General Session/ Presentation: “Cross Training: Security Best Practices from Other Industries”.

Slides:



Advertisements
Similar presentations
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
Advertisements

Copyright © Healthcare Quality Quest, Proposed standards for a national clinical audit — How we got involved and what we have learned.
Virtual Clipboard Pilot. Sullivan Institute / MGMA Meeting Dec. 9 Held in Wash DC at BCBSA WEDI Health ID Card + ONC Blue Button = Patient In-take Process.
HIMSS/GSA E-Authentication Initiative A Pilot Project of the HIMSS RHIO Federation HIMSS Public Policy Forum September 28, 2006 Mary Grizkewicz, HIMSS.
SETECS MIX – ® ™ Secure Medical Information Exchange System ® ™ SETECS MIX Secure Medical Information Exchange System Demonstration of System Components.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Delivering the right data to the right person at the right time Improving services to patients with long- term conditions Professor Michael Thick Chief.
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair Certificate Authority- Provider Authentication Recommendations.
DICOM and Integrating the Healthcare Enterprise: Five years of cooperation and mutual influence Charles Parisot Chair, NEMA Committee for advancement of.
Case Study: Password Authentication in eHealth Applications
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
1 Promoting Safe Medicine With Track and Trace Systems SRC Technologies, Inc.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Privacy and Security Workgroup: Big Data Public Hearing December 8, 2014 Deven McGraw, chair Stan Crosley, co-chair.
The Office of Information Technology Two-Factor Authentication.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20,
Identity management – developments within the European Social Security Sector Pantelis Angelidis.
Access to Clinical Expertise Steve Bain David Powell Jemma Hughes Paula Jeffries.
Privacy and Security Tiger Team Subgroup Discussion: MU3 RFC July 29, 2013.
The Use of Health Information Technology in Physician Practices
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Engaging Stakeholders in the Effective Health Care Program Information and tools for researchers and investigators.
1 Creation of State Legislation to Protect and Facilitate Use and Exchange of Electronic Health Information Shelley Carter, RN, MCRP, MPH 1, Maggie Gunter,
Privacy and Security Tiger Team Trusted Identity of Providers in Cyberspace Follow-Up Recommendations September 6, 2012.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CSCE 201 Identification and Authentication Microsoft support Fall 2010.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Chapter 2 Standards for Electronic Health Records McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
Current challenges for health systems Increasing elderly population –Relative decrease in resources (fewer taxpayers), chronic patients Financial sustainability.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
Working with HIT Systems
EHealth Progress Across the States in 2007 Results of a Survey of State Officials AcademyHealth National Health Policy Conference State Health Research.
Taxonomies of User-Authenticated Methods in Computer Networks Göran Pulkkis, Arcada Polytechnic, Finland Kaj J. Grahn, Arcada Polytechnic, Finland Jonny.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Challenges of Disseminating Information to Broad Stakeholder Groups Elizabeth Cummings and Paddy Nixon University of Tasmania, Australia.
Computerization of a bank  Automatic Teller Machines  Net Banking  Phone Banking  Savings/ Current/ Fixed Deposit/ Recurring Deposit  Loans against.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
RTI International RTI International is a trade name of Research Triangle Institute. Health IT Safety Webinar Series A Roadmap for a National.
H1N1 Disease Surveillance Team Project Week 5 Presentation Melody Dungee Beena Joy David Medina Calvin Palmer.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
CSCE 201 Identification and Authentication Fall 2015.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Consumer and Provider Education and Engagement Breakout Session Betsy Abramson, Wisconsin Coalition Against Domestic Violence Alison Bergum, UW Population.
BizForceOne by MegaSolutionCenter (MSC), USA BIZFORCEONE OPERATING SYSTEM BEST FIT IMPLEMENTATION.
Mary Trauner Senior Research Scientist Georgia Institute of Technology Middleware for Video.
HIMSS – Chicago – April, 2009 New Jersey - Health Information Technology – NJ HIT Act – Office for Health Information Technology Development - Recovery.
© 2014 By Katherine Downing, MA, RHIA, CHPS, PMP.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
The impact of digitisation on Social Security - process improvement or paradigm shift? Chris Gibbon.
Electronic Case Reporting Update
Horizon Lab™ Optimizing Clinical Performance to Increase Patient and Lab Safety
Summary Physical Access & Time and Attendance PC/Network Access
ONC P2 FHIR Ecosystem Task Force
Challenge-Response Authentication
Legal Framework for Civil Registration, Vital Statistics
HIMSS National Conference New Orleans Convention Center
Finance & Planning Committee of the San Francisco Health Commission
FDA Sentinel Initiative
e-Security Solutions Penki Kontinentai Vladas Lapinskas
HLN Consulting, LLC® November 8, 2006
Presentation transcript:

General Session/ Presentation: “Cross Training: Security Best Practices from Other Industries”.

Mick Talley: Mick Talley: The Financial Services Perspective. The Financial Services Perspective. Chair: HIMSS Security & Privacy Chair: HIMSS Security & Privacy Task Force. Task Force. Recently completed whitepaper on “Crafting Healthcare Identify Management on Industry Best Practices”. “Crafting Healthcare Identify Management on Industry Best Practices”.

“Lessons from Financial Services” -- Begin with point of view that “the providers, insurance companies, and the banks have an equal interest in validating that the individual is “who they say they are.” -- Goal: Accurate identification of an individual and the linking of all that individual’s related health information within and across healthcare and financial institutions.

ONC Final Report ONC Final Report Feb. 7, 2014 “Patient Feb. 7, 2014 “Patient Identification and Matching” Identification and Matching” Basic Principles: --Patient safety and quality of care. --Improvement should reflect a real world impact on the workflow of clinical impact on the workflow of clinical and administrative personnel. and administrative personnel. --Improvements should be multi-faceted and incremental with no single solution and incremental with no single solution or step which is final. or step which is final.

ONC Final Report: ONC Final Report: Feb. 7, Feb. 7, Improvements should apply to all sizes And types of provider settings, with a broad set of use cases, involving multiple stakeholders across networks of multiple IT platforms. --We need to test and validate the use of authentication technologies and increase the comfort level of diverse stakeholders across networks. --HIMSS Task Force Conclusion. (July 2014) --HIMSS Task Force Conclusion. (July 2014)

Five Authentication Five Authentication Processes deployed by financial institutions: 1.) Something you know, you have, your are. 2.) Pre-shared secret, such as User ID & password, with PIN. 3.) Asymmetric cryptographic key pairs, one private and one public. 4.) One-time passwords. 5.) Bio-metric combined for two-factor authentication for NIST , Level 3 of assurance.

Task Force Recommendation: “The healthcare industry might best be served by conducting a set of pilots of each of the five processes that include a method of monitoring the success of each against a common criteria”. --HIMSS Task Force for Security & Privacy, July 2014.

Mick Talley Southeast Michigan Health Information Exchange. (SEMHIE)