Action Tracker · Status Report | Bill Moss, Assistant Secretary Oct 6, 2015 Aging and Long-Term Support, Administration Background Group Topic / Strategic.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

Ways to Improve the Hazard Management Process
MONITORING OF SUBGRANTEES
(Individuals with Disabilities Education Improvement Act) and
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
STATE OF MARYLAND DEPARTMENT OF HEALTH AND MENTAL HYGIENE Statewide Transition Plan for Compliance with Home and Community-Based Setting Final Rule 1 Public.
SL21 Information Security Board Mission, Goals and Guiding Principles.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Federal Protective Service National Protection and Programs Directorate U.S. Department of Homeland Security 2010 Gary W. Schenkel Director.
Security Controls – What Works
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Federal Transit Administration Office of Safety and Security FTA BUS SAFETY & SECURITY PROGRAM 18 th NATIONAL CONFERENCE ON RURAL PUBLIC AND INTERCITY.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
ENVIRONMENTAL MANAGEMENT SYSTEMS MARINE OPERATIONS CENTER – PACIFIC INTRODUCTION TO OUR SYSTEM JIM SCHELL, ENVIRONMENTAL COMPLIANCE OFFICER.
Implementing Effective Contractor Compliance Programs.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Relentless in the Pursuit of Excellence Highland Technology Services Inc. 1 Section 508 Business Practices.
1 Tuesday, August 16, 2005 W E B C A S T August 16, 2005 Policy Development Theory & Practice: An Emphasis on IT Pat Spellacy Director of Policy & Process.
Monitoring Accommodations in South Dakota Linda Turner Special Education Programs.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Information Security Update CTC 18 March 2015 Julianne Tolson.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
CORPORATE COMPLIANCE Tim Timmons Vice President Compliance and Regulatory Services Health Future, LLC.
1 CIVIL RIGHTS COMPLIANCE AND ENFORCEMENT Office for Civil Rights U.S. Department of Health and Human Services Introduction to OCR.
Erica Cummings Grant Coordinator 1.  The New Mexico Department of Homeland Security and Emergency Management (DHSEM) is responsible for:  Monitoring.
State of Iowa Enterprise HIPAA Compliance
1 DOE IMPLEMENTATION WORKSHOP ASSESSING MY EMS Steven R. Woodbury
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Copyright © Education Compliance Group, Inc. All rights reserved. By Peggy A. Burns, Esq. and Mark Hinson, SPHR Internal Investigations & Decision-Making:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
PCI Compliance Update Presented by: Jeff Gassaway, Information Security Officer – CISSP Lucas Walker, Information Security Analyst – GSEC 1.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Division of Developmental Disabilities: Analysis of How Services Are Prioritized Proposed Final Report to the Joint Legislative Audit & Review Committee.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
DOE ASSET MANAGEMENT PLAN
Compliance August 18, Agenda Outline Status Draft of Answers.
Action Tracker · Status Report | Bill Moss, Assistant Secretary Oct 09, 2015 Aging and Long-Term Support Administration Background Group Topic / Strategic.
Action Tracker · Status Report | Bill MossOct 7, 2015 Assistant Secretary, Aging and Long-Term Support Administration Background Group Topic / Strategic.
Action Tracker · Status Report | Bill Moss, Assistant SecretaryOct 09, 2015 Aging & Long-Term Support Administration Background Strategic Plan Goal / Commitment.
Action Tracker · Status Report | Bill Moss, Assistant SecretaryOct 7, 2015 Aging and Long-Term Support, Administration Background Group Topic / Strategic.
Action Tracker · Status Report | Bill Moss9/22/2015 Assistant Secretary, Aging and Long-Term Support Administration Background Group Topic / Strategic.
Action Tracker · Status Report | Bill Moss, Assistant SecretaryOct 7, 2015 Aging and Long-Term Support, Administration Background Group Topic / Strategic.
Office of Human Research Protection Georgia Health Sciences University.
Task(s) to support strategy
Job Corps Equal Opportunity Officers Orientation Presenter: Kevin Malone U.S. Department of Labor Civil Rights Center.
PROGRESS ON THE IMPLEMENTATION OF AUDIT RECOMMENDATIONS FOR 2014/15: INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) 1 Briefing presentation to the Portfolio.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Action Tracker · Status Report | Bill Moss, Assistant SecretaryMarch 4, 2016 Aging and Long-Term Support, Administration Background Group Topic / Strategic.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
The CFPB’s Legal Minefield for CREDIT UNIONS
Information Security Board
General Counsel and Chief Privacy Officer
County HIPAA Review All Rights Reserved 2002.
Kenya Mann Faulkner Chief Ethics & Compliance Officer April 2019
Capabilities Briefing
Risk Management NDS Forum June 23rd 2010.
Presentation transcript:

