Advanced Strategies in HIPAA Security Risk Analysis

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Control and Accounting Information Systems
Security Controls – What Works
Information Security Policies and Standards
Information Systems Security Officer
Computer Security: Principles and Practice
Center for Health Care Quality Licensing & Certification Program Evaluation 1 August 2014 rev.
Session 3 – Information Security Policies
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Making Health Savings Accounts Work: Interoperable with Health Plans, Providers and Patients Steven S. Lazarus, PhD, CPEHR, CPHIT, FHIMSS September 27,
STEVEN S. LAZARUS, PHD, CPEHR, CPHIT, FHIMSS PRESIDENT, BOUNDARY INFORMATION GROUP AUGUST 20, – The Twelve Year Journey is Not Over.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
The Fifth National HIPAA Summit – October 30, 2002 What to Do Now: Operational Implementation of HIPAA Privacy and Security Training Presented by: Steven.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
EHRs/NHII: HIPAA Security and EHRs, a Near Perfect Match Margret Amatayakul, RHIA, CHPS, FHIMSS Steven S. Lazarus, PhD, FHIMSS.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
March 19, 2003 Audioconference Approaches to Compliance with the HIPAA Privacy and Security Workforce Training Requirements Presented by: Steven S. Lazarus,
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
April 14, 2003 – HIPAA Privacy Audioconference The Importance of April 14, 2003: Where you should be regarding HIPAA privacy policies and procedures and.
iSecurity Compliance with HIPAA
Moderated by: Steven S. Lazarus, PhD, FHIMSS President
Introduction to the Federal Defense Acquisition Regulation
Transactions and Code Sets and the National Provider Identifier (NPI) – Getting Value From the HIPAA Standards Presented by: Steven S. Lazarus, PhD, CPEHR,
Electronic Health Records: Overview, Acquisition and Implementation
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
Risk Management: why and how to protect your health center
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Enforcement and Policy Challenges in Health Information Privacy
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
Presentation transcript:

Advanced Strategies in HIPAA Security Risk Analysis Margret Amatayakul, RHIA, CHPS, FHIMSS Steven S. Lazarus, PhD, FHIMSS

Strategic IT planning Compliance assessments Work flow redesign Project management and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Margret A . Margret\A Consulting, LLC Strategies for the digital future of healthcare information Information management and systems consultant, focusing on electronic health records and their value proposition Adjunct faculty, College of St. Scholastica; former positions with CPRI, AHIMA, Univ. of Ill., IEEI Active participant in standards development Speaker and author (Silver ASHPE Awards for “HIPAA on the Job” column in Journal of AHIMA)

Strategic IT business process planning ROI/benefits realization Project management and oversight Workflow redesign Education and training Vendor selection and enhanced use of vendor products Facilitate collaborations among organizations to share/exchange health care information Steve Lazarus . Boundary Information Group Strategies for workflow, productivity, quality and patient satisfaction improvement through health care information Business process consultant focusing on electronic health records, and electronic transactions between organizations Former positions with MGMA, University of Denver, Dartmouth College; advisor to national associations Active leader in the Workgroup for Electronic Data Interchange (WEDI) Speaker and author (two books on HIPAA Security and one forthcoming on electronic health record)

Agenda Security Rule in context of HIPAA Risk-based Approach to Information Security Executive Risk Mitigation Strategies Planning and Managing the Project Risk Management Approaches “Best Practices” for Ongoing Compliance

Advanced Strategies in HIPAA Security Risk Analysis Security Rule in context of HIPAA

Privacy Security Administrative Simplification, Health Insurance Portability & Accountability Act Uniform data standards for patient medical record information Uses and Disclosures Patient Rights Admin Practices 57 Standards Privacy Title III: Medical Savings and Tax Deduction Title IV: Group Health Plan Provisions Title V: Revenue Offset Provisions Title I: Insurance Portability Title II: Fraud & Abuse, Administrative Simplification, Medical Liability Reform April 14, 2003 Security April 21, 2005 9 Standards Administrative Safeguards Physical 4 Standards Technical 5 Standards Recommendations ASC X12N for claims, eligibility, etc. Employer Health Plan Individual Provider Transactions Variable 2004-? Code Sets Identifiers October 16, 2003 Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 6

“Mini-Security Rule” “Mini-security rule” in Privacy Rule is not sufficient Does not address risk analysis Focuses on incidental disclosures Lacks specificity Efforts may be 2 – 4 years old “Mini-security rule” does address the need to “secure” paper and oral forms of PHI

