ROUNDTABLE New Tools & Initiatives for Addressing Medical Device Security Thursday, February 17, 9:45am ROUNDTABLE New Tools & Initiatives for Addressing.

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
David Assee BBA, MCSE Florida International University
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
HIPAA Security Risk Overview Lynne Shoemaker, RHIA, CHP, CHC OCHIN Integrity Officer Daniel M. Briley, CISSP, CIPP Summit Security Group.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Information Security Policies and Standards
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Integrated Control of Industrial and Chemical Substances in Cyprus Integrated Control of Industrial and Chemical Substances in Cyprus Final Conference.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Securing the System A K-12 Case Study. Background Rural School District 93% Free and Reduced Lunch 1100 students 3 Schools 1 Systems Administrator.
Chapter 3 Internal Controls.
HIPAA COMPLIANCE WITH DELL
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
How to evaluate ICT use for small organisations Session 2.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Strong9 Consulting Services, LLC 1 PMI - SVC I-80 Breakfast Roundtable Monthly Meeting Thursday, October 12, :00 am – 9:00 am.
Community Resources Assessment Training 3-1. Community Resources Assessment Training 3-2.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Policy, Standards, Guidelines. NSF draft Article for FATC supplement The awardee is responsible for all information technology (IT) systems security and.
How to Plan for the Implementation of the Toolkit CEI Implementing the Reproductive Health Assessment Toolkit for Conflict-Affected Women November.
1 PARCC Data Privacy & Security Policy December 2013.
November 13, 2008www.infosecurity.ca.gov1 What’s New! Presented by Colleen Pedroza.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Learn Integrated Management System Documentation Process with Ready-to-use EQHSMS Documentation Kit
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
LRC Network Planning for Records Management improvement Kathryn Dan, GM University Records and Policy.
© 2016 Health Information Management Technology: An Applied Approach Chapter 10 Data Security.
Risk management.
Capabilities Matrix Access and Authentication
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Final HIPAA Security Rule
Lesson 1  7 Basic Components of an Effective Compliance Plan
HIPAA Security Standards Final Rule
Presentation transcript:

ROUNDTABLE New Tools & Initiatives for Addressing Medical Device Security Thursday, February 17, 9:45am ROUNDTABLE New Tools & Initiatives for Addressing Medical Device Security Information Security for Biomedical Technology: A HIPAA Compliance Guide™ Thursday, February 17, 9:45am Jim Keller Director, Health Devices ECRI 2005 Annual Conference and Exhibition Dallas, TX HIMSS 2005 Annual Conference and Exhibition Dallas, TX

February 17, 2005 © HIMSS / ACCE / ECRI ~ 2 ACCE / ECRI Information Security for Biomedical Technology: A HIPAA Compliance Guide ™ Details compliance process Security Management Security Management Risk Analysis & Management Risk Analysis & Management Provides variety of compliance tools, including Matrix of security standards & implementation specifications Matrix of security standards & implementation specifications Biomedical Equipment Survey Form & Questionnaire Biomedical Equipment Survey Form & Questionnaire Risk Mitigation Worksheet Risk Mitigation Worksheet Security Assessment Survey Questionnaire Security Assessment Survey Questionnaire Sample policies/procedures Sample policies/procedures Security incident report Security incident report Business associate agreement with security provisions Business associate agreement with security provisions Management templates for project planning and budgeting Management templates for project planning and budgeting Bibliography, Definitions, and relevant On-line Resources Bibliography, Definitions, and relevant On-line Resources

February 17, 2005 © HIMSS / ACCE / ECRI ~ 3 HIPAA’s Final Security Rule “Standards & Implementation Specifications ” Key elements/tools Standards & Implementation Specifications laid out in Matrix

February 17, 2005 © HIMSS / ACCE / ECRI ~ 4 ACCE / ECRI Information Security for Biomedical Technology: A HIPAA Compliance Guide ™ Key elements/tools Biomedical Equipment Survey Form to identify systems with ePHI, system vulnerabilities, and system security measures available

February 17, 2005 © HIMSS / ACCE / ECRI ~ 5 ACCE / ECRI Information Security for Biomedical Technology: A HIPAA Compliance Guide ™ Key elements/tools Security Assessment Survey Questionnaire addressing level of compliance on Standards and Implementation Specifications for Administrative, Physical & Technical Safeguards

February 17, 2005 © HIMSS / ACCE / ECRI ~ 6 ACCE / ECRI Information Security for Biomedical Technology: A HIPAA Compliance Guide ™ Key elements/tools Management templates for project scheduling and budgeting

February 17, 2005 © HIMSS / ACCE / ECRI ~ 7 ACCE / ECRI Information Security for Biomedical Technology: A HIPAA Compliance Guide ™ Key elements/tools Risk Mitigation Worksheet for Medical Devices/Systems 1 Identify ePHI 2 Identify & Assess Risks 3 Establish Priorities 4 Determine Gap 5 Formulate & Implement Plan 6 Test & Measure Effectiveness of Plan

February 17, 2005 © HIMSS / ACCE / ECRI ~ 8 ACCE / ECRI Information Security for Biomedical Technology: A HIPAA Compliance Guide™ Key elements/tools Policies & Procedures, Incident Reporting Form, and Business Associate Agreements

February 17, 2005 © HIMSS / ACCE / ECRI ~ 9 ACCE / ECRI Security Process Training Administrative Safeguards Physical Safeguards Technical Safeguards Policies & Procedures; Contingency Plans Security Assessment Survey Questionnaire (process analysis) Manufacturer- supplied MDS 2 Forms Biomedical Equipment Survey Forms (sources of ePHI) Information Security Officer & Committee (risk assessment) Risk Mitigation Worksheets (plan & priorities) Security Management Schedule & Budget Encryption Incident Reports & Audits Data Backup Lock & Key Intrusion & Environmental Alarms Business Associate Agreements Biometrics Tokens Firewalls Error Correction Criteria & Guidelines

February 17, 2005 © HIMSS / ACCE / ECRI ~ 10 MDS 2 supplies key data to the ACCE / ECRI Biomedical Equipment Survey Form MDS 2 Developed by HIMSS Medical Device Security Workgroup

February 17, 2005 © HIMSS / ACCE / ECRI ~ 11 Discount for Members

February 17, 2005 © HIMSS / ACCE / ECRI ~ 12 ACCE / ECRI on Medical Device Security Product Description Guide/Default.aspx Table of Contents Brochure and Order Form Brochure and Order Form Press Release CD-ROM based Information Security for Biomedical Technology: A HIPAA Compliance Guide™ Discount for Members