1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA 24273 (276) 679-7900 WWW.DATAENSUREINC.COM D E.

Slides:



Advertisements
Similar presentations
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
ITEC 6324 Health Insurance Portability and Accountability (HIPAA) Act of 1996 Instructor: Dr. E. Crowley Name: Victor Wong Date: 2 Sept
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
HIPAA COMPLIANCE FANTASTIC FOUR CASEY FORD MANINDER SINGH RANGER OLSOM Information Security in Real Business.
Developing a Records & Information Retention & Disposition Program:
Saving Your Business from a Data Loss Randy Clark.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
The University of Kansas Medical Center Shadow Experience Training.
New Data Regulation Law 201 CMR TJX Video.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
Western Asset Protection
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Information Security and Privacy in HRIS
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
8 – Protecting Data and Security
Us Healthcare System.
HIPAA.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Security Standards Final Rule
The Health Insurance Portability and Accountability Act
Lesson 1: Introduction to HIPAA
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
Presentation transcript:

1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E

2 HIPAA Compliance Complying with HIPAA is challenging because this regulation affects so many areas, including standards for transactions, rules for data privacy/security, standards for clinical records and more. DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E

3 HIPAA Background In August of 1996, Congress enacted the Health Insurance Portability and Accountability Act. (HIPAA) The goals of the legislation are to reduce the administrative costs of healthcare, to develop standard transactions for consistency industry wide, to require broad security and disaster recovery protections for “individually identifiable healthcare information”, to promote confidentiality of patient records and to provide an incentive for the healthcare companies to communicate electronically. In August of 1996, Congress enacted the Health Insurance Portability and Accountability Act. (HIPAA) The goals of the legislation are to reduce the administrative costs of healthcare, to develop standard transactions for consistency industry wide, to require broad security and disaster recovery protections for “individually identifiable healthcare information”, to promote confidentiality of patient records and to provide an incentive for the healthcare companies to communicate electronically.

4 HIPAA Background Any health care provider organization, office, or plan that electronically maintains or transmits health information pertaining to an individual must comply with HIPAA regulations. These federally governed regulations will require strict standards for Security and Disaster Recovery. Any health care provider organization, office, or plan that electronically maintains or transmits health information pertaining to an individual must comply with HIPAA regulations. These federally governed regulations will require strict standards for Security and Disaster Recovery.

5 Who Must Comply ? Those who must comply with HIPAA fall into two categories: Those who must comply with HIPAA fall into two categories: Covered Entities Business Associates.

6 HIPAA Overview HIPAA consists of five parts: Title1 - Health Insurance Portability - helps workers maintain insurance coverage when they change jobs Title 2 - Administrative Simplification - standardizes electronic health care-related transactions, and the privacy and security of health information Title 3 - Medical Savings Accounts & Health Insurance Tax Deductions Title 4 - Enforcement of Group Health Plan provisions Title 5 - Revenue Offset Provisions

7 The Security Rule The Final Security Rule was published in February 2003, and became effective on April 21, Compliance with this Rule has been required sense April 21, 2005.

8 The Security Rule The Security Rule legislates the means that should be used to protect ePHI (electronic Protected Health Information). It requires that covered entities have appropriate Administrative Procedures, Physical Safeguards, and Technical Safeguards to protect access to ePHI. The Security Rule legislates the means that should be used to protect ePHI (electronic Protected Health Information). It requires that covered entities have appropriate Administrative Procedures, Physical Safeguards, and Technical Safeguards to protect access to ePHI.

9 Examples of Appropriate Safeguards Include: Establishment of clear Access Control policies, procedures, and technology to restrict who has authorized access to ePHI. Establishment of restricted and locked areas where ePHI is stored. Establishment of appropriate Data Backup, Disaster Recovery, and Emergency Mode Operation planning. Establishment of technical security mechanisms such as encryption to protect data that is transmitted via a network.

10 The Security Rule Two Rules for Discussion are: (a)(7)(ii)(A) Data Backup Plan (R) (a)(7)(ii)(B) Disaster Recovery Plan (R)

11 Disaster Recovery Planning Disaster recovery planning is a necessary and vital part of any healthcare delivery organization. How does an institution recover from something as simple as a hardware or software failure or as catastrophic as the loss of a complete data center? How long can data be unavailable before it impacts patient care?

