K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
COMP 110: Introduction to Programming Tyler Johnson Apr 27, 2009 MWF 11:00AM-12:15PM Sitterson 014.
Laptop Security in the current IT world W3 group.
HIPAA Security.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
1. (c) Alan Rowley Associates Laboratory Accreditation Dr Alan G Rowley Quality Policy based on Quality Objectives Quality Management System Communicate.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security, Confidentiality, and Legal Issues
Data Classification & Privacy Inventory Workshop
Security Controls – What Works
Information Security Policies and Standards
Welcome to New Hire Orientation Information Security
Developing a Records & Information Retention & Disposition Program:
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Factors to be taken into account when designing ICT Security Policies
Session 3 – Information Security Policies
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Security Technological Security Implementation and Privacy Protection.
General Awareness Training
Learning Objectives Discuss measures to address: –Physical Security –Technical Security –Administrative Security.
Electronic Records Management: What Management Needs to Know May 2009.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2011 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 3: A Blueprint for Compliance with the Privacy Rule.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Information Security and Privacy in HRIS
Wednesday, November 7, 2012.
E&O Risk Management: Meeting the Challenge of Change
Chapter 3: IRS and FTC Data Security Rules
Unit 7 – Organisational Systems Security
Move this to online module slides 11-56
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Information Security Awareness
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
How it affects policies and procedures
Introduction to the PACS Security
School of Medicine Orientation Information Security Training
Presentation transcript:

K eep I t C onfidential Prepared by: Security Architecture Collaboration Team

Data Confidentiality What data is considered confidential? Data Classification – Public Campus maps – Sensitive Contractual obligation to protect Right to Know – Restricted Required by law – HIPAA – FERPA 05/15/20092

Data Confidentiality Remember the 3R’s – Roles – Rules – Responsibility 05/15/20093

Roles System Administrator/Technical Management Faculty Student Staff 05/15/20094

Rules PASSHE Policy Employment Contract Confidentiality Policy Risk Assessment 05/15/20095

Responsibility Everyone 05/15/20096

Responsibility Individual accountability System Administrators and Managers – Responsible for safeguarding confidential data – Responsible for compliance – Responsible for persons under their supervision Faculty – Responsible for confidential data to which they have access Bio/Demo data (including DOB and SSN) Student Grades and historical data Students – Responsible for managing their own confidential data Log out of session Do not share passwords Staff – Responsible for confidential data to which they have access Bio/Demo data (including DOB and SSN) Student Grades and historical data Salary Information 05/15/20097

User Security Awareness Topics – Password use and management – Virus protection – Phishing/Spam – Laptop/Handheld Device – Access privileges – Data backup and storage – Incident response 05/15/20098

Security Breaches Follow designated policies and procedures 05/15/20099

Misuse Penalties Civil and Criminal Conflict of Interest Disciplinary Action 05/15/200910

Checklist Policies and procedures are in place Data submissions are fully protected Data encryption Data transfer agreement Penalties for misuse are in writing and are enforced Access to data is restricted based on University role Electronic Data storage areas Employees sign and understand confidentiality agreement 05/15/200911

Checklist Timely threat notifications Security Breaches Affects institutions’ finances, productivity and credibility Cybercrime Hacking Malware Phishing USB drives 05/15/200912

Checklist Training program has been developed Re-training conducted based on performance Routine evaluations are conducted Developed a disaster and recovery plan Firewalls are in place Routine virus checking, system audits and diagnostics Data retention schedule 05/15/200913

Checklist Notation on all records containing identifiable data (e.g. confidentiality reminder) Telecommuting and home offices Same level of security Additional safeguards Minimal data on home computer Security Software Password control Secure transport from one location to another 05/15/200914

Checklist Open-access area security Written data not left out in the open Log out of sessions Fax/Copy machines Secure area Cover sheets De-program to recover confidential information Established document disposal procedures Protection of hard copy information Written consent to release to outside agencies Double check before providing information 05/15/200915

Confidentiality Agreement 05/15/200916

Resources PASSHE National Cyber Security Alliance (NCSA) 05/15/200917