Fraud & Abuse Sets Precedence Fraud and Abuse Privacy and Security 1. Written standards of conduct & policies & procedures 1. Privacy & security policies & procedures 2. Designation of chief compliance officer; reports to CEO & governing body 2. Designation of information privacy official & information security official 3. Regular, effective education & training for all affected employees 3. Training & awareness building 4. Process to receive complaints & protect whistleblowers from retaliation 4. Privacy complaint & security incident reporting procedures 5. System to respond to allegations & the enforcement of disciplinary action 5. Complaint/incident handling & enforcement of sanction policy 6. Audits &/or other evaluation techniques to monitor compliance 6. Ensure uses & disclosures consistent with notice; information system activity review, risk management, evaluation 7. Investigation & remediation; policies addressing non-employment or retention of sanctioned individuals 7. Termination procedures for members of workforce & business associate contracts Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 8

Security of TCS Promote adoption of electronic transactions Achieve benefits of “direct connectivity” Claims attachments coming

Uniform Data Standards for PMRI Interoperability HL7 DICOM NCPDP SCRIPT IEEE 1073 Comparability SNOMED CT® LOINC Federal Drug Terminologies Recommendations Interoperability Comparability EHR Initiatives Uniform data sets Pay-for-performance Heightened need for: Contingency planning Access controls Authentication

Advanced Strategies in HIPAA Security Risk Analysis Using a Risk-based Approach to Information Security

YOU decide ! Comprehensive Scalable Technology-neutral Standards Must address all aspects of security for electronic PHI Scalable Size, complexity, capabilities Technical infrastructure Costs Probability & criticality of risks Technology-neutral Stable, but flexible Standards Require compliance Required & Addressable Implementation Specifications Implement or document alternative Very specific/very general, e.g., Maintenance records Encryption

Benefits of Risk Analysis Comply with HIPAA Build a business case Help executives meet fiduciary duties Build staff awareness & support Uncover excellent new ideas Reduce damages if you are sued

Examples Encrypted e-mail Reconstruction of examination rooms SSL Web portal White noise, tranquility fountains, wall hangings

+ = Risk Analysis Process Risk Threats Vulnerabilities Target Agent Event Agent Target + Threats Vulnerabilities

Targets – Agents - Events Unauthorized Access Modification/ Destruction of Data Denial of Service Repudiation Agent Confidentiality Integrity Availability Accountability Target Wrongful Disclosure Privacy Violation Erroneous Information Medical Errors Lack of Critical Productivity Recovery Cost False Claims Lack of Evidence Event

Threat Sources What are YOUR concerns? Accidental Acts Deliberate Acts Incidental disclosures Errors and omissions Proximity to risk areas Work stoppage Equipment malfunction Deliberate Acts Inattention/inaction Misuse/abuse of privileges Fraud Theft/embezzlement Extortion Vandalism Crime Environmental threats Contamination Fire Flood Weather Power HVAC What are YOUR concerns?

Internal Threats Source: eWeek, January 21, 2002 Surveys Primary Healthcare Concerns .Adapted from: Journal of Healthcare Information Management, 17/1 Tangible Losses Cost of data recovery Lost user productivity Investigate/prosecute offenders Insurance premium increases Fees for contract/regulatory defense Cost of fines Intangible Issues Harm to patient Lost patient & business partner confidence & loyalty Lost reputation, contributing to difficulty in recruitment Lower employee morale Career-threatening corporate officer liabilities Internal Threats Source: eWeek, January 21, 2002 57% - Users accessing resources they are not entitled to 43% - Accounts left open after employee has left company 27% - Access to contractors not terminated upon project completion 21% - Attempted or successful break-in by angry employee

Vulnerabilities Technical Administrative New applications Policy Accountability Management Resources Training Documentation Physical Entrance/exit controls Supervision/monitoring Locks, barriers, routes Hardware Property Disposal Technical New applications Major modifications Network reconfiguration New hardware Open ports Architecture Controls

Security Vulnerability Tests Policy & procedure review Workforce perception survey Certification/accreditation Disaster recovery plan drills Social engineering Document grinding Facility security review Communications testing Wireless testing Backup, maintenance & change control log review Internet presence identification & testing

