Download presentation
Presentation is loading. Please wait.
1
Introduction to the PACS Security
PACS Workshop -Amirkabir University. Medical Software Introduction to the PACS Security Dr. Afshin Niakan,
2
PACS Workshop -Amirkabir University.
Security Definition HIPPA: (Health Insurance Portability and Accountability Act ISMS (Information security management system) ISO ( ) 27003 (Implementation of ISMS) 27005 (Security Risk Management) 27004 (Measurement) (Organization offering ISMS Certification) Health Information Technology for Economic and Clinical Health (HITECH) protected health information (PHI) Dr. Afshin Niakan
3
PACS Workshop -Amirkabir University.
The Health Insurance Portability and Accountability Act (HIPAA) passed by Congress in 1996 is a comprehensive law that addresses a number of health care issues including data transmission and protection, fraud and abuse, and insurance portability. The components of HIPAA Administrative Simplification include the following Electronic Transactions and Code Sets; Privacy Standards Security Standards Unique Identifiers Electronic Digital Signature; and Enforcement Dr. Afshin Niakan
4
PACS Workshop -Amirkabir University.
Compliance with the Administrative Simplification portion of HIPAA will require significant changes to a physician’s medical practice. Maintaining the confidentiality of patient information, both electronic and written, is a critical aspect of patient care. Dr. Afshin Niakan
5
PACS Workshop -Amirkabir University.
Short HIPAA Compliant Checklist 1. Have you formally designated a person or position as your organization’s privacy and security officer? 2. Do you have documented privacy and information security policies and procedures? 3. Have they been reviewed and updated, where appropriate, in the last six months? 4. Have the privacy and information security policies and procedures been communicated to all personnel, and made available for them to review at any time? 5. Do you provide regular training and ongoing awareness communications for information security and privacy for all your workers? Dr. Afshin Niakan
6
PACS Workshop -Amirkabir University.
6. Have you done a formal information security risk assessment in the last 12 months? 7. Do you regularly make backups of business information, and have documented disaster recovery and business continuity plans? 8. Do you require all types of sensitive information, including personal information and health information, to be encrypted when it is sent through public networks and when it is stored on mobile computers and mobile storage devices? 9. Do you require information, in all forms, to be disposed of using secure methods? 10.Do you have a documented breach response and notification plan, and a team to support the plan? Dr. Afshin Niakan
7
PACS Workshop -Amirkabir University.
If you answered no to any of these questions you have gaps in your security fence. If you answered no to more than three you don’t have a security fence. Dr. Afshin Niakan
8
10 Best Practices for the Small Healthcare Environment
PACS Workshop -Amirkabir University. 10 Best Practices for the Small Healthcare Environment 1: Use strong passwords and change them regularly Strong passwords should: • Be at least 8 characters in length • Include a combination of upper case and lower case letters, at least one number and at least one special character, such as a punctuation mark 2: Install and Maintain Anti-Virus Software 3: Use a Firewall Control Access to Protected Health Information access control only to people with a need to know it. access logs Dr. Afshin Niakan
9
10 Best Practices for the Small Healthcare Environment
PACS Workshop -Amirkabir University. 10 Best Practices for the Small Healthcare Environment 1: Use strong passwords and change them regularly Strong passwords should: • Be at least 8 characters in length • Include a combination of upper case and lower case letters, at least one number and at least one special character, such as a punctuation mark 2: Install and Maintain Anti-Virus Software 3: Use a Firewall 4: Control Access to Protected Health Information access control only to people with a need to know it. access logs Dr. Afshin Niakan
10
10 Best Practices for the Small Healthcare Environment
PACS Workshop -Amirkabir University. 10 Best Practices for the Small Healthcare Environment 5: Control Physical Access flash drives, CD or DVD disks, laptops, handhelds, desktop computers, and even hard drives ripped out of machines, lost and stolen backup tapes, and entire network servers 6: Limit Network Access Wireless routing A good policy is to prohibit staff from installing software without prior approval 7: Plan for the Unexpected 8: Maintain Good Computer Habits Configuration Management Software Maintenance Operating Maintenance Dr. Afshin Niakan
11
10 Best Practices for the Small Healthcare Environment
PACS Workshop -Amirkabir University. 10 Best Practices for the Small Healthcare Environment 9: Protect Mobile Devices 10: Establish a Security Culture the weakest link in any computer system is the user. Security practices must be built in, not bolted on. Dr. Afshin Niakan
12
PACS Workshop -Amirkabir University.
Section of the HIPAA privacy rule states (b) 1. Standard: training. (b) 2. Implementation specifications: training. (j) 1. Standard: documentation. (j) 2. Implementation specification: retention period. AHIMA Summary on Privacy Training: A covered entity must train the entire workforce on HIPAA-directed privacy policies and procedures necessary to comply with the rule. Workforce training should be executed through normal or existing organizational educational operations. All covered entities must provide ongoing updates and document evidence of compliance in written or electronic form and retain it for a minimum of six years from the implementation date. Dr. Afshin Niakan
13
PACS Workshop -Amirkabir University.
HIPAA's security standard (a)(5)(i) states: ...Implement a security awareness and training program for all members of its work force (including management). (ii) Implementation specifications. Implement: Security reminders Protection from malicious software Log in monitoring Password management AHIMA Summary on Security Training: Covered entities should train the entire workforce, including management, on security issues respective of organizational uniqueness. In addition, the covered entity periodically should provide security training updates based on technology and security risks. Dr. Afshin Niakan
14
اجرای عملیاتی پیاده سازی امنیت در مراکز درمانی و سیستم PACS
PACS Workshop -Amirkabir University. اجرای عملیاتی پیاده سازی امنیت در مراکز درمانی و سیستم PACS Dr. Afshin Niakan
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.