The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
David Assee BBA, MCSE Florida International University
Hipaa privacy and Security
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Security Controls – What Works
Information Security Policies and Standards
Computer Security: Principles and Practice
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Information Security Technological Security Implementation and Privacy Protection.
Information Security Issues at Casinos and eGaming
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA COMPLIANCE WITH DELL
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
What to Expect and How to Prepare: Healthcare Security & Privacy Regulation and Enforcement in 2015 and Beyond.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Eliza de Guzman HTM 520 Health Information Exchange.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
 Secure resident safety  Assess the resident, provide medical and/or psychosocial treatment as necessary  Examine the resident’s injury and/or psychosocial.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
1 HIPAA Privacy Rule Clean-Up Following Compliance Date Tracie Hanna & Emily McConkey American Republic Insurance Company.
iSecurity Compliance with HIPAA
Identity and Access Management
Policy & Procedure Writing
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Introduction to the Federal Defense Acquisition Regulation
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
COMING TO THE HIPAA PARTY: TIPS FOR IT SUPERHEROES &
Paul T. Smith Davis Wright Tremaine LLP
Offline Auditing for Privacy
A Tale of Snooping: Lessons Learned the Hard Way Nebraska Rural Health Association September 21, 2015 Vickie B. Ahlers Baird Holm LLP
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
County HIPAA Review All Rights Reserved 2002.
The Practical Side of Meaningful Use:
Cyber security Policy development and implementation
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
UNUSUAL INCIDENT REPORTS AND MAJOR UNUSUAL INCIDENTS
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Privacy and Security Update - 5 Years After Implementation
Introduction to the PACS Security
Presentation transcript:

The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture Presented By Tim Burris Product Manager, Iatric Systems

Today’s Speaker Tim Burris Product Manager Iatric Systems

The Privacy Cycle Continuous process that relates regulations to meaningful actions in Healthcare organizations

5 Key Steps to the Privacy Cycle Policy and Procedure Review Auditing Documentation Trend Analysis Corrective Action

Step 1 Policy & Procedure Review

Step 1: Policy & Procedure Review Know Your Regulatory Requirements HIPAA Security Rule, 45 CFR 164.308(a)(1)(i) Security management process Organizations must implement policies and procedures to prevent, detect, contain and correct security violations HIPAA Security Rule, 45 CFR 164.312(b) Audit controls Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI HIPAA Security Rule, 308(a)(1)(ii)(D) Information system activity review Implement procedures to regularly review records of information systems activity, such as audit logs, access reports, and security incident tracking reports

Step 1: Policy & Procedure Review OCR Guidance It is imperative for Covered Entities and Business Associates to review their audit trails regularly, both particularly after security incidents or breaches, and during real-time operations. Regular review of information system activity should promote awareness of any information system activity that could suggest a security incident or breach.

Step 1: Policy & Procedure Review Considerations Determine “reasonable and appropriate” measures to implement Conduct a comprehensive Risk Assessment Risk vs. Likelihood Additional Considerations: Technical infrastructure Software capabilities Staffing and expertise

Step 1: Policy & Procedure Review Considerations Effective and Enforceable Include Process to Routinely Review Remember the Real Goal – Promote Culture

Step 2 Auditing

Step 2: Auditing Know Your Data Use Risk Assessment results to determine what systems need to be routinely audited What systems are within scope What is the overall risk of each system What audit tools/features are available

Step 2: Auditing Know Your Users Do you know who is using these systems? (Accountability) What details do you have on each system user (Identity Management) Consider Non-employees, Physicians, Contractors, and Students Have you documented what each user or role should have access to?

Step 2: Auditing Develop a Sustainable Program Who is responsible? Scope of Audits Frequency of Audits Procedures for investigation, escalation, and follow-up Example — Weekly proactive auditing program with procedures for investigation of complaints or issues related to known security incidents.

Step 2: Auditing Proactive Auditing – What To Look For Known relationships Neighbor, Coworker, Relative, Roommate, etc. Suspicious Access Volumes Number of Logs Generated Number of Unique Patients Accessed Irregular Behaviors Suspicious screens or events for a specific job title. (Registrar Accessing Clinical Notes/Orders)

Step 2: Auditing Consider Audit Solutions A comprehensive audit solution can help save a lot of time by consolidating systems and helping to automate detection of suspicious activity

Step 3 Documentation

Step 3: Documentation Types of documentation Incident documentation This documentation should provide details of every investigated incident. May also include investigations that resulted in no inappropriate actions. Breach Risk Assessment This is used to determine if a confirmed incident is an actionable breach Breach Documentation Specifically included those incidents that identified a reportable breach Documentation of Breach notification actions Record when were required notifications were provided.

Step 3: Documentation Document considerations Capture additional information that could benefit later review How the incident was identified? Details about the user — Job Title, Department, Hire Date, and Shift Relationship between user and patient

Step 4 Research & Trend Analysis

Step 4: Research & Trend Analysis Routine Review Review documentation over time to identify trends in data

Step 4: Research & Trend Analysis Predict Future Incidents Who Patterns in Job Title, Role, Age Group, Experience, Hire Date, etc. What What parts of chart are viewed, or what data is typically accessed as a part of an inappropriate event When Most common times when incidents occur Where Facilities, departments, workstations, or remote workplaces that have the most incidents Why Determine motives – Snooping, Bored, Names in Media, Local VIPs/Celebrities, Information harvesting, malicious intent How What systems are they using? What path do they take? Do they take precautions to minimize their risk? Do they bypass securities? Are they exploiting a particular feature or function?

Step 5 Corrective Action

Step 5: Corrective Action Sanctions An effective and consistent sanction policy should be a priority

Step 5: Corrective Action Goes beyond sanctions What improvements can we make to prevent incidents in the future? Consider HIPAA Administrative, Technical, and Physical Safeguards Administrative Policies written and communicated effectively Training and awareness programs Identity & Access Management Technical Accounts configured with least privilege necessary Role based access controls Technology to detect future incidents of this type Physical Devices in private locations Workstation and screen positioning

Rinse and Repeat Policies Auditing Documentation Trend Analysis Corrective Action

Questions & Discussion

Takeaways Strategy to tie Policies and Procedures to an effective, continuous process to improve your organizations Privacy Culture Tips for building a successful proactive auditing and documentation program An approach to routinely analyze incidents for patterns so that future incidents can be prevented through realistic corrective action measures