University Health Care System 1 HTM 660 Systems Management and Planning May 2014.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
SLIDE 1 Westbrook Technologies from Fortis: A Healthcare Solution for Medical Records, Billing and HIPAA.
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Electronic Health Records Danielle P. Berthelot, RHIA Director, Health Information Management and Cancer Registry Privacy Officer Woman’s Hospital.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Security Controls – What Works
Clinical Information System Implementation Project Prepared for Clinical Affairs Committee December 4, 2002.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
IT Governance and Management
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Katherine Kingston EDLD May 15, 2011 This presentation will see just how well Galena Park ISD’s technology plan compares with the National.
Revenue Cycle Management Medical Technology Acquisition and Assessment Team Members: Joseph Dixon, Michael Morotti, Mari Pirie-St. Pierre, David Robbins.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Improving Meeting Management for Your IT Department (Concurrency Corporation)
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
AJ Construction & Development Co Portal & Customer Information and Billing System.
Working with HIT Systems
Pro-active Security Measures
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
State of Georgia Release Management Training
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Installation and Maintenance of Health IT Systems Unit 8a Troubleshooting; Maintenance and Upgrades; and Interaction with Vendors, Developers, and Users.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
EMR Optimization in a Medical Clinic Environment: An Analysis of IT Support By Lydia Maples Senior Thesis Fall 2014.
Georgia Management Information Sciences Conference October 2011 Presented by Tonya Vickers, CPA 1.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Clinical Decision Support Implementation Victoria Ferguson, COO - Program Manager Christopher Taylor, CIO – Business Owner Monica Kaileh, CMIO – Steering.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Computers in the Ambulatory Care Setting
Arizona Health-e Connection Leadership from Governor Napolitano
TRINITY UNIVERSITY HOSPITAL INTERNAL EXIT MEETING
Move this to online module slides 11-56
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Computers in the Ambulatory Care Setting
Introduction to the PACS Security
Presentation transcript:

University Health Care System 1 HTM 660 Systems Management and Planning May 2014

Introduction/Purpose Background Process Utilized Chart linking projects to HCO’s strategies and goals Prioritized Portfolio with Budget Tactical Plan Questions & Answers 2

Introduction/Purpose /Background The project steering committee is requesting approval for the acquisition of FireEye security system. Objective - In order to prevent future data breaches that our organization has recently experienced when thousands of patients health records were accessible online, our project will focus on acquiring a high level software security application called FireEye. The software product, FireEye, will meet all of the needs of the project. 3

Project Steering Committee 4 CIO CFO CNA Project manager Representatives from nursing, medical assistants, and office manager. IT support will be engaged in the last phase of implementation.

Background HIPPA Violation Post Breach Response Record $4 Million Settlement Preventative Action Plan 5

Scope of Work FireEye: 95% of All Networks are Compromised (FireEye.com)FireEye.com Upgrade Current Security System Server Upgrade Integration Timeline Project Measurement and Budget Maintain - Speed, Accuracy Protection for clinicians and patients data 6

Scope of Work Continued 7 Timeline - 1 Year 3 Phases Fiscal Year 2015 Department Needs - Representatives from all sectors * Our project team is dedicated to deliver advanced data threat protection of patients health information by acquiring FireEye throughout the University Health Care system.

8 Ensure communication modes and data storage points, including web browsing, , content security, endpoint security, and forensic analysis are secure. Develop New Protocol - Firewall Virus scanner Reporting Universal adoption of FireEye technology in every hospital and medical center, which would enable a uniform standard of security across the healthcare system. Measured - Decrease % Leaks Increase Security Decrease Organizational Liability Increase % Leaks Identified at Stage 1 Deliverables

9 High % of staff who use the system successfully Low incidence of lost data Physical modes of security can still be implemented: Security guards monitor computers All employees must change passwords every three months All staff must file a report for every breach Finally, these reports must be filed to HIPAA authorities within a timely manner of the incident. FireEye is believed to be a means to make EHR data more secure and breaches more easily identified. Deliverables Continued

10 Timeline TaskDeadline Analysis and contractingSeptember Hard ware and software installationOctober Registration interfaceNovember Update HER systemDecamber Staff TrainingDecember System set upJanuary IT staff trainingJanuary Go live dateJanuary

11 Budget Highlight Project NameOperating Cost Capital budget$100,000 Software$30,000 Hardware$15,000 Access points$10,000 Operation Maintenance cost$10,000 First year services$15,000 Security guard on computer$6,500 Simulation test (trial period)$5,000 Staff training$8,500

Major Stakeholders Project Manager Project Steering Committee C Level Executives Current IT Staff New IT Staff FireEye Vendor Solutions Team 12

13 All hospital executives (CEO, CIO, CFO) are responsible for making policies to keep the system compliant with HIPAA regulations. The entire IT department must develop and maintain a tightly monitored electronic information system employing a firewall, antivirus software and a two-factor authentication access. Finally, all hospital staff, all the way down to the custodial staff, must remain vigilant of their own and others’ behavior. Any unauthorized verbal or written sharing of patient information must be immediately reported, and the offending employee given a warning or reprimanding. *The system encourages proper resources be maintained post procurement of information systems. Without access to support, the possibility of a fall could occur. Project Support and Authority

University Health Care employees are willing to change business operations to take advantage of the functionality offered by the new FireEye security technology. Management will ensure that project team members are available as needed to complete project tasks and objectives. The project team will participate in the timely execution of the FireEye Project Plan (i.e., focus meetings when required). 14 Assumptions and Dependencies

15 Failure to rollout new security system within the time specified in the project timeline will result in project delays. Project team members will adhere to all project guidelines. Mid and upper management in including nurse management leaders will foster support to the project goals and objectives. The FireEye Project Plan may change as new information and issues are revealed. Assumptions and Dependencies Continued

Constraints 16 Project funding sources are limited. Due to the estimated budget cost resource availability is inconsistent. Internet connections could be affected due to slower rate of connectivity because of the new implemented security system.

Known Risks 17 Cost - $100,00 per Installation Operating Costs & Hidden Costs Additional Risks Unknown *Furthermore, access is never 100% secure. The system is designed to be highly accessible to authorized figures, but must be closely guarded against unauthorized use. If a password leaks, a logged in computer is left unattended or any patient information is written on paper and left unattended, this could constitute a security breach, even with FireEye. If any part of confidential patient information (no matter how small) is leaked, it constitutes a breach of patient privacy.

Procurement Items 18 Identifying relevant information systems Conducting a risk assessment Implementing a risk management program Acquiring IT systems and services Creating and deploying policies and procedures

Creating and Deploying Policies and Procedures 19 All policies and procedures will receive a refresh post acquisition allowing staff time to assimilate to new critical measures. New items will align with HIPPA regulations and also take into account any new software or hacking awareness learnings from recent retail data breaches in a sister industry. Content has the ability to be procured and distributed in a wide ranging variety across the internet and the challenge will be to learn from those around us in creating a new set of privacy policies and procedures to protect patients.

Q/A Thank You 20