Integrating a Vendor Assessment Program Into Your Organization Thomas H. Garrubba Manager - Technical Assessments Group; CVS Caremark.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Training & Development Contract Management. Contents Introduction to Contract Management Definition Contract Management Issues Activities Overview Contract.
Top 10 Tips for Effectively Assessing Third-Party Vendors Tom Garrubba, CISA, CRISC, CIPP/IT Senior Privacy Manager, Information Governance & Privacy -
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Are you ready for HIPPO??? Welcome to HIPAA
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Professional Behaviour
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Security Controls – What Works
IS Audit Function Knowledge
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Quality evaluation and improvement for Internal Audit
What is personally identifiable information (PII)? KDE Employee Training Data Security Video Series 1 of 3 October 2014.
Guidance for Managing Third-Party Risk Chicago Region Regulatory Conference Call December 8, 2010.
Business Acquisition Process Implementation & transition Closing Negotiation of the transaction Due Diligence Engagement TargetIdentification.
Vendor Risk: Effective Management is Essential
Internal Auditing and Outsourcing
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Protecting Sensitive Information PA Turnpike Commission.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
SMALL BUSINESS RESOURCE GUIDE CHECKLIST FOR GOING INTO BUSINESS.
The Use of Health Information Technology in Physician Practices
Service Organization Control (SOC) Reporting Options and Information
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
The Policy Company Limited © Control of Infection.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
Contract Administration Stacy Sassman Purchasing Agent Iowa State University Cory Harms Associate Director of Purchasing Iowa State University.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Eliza de Guzman HTM 520 Health Information Exchange.
© Dr. John T. Whiting All Rights Reserved Slide 1 Achieving Compliance with GBLA & Other Laws and Regulations Impacting.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
C4HCO Security and Privacy Discussion Bill Jenkins C4HCO Security and Privacy Officer 16 October 2013.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Information Security IBK3IBV01 College 1 Paul J. Cornelisse / George Pluimakers.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
UNIVERSITY OF DAR ES SALAAM t Selection and Employment of Consultants Negotiations with Consultants; Monitoring Performance of Consultants; Resolving Disputes.
An Overview THE AUDIT PROCESS. MAJOR PHASES IN AN AUDIT Client acceptance and retention Establish terms of the engagement Plan the audit Consider internal.
18-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Internet Payment.
12.2 Conduct Procurements The process of obtaining seller responses, selecting a seller and awarding the contract The team applies selection criteria.
Session 11 Other Assurance Services
Disability Services Agencies Briefing On HIPAA
Colorado “Protections For Consumer Data Privacy” Law
Anatomy of a Common Cyber Attack
Presentation transcript:

Integrating a Vendor Assessment Program Into Your Organization Thomas H. Garrubba Manager - Technical Assessments Group; CVS Caremark

2 Mission and Founding Members Created by industry leaders to provide a standardized, risk-based approach to assess service provider control environments in a rational, cost-effective manner ©2011 The Shared Assessments Program. All Rights Reserved.

3 Common sense answer to complex process Reduces costs Increases efficiencies Global acceptance One-stop shop for meeting federal regulations and international standards Why Shared Assessments? ©2011 The Shared Assessments Program. All Rights Reserved.

4 Why Shared Assessments? Raises the bar on risk management and controls Member-driven, member-funded Used by financial services healthcare telecommunications retail higher education energy others Evolves to ensure relevance ©2011 The Shared Assessments Program. All Rights Reserved.

5 Why Shared Assessments? Efficiency From 1000s of questionnaires to 1 Outsourcers get the information they need immediately Reduce or eliminate audit-related travel time VW's 282 MPG Super Fuel Efficient Car ©2011 The Shared Assessments Program. All Rights Reserved.

Why Shared Assessments? Service providers  Security message = competitive advantage  Evidence available during sales process  Can eliminate pre-sales audits  Can reduce the sales cycle 6 ©2011 The Shared Assessments Program. All Rights Reserved.

