Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
Welcome to UF We’re from the Privacy Office and we’re here to help you… HIPAA Orientation – College of Nursing August 22,2014 Cheryl Webber, MS, RHIA University.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
New Data Regulation Law 201 CMR TJX Video.
Threats to I.T Internet security By Cameron Mundy.
Information Security Technological Security Implementation and Privacy Protection.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1.1 System Performance Security Module 1 Version 5.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Children’s Hospital Requirements for Remote Access.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Eliza de Guzman HTM 520 Health Information Exchange.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
KTAC Security Task Force Superintendents Update April 23, 2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
Computer Security Sample security policy Dr Alexei Vernitski.
Technology & Private Practice: Understanding the Legal & Ethical Challenges Bianca Puglia, Ph.D., LPC, NCC/Puglia Counseling Services Panagiotis Markopoulos,
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Lewis Creek Systems, LLC
East Carolina University
Lewis Creek Systems, LLC
HIPAA.
Staying Austin College
Call AVG Antivirus Support | Fix Your PC
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Drew Hunt Network Security Analyst Valley Medical Center
Security in mobile technologies
Introduction to the PACS Security
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health

Personal Mobile Device Use in a Clinical Setting Many hospitals and health care providers are struggling with what to do about employees and their use of mobile devices in the workplace  What is our organization’s position on Bring Your Own Device or “BYOD”  Do you have a policy that speaks to whether the organization allows use of personal devices  Does HIPAA allow the use of personal devices to transmit or store PHI?

Mobile Devices and Protected Health Information  What does the law say about mobile devices?  There is nothing in HIPAA that states that it is not permissible to use a personal device to transmit patient information, however, the HIPAA Security Rule is clear that patient information must be protected and used securely by a covered entity, “whether at rest, in use, or in transmission.”  The problem: Who owns the phone or portable device and how can a covered entity enforce proper security on the device if they don’t own it?

Common conversations regarding mobile devices Common FeedbackResponse “Our phones on the unit are so outdated. They break, they aren’t efficient, and they are three times the size of my cell phone. I can use my cell to text and don’t have to use number keys to text docs... It’s so much faster.” What does your policy regarding mobile devices state? Do you have a policy? Are you texting PHI? If so, you may be putting patient information at risk. Remember, your service provider for your personal phone regularly backs up your phone in a cloud storage environment – this storage is not secured “I don’t want to carry around more than one phone – why can’t I just use my personal cell phone?” Newer cell phones have encryption features, but older models may not. Encryption is often not turned on by a person, because they are unaware that the feature exists

Common FeedbackResponse “If I need to text a doctor information about a patient, it’s no different than calling the doctor. “ Texting and phone calls are two very different modes of communication with very different levels of risk. When you text anything from a mobile device that does not have appropriate security, the information is stored electronically in your phone’s cloud storage “I’m under a lot of pressure to treat patients quickly... It’s just easier to text other docs and nurses when I need to tell them something. Maybe the hospital should look into purchasing us better technology.” While convenience may be tempting, fines for HIPAA Security violations have jumped from $50,000 to $1.5 million in the last year. Most of the fines given by the Office of Civil Rights involve Security Rule violations and PHI that was discovered on the internet unsecured “I told our IT Department that I was using my mobile phone to text, and they said that they wanted me to give them rights to my device so that they can wipe it if it gets lost or stolen. I don’t think I want to give them this right. It’s my device.” It may be your device, but if you are texting PHI, it’s the organization’s patient information. You are putting the organization at risk if the device is lost or stolen and you don’t report it. In order to use your device, there are tradeoffs so that information can be safeguarded

Coming up with a Position on Use of Smartphones in Your Organization  Use of Smartphones:  Many organization are aware that employees in clinical areas are using their personal mobile device to communicate information regarding their patients but are they dealing with the issue? Pretending like the issue doesn’t exist can cost your organization

Steps to Compliance  Does your organization have a mobile device policy?  What is your organization’s position  Is your organization willing to support a BYOD culture?  Do you know who your organization’s Privacy & Security officers are if you have questions regarding BYOD?  Are you training your employees on what your organizational position is?