Action Tracker · Status Report | Bill Moss, Assistant Secretary Oct 6, 2015 Aging and Long-Term Support, Administration Background Group Topic / Strategic Plan Goal / Other Mission Critical Goals Sub Topic / Strategic Objective: Increase IT security support to improve and enhance data security to perform oversight activities to ensure evidence of compliance for both internal and external business partners statewide with data security requirements mandated by state and federal laws, DSHS Administrative and Washington State Office of Chief Information Officer (OCIO) security standards and policies, and Health and Human Services (HHS), Office of Civil Rights (OCR) DSHS investigation findings. Strategic Objective # : 4.2 Measure Title : Reduce the monthly security vulnerabilities weighted score by 5 percent for servers and workstations through June ID#Problem to be solvedStrategy/Approach Task(s) to support strategyLeadStatusDueExpected OutcomePartners 4.2.1Contractor Compliance Verification Conduct onsite compliance verification reviews with ALTSA & Developmental Disabilities Administration (DDA) contractors. Develop Compliance Verification (CV) policy & procedure, to include schedules and develop tool for CV reviews. Conduct communications about new process to ALTSA & DDA programs. Kim AndersonOn track12/31/15Ensure contractors are complying with the data security requirements of their contracts in turn keeping DSHS data protected and reducing risk of data breaches.. ALTSA & DDA Contractors 4.2.2Vulnerability Management Statewide Conduct vulnerability scans and timely patching on computer systems. Address vulnerability scans backlog to reach maintenance mode Scott DeMeyerIn progress12/31/2015Reduce or remove vulnerabilities and ensure compliance of HIPAA, state and federal regulations for protecting data. Conduct monthly and more if needed vulnerability scans on systems, applications, and data bases timely Each month through 6/30/2017 Provide oversight and track progress on corrective action plans to completion. 6/30/16 On track10/30/15Regularly updated data for reporting Collect vulnerability data to support monthly reporting. Proposed Action Type of Status Report Strategic Plan SO-4.2IT Security Vulnerability Last modified 10/06/2015 1

Action Tracker · Status Report | Bill Moss, Assistant Secretary Oct 06, 2015 Aging and Long-Term Support, Administration Background Group Topic / Strategic Plan Goal / Other Mission Critical Goals Sub Topic / Strategic Objective: Increase IT security support to improve and enhance data security to perform oversight activities to ensure evidence of compliance for both internal and external business partners statewide with data security requirements mandated by state and federal laws, DSHS Administrative and Washington State Office of Chief Information Officer (OCIO) security standards and policies, and Health and Human Services (HHS), Office of Civil Rights (OCR) DSHS investigation findings. Strategic Objective # : 4.2 Measure Title : Reduce the monthly security vulnerabilities weighted score by 5 percent for servers and workstations through June ID#Problem to be solvedStrategy/Approach Task(s) to support strategyLeadStatusDueExpected OutcomePartners 4.2.3Security Log Monitoring for compliance with HIPAA regulations, Office of Chief Information Officer (OCIO) IT standards and DSHS Information Security Polies Security Log Monitoring on headquarters servers that store Category 3 and 4 data. Develop documented procedure, schedules, timelines. Kim AndersonOn track6/30/16Increased security compliance required by HIPAA regulations, OCIO IT standards and DSHS Information Security Policies 4.2.4Internal verification of compliance Conduct internal audits Conduct 1-2 random audits of ALTSA and DDA sites to determine data security compliance and risk, establish corrective action plans and track to completion. Michele WeedinOn trackEach month through 6/30/2017 Increased compliance and reduced risk to department data and IT resources. ALTSA & DDA Sites Develop policy & procedure, to include schedules and develop tool for reviews. Conduct communications about new process to ALTSA & DDA programs. Proposed Action Type of Status Report Strategic Plan SO-4.2IT Security Vulnerability Last modified 10/06/2015 2