risks…. Anticipate Environmental Hazards Power outages/spikes Fire Flood

How About the Internet? Downloading information

Downloading Information Freeware Shareware Be careful: some of these programs create vulnerability to viruses, unexpected software interactions, and subversion of security controls, and may violate your licensure agreements if you don’t purchase the software.

Don’t open attachments from someone you don’t know Don’t open attachments from someone you do know if the message seems strange

Your PC The only safe PC is a powered-off PC Two thirds of all hacking is INTERNAL Most hacking activity takes place off-hours There is no such thing as a 100 percent secure system or network, but we can work toward better security practices.

Your HIM Professionals Are a Valuable Resource! Working together we can manage the privacy and security of health information. Sponsored by © 2003 AHIMA