Challenges to Implementation of [real] Information Security August 21, 2002 Chris Apgar, CISSP Kate Borten, CISSP Ken Patterson, CISSP.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

IT Security Policy Framework
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Myths and Realities for Physician Practice Managers Presented by Shana Wolfe, CHC Corporate Compliance Officer, Washington County Health System Co-chair.
And the finer details of patient privacy TCH Confidential Understanding HIPAA.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
NAU HIPAA Awareness Training
HIPAA Training. What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in It provides the ability to transfer.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Computer Security Fundamentals
Frequently Asked Questions. No, in fact DOCTUS considers itself a strategic extension of your organization. Hence, we deliver the work the way you do.
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
WORKSHOP IV Integrating Ethics, Compliance, Privacy and Security into a Single Organizational Initiative Geralyn Kidera JD Senior Vice President Council.
Security and Privacy Strategic Global Partners, LLC.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
1 Craig D. Azoff, Director Administrative Information Systems Bill Luecken, Senior Director Information Systems Eric Steinhardt, Security Manager 13 th.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
ACHIEVEMENTS Spring 2013 Employee Development Mark Zocher.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
HIPAA Privacy What Every Staff Member Needs to Know.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
And the finer details of patient privacy
Introduction to the Federal Defense Acquisition Regulation
Health Insurance Portability and Accountability Act
Analysis of the Final HIPAA Security Rule
Health Insurance Portability and Accountability Act
Health Care: Privacy in a Digital Age
The Practical Side of Meaningful Use:
The Role of the Information Security Officer Getting It Right
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Lesson 1: Introduction to HIPAA
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Protect data in core business applications
Presentation transcript:

Challenges to Implementation of [real] Information Security August 21, 2002 Chris Apgar, CISSP Kate Borten, CISSP Ken Patterson, CISSP

Chris Apgar, CISSP  Former state regulator turned private sector HIPAA “expert”  Security & HIPAA compliance officer for Providence Health Plan, a moderate sized regional health plan that is part of large delivery system  “Volunteered” for HIPAA & security while managing Y2K remediation

Chris Apgar, CISSP (cont’d)  Chair, Oregon HIPAA Forum Transaction & Code Set Subcommittee  Past Chair, Oregon Medicaid contractors HIPAA task force  Advisory board member, HIPAA Compliance Insider  Past board member, Privacy Officers Association

My Favorite Soap Box  The “Rodney Dangerfield complex” or “I get no respect”  Security & privacy deemed important challenges but limited resources available to address  Difficult to develop ROI for security – cost avoidance versus a profit making venture  Overcoming the belief, “it won’t happen to me”

Senior Management Education (or lack thereof)  The business of keeping the doors open versus attending to the details  Overcoming the belief that security is another IT initiative  No final security rule hampers efforts to acquire resources  Problem generally not getting to the top but keeping top management engaged

Solutions & Suggestions  Tie security to ROI – what is the competition doing, positive PR, etc.  Remind Privacy Rule & statute mandate sound security practices  Educate, educate, educate  Use horror stories judiciously

Solutions & Suggestions  Present options, accept risk and remain flexible  Remember brevity with top executives – make your point quickly and avoid fluff  Cultivate security advocates within and outside the organization  Incorporate a bottom up approach (I.e., train end users, period security announcements to staff, etc.)

Solutions & Suggestions  Focus on culture, business process versus technology – change the belief “this is only an IT issue”  Partner with regulatory, compliance, clinical – generally deep concern felt for privacy of patient/member  Patience & a sense of humor a must!

Kate Borten, CISSP  In healthcare IT for over 20 years … designing & implementing IT solutions for clinical and business functions (at Harvard U. affiliates)  Got “stuck” with starting up first-time comprehensive information security program at Mass. General Hospital (IDS) in the early 1990s … found out there’s a lot more to it than passwords!

Kate Borten, CISSP (cont’d)  Chief Information Security Officer, CareGroup –Set up corporate-wide comprehensive infosec program  Now, President, The Marblehead Group, Inc. –National healthcare privacy & security consulting

A Few of the Numerous Challenges  Understanding –Lack of health industry knowledge of the field  Importance –InfoSec plays second fiddle to privacy - yet breaches & lawsuits usually due to infosec flaws  Scope –Due diligence => protection of all information assets, not just HIPAA stuff  Technology –Big problems remain unsolved

Culture Change  One of the biggest challenges: changing people  Need to understand and work to modify attitudes & behavior

Culture Change Needed! Real Examples Security principle: Passwords must be hard to guess & kept secret –Clinton signs the e-sign bill using password “Buddy,” a radiologist picks password “RAD” –Passwords stuck on computer screens, under mouse pads, on keyboards, on stethoscopes –Boss says, “Tell me your password ‘cause I don’t have time to submit the form and go through training to get my own.”

Culture Change Needed! Real Examples Security principle: Everyone is personally responsible for ensuring good security through their own behavior and through reporting incidents –“The computer people handle that [i.e., it’s not my job].” –“ I’m not gonna rat on my friend! [and what’s the big deal about looking up his girlfriend’s lab test results anyway?]”

Culture Change Needed! Real Examples Security principle: Avoid confidential conversations where they can be overheard –“We’ve asked him to lower his voice when he’s discussing patients in the ER, but I guess he just has a naturally loud voice.” –“We’re so busy that we need to catch up on cases whenever we bump into each other [such as in the elevator, walking down the hall, in the cafeteria].”

Culture Change Needed! Real Examples Security principle: Destroy media (shred paper, chip disks, etc.) containing confidential data when no longer needed –“But it’s only a phone message slip with the patient’s name and number on it.” –“But it’s just a floppy disk and I’m using it at home now for other files.”

Good News  Little/no technology required  Hence, relatively low budget  Most “bang for the buck” - can get great results through strong workforce education programs  And it can be fun!

Ken Patterson, CISSP  Information Security Officer for Harvard Pilgrim Health Care “This is the hot young security officer” copyright 2002 john klossner,

Technology Challenges  Technical security mechanisms –Processes that are put in place to guard against unauthorized access to health information that is transmitted over a communications network –When using open networks, some form of encryption should be used –Small provider example: encryption must be used to transmit or receive health information when the provider chooses to use the Internet

Technology Challenges: Secure Messaging / copyright 2002 john klossner,

Secure Solutions  Client based solutions: client software implemented as a “plug-in” or “add-on”.  Pros: client to client security –Protects message from internal staff –Integrated into existing environment  Cons: Requires end-user training, including installation at the client level –End user responsible for security –Very difficult to centrally scan for viruses, perform content checking, and message archiving

Secure Solutions (cont.)  Web based solutions: web interface where messages are checked, signed and encrypted at the web server – can be outsourced  Pros: No installation at client or local network –Low initial cost and administrative overhead –Can provide extensive message tracking –Any browser can easily access  Cons: A new and separate system –Dependency on supplier –Not always fully secure

Secure Solutions (cont.)  Server based solutions: adds a centrally controlled layer of security to the existing mail server  Pros: uses existing environment, so no client installation, low level of user training required –Centrally control and maintain policy  Cons: internal security issue still present –Client to client not 100% secure –Resources for administration and central control are required

No Free Lunch copyright 2002 john klossner,