One-Stop Shop COBIT PCI-DSS AICPA ISO NIST FFIEC GLBA HIPAA/HITECH UCF 7 ©2011 The Shared Assessments Program. All Rights Reserved.

8 Case Study: CVS Caremark 8 Vendor Assessment Program – Implementation & Current Process ©2011 The Shared Assessments Program. All Rights Reserved.

9 Confidential Data Personally Identifiable Information (PII) Definition:  Includes any information that relates to an individual, whose identity can be either directly or indirectly PII inferred, including any information that is linked or linkable to that individual regardless of the citizenship, age, or other status of the individual. This definition incorporates any patient medical records, protected health information, health care provider records, cardholder data, and employee employment data (including payroll and group health plan information). Examples:  Examples of personally identifiable information include employee badge numbers, Social Security Numbers, driver’s license numbers, patient scripts, plan participant data, and credit card numbers.  Specifically, it incorporates any piece of information that can potentially be used to uniquely identify, contact, or locate an individual, such as name, address, date of birth, mother’s maiden name, telephone number, participant ID number, Rx Number, or patient identifiers.  You will find PII on Caremark participant invoices or on a completed CVS/pharmacy ExtraCare Card application or in a MinuteClinic medical record.

10 Confidential Data Cardholder Data (CHD) aka Payment Card Industry (PCI) Definition:  Credit or debit card information that includes the Primary Account Number (PAN), which is the payment card number (credit or debit) that identifies the issuer and the particular cardholder account. Cardholder Data may also appear in the form of the full PAN and, and at least one of the following: (1) Cardholder name, (2) Expiration Date, or (3) Service Code (Three- or four-digit number on the magnetic-stripe that specifies acceptance requirements and limitations for a magnetic-stripe read transaction). The Payment Card Industry Data Security Standard (PCI-DSS) obligations the Company to protect this information. Note that Cardholder Data is also a type of PII as personal information associated with a credit or debit card. Examples:  Payment Card Receipt  Electronic Payment Card Transaction Record

11 Confidential Data Protected Health Information (PHI, ePHI) Definition:  Any individually identifiable health information transmitted or maintained in any medium, including demographic information that is 1.created or received by a health care provider, health plan or health care clearinghouse and ( 2.relates to past, present or future physical or mental health or condition of an individual, provision of health care to the individual, or payment for the provision of care to the individual, and 3.identifies the individual or includes enough information about the individual so that there is a reasonable basis to believe that the information can be used to identify the individual.  PHI is a subset of PII because PHI is also linked to an individual, PII is considered PHI when linked with health information and is obtained by or on behalf of a health plan or health care provider. For example, when a patient’s name appears on a prescription. One or more PII data elements Examples: Plus one or more health care data elements Examples: NameDisease state AddressPrescription History Date of BirthMedical treatment or diagnosis SSNHealth insurance Identification or account number

12 Confidential Data Medicare Part D Data Description:  Federal regulations require that any vendor who performs any activities outside of the United States in support of Medicare Part D take extraordinary measures to ensure that offshore arrangements protect patient privacy. This requirement extends to any subcontractors used by vendors contracted with CVS Caremark.

13 Confidential Data Sensitive Operational or Financial Information Description  Business Owner will consult with assigned Business Analyst if necessary to determine if the relationship is deemed of financial/operational significance. Examples:  Competitive Pricing  Advertising or Networking  Financial Information  Pricing Data  SEC Filing Data  Intellectual Property

14 Who Do We Assess? Any vendor that performs the following to our data: Collect Destroy Store Transmit/Transport Process Remember: C-D-S-T-P! ©2011 The Shared Assessments Program. All Rights Reserved.