Probability of Occurrence Criticality of Impact Has it happened before? How frequently? Does threat source have Access, knowledge, motivation? Predictability, forewarning? Known speed of onset, spread, duration? Are controls available to Prevent? Deter? Detect? React? Recover? Patient care Confidentiality Complaint/lawsuit Reduce productivity Loss of revenue Cost to remediate Licensure/ accreditation Consumer confidence Competitive advantage Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 21

Probability of Occurrence Risk Ranking Probability of Occurrence Criticality of Impact Low Medium High 3 6 9 2 4 1

Example

Advanced Strategies in HIPAA Security Risk Analysis Executive Risk Mitigation Strategies

Has this happened to YOU? News Foreign hacker stole 4,000 medical records from University of Washington, mid-2000 Kaiser Permanente sent 858 patients’ medical records to 19 before error in e-mail upgrade system was caught, Aug, 2000 A 13-year-old daughter brought to work at University Medical Center, Jacksonville, stole patients’ names and phone numbers and called them saying they either had AIDS or were pregnant, March, 1996 A 17-year-old boy reconfigured physicians’ central paging system at Inova Fairfax Hospital to forward pages to his own pager, & called in prescriptions which nurses administered to patients. Dec, 2000 “It won’t happen here”

Executive Engagement Sarbanes-Oxley Act of 2002, PL 107-204, impact on private sector: Management must establish and maintain an adequate internal control structure and procedures for financial reporting “A secure information infrastructure is central to many companies’ operational capabilities. Hence, the material condition of the business will be assessed, and certified by officers, in that light.” Richard Marks, Davis Wright Tremaine, LLP

Risk Mitigation Options NIST Definition Risk Assumption Accept risk & continue operating or implement controls to lower risk to an acceptable level Risk Avoidance Avoid risk by eliminating cause and/or consequence Risk Limitation Limit risk with controls that minimize adverse impact of a threat’s exercising a vulnerability Risk Planning Manage risk by developing a plan that prioritizes, implements, and maintains controls Research & Acknowledgement Lower risk of loss by acknowledging vulnerability & researching controls to correct Risk Transference Transfer risk by using other options to compensate for the loss, such as insurance Source: NIST, Special Publication 800-30, “Risk Management Guide for Information Technology Systems,” U.S. Government Printing Office, Washington, DC, 2001.

Wasn’t this done before? Assessment Identify Vulnerabilities Prioritize by: Privacy Rule Importance Risk Analysis Identify Vulnerabilities Identify Threats Measure Probability of Occurrence Criticality of Impact Determine Risk Select Controls Identify Residual Risk + + =

Top ranking states in terms of number of killer tornadoes: Business Case Example Top ranking states in terms of number of killer tornadoes: Texas Oklahoma Arkansas Alabama Mississippi Illinois Missouri Indiana Louisiana Tennessee HIPAA doesn’t require a hot site What form of DRP should you recommend for this environment?

Residual Risk Level of risk remaining after controls have been implemented No such thing as 100% secure Estimate in same manner as original risk determination: Probability of a threat exploiting a vulnerability Criticality of impact Probability plus criticality with control define residual risk

Advanced Strategies in HIPAA Security Risk Analysis Planning and Managing the Risk Analysis Project

Project vs. Process Executive Support Objectives Scope Staffing Budget Timeline Reporting Results Obtaining Approval for Controls Identifying Residual Risk Implementation Staffing External resources Vendor selection Licenses & capital Installation & testing Training Documentation Ongoing monitoring for compliance

Objectives & Scope PHI ePHI

Staffing the Project Team Members Purpose Information Security Official Team Leader, Project Manager, Internal Consultant User Representatives Understand threats, evaluate functionality of controls, gain buy-in I.T. Professionals Identify vulnerabilities, evaluate technical capability, learn administrative controls Representatives of Other Areas Monitoring Risk Probability/criticality estimates, support implementation, represent customers HR, Labor Relations, Legal, Contract Management Represent user interests, assures controls meet other legal requirements Trainers Gain insight for training programs Information Privacy Official Coordinate with Privacy Rule compliance Executive Sponsor Interpret message for executives

Budget & Timeline Staff $ External resources Learning & benchmarking resources Software tools Assessment tools & services Resource office $ Apr 21 2005

Results & Approval

Advanced Strategies in HIPAA Security Risk Analysis Risk Management Approaches

Risk Analysis Approaches Qualitative Scenario-based Rating probability and criticality and ranking risk Integrates administrative, physical, and technical factors Quantitative Attempts to determine annualized loss expectancy from value of information assets Difficult to assign monetary value to health care information

