Steps to Compliance: Bring Your Own Device PRESENTED BY.

Slides:



Advertisements
Similar presentations
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Advertisements

Security for Mobile Devices
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Steps to Compliance: Managing Business Associates PRESENTED BY.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Forming Your HIPAA Compliance Plan PRESENTED BY. Daniel B. Brown, Esq. Healthcare Attorney Taylor English Duma LLP Jason Karn Director Training and IT.
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
Meraki Mobile Device Management
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Andrew Schroeder Networking Aspects of Cloud Computing.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Steps to Compliance: Electronic Devices Overview PRESENTED BY.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Steps to Compliance: Risk Assessment PRESENTED BY.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
[INSERT COMPANY NAME] Protecting Against Data Breach YOU ARE THE FIRST LINE OF DEFENSE Copyright 2010 Jackson Lewis LLP This sample training powerpoint.
New Data Regulation Law 201 CMR TJX Video.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Information Security Technological Security Implementation and Privacy Protection.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
ESCCO Data Security Training David Dixon September 2014.
Compliance Strategies for Records Management
DATA PROTECTION IN THE AGO Christina Beusch Deputy Attorney General WA State Attorney General’s Office.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Minimizing Risk and Cost Exposure through Information Governance January 28, 2015 Moderator: Christopher Johnson, Director of Technology and Integrated.
Technology Update- BYOD. Possible uses to support learning  Calculator for Maths  Calendar app for recording homework  Internet for Research.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Hidden HIPAA Weaknesses: How to Tackle Them and Prevent a Breach
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
Mobile Data Solutions Inc
What this activity will show you
Introduction to Soonr by ….
Different Types of Apps. App Development ● App Development refers to the creation of computer applications for use on mobile devices such as tablets,
Garmin Express Support Service Call for
Which is right for your business, Office 365 or Microsoft 365?
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Which is right for your business, Office 365 or Microsoft 365?
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Introduction to the PACS Security
Presentation transcript:

Steps to Compliance: Bring Your Own Device PRESENTED BY

Daniel B. Brown, Esq. Healthcare Attorney Taylor English Duma LLP Jason Karn Director Training and IT Total HIPAA Compliance Today’s Presenters

This program is educational and does not constitute, and may not be construed as, legal advice to, or creating an attorney-client relationship with, any person or entity. Housekeeping The materials referenced here are subject to change, so frequent review of the source material is suggested. 3

The Good  Good for productivity  Saves you money The Bad  You have limited control of the devices  Distracting for employee The Good, The Bad, and The Ugly  Employees can bring malware to work The Ugly

Acceptable Use  What apps are allowed or forbidden?  Are certain websites restricted during business hours?  Can employees access practice-owned resources? Contacts Documents Records 9 Employees shouldn’t share devices that can access the practice network with family members or friends.

Reimbursement 10 What will you reimburse? What won’t you reimburse?

Why Should I Have A Policy In Place? 11  Protects the Practice  Protects your Patients  Shows employees how important Privacy and Security are to you

How To Secure These Devices Smartphones Tablets All-in-Ones

What devices are allowed on your network?  First, create a detailed list of devices and the operating systems allowed.  Next, you should determine: Who will support connectivity issues? Who will configure devices for network access? How are you encrypting devices? 10

Password Changes 11  Establish a set schedule (e.g., every 90 days)  Clearly state this in your Policies and Procedures  How should you enforce this?

11  iPhone and iPad  Android Devices  Windows Devices  Linux Based Systems Virus Protection Required on Devices

11  Laptop PC’s  Android devices  Windows Phones  Apple Devices Tracking and Remotely Wiping Devices

11  What type of remote access is acceptable?  How should employees access secure info.?  VPN  Cloud File Sharing Remote Access

Portable Storage Devices 11  Do you allow these on your network? Flash Drives Removable Hard Drives CD’s and DVD’s

Special Thanks Taylor English Duma LLP is a full-service law firm built from the ground up to provide highest-quality legal services for optimal value. The firm was founded in 2005 and its attorneys work each day to provide timely, creative and cost-effective counsel to help clients solve problems and achieve goals. Taylor English represents all types of clients— from Fortune 500 companies to start-ups to individuals. 20

Questions?