Security Compliance …from Planning to Practice Sharon A. Budman Director of HIPAA Privacy & Security September 13, 2004 © University of Miami Office of.

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Workshop on High Confidence Medical Device Software and Systems (HCMDSS) Research & Roadmap June 2-3, 2005 Philadelphia, PA. Manufacturer/Care-Giver Perspective.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Medication Reconciliation Networking Session Steve Rough, MS., RPh. Director of Pharmacy University of Wisconsin Hospital and Clinics.
Session 3 – Information Security Policies
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
SEC835 Database and Web application security Information Security Architecture.
Information Security Training for Management Complying with the HIPAA Security Law.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Chapter 3 Internal Controls.
Responsible CarE® Product Stewardship – Building Your Team David Sandidge Director, Responsible Care American Chemistry Council June 2010.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Eliza de Guzman HTM 520 Health Information Exchange.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Working with HIT Systems
HIPAA Health Insurance Portability and Accountability Act of 1996.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
The Evolution, Development & Training of HIPAA Policies and Procedures in a Decentralized Health Care Environment Presented By: Sharon A. Budman, M.S.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
PRECONFERENCE III Advanced Strategies to Achieve ROI in Implementing HIPAA Karl Ideman, CEO Pool Administrators Inc. September 14, 2003.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Information Systems Security
Health Insurance Portability and Accountability Act HIPAA 101
Introduction to the Federal Defense Acquisition Regulation
Information Security based on International Standard ISO 27001
Privacy Project Framework & Structure
Risk Management: why and how to protect your health center
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
HIPAA Security Risk Assessment (SRA)
Presentation transcript:

Security Compliance …from Planning to Practice Sharon A. Budman Director of HIPAA Privacy & Security September 13, 2004 © University of Miami Office of HIPAA Privacy & Security

Accomplishing the Goal Vision Strategy PeopleProcess © University of Miami Office of HIPAA Privacy & Security

Vision Security Compliance Risk Assessment is the first step towards Security Compliance © University of Miami Office of HIPAA Privacy & Security

Understanding the Challenge The Strategy – Risk Assessment Identification of systems, key stakeholders, and associated information related to e-phi within the organization. Design a strategy to inventory all systems that maintain or transmit e-phi. Develop and disseminate a data collection tool that details the systems, users, and information. Analyze the data. © University of Miami Office of HIPAA Privacy & Security

The Goal of the Analysis Process Protect the organization and its ability to perform its mission. –IT assets facilitate our mission –The process should NOT be treated primarily as a technical function but rather as an essential management function of the organization. NIST – SP (as referenced in the security rule) © University of Miami Office of HIPAA Privacy & Security

Defining the People/Players Who are they? Leadership Support/Sponsor Steering Committee -Leadership Group Key Stakeholders – System Owners Risk Assessment Team © University of Miami Office of HIPAA Privacy & Security

The Structure - Hybrid Decentralized IT Structure Decentralized Clinical Departments Decentralized Medical Records Research – Outside of the Covered Entity © University of Miami Office of HIPAA Privacy & Security

Planning Considerations Types of Risk Assessments Quantitative vs. Qualitative © University of Miami Office of HIPAA Privacy & Security

Quantitative Risk Assessment Main Advantage –Provides specific quantifiable measurements of the magnitude of the impacts which can be used in a cost benefit analysis of the recommended controls. Main Disadvantage –Values must be assigned to the assets and determining accurate values may be difficult. © University of Miami Office of HIPAA Privacy & Security

Qualitative Risk Assessment Main Advantage –Prioritizes the risk and identifies the areas for immediate improvement. Main Disadvantage –Does not provide specific quantifiable measurements of the magnitude of the impacts, therefore, making a cost benefit analysis of any recommended controls difficult. © University of Miami Office of HIPAA Privacy & Security

Risk Assessment Risk Management Risk Mitigation Risk Analysis 3 Phase Approach A Continuous Process © University of Miami Office of HIPAA Privacy & Security

Defining the Phases of Risk Analysis Risk Assessment - Determine the hazards, the exposure and characterizing the risk to the organization Risk Management – Analyze and select the policies and control alternatives based on the risk assessment findings. Risk Mitigation – Implement the selected policies and controls and subsequently monitor their application. © University of Miami Office of HIPAA Privacy & Security

Risks to Covered Entity Permanent loss or corruption of EPHI Temporary loss or unavailability of medical records Loss of financial cash flow Unauthorized access to or disclosure of EPHI Loss of physical assets Damage to reputation and public confidence Threats to patient safety Threats to employee safety © University of Miami Privacy Office © University of Miami Office of HIPAA Privacy & Security

