Personal Accountability for Data Stewardship 2015 1 st Year Medical Students Noella RawlingsBrad Peda Director of ComplianceInformation Security Program.

Slides:



Advertisements
Similar presentations
HIPAA Health Insurance Portability and Accountability Act of 1996
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Personal Accountability for Data Stewardship 1 st Year Medical Students – October 18, nd Year Medical Students – October 9, 2012 Noella RawlingsRichard.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Security Training 2005
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
HIPAA Regulations What do you need to know?.
PERSONAL ACCOUNTABILITY FOR DATA STEWARDSHIP
Health information security & compliance
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Accountability for Data Stewardship st Year Medical Students Noella RawlingsJohn Soltys Director of ComplianceSenior Computer Specialist.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Critical Data Management Indiana University HR Summit April 24, 2014.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Allison Dolan Program Director, Protecting PII Handling Sensitive Data - WISP and PIRN.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Protecting Sensitive Information PA Turnpike Commission.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
From HIPAA to HITECH OMH Briefing.
2011 SECURITY REFRESHER Information Security. Agenda HIPAA Update Encryption Overview Mobile Phones and Tablets Cameras USB Drives ing Patient Information.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Children’s Hospital Requirements for Remote Access.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
East Carolina University
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Welcome to the SPH Information Security Learning Module
Information Security Training
Move this to online module slides 11-56
Colorado “Protections For Consumer Data Privacy” Law
Information Security in Your Office
School of Medicine Orientation Information Security Training
Presentation transcript:

Personal Accountability for Data Stewardship st Year Medical Students Noella RawlingsBrad Peda Director of ComplianceInformation Security Program Analyst School of MedicineUW Medicine IT Services 1

Defining data stewardship and your responsibilities Safeguarding confidential information DO’s and DON’Ts Current security threats Tools and resources Agenda 2

YOUR ROLE: Every individual is personally and professionally responsible for the security and integrity of confidential information, electronic or paper, entrusted to you. UW Medicine Professionalism Policy: Demonstrated excellence, integrity, respect, compassion, accountability and a commitment to altruism in all our work interactions and responsibilities. policies/Pages/Professional-Conduct.aspx policies/Pages/Professional-Conduct.aspx What is Data Stewardship? 3

Confidential Information – protection of data required by law and includes: Protected health information (PHI) – protected by HIPAA Individual student records – protected by FERPA Personally identifiable information (PII) – financial information (e.g., credit card, bank), social security number and driver’s license number – protected by Washington’s breach notification law Other personal information - public employee’s home addresses, personal contact information, performance evaluations – protected by the Washington Public Records Law Proprietary intellectual property or trade secrets, research data – protected by the Washington Public Records Law Confidential Information 4

“Breach” is the unauthorized acquisition, access, use or disclosure of unsecured PHI and compromises the security or privacy of the PHI Breaches of unsecured PHI require notification to the Office of Civil Rights (OCR) and affected individuals. May also require notice to the media and posting on the UW Medicine website A breach is presumed and covered entity has burden of showing a breach has not occurred There are two ways to secure PHI Encryption Destruction Renders PHI unusable, unreadable or indecipherable What is a Breach? 5

Possible consequences of a loss of confidential information that has not been secured Personal and professional – time spent on an investigation; name known to UW Medicine Leadership; impact to reputation and relationship with patients; imposition of disciplinary action and civil/criminal penalties Institutional – report to the Office of Civil Rights (OCR) for HIPAA breaches; notification to patients; imposition of fines and sanctions; financial costs of investigation and remediation, e.g., providing credit monitoring; impact to UW Medicine reputation Why Is This Important to Me? 6

May $4.8M against New York- Presbyterian Hospital and Columbia University due to physician causing PHI to be accessible on Google April 2014 – $1.73M against Concentra Health Services for a stolen unencrypted laptop June $1.7M against Alaska Department of Health and Human Services for unencrypted USB drive stolen from employee’s car HIPAA Fines 7

Unencrypted laptop and external hard drive stolen from locked, parked car Briefcase containing (paper) PHI stolen from locked, parked car Backpack containing (paper) PHI stolen from locked, parked car Unencrypted laptop containing PHI and PII stolen from office in Health Sciences Building Recent Examples of Loss 8

If you use a mobile device to store or transmit PHI or PII, your mobile device MUST be encrypted! Rule Number One 9

