Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South

Slides:



Advertisements
Similar presentations
The Affordable Care Act Assisting Your Patrons Cheryl Rowan, MSLS Consumer Health Coordinator, NN/LM SCR Texas State Library September 26, 2013.
Advertisements

The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South Central Region TMC Library Houston, Texas HEALTH INFORMATION.
Video Creation Tools & Tips SCR CONNECTions August 21, 2013 Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Steps to Compliance: Electronic Devices Overview PRESENTED BY.
Getting MOOC’ed: Taking Online Training from Many to Massive Emily J. Hurst, MSLS, AHIP Technology Coordinator National Network of Libraries of Medicine.
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Company LOGO Internet Safety A Community Approach.
Online Shopping Take Charge of Your Finances
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Information Security Information Technology and Computing Services Information Technology and Computing Services
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
EVALUATING HEALTH INFORMATION ONLINE Lydia N Collins Consumer Health Coordinator.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Setting Wireless Network At Home By: Parveen Sharma.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
DATA SECURITY FOR MEDICAL RESEARCH
East Carolina University
Hotspot Shield Protect Your Online Identity
Electronic Health Records (EHR)
TECHNOLOGY GUIDE THREE
Health Information & Online Privacy for You & Your Organization
Passwords.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Digital $$ Quiz Test your knowledge.
Web Servers / Deployment
Chapter 3: Protecting Your Data and Privacy
Health IT Workforce Curriculum Version 1.0/Fall 2010
Introduction to the PACS Security
Presentation transcript:

Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South

 Health Online Susannah Fox and Maeve Duggan. Pew Research Internet Project.  One in three American adults have gone online to figure out a medical condition.

 Health Insurance Portability and Accountability Act of 1996 (HIPAA)   Protects  Individually identifiable health information (IIHI)  Information related to physical or mental condition of the individual  The provision of health care to the individual  Payment for health care  Information that identifies the individual  HIPAA Compliant entities: Health Plans Most Health Care Providers Health Care Clearinghouses Business Associates of these entities

 A tremendous amount of health-related information is found on the Internet. Many discussion forums are available for individuals to share information on specific diseases and health conditions. Websites dispense a wide variety of information. There is no guarantee that information you disclose in any of these forums is confidential. Always review the privacy policy of any website you visit.  Privacy Rights Clearinghouse. Medical Records Privacy.

 Not all Personal Health Records (PHRs) are mandated to be HIPAA compliant.  When selecting a PHR, individuals should evaluate privacy policies to decide if they are comfortable with the protections and rights offered, such as how their information will be safeguarded, for what purposes their information will be used and disclosed, and the extent to which the individual will control access to information in the PHR.  Personal Health Records and the HIPAA Privacy Rule:

 Is your organization tracking user behavior on computers?  ALA  ill/interpretations/privacy ill/interpretations/privacy  MLA   Does your library have an up to date privacy policy?  ty/toolkitsprivacy/Developing-or-Revising-a- Library-Privacy-Policy ty/toolkitsprivacy/Developing-or-Revising-a- Library-Privacy-Policy

 Consider updating disclaimers to include online privacy statement.  Disclaimers, MLA CAPHIS:

 The National Library of Medicine (NLM) does not collect any personally identifiable information (PII) about you when you visit their websites unless you choose to provide that information to them.  NLM Privacy Policy.

 Turn on wireless router’s encryption setting - WPA2 (Wi-Fi Protected Access II) – WEP (Wired Equivalent Privacy) is less secure  Change default password  Change default network name – Services Set Identifier (SSID)  Turn on wireless router’s firewall  At Home:  Turn off guest access – Turn network name broadcasting off

 Hypertext Transfer Protocol Secure (HTTPS) provides secure communication over a computer network.  Protects against:  Forging  Eavesdroppers  Man-in-the-Middle attacks  HTTPS is not an anonymity tool  What libraries can do:  Enable HTTPS on your website  Educate/Encourage patrons to use HTTPS for secure online communications  HTTPS Everywhere FAQ:

 DuckDuckGo   Startpage   Blekko   Deletes personally identifiable information (PII) within 48 hours

 Create strong passwords  At least 8 characters long  Combination of upper case, lower case, special characters and numbers  Avoid using:  Names of family members or pets  Real words with numbers or special characters replacing some or part of the word  Sequences  Personal information  How Strong Is Your Password?  security/password-checker.aspx security/password-checker.aspx

 LastPass 3.0   Free browser extension or $12.00/year  Dashlane 2.0   Free or $29.99/year  KeePass   Free

 Remove unnecessary data from your devices  Social Security Number  Credit Card Numbers  Bank Accounts  Set passcode or fingerprint lock  Enable idle timeout lock  Download apps only from trusted sources  Encrypt data  Enroll with a trusted service such as Find My iPhone  Keep operating system (OS) up to date

 Antivirus  System restore software (Deep Freeze)  Privacy/Protective monitor screens  Private area for reviewing online health information  User training  Online Security  Reliable Online Health Resources

 The Medical Library Association Guide to Providing Consumer and Patient Health Information. Edited by Michele Spatz.  Personal Health Records and the HIPAA Privacy Rule: _ pdf#page%3D1 _ pdf#page%3D1  When HIPAA applies to mobile applications: applications/ applications/  Find and Evaluate Health Information on the Web:  The Consumer Health Reference Interview and Ethical Issues:  Health Information in Libraries (ALA):

 Protecting Your Wireless Network:  The Ultimate Guide for Creating Strong Passwords:  Guidelines for Securing Mobile Computing Devices: s.html s.html  The Best Antivirus for 2014:

Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South Central Region (800) (Toll Free) This project has been funded in whole or in part with Federal funds from the National Library of Medicine, National Institutes of Health, under Contract No. HHSN C with the Houston Academy of Medicine-Texas Medical Center Library.

  Complete by August 1, 2014

 Wednesday, August 20, 2014  Topic: Metadata: The Key to Linking Data  Speaker: Guest Speakers: Dick Miller, Thea S. Allen & Joanne Banko from Lane Medical Library, Stanford University