Quantitative Analysis Annualized Loss Expectancy (ALE): Asset value, times % of asset loss caused by threat, times Frequency of threat occurrence in a year Cost of Safeguard: Purchase, development, and/or licensing costs Physical installation costs; disruption to normal productivity during installation and testing Normal operating costs, resource allocation, and maintenance/repair costs Cost of Safeguard vs. ALE: Positive, recommend remediation Negative, consider other alternatives

Steps to Conduct the Process Executive management guidance on risk Inventory & characterize policies, procedures, processes, physical layout, systems Identify threats Identify vulnerabilities Determine likelihood risks may actually occur Analyze impact if risk actually occurs Determine & rate each risk Analyze appropriate types of controls Recommend controls & describe residual risk Document results

Find Lowest Common Denominator Practical Assessment Find Lowest Common Denominator Administrative Physical Technical Corporate Site/Department Application Data Center Network Platform

Pair Threats & Vulnerabilities Workstation Location Vulnerability/Threat Analysis Control Desktop Nursing units Staff only area, staffed continuously, all workstations turned away from public, high need for availability Screen saver only Outpatient reception area Public area, not staffed continuously User log off on exit reminder & automatic logoff set at 10 min. Notebook Exam room Integrity issue, rotation of users need accountability User log off on exit

Security Architecture Perimeter Network Host Application Data Security service Function to be accomplished Security mechanism Control that provides security function Security architecture Structure of controls to achieve functions

Advanced Strategies in HIPAA Security Risk Analysis “Best Practices” for Ongoing Compliance

“Best Practices” Not . . . Most effective and efficient “Most appropriate” What a prudent person would do Whether or not specified in regulations Most expensive Expected to fill every gap Necessarily common in industry Not . . .

Proposed Security Rule Access controls Alarms Audit trail Encryption Entity authentication Event reporting Integrity controls Message authentication Included in YOUR vendor offerings?

Security Identity Management Access Management Software Password Reset Security Identity Management Password Synchron- ization Bio- metrics Single Sign-on Tokens & Smart Cards Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 47

Security Event Management Local LAN Corporate WAN Proprietary Connectivity Supporting Systems Internet Gateway Security Event Management Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 48

"Does not apply to treatment . . ." Minimum Necessary Classes of Users Categories of PHI Conditions of Access Access Control Assigns Privileges User-based To each user Role-based To classes of users to categories of PHI Context-based Based on conditions But, if there is no treatment relationship . . . Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 49

Compliance Policies Standards Procedures Specifications Reports & logs Extent to which IT security decisions were guided by policy Source: Information Security, 9/2002 Policies Standards Procedures Specifications Reports & logs

Documentation Rules & Regulations Policies & Procedures Training Materials Records: of Training Awareness Building Contracts Sensitive Findings Audit Trails Incident Reports

Organizational Controls Management Reporting & Documentation Compliance Assurance HIPAA Standards & Organizational Controls Continuous Monitoring of Actions Triggered Reviews of Incidents Management Reporting & Documentation Analyze Implement Design & Test Changes Auditing of Events

Compliance Assurance Plan

References & Resources Required specifications and prioritization based on: National Research Council, For the Record: Protecting Electronic Health Information www.nap.edu Significant reference to NIST Special Publications (SP) 800 Series documents: http://csrc.nist.gov/ publications/nistpubs/ NIST certifying activities: http://www.niap.nist.gov CMS IT Security – http://cms.hhs.gov/it/ security/References WEDI – www.wedi.org/snip SP 800-30, Risk Management Guide for Information Technology Systems, Chapters 3 and 4 Revision A DRAFT, Jan. 21, 2004 SP 800-16, Information Technology Security Training Requirements, A role and performance based model SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems SP 800-33, Underlying Technical Models for Information Technology Security SP 800-26, Security Self-Assessment Guide for Information Technology Systems CMS Information Security Acceptable Risk Safeguards V1.1

References & Resources www.brownstone.com Amatayakul Lazarus www.hcpro.com https://catalog.ama-assn.org Walsh Hartley Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group 55

Contact Information Margret Amatayakul, RHIA, CHPS, FHIMSS Margret\A Consulting, LLC Schaumburg, IL MargretCPR@aol.com www.margret-a.com Steven S. Lazarus, PhD, FHIMSS Boundary Information Group Denver, CO SSLazarus@aol.com www.boundary.net