 Does your organization use a Virtual Private Network or “VPN?”  A VPN is a way for employees to securely enter the network and work remotely in a secure environment  This allows employees to  Text securely  Access patient information securely  securely Steps to Compliance

Understand what can put a patient’s information at risk There are risks that many don’t think of when we talk about mobile devices:  Device gets lost – is the employee reporting the loss to their employer, even if the phone belongs to the employee  Devices can be stolen – is your IT department enforcing wiping capabilities on personal smart phones in the event they are lost or stolen?  Is the employee’s phone password protected? You would be surprised to know how many people do not have passwords on their phone  Depending on the type of device, malware and viruses are a potential threat that can be introduced into the workplace  Do your employees understand that using a “free wifi” service when outside of work is dangerous and can expose any PHI on their device to potential theft or loss?

Simple steps for each employee to take to help their organization achieve compliance  Step 1: Use a password or other user authentication method  Authentication is the process of verifying the identity of a user  Mobile devices can be configured to require a password, PIN or passcode to gain access  If an unauthorized user attempts to gain access and doesn’t have the right password or PIN, mobile devices can activate screen locking to disallow any more attempts to gain access to the device

Step 2: Install and enable encryption  Encryption protects health information stored and sent by mobile devices  Mobile devices often have built-in encryption that can be activated or encryption can be purchased for a device  Find out what your organization’s encryption capabilities are and if they offer encryption for a personal device

Step 3: Install and activate remote wiping and/or remote disabling  Remote wiping enables you to erase data on a mobile device remotely. This can permanently delete date stored on a lost or stolen mobile device  Remote disabling enables you to lock your device until it is recovered

Step 4: Disable and do not install or use file sharing applications  File sharing is software or a system that allows Internet users to connect to each other and trade computer files  But file sharing can also enable unauthorized users to access your laptop, handheld device or phone without your knowledge  By disabling or not using file sharing applications, you reduce a known risk to data on your mobile device

Step 5. Install and enable a firewall  A personal firewall on a mobile device can protect against unauthorized connections  Firewalls intercept incoming and outgoing connection attempts and block or permit them based on a set of rules

Step 6. Install and enable security software  Security software can be installed to protect against malicious applications, viruses, spyware, and malware-based attacks

Step 7. Keep your security software up to date  When you regularly update your security software  You have the latest tools to prevent unauthorized access to health information on or through your mobile device

Step 8: Research mobile applications (apps) before downloading  A mobile app is a software program that performs one or more specific functions  Before you download and install an app on your mobile device, verify that the app will perform only functions you approve of – not sure if the app is ok? Ask your IT Department  Use known websites or other trusted sources that you know will give reputable reviews of the app

Step 9. Maintain physical control  The benefits of mobile devices - portability, small size, and convenience... these are also their challenges for protecting and securing health information  Mobile devices are easily lost or stolen  There is also a risk of unauthorized use and disclosure of patient health information  You can limit an unauthorized users’ access, tampering or theft of your mobile device when you physically secure the device

Step 10. Use adequate security to send or receive health information over public Wi-Fi networks  Public Wi-Fi networks are so tempting to use because, of course, they are free  But, they can be an easy way for unauthorized users to intercept information  You can protect and secure health information by not sending or receiving it when connected to a public Wi-Fi network, unless you use secure, encrypted connections

Step 11. Delete all stored health information before discarding or reusing the mobile device  When you use software tools that thoroughly delete (or wipe) data stored on a mobile device before discarding or reusing the device, you can protect and secure health information from unauthorized access  HHS OCR has issued guidance that discusses the proper steps to take to remove health information and other sensitive data stored on your mobile device before you dispose or reuse the deviceguidance  Unsure how to make sure your device is sufficiently wiped when you get a new device? Ask you IT Department for help!

Questions?