1 Security Planning (From a CISO’s perspective) by Todd Plesco 24OCT2007

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
1 HIPAA Security Final Rule Overview April 9, 2003Karen Trudel.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA, Computer Security, and Domino/Notes Chuck Connell,
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HIPAA Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA and the GLB Connections Between Congress and Information Assurance.
Presented by the Office of the General Counsel An Overview of HIPAA.
NAU HIPAA Awareness Training
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health information security & compliance
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
HIPAA: It Doesn’t Only Impact Medical Records Basic HIPAA Stuff and Overall Information Protection 1.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Compliance: A Traditional Risk-Based Audit Approach GR-ISSA Lloyd Guyot, MCS GSEC Sarbanes-Oxley USA PATRIOT Act Gramm-Leach-Bliley … more November, 2005.
Information Security Technological Security Implementation and Privacy Protection.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
HIPAA Compliance. What is it? The federal Health Insurance Portability and Accountability Act of Ensures the privacy rights of patients.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA Security Best Practices Clint Davies Principal BerryDunn
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
© 2016 Health Information Management Technology: An Applied Approach Chapter 10 Data Security.
The Health Insurance Portability and Accountability Act 
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
HIPAA Security Standards Final Rule
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
The Health Insurance Portability and Accountability Act
Presentation transcript:

1 Security Planning (From a CISO’s perspective) by Todd Plesco 24OCT2007

2

3

4

5

6 Information assurance (IA) is the practice of managing information- related risks. IA practitioners seek to protect the confidentiality, integrity, and availability of data and their delivery systems.

7 Integrity: Ensuring that data is Not altered or Destroyed. Availability: Ensuring that data is Available in when It is needed. Confidentiality: Ensuring that only Authorized personnel Have access to Data.

8 IA’s Swiss Army Knife skill set Inter-personal Negotiation and Diplomacy Project management Technical Business

9 IA Camp Counselor (conflict mitigation) Ease Cost Likelihood Impact (frustration, security conscience) Maintenance

10 Information Assurance To Do: Ensure “Rules of Use” Ensure procedures follow policies Ensure 3 rd parties follow policy Measure, monitor & report Change management Process Vulnerability Assessments Non-compliance issues Security Awareness

11 Information Assurance Tasks: Create and implement plans Develop baselines Ensure processes address security Ensure compliance of IT Integrate Security into organization Review end user impacts from policies Hold business end accountable Establish governance framework Determine appropriate resources inside/out

12 Risk Assessments (NIST SP method) Define the scope (issues faced by our agency) Identify the Risks (unique data and addressables) Analyze the risks (probability of occurrence multiplied by severity to quantify hazards) Mitigation Proposal (using cost & benefit analysis) Evaluate recommended control options (feasibility and effectiveness) Review and address concerns Communicate & Consult Monitor/review as needed & periodically

13 45 Code of Federal Regs 160, 162, and 164

14 Health Insurance Portability and Accountability Act of 1996 (HIPAA, Title II) Required the Department of Health and Human Services (HHS) to establish national standards for the security of electronic health care information. The final rule for HIPAA security was published in the Federal Register on February 20, 2003.

15 Who are the covered entities? Standards for the security of electronic protected health information (PHI) are to be implemented by –health plans –health care clearinghouses –certain health care providers.

16 What is PHI? Under HIPAA, there are 18 pieces of information that are considered identifiable of a patient. 1.Name 2.Postal address (geographic subdivisions smaller than state) 3.All elements of dates, except year 4.Phone number 5.Fax number 6. address 7.Social Security number 8.Medical Record number 9.Health Plan number 10.Account numbers 11.Certificate/license numbers 12.URL 13.IP address 14.Vehicle identifiers 15.Device ID 16.Biometric ID 17.Full face/identifying photo 18.Any other unique identifying number, characteristic, or code

17 What is a health care clearinghouse? Health care clearinghouse means a public or private entity, including billing services, repricing companies, community health management information systems or community health information systems, and “value-added” networks and switches, that does either of the following functions: (1) Processes or facilitates the processing of health information received from another entity in a nonstandard format or containing nonstandard data content into standard data elements or a standard transaction. (2) Receives a standard transaction from another entity and processes or facilitates the processing of health information into nonstandard format or nonstandard data content for the receiving entity.

18 What were the deadlines? Covered entities, with the exception of small health plans, must have complied with the requirements of this final rule by April 21, Small health plans must have complied with the requirements of this final rule by April 21, 2006.