NEVER leave confidential data in your car! Rule Number Two 10

Avoid taking confidential data off-site or downloading to portable or mobile devices If taking confidential data with you, you MUST obtain supervisor or department head approval Password protect AND encrypt all devices Only use UW approved cloud services Ensure the physical security of information - lock up confidential data (locking file drawer, safe, or other locked device) Prepare for the worst - protect yourself against theft - nobody thinks they will be a victim! Other Basic Do’s and Don’ts 11

CURRENT SECURITY THREATS 12

Phishing is a very common way accounts are stolen Don’t click links in and if you do, don’t enter your credentials UW/UW Medicine will never ask for account information via UW Medicine periodically sends phishing messages to our workforce to help raise awareness – includes training YOU WILL RECEIVE PHISHING MESSAGES – be very wary and very cautious! PHISHING 13

Cryptolocker/Locker: Very destructive malware threat – encrypts your data and tries to sell it back to you Malware infection is obtained via attachments or by visiting/downloading a file (such as an MP3 file) from a website Sophos Anti-virus sometimes detects the malware (malware name used is Troj/Ransom-ACP) DON’T FALL FOR THIS SCHEME! MALWARE 14

NEVER click on links and NEVER open attachments from unknown or unexpected sources Rule Number Three 15

NEVER open an attachment from an unknown source If the context of the message doesn’t make sense, delete the message or call the sender to verify the Always be wary of messages that ask you to update your password or confirm you account – UW IT support groups will never ask you to do this via a link in an Report any warning messages from antivirus or other software immediately. DO NOT CLICK ON THE LINK! Minimize the confidential information you store Encrypt the data and the device Keep your operating system and software up to date (Stay patched) Empty your “Trash bin” (Deleted Items) regularly or set it to empty automatically when you exit the program Contact your Department IT support staff for assistance with any device you use for work What Can You Do? 16

If you get infected, or think you may be infected, contact UW Medicine IT Security IMMEDIATELY! Report information security incidents when they occur. Contact IT Services Help Desk at If it is urgent, call Report the loss or theft of PHI to UW Medicine Compliance at or Immediately notify the Director of Compliance for the School of Medicine at or 206- Incident Reporting 17

TOOLS AND RESOURCES 18

Tools to Assist You in Safeguarding Data Encryption Complex passwords Physical data security - lock offices, files and computers Education and training materials Privacy, Confidentiality and Information Security Agreement (PCISA) Following policies restricting removal of data from worksites 19

UW Medicine Compliance Policies UW Medicine IT Security Policies UW Medicine Polices 20

Smartphone/Tablet Security If you use a smartphone or tablet (UW owned or your personal device) to conduct UW business, such as accessing your UW , we recommend: Auto lock device and use a strong password Enable encryption on the device Set an automatic lockout timer on the device Activate Tamper Wipe: i.e. phone is wiped clean after 10 pass code or PIN attempts (all data is deleted) Activate “find my phone” function Don’t use cloud back up services, such as iCloud or Google Drive, unless it is an approved cloud by UW Medicine IT Security for PHI or FERPA data Don’t store data on the SIM card 21

Encryption Resources Where to get information and help with encryption: Encryption guidelines mobile devices: sp sp Whole disk encryption guidelines: e.pdf e.pdf vice_Encryption/other_windows_linux_guidance.asp vice_Encryption/other_windows_linux_guidance.asp IT Services Help Desk: DOM IT Help Desk: 22

One Drive for Business (formerly UW SkyDrive Pro) requires UW NetID nformation-technology/skydrivepro nformation-technology/skydrivepro wares/online-storage/onedrive/ wares/online-storage/onedrive/ Cloud Resources 23

Educational Tools UW Medicine IT Security Phishing Awareness Announcement: ations/Phishing_Awareness_ _041212/default.asp ations/Phishing_Awareness_ _041212/default.asp Office of the Chief Information Security Officer phishing video: y.html y.html Phishing Resources 24

Other Resources Office of the Chief Information Security Officer training/ training/ computing/ computing/ UW Medicine IT Security 25

UW Medicine IT Services Help Desk: UW Medicine ITS Security Team: uwmed- UW Medicine Compliance: Noella Rawlings, UW School of Medicine, Director of Compliance: Contact Information 26

Questions ? 27