Kit Robinson Director Data Loss Prevention and HIPAA.

Slides:



Advertisements
Similar presentations
HIPAA and Joint Commission Requirements Compared and Contrasted
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
A Do-It Yourself Guide (Sort of…) Veritas Solutions Group, LLC
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Founded 1993 Primary focus – Enterprise Risk Management Solutions COMPANY PROFILE.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Red Flag Rules: What they are? & What you need to do
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
© Chery F. Kendrick & Kendrick Technical Services.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Confidentiality and HIPAA
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
© Chery F. Kendrick & Kendrick Technical Services.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Use of Health Information Technology in Physician Practices
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
CORPORATE COMPLIANCE PROGRAM The Office of Corporate Integrity
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
HIPAA (health insurance portability and accountability act)
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Health Insurance Portability and Accountability Act of 1996
HIPAA THE PRIVACY RULE Reviewed December 2012.
Encrypted from CDS Office Technologies
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Understanding HIPAA Dr. Jennifer Lu.
Chapter 3: IRS and FTC Data Security Rules
Cyber Trends and Market Update
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Risk Management: why and how to protect your health center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Presentation transcript:

Kit Robinson Director Data Loss Prevention and HIPAA

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. ID Theft Tops FTC's List of Complaints For the 5 th straight year, identity theft ranked 1 st of all fraud complaints. 10 million cases of Identity Theft annually. 59 percent of companies have detected some internal abuse of their networks

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Changing Threats to Data Security

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Top 10 Most Frequent Incidents 1.Patient PHI sent to partner, again, and again 2.Employee 401k information sent outbound and inbound 3.Payroll data being sent to home address 4.Draft press release to outside legal council 5.Financial and M&A postings to message boards 6.Source code sent with resume to competitor 7.SSNs…and thousands of them 8.Credit Card or account numbers….and thousands of them 9.Confidential patient information 10.Internal memos and confidential information

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Data Loss Prevention 1.Where is my confidential data stored? –Data at Rest 2.Where is my confidential data going? –Data in Motion 3.How do I fix my data loss problems? –Data Policy Enforcement Three Key Customer Challenges

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Why Data Loss Prevention is a Priority Compliance Brand and Reputation Protection Remediation Cost 1:400 messages contain confidential information 1:50 network files are wrongly exposed The Risk

American National Insurance Company Business Drivers –Protect policy holder information –Protect employees PHI –Layered approach with encryption –HIPAA Compliance Why Vontu Was Selected –Ability to prevent policy breaches –Integration with PGP encryption American National Insurance Results –Monitor all protocols –Prevention activated with PGP within two months –Automated enforcement –Encrypt all s with employee or patient information Fortune 583 Market Cap $3.25B Revenue $2.9B Employees 4,200 Industry: Insurance Vontu Solution 1.Monitor 2.Prevent

American Association of Retired Persons Business Drivers –Protect membership information –Protect Social Security Numbers –Protect credit card numbers and PCI compliance –Protect confidential documents Why Vontu Was Selected –Ability to block/quarantine messages –High degree of accuracy –Ability to delegate incident response to business units AARP Results –Secure partner communications –Efficiency in investigations –Updating insecure business processes Fortune 583 Market Cap $3.25B Revenue $2.9B Employees 2,670 Vontu Solution 1.Monitor 2.Prevent

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Enforce Policies to Reduce Risk Incidents Enforcement Levels 1.Remediation 2.Notification 3.Prevention and Protection How is Risk Reduced? –Fix broken processes –Educate workforce –Notify policy violators –Notify management –Protect files –Prevent incidents BaselinePrevention & Protection RemediationNotification

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Unified Data At Rest and Data in Motion Protection Intellectual Property Source Code Design Documents Patent Applications Patient Data Social Security Numbers Non-Public Information Credit Card Numbers Corporate Data Financials Merger & Acquisitions Strategy and Planning Employee Data Social Security Numbers Employee Contact Lists 401K and Benefits Info

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Discover and Protect Confidential Data at Rest Define Confidential Data Policy Run Scan and Discover Exposed Data Enforce Policy by Automatically Protecting Files Report on Risk and Compliance Remediate Incidents

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Monitor and Prevent Confidential Data in Motion Employee Sends Confidential Data Vontu Detects or Prevents Incident Vontu Notifies Employee Report on Risk and Compliance Vontu Workflow Automates Remediation

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Secure Messaging Solution Employee sends confidential data Vontu detects incidents Vontu tags message Report on Risk and Compliance PGP automatically encrypts tagged messages

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Vontu covers HIPAA Vontu HIPAA Policy How Vontu Detects HIPAA 1.Exact Patient Data –Social Security Numbers –Health Insurance Card Numbers –First Name, Last Name –Address & Phone Numbers WITH 2.Drug, Disease, Treatments –Medical Disease Keywords –Medical Treatment Keywords –Drug Keywords EXCEPT 3.Specific TPO Partners Individually Identifiable Health Information Identifies the individual AND Past, present, or future physical or mental health or condition of an individual OR The provision of health care to an individual OR The past, present, or future payment for the provision of health care to an individual NOT Communications with Treatment, Payment, Operations (TPO) partners Health Insurance Portability & Accountability Act 1996

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Healthcare Solution Pack Solution PackData Loss Priorities & PolicyRoles & Responsibilities HealthcareCompliance –Regulations (HIPAA) –M&A language Patient & Employee Data –Account info –Personal info –Enrollment info –Employee benefit info –Pharmacy info –Insurance Claim info Confidential Data –Rate Calculators –Financial info –M&A info –General confidential docs Security Services Responder –Front line for remediation –Fan-out to extended remediation team Security Services Manager –Escalations within the Security Services Compliance Officers –Compliance & incident trends –Risk scorecards Internal Auditors –Compliance & incident trends –Risk scorecards HR/Employee Relations –Incidents that lead to employee termination Legal/Privacy Officers –Investigate incidents to mitigate legal actions –Compliance & incident trends –Risk scorecards Investigations & Forensics –Focused investigation on specific employees Business Unit Managers –Corporate involvement on escalated incidents Executives (trends & dashboards) –Risk trends and performance metrics –Risk dashboards

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Data Loss Prevention Requirements Discover and Protect Confidential Data at Rest Monitor and Prevent Confidential Data in Motion Accurate Detection Across All Content and Groups Automate Enforcement and Response Workflow Encryption Visibility and Control Safeguard Employee Privacy Proven Global Scale and Architecture

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Self-Risk Assessment 1.How many s leave your company with PHI? 2.Who is sending the confidential information? 3.What are your most offensive protocols? 4.How many of these s violated a regulation? 5.What is your risk level compared to that of peer companies or competitors?

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. High 721 incidents High 10,178 incidents Very High 78 incidents Medium 939 incidents High 624 incidents Data in Motion Risk Assessment Scorecard Severity x Frequency = Risk Priority DataSeverity of LossData at Rest HIPAA High Patient Data High Physician Referral High CA 1386 High Research High Very High High FrequencyRiskFrequency High 256 incidents High 2178 incidents Medium 9 incidents Medium 132 incidents High 24 incidents Very High High Risk Very High Medium

© 2006 Vontu, Inc. Proprietary and Confidential. All Rights Reserved. Data Loss Prevention In Summary Reduce Risk of Data Loss Reduce Financial Loss Protect Brand and Reputation Demonstrate Compliance Vontu met all our requirements to meet the highest degree of compliance with both our own data security policies and state and federal regulations Charles Addison CIO American National Insurance

Kit Robinson Director Data Loss Prevention and HIPAA