19 What is a small health plan? Small health plan means a health plan with annual receipts of $5 million or less. (The Small Business Administration (SBA) promulgates size standards that indicate the maximum number of employees or annual receipts allowed for a concern)

20 Information Assurance – it’s not just HIPAA Identity Theft is big business Electronic Authentication Act WA State Security Breach Notification Law SB6043 Required to notify if personal information stored in an unencrypted electronic format is acquired, or reasonably believed to have been acquired by an unauthorized person

21 HIPAA Violation Penalties a person who knowingly uses a unique health identifier, or causes one to be used; obtains individually identifiable health information relating to an individual; or discloses individually identifiable health information to another person; is in violation of HIPAA regulations. Such persons are subject to the following penalties: a fine of up to $50,000, or up to 1 year in prison, or both; if the offense is committed under false pretenses, a fine of up to $100,000, up to 5 years in prison, or both; if the offense is committed with intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain, or malicious harm, a fine up to $250,000, or up to 10 years in prison, or both. HIPAA also provide for civil fines to be imposed by the Secretary of DHHS "on any person" who violates a provision of it. The maximum is $100 for each violation, with the total amount not to exceed $25,0000 for all violations of an identical requirement or prohibition during a calendar year.

22 HIPAA PRIVACYSECURITY Standards: Administrative Controls Physical Controls Technical Controls

23 Administrative Safeguards 45CFR Security Management Process (a)(1) Assigned Security Responsibility (a)(2) Work Security (a)(3) Information Access Management (a)(4) Security Awareness & Training (a)(5) Security Incident Procedures (a)(6) Contingency Plan (a)(7) Evaluation (a)(8) Business Associate Contracts (b)(1)

24 Physical Safeguards 45CFR Facility Access Controls (a)(1) Workstation Use (b) Workstation Security (c) Device and Media Controls (d)(1) Technical Safeguards 45CFR Access Control (a)(1) Audit Controls (b) Integrity (c)(1) Person or Entity Authentication (d) Transmission Security (e)(1)

25 Organization Requirements 45CFR Business Associate Contracts (a)(1) Group Health Plan requirements (b)(1) Policies, Procedures, & Documentation 45CFR Policies and Procedures (a) Documentation (b)(1)

26 “Required” and “Addressable” Safeguards (a) If a given addressable implementation specification is determined to be reasonable and appropriate, the covered entity must implement it. (b) If a given addressable implementation specification is determined to be an inappropriate and/or unreasonable security measure for the covered entity, but the standard cannot be met without implementation of an additional security safeguard, the covered entity may implement an alternate measure (c) A covered entity may also decide that a given implementation specification is simply not applicable (that is, neither reasonable nor appropriate) to its situation

27 Administrative Safeguards (R)=Required, (A)=Addressable SecurityManagementProcess (a)(1) –Risk Analysis (R) –Risk Management (R) –Sanction Policy (R) –Information System Activity Review (R) Assigned Security Responsibility (a)(2) Work Security (a)(3) –Authorization and/or Supervisor (A) –Workforce Clearance Procedure (A) –Termination Procedure (A)

28 Information Access Management (a)(4) § Isolating Health Care Clearinghouse Functions (R) § Access Authorization (A) § Access Establishment and Modification (A) Security Awareness and Training (a)(5) § Security Reminders (A) § Protection from Malicious Software (A) § Log-in Monitoring (A) § Password Management (A) Security IncidentProcedures (a)(6) § Response and Reporting (R) Administrative Safeguards (R)=Required, (A)=Addressable

29 Contingency Plan (a)(7) Data Backup Plan (R) Disaster Recovery Plan (R) Emergency Mode Operation Plan (R) Testing and Revision Procedures (A) Applications and Date Criticality Analysis (A) Evaluation (a)(8) Business Associate Contracts and Other Arrangements (b)(1) Written Contract or Other Arrangement (R) Administrative Safeguards (R)=Required, (A)=Addressable

30 Facility Access Controls (a)(1) Contingency Operations (A) Facility Security Plan (A) Access Control and Validation Procedures (A) Maintenance Records (A) Workstation Use (b) Workstation Security (c) Device and Media Controls (d)(1) Disposal (R) Media Re-use (R) Accountability (A) Data Backup and Storage (A) Physical Safeguards (R)=Required, (A)=Addressable

31 Access Control (a)(1) Unique User Identification (R) Emergency Access Procedure (R) Automatic Logoff (A) Encryption and Decryption (A) Integrity (c)(1) Mechanism to Authenticate Electronic Protected Health Information (A) Person or Entity Authentication (d) Transmission Security (e)(1) Integrity Controls(A)Encryption (A) Technical Safeguards (R)=Required, (A)=Addressable

32 Security: Areas of Focus Security Risk Management program Computing Device Use & Password Management Software Vulnerability Protection Remote Access & overall Access Management Back-up and Storage Encryption and Decryption Information Asset Classification Information Systems Risk Management & Incident Tracking Entity and Person Authentication Audit Controls Contingency Planning

33 Recommended resources om/ om/

34 Questions