Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.

Slides:



Advertisements
Similar presentations
HIPAA Security.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Protecting Sensitive Information PA Turnpike Commission.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
The Office Procedures and Technology
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
1 HIPAA Information Security Awareness Training “Good Computing Practices” for Confidential Electronic Information For All NXC Employees October 2011.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Computer Note.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
UNIT 19 Data Security 2.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
G061 - Network Security.
Information Security in Your Office
Presentation transcript:

Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology

A case of confidentiality Dr. B employs an office manager who also does transcription and completes dialysis billing. Takes work home to complete. Home computer crash requiring repair Computer “irretrievable”; replaced. Requested “wipe the old hard drive” The phone call 3 months later…

Computer hard drive recycled to new setup and resold New purchaser finds medical transcription files stored on the hard drive, and releases to local paper. Patients involved interviewed by paper Dr. B gets a call from a lawyer or two…..

What are the issues for Dr. B and patient heath information? Limiting access to information Improving confidentiality Keeping the integrity of medical information

Who has access? Office employees with need to access medical information (e.g.: nurse, booking, billing) Office staff with no need to access medical information (e.g.: night cleaning staff) Cyberspace (i.e.: everyone)

Through what route do they have access? Single computer Server / Network within the institution or office Internet

Where/How is information stored? Fixed Server (remote) Hard drive Mobile Compact disks (CD) or DVDs Floppy, tape, jaz, or zip drives Memory sticks or data keys

When is information accessible? From office when open From outside 24/7

Methods to improve security in the office Computer access Information storage and backup Internet access

Simple things to control access or theft Password login In place on most OS Password protected files In place in most WP and accounting applications Chained computer Locked desk Locked office

Information storage Fixed storage Often can establish permissions to access folders Safer to have remote server (damage) Mobile storage Can be locked away Can removed just as easy Not generally durable storage Magnetic storage– corrupted data after 10 years with some forms such as floppies and zip Less with data keys and flash cards

Information backup Best to have a system remote from office Fire Surges Get a protector! Computer crashes Back up should be real-time Best if combined with encryption or password access

Internet access A computer with access to internet is vulnerable Broadband (cable) >> dialup Standalone >> network Monitored access / Access on demand No access (not practical)

Internet access Ways to help Firewall = a set of instructions limiting what data channels of your internet connection can be accessed from outside and in some cases, by whom AND what programs can access the internet from within your computer

Firewalls – what channels? Data incoming and outgoing is organized in channels e.g.: , Internet, DNS lookup Can allow data to flow into or out of: Any None Some

Firewalls – a checkpoint What it can do : audit What type of data ( , internet and file types) How frequently / how many attempts Where it is going (limiting internet access to certain sites) Low level data content censoring (out and ingoing)

Firewalls What it can’t do Intentional bypass of the system E.g.: Social engineering Password changes, phone numbers, credit card numbers etc. Protect against viruses entering Some can prevent multiple distributions from occurring

Firewalls Helpful if you have layered security needs to a computer/network If something is completely confidential/high sensitivity… IT SHOULD BE ISOLATED FROM THE NETWORK

Return to Dr. B – What can be done? Establish policy that patient data doesn’t leave office If it has to leave the office: Password protect/encrypt all files Delete all files when transferred back to the office Store transcription work on mobile media that comes back to the office

Within the office… Lock computer access and or password protect login Isolate patient information from internet Educate your patients and staff about your confidentiality standards

Further resources HIPAA Privacy regulations More on Firewalls Basic Primer on computer security