15 Why Do We Assess? To mitigate our exposure to a vendor’s risk to our data ( note : we do not eliminate !)  CVS Caremark – Due Diligence function We create value to the Business Unit and the Company  We provide “peace of mind” to the BU and the Company We look at items that BU’s normally don’t ask for (e.g.., SAS-70’s, P/P’s; Third Party SAS’, P/P’s; NVA/Pen-Tests, etc.)  We provide “consultancy” services to vendors to ensure they hit generally accepted IT Standards ©2011 The Shared Assessments Program. All Rights Reserved.

16 What are We to Assess? At what level do we look at the vendor?  Enterprise?  Geographic?  Business Line  Scope/Solution specific?  Combination of one or more of the above? ©2011 The Shared Assessments Program. All Rights Reserved.

17 Formula for a Successful Program P = p1(p2 + p3) (Mortensen-Garrubba Theorem) P = Program p1 = Policy p2 = Process p3 = Practices ©2011 The Shared Assessments Program. All Rights Reserved.

18 Formula for a Successful Program P = p1 (p2 + p3)  Policy ( can also be an Executive [CxO] Decree promulgated to the Organization) "THOU SHALT…" statement; Must Have in First Position! ©2011 The Shared Assessments Program. All Rights Reserved.

19 Formula for a Successful Program P = p1( p2 + p3)  Process (series of documented actions or operations; Streamlined!) May include items as:  SIG/AUP development and Usage  Internal & external resources  Documentation to review  Turnaround times;  How you communicate with the BU, vendor, your management  How you report to other Senior management levels (a “VAC”)  “Contingent Items”; “Denials”, etc.; ©2011 The Shared Assessments Program. All Rights Reserved.

20 Formula for a Successful Program P = p1(p2 + p3 )  Practices (your way of “doing things”) Making adjustments as needed (notifications; contingent items, etc.) Does not necessarily need to be documented but must be consistent and understood by your management. ©2011 The Shared Assessments Program. All Rights Reserved.

21 Defining Vendor Risks What is your data at risk?  PII?  PHI?  PCI?  Strategic? ©2011 The Shared Assessments Program. All Rights Reserved.

22 Defining Vendor Risk What is your data risk ? Ask yourself…  What is the risk exposure (or “ranking”) to that data?  What is our tolerance of risk?  Is it calculated the same across the board (i.e., same for PII, PHI, PCI, Strategic, etc.)? ©2011 The Shared Assessments Program. All Rights Reserved.

23 VAP Phase 1: Pre-Assessment Obtain all information you can regarding the scope of work for that vendor (read the SOW or contract!) Find out the data that will be CDSTP’ed Converse with the assigned BU and/or the vendor contacts to fully understand ( note : this can be your kickoff meeting!):  What the vendor is doing  Where they will be doing it  How they will be doing it If applicable, determine if the assessment will be handled by an internal or external assessor Send the vendor the SIG questionnaire to be completed Determine if the assessor will perform Agreed Upon Procedures ©2011 The Shared Assessments Program. All Rights Reserved.

24 VAP Phase 2: Assessment If you haven’t had a kickoff meeting yet, now is the time!  Contacts?  Deliverables?  Timelines? Request/Review pertinent documentation:  BU Docs Contracts, SOW’s, NDA’s, BAA’s,  Vendor Docs SAS-70/SSAE-16 /SOC-2 documents; ISO 27001/2 certifications, CMM Level, NAID, URAC, etc. Review the returned SIG Questionnaire responses ©2011 The Shared Assessments Program. All Rights Reserved.

25 VAP Phase 2: Assessment Perform AUP Follow up on any questions regarding SIG responses Inform BU and vendor of any “contingent items” (i.e., audit issues/findings) Have a closing meeting to ensure CI’s are accurate Compose the Assessment Report Send Assessment Report to appropriate management (determined by your organization) File all work papers ©2011 The Shared Assessments Program. All Rights Reserved.