12 Disaster Recovery Planning These are precisely the situations that the Security Standard was intended to address by ensuring confidentiality, integrity and availability of patient information. To that end, disaster recovery planning should be viewed as a plan for business continuity and, further, as an opportunity to minimize the costs associated with regulatory compliance. These are precisely the situations that the Security Standard was intended to address by ensuring confidentiality, integrity and availability of patient information. To that end, disaster recovery planning should be viewed as a plan for business continuity and, further, as an opportunity to minimize the costs associated with regulatory compliance.

13 What is Required for a Disaster Recovery Plan? What should be included in the disaster recovery strategy? Considerations must include the end-user’s specific needs, the location and storage of the critical data, and every component in-between. The plan must allow a covered entity to re- create the entire infrastructure necessary to guarantee information availability. What should be included in the disaster recovery strategy? Considerations must include the end-user’s specific needs, the location and storage of the critical data, and every component in-between. The plan must allow a covered entity to re- create the entire infrastructure necessary to guarantee information availability.

14 Why Backup? It is an integral part of any Disaster Recovery Plan. The amount of data stored electronically is growing and your practice relies on it to conduct efficient and proper patient care. What if you lost your scheduling software? How long would it take to recreate it?

15 Who Performs Data Backups? It is estimated that less than 30% of businesses, properly protect their computer data. Healthcare related businesses do better job. Proper backups can ensure that your business / practice survives computer related disasters no matter how big or small.

16 How Often? Backups should be done on a schedule. Daily would be ideal. Most businesses don't do this for one reason or other; they don't keep a regular backup regimen. Backups should be done on a schedule. Daily would be ideal. Most businesses don't do this for one reason or other; they don't keep a regular backup regimen. Usually it's because the person responsible for doing backups (if there is one) is too busy doing something else, or someone is using the computer when it's time for a backup, or they simply forget. It should be automated so as not to depend on any one person.

17 Why Off-Site Backups? Of the estimated ten percent of companies that follow all the other rules for safe backups, only five percent follow this one. This is where almost every business makes its biggest mistake. Of the estimated ten percent of companies that follow all the other rules for safe backups, only five percent follow this one. This is where almost every business makes its biggest mistake. Even if you do everything else perfectly, your backups are of little use if your building burns or you are unable to physically recover your data backup media. Even if you do everything else perfectly, your backups are of little use if your building burns or you are unable to physically recover your data backup media.

18 Redundancy! Why? The general definition of "proper" backups requires redundancy. That is, one must keep multiple copies of the same files at different points in their development, called versions. The general definition of "proper" backups requires redundancy. That is, one must keep multiple copies of the same files at different points in their development, called versions. Part of the reason for doing backups is to be able to revert to the previous version of a file in case a virus, hardware failure, or human error damages the current version.

19 Redundancy! Why? If you copy new files over old ones you may lose your only backup by inadvertently copying a damaged file over it. This is much too important to overlook. If you copy new files over old ones you may lose your only backup by inadvertently copying a damaged file over it. This is much too important to overlook.

20 What Data is Backed Up? Most hard drives contain thousands of files, but only a small percentage of them contain your Critical Data. Find out which ones, and be sure you are backing them up. Most hard drives contain thousands of files, but only a small percentage of them contain your Critical Data. Find out which ones, and be sure you are backing them up. Ordinary backup software is often installed with a list of files to be backed up. This set of files usually represents the state of the system when the software was installed, and often misses critical files. Ordinary backup software is often installed with a list of files to be backed up. This set of files usually represents the state of the system when the software was installed, and often misses critical files.

21 What about Security? Of the very small percentage of companies that take their backups off-site regularly, an even smaller percentage encrypts their backups for security. Of the very small percentage of companies that take their backups off-site regularly, an even smaller percentage encrypts their backups for security. Most of those send backups home with an employee who might make a few stops on the way. If backups are stolen or lost, your ePHI data could easily end up in the hands of ?????????????. Most of those send backups home with an employee who might make a few stops on the way. If backups are stolen or lost, your ePHI data could easily end up in the hands of ?????????????.