PRIORTIZATION OF RISK ….as defined by Leadership –Patient Care Impact –Financial Loss –Legal Implication Loss –Loss of Reputation © University of Miami Office of HIPAA Privacy & Security

The Roll-out Embarked on Quantitative Risk Assessment Unable to readily obtain necessary values to incorporate into the analysis Changed gears and moved towards Qualitative Risk Assessment © University of Miami Office of HIPAA Privacy & Security

Current Status Enlisted all key system owners for data collection purposes Obtained information related to systems with E-phi Prioritization of Systems based on Leadership Priorities Expanded infrastructure © University of Miami Office of HIPAA Privacy & Security

Living and Learning Garner leadership support Encourage Buy-in from Key Stakeholders Use HIPAA for Continuous Process Improvement Look at HIPAA in a positive realm and use it as a catalyst to effectuate change © University of Miami Office of HIPAA Privacy & Security

Questions???? Contact information: Sharon A. Budman Director of HIPAA Privacy & Security University of Miami Office of HIPAA Privacy & Security © University of Miami Office of HIPAA Privacy & Security

UNDERSTANDING THE KEY ELEMENTS OF RISK ANALYSIS TO MEET THE HIPAA FINAL SECURITY RULE Caroline Hamilton, President RiskWatch, Inc.

-- Peter Drucker “IF YOU CAN’T MEASURE IT, YOU CAN’T MANAGE IT!” RISK ANALYSIS IS A MANAGEMENT TOOL – IT ELEVATES THE SECURITY FUNCTION UP TO THE BOARD ROOM

5 STEPS IN THE HIPAA SECURITY RISK ANALYSIS Define & value all assets Analyze Existing Threats Survey personnel to discover vulnerabilities in handling protected electronic health information. Analyze the data. Write the report.

ALL SECURITY RISK ANALYSIS ELEMENTS COME FROM GOVERNMENT AND AUDIT GUIDELINES ASSETS THREATS VULNERABILITIES LOSSES SAFEGUARDS

SAMPLE ASSET CATEGORIES Applications Clinical Staff Communication Systems Data Centers Databases E-Health Info Electrical Power Facilities Hardware Medical Records Networks Monitoring Equipment Patients Personnel Pharmacy Security Systems Software System Software

THREAT INFORMATION Quantified threat data is hard to find. Categories of Threats: Natural Disasters, Criminal Activity Malicious Code, Hackers, Fraud Includes collected data from Web Sources, government data, weather data, crime casts, global info services, access control systems, incident logs. You can customize with data from internally collected sources

STANDARD AND LOCAL THREAT DATA FREQUENCY ESTIMATES PER ORGANIZATION PER YEAR

Surveying the entire organization Using a non-threatening scientific approach Must include complete audit trails Should include different levels of the organizations Finding Vulnerabilities Through Electronic Surveys – Finding out how people do their jobs

ANALYZE POTENTIAL LOSS CATEGORIES Delays and Denials of Service Disclosure of PHI Direct Loss (Computers Destroyed) Regulatory Fines (Liability) Modification of Data Reputation (Credibility) Direct Related (Sum of the Above)

HIPAA-REQUIRED SAFEGUARD CATEGORIES

Linking Relationships Applications Databases PHI Medical Records Hardware System Software Delays & Denials Fines Disclosure Modification Direct Loss Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control AssetVulnerabilityThreatLoss Risk = Asset * Loss * Threat * Vulnerability

HOW TO ILLUSTRATE RESULTS OF THE ANALYSIS FOR MANAGEMENT OVERALL COMPLIANCE VS. NON-COMPLIANCE

Vulnerability Distribution Report Indicates Weak Security Areas By Category and Backed up by Audit Trails

How To Calculate Return on Investment 1.Finish Disaster Recovery Plan2000:1 2.Finish the Security Plan 1200:1 3.Distribute Security Policy 943:1 4.Mandatory Security Training 75:1

RISK ANALYSIS REPORTING RECOMMENDED CONTROLS BY RETURN ON INVESTMENT (ROI)

USING COLLECTED DATA TO BENCHMARK HEALTHCARE RISKS By Hospital, by Systems, by Business Unit, by Region Common standards, terms and definitions Use for budgeting purposes --- determining ‘reasonable precautions’ --- ‘as good as’

THE BOTTOM LINE The Risk Analysis Process means Ongoing Compliance Measurement and Validation Data Security/Privacy regulations in Healthcare will continue to increase. The Risk Analysis is a key to demonstrating on-going HIPAA compliance Properly done, a risk analysis will credibly measure HIPAA compliance, identify vulnerabilities, justify capital improvements and focus & prioritize the security budget.