26 VAP Phase 3: Post-Assessment Ensure you have a process to track contingent items Keep VAP management, BU management, and the vendor’s management abreast of the progress or lack there of Get Sr. Level VAP and BU management involved if the vendor is:  Not communicating with you  Refuses to share data with you  Consistently misses remediation dates Review CI remediation documentation and if acceptable, close out the item ©2011 The Shared Assessments Program. All Rights Reserved.

27 Contingent Items Contingent Items = “audit issues/findings”  Require remediation by the vendor or Business Unit If the vendor/BU does not address them in the timely fashion prescribed, the vendor relationship may become in jeopardy!  Should be risk-rated and prioritized as such  Should be actively monitored by the VAP group responsible for closing these items  Should be escalated to appropriate levels of management if the remediation timelines are not met  Adjust the timelines if the vendor cannot reasonably meet the target dates (you need to decide if these timelines should be “set in stone”!) ©2011 The Shared Assessments Program. All Rights Reserved.

28 Contingent Items – 3 Types of CI’s Contractual  Contracts, SOW’s, NDA’s, BAA’s  Incomplete  Out of date HR-Related  Drug testing  Background checks  Credit checks Technical/Operations  Typical IT/Operations-related issues/findings/observations ©2011 The Shared Assessments Program. All Rights Reserved.

29 VAP Phase 3: Post-Assessment Start planning for Reassessment!  Maybe based on type of data (PCI, PHI, etc.)?  Maybe based on the geographic location?  Maybe based on a SIG scoring system?  Maybe based on an aggregate score card? ©2011 The Shared Assessments Program. All Rights Reserved.

30 Other Items - External Assessors These are an extension of your VAP team and should be treated as such  Monitor their progress  Meet with them at least weekly  Ensure they pull you in when the assessment begins to “look bad” (no surprises!) Make sure other vendors will accept their NDA’s  Be prepared for the Legal dept’s to red-line much of the document!  Be prepared to adjust start/end dates  Insist you participate in the closing meetings for key/offshore vendors ©2011 The Shared Assessments Program. All Rights Reserved.

31 Summary: Big "To Do’s” Have executive buy-in (Remember: P1 ! MUST HAVE!) Establish a risk-based approach for prioritizing your assessments Establish core relationships with BUs (streamlines vendor communication); this leads to providing value to the BU Have the business unit (BU) establish initial contact with the vendor (i.e., they write the checks!) and be upfront as to what could happen if the vendor doesn’t meet your organization’s standards or Best Practices Use qualified assessors (CISAs, CISSPs, CRISCs, etc.) ©2011 The Shared Assessments Program. All Rights Reserved.

32 Summary: Big "To Do’s” Establish a follow-up process for contingent items Use the SIG and AUP’s as your primary tools for assessing vendors Follow up on “Yes” and “No” answers in the SIG Share contingent items (“observations,” “issues,” “findings”) with the BU and the vendor When feasible, use established professional assessment firms to assess your key high-risk vendors ©2011 The Shared Assessments Program. All Rights Reserved.

33 Summary: Big “Do Not’s” Treat your VAP as an administrative function Leave your VAP process ad hoc (remember: (p2+p3) )  Formalize it  Document it Keep BUs in the dark during the assessment process Wait too long to publish your assessment to the appropriate personnel  It’s a point in time Treat any vendor assessment as a one-time deal  Schedule a risk-based reassessment ©2011 The Shared Assessments Program. All Rights Reserved.

34 Questions/Answers ©2011 The Shared Assessments Program. All Rights Reserved.

For More Information…  Resources Resources FAQs and tips for getting started Case studies Enterprise Cloud Computing Guide Detailed comparisons with regulations and international standards (HIPAA/HITECH, PCI, ISO, COBIT, NIST)  Members Members Membership: Joyce Crawshaw, Client Relations Manager ; ; Shared Assessments Tools: Brad Keller, Senior Consultant; ;  Partners Partners or call Join us on LinkedIn! ©2011 The Shared Assessments Program. All Rights Reserved.