22 What about Security? Would you want someone to be able to slip one of your backup tapes into a pocket and take it to ??????? It happens. Tape backups are not generally encrypted, so anyone can read them and gain access to your patient database, billing records, payroll, tax info, and everything else on your computer. Would you want someone to be able to slip one of your backup tapes into a pocket and take it to ??????? It happens. Tape backups are not generally encrypted, so anyone can read them and gain access to your patient database, billing records, payroll, tax info, and everything else on your computer.

23 What about Security? Jane Doe Birth date AddressConditionMedicationsTreatmentsInsurance

24 Data Encryption è & ( € € € €€ € € € €€ €€€ ÀÀÀ ÿ ÿ ÿÿ ÿ ÿ ÿ ÿÿ ÿÿÿ wwwwwwwwwwwwwwpDDDDDDDDDDDDDDpÿÿÿÿÿÿÿÿÿÿÿÿÿô pÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿ ÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôp ÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿ ÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿ ÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpˆˆˆˆˆˆˆˆˆˆˆˆˆ„p DDDDDDDDDDDDDDpLLLLLLLLLNÎÎItpÌÌÌÌÌÌÌÌÌÌÌÌÌÄ ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÀ € € € € € € € € € € € € € € € € € € € € € € € À ÿÿÿÿÿÿÿÿÿÿÿÿ( À € € €€ € € € €€ €€€ ÀÀÀ ÿ ÿ ÿÿ ÿ ÿ ÿ ÿÿ ÿÿÿ wwwwwwwDDDDDDDGOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿø GOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿøGHˆˆˆˆˆˆGLÌÌÌÌÌÌGÄDDD DDDÀ ÿÿ € ÿÿ ÿÿ è & ( € € € €€ € € € €€ €€€ ÀÀÀ ÿ ÿ ÿÿ ÿ ÿ ÿ ÿÿ ÿÿÿ wwwwwwwwwwwwwwpDDDDDDDDDDDDDDpÿÿÿÿÿÿÿÿÿÿÿÿÿô pÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿ ÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôp ÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿ ÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿ ÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpÿÿÿÿÿÿÿÿÿÿÿÿÿôpˆˆˆˆˆˆˆˆˆˆˆˆˆ„p DDDDDDDDDDDDDDpLLLLLLLLLNÎÎItpÌÌÌÌÌÌÌÌÌÌÌÌÌÄ ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÀ € € € € € € € € € € € € € € € € € € € € € € € À ÿÿÿÿÿÿÿÿÿÿÿÿ( À € € €€ € € € €€ €€€ ÀÀÀ ÿ ÿ ÿÿ ÿ ÿ ÿ ÿÿ ÿÿÿ wwwwwwwDDDDDDDGOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿø GOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿøGOÿÿÿÿÿøGHˆˆˆˆˆˆGLÌÌÌÌÌÌGÄDDD DDDÀ ÿÿ € ÿÿ ÿÿ

25 What is RDB? Remote Data Backup works basically like regular tape backups, with one important difference. Instead of sending backups to a tape drive or other media, Remote Data Backup sends it over the internet to another computer safely off-site. Instead of sending backups to a tape drive or other media, Remote Data Backup sends it over the internet to another computer safely off-site.

26 What is RDB? It does this (usually) at night while the practice is closed and nobody is using the computers. And it's completely automatic. Remote Data Backup encrypts its backups for complete security so nobody can read them. Only Remote Data Backup has such an easy to use version control system. Further, you should be able to easily restore any of your files up to any given point in time.

27 Remote Data Backup From Data Ensure, Inc. Can be your data backup solution. It provides you with secure encrypted data storage and recovery and automatic backups. It meets HIPAA compliance standards for electronic transactions through the use of encryption and passwords in a secure environment. Can be your data backup solution. It provides you with secure encrypted data storage and recovery and automatic backups. It meets HIPAA compliance standards for electronic transactions through the use of encryption and passwords in a secure environment.

28 THANK YOU FOR ATTENDING!!! DATA ENSURE INC. 798 PARK AVE. NW, SUITE 204 NORTON, VA (276) D E