“HIPAA-Proof” Your Healthcare Data: Safeguards at the Database Level Ted Julian VP Marketing & Strategy Application Security Inc.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
Red Flag Rules: What they are? & What you need to do
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Health information security & compliance
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Computer Security: Principles and Practice
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA COMPLIANCE WITH DELL
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Security Architecture
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Organizational and Legal Issues -- Developing organization and governance models for HIE Day 2 -Track 5 – SECOND SESSION – PRIVACY AND SECURITY CONNECTING.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Connecting the Dots A Practical Approach to Integrating Compliance, Risk and Quality Jody Ann Noon RN, JD Partner Health Care Regulatory Practice.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Auditing and Monitoring for HIPAA Compliance
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
HIPAA Yesterday, Today and Tomorrow? Dianne S. Faup Office of HIPAA Standards Centers for Medicare & Medicaid Services.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Health Insurance Portability and Accountability Act HIPAA 101
Understanding HIPAA Dr. Jennifer Lu.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Enforcement and Policy Challenges in Health Information Privacy
HIPAA Security A Quantitative and Qualitative Risk Assessment
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

“HIPAA-Proof” Your Healthcare Data: Safeguards at the Database Level Ted Julian VP Marketing & Strategy Application Security Inc.

2 Agenda  HIPAA requirements  HIPAA Safeguards and Databases  How To Ground HIPAA Compliance in Databases  Vulnerability Management – Establish Safeguards  Activity Monitoring – Flag Safeguard Compromise  Summary

3 HIPAA Requirements  Privacy Rule - data that relates to:  Past, present, or future medical condition  Provision of health care  Past, present, or future payment  Requires consent and notification  Security Rule  Administrative Safeguards  Physical Safeguards  Technical Safeguards  Organizational Requirements  Policies and Procedures

4 HIPAA Admin Safeguards ® = Required, (A) = Addressable

5 HIPAA Technical Safeguards ® = Required, (A) = Addressable

6 HIPAA Safeguard Methodology Avoid one-offs:  Consider broader security control / safeguard frameworks  Make HIPAA controls / safeguards part of this broader framework  ISO (formerly ISO 17799) is pretty popular

7 HIPAA Safeguard Methodology  Understand IT management & organization  Blueprint IT infrastructure  Identify business units that hold patient data  Develop strategy for administering technology and applications at these business units IT Infrastructure Business Unit IT Safeguards IT Process Safeguards

8 Business Unit IT Control HIPAA Safeguard Methodology  Identify separate application and data owners  Evaluate IT controls and monitoring  Engage in risk assessment of controls and monitoring IT Infrastructure Business Unit IT Safeguards IT Process Safeguards

9 IT Process Control HIPAA Safeguard Methodology  General IT process  Application and data owner process  Integrated application-specific process Business Unit IT Control IT Infrastructure Business Unit IT Safeguards IT Process Safeguards

10 Common Threat to HIPAA UNAUTHORIZED PATIENT RECORD DELETION, MODIFICATION OR ACCESS Q1: Where are patient records? A: in transit over the network B: on a general-purpose host C: in a database

11 Are Databases Vulnerable? OracleMS SQL Server SybaseIBM DB2MySQL Default & Weak Passwords Denial of Services & Buffer Overflows Misconfigurations & Resource Privilege Management

12 Any Breaches? Source: Privacy Rights Clearinghouse, Company / Organization # of Affected Customers Date of Disclosure UCLA AT&T Card Systems Citigroup DSW Shoe Warehouse Bank of America LexisNexis ChoicePoint 800,000 19,000 40,000,000 3,900,000 1,400,000 1,200, , , Nov Aug Jun-05 6-Jun-05 8-Mar Feb-05 9-Mar Feb-05 Debit card compromise (OfficeMax?) 200,0009-Feb-06 What Was Breached DB TP ?? Total Affected Records - ’05-present: 100+ million TJX ???17-Jan-07 DB n/a

13 Any Breaches?  Breaches of privacy at insurers and other payers went up from 45 percent last summer to 66 percent in January.  Most respondents experienced between one and five breaches, but 20 percent reported six or more.  Yet, Security Rule compliance remains low:  Though the deadline passed over a year ago, 80% of payers and only 56% of providers have implemented the Security standards.  Of those claiming full compliance, many “compliant” Providers and Payers could not confirm that they had implemented all key Security standards. Source: bi-annual Phoenix Health Systems and HIMSS study, April & October 2006

14 Any Breaches?  Less than 25% of the 22,964 privacy complaints submitted between April 2003 and September 2006 were investigated  Of the 5,400 investigated complaints, informal action was taken in 3,700 of the cases.  In the other 1,700 investigated complaints, the accused health care organizations were pardoned Source: The 3rd Annual Review of Medical Privacy and Security Enforcement, January 2007

15 Forrester on HIPAA & Data  Forrester predicts protecting databases for HIPAA, including non-production, “will become a key requirement…all personal information (PI) and personal health information (PHI) in any data repository or file be secured at all times, and only privileged users should have access” 1 1 Source: “Trends 2006: DBMS Security,” Forrester Research, Nov 2005

16 Gartner on HIPAA & Data Our focus today

17 HIPAA & Databases  Yikes! What can we do!? How can we:  establish safeguards on the database  tighten security on the crown jewels  ground HIPAA compliance in our databases

18 Grounding HIPAA In the Db Apply the vulnerability management lifecycle...  Prioritize based on vulnerability data, threat data, and asset classification  Document security plan  Eliminate high-priority vulnerabilities  Establish controls  Demonstrate progress  Monitor known vulnerabilities  Watch unpatched systems  Alert other suspicious activity  Inventory assets  Identify vulnerabilities  Develop baseline

19 Monitor Safeguards & Flag Violations  Who did it?  What did they do?  When did they do it? Grounding HIPAA In the Db Establish Safeguards & Track Progress  Document systems  Establish controls  Demonstrate continuous improvement Baseline/ Discover Prioritize Shield and Mitigate Monitor

20 Real-time Activity Monitoring Five Components of Activity Monitoring

21 Vuln Mgmt Process Benefits  Common agreement on safeguards  Start with simple stuff  Add more safeguards and more systems over time  Easy to demonstrate continuous improvement

22 Summary: HIPAA To The Db  There are no silver bullets that bring HIPAA safeguards to the database  Vulnerability management and activity monitoring can help  aligns with existing people, process, and technology  solutions can automate the process  End result is significant:  Security for the crown jewels  Repeatable and demonstrable HIPAA compliance, grounded in the database

23 For More Information: Ted Julian VP Marketing & Strategy Application Security Inc.

Thank you!