EDUCAUSE 2002 From Toys to Mobile Tools PDAs in Medical School - Tackling Confidentiality.

Slides:



Advertisements
Similar presentations
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Advertisements

Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Health Insurance Portability and Accountability Act.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Privacy, Security, Confidentiality, and Legal Issues
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Forms Management: Compliance, Security & Workflow Efficiencies.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Project MED INF 403 DL Winter 2008 Group 3. Group Members Michael Crosswhite Maureen Farrell Julia Hernandez R Steven McDonald Jennifer Ogg David Robbins.
Western Asset Protection
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
CSCE 201 Identification and Authentication Fall 2015.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
Protecting PHI & PII 12/30/2017 6:45 AM
DATA SECURITY FOR MEDICAL RESEARCH
East Carolina University
Electronic Records The Systems Concept
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA & PHI TRAINING & AWARENESS
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Designing IIS Security (IIS – Internet Information Service)
The Health Insurance Portability and Accountability Act
Presentation transcript:

EDUCAUSE 2002 From Toys to Mobile Tools PDAs in Medical School - Tackling Confidentiality

From Toys to Mobile Tools EDUCAUSE 2002 Presenters Sharon CollinsComputer Consultant Information Technology & Computing Services East Carolina University Julius Q. MalletteMD FACOG Senior Associate Dean Brody School of Medicine East Carolina University Susan ThorntonComputer Consultant Information Technology & Computer Services Brody School of Medicine East Carolina University

From Toys to Mobile Tools EDUCAUSE 2002 Copyright Statement Copyright Sharon Collins, Julius Q. Mallette and Susan Thornton, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

From Toys to Mobile Tools EDUCAUSE 2002 Introduction East Carolina University has introduced PDAs for medical students, yet answers to questions surrounding patient confidentiality are unclear. How do we enforce students and faculty to keep information on their devices secure and confidential? HIPAA may impose new standards and we must be prepared. This session outlines steps taken to get policies/technology in place.

From Toys to Mobile Tools EDUCAUSE 2002

From Toys to Mobile Tools EDUCAUSE 2002 Number of students What PDA/OS we require What software is available New Toys – New Tricks Introduction to the “Toy”

From Toys to Mobile Tools EDUCAUSE st Year Medical Students 52% 48% 35% 40% 100% Male Female Internet Access PDA Use Wireless Use Percent

From Toys to Mobile Tools EDUCAUSE 2002 Challenges Different types of devices/OS Battery Life By 2003, an estimated 86% of physicians are expected to use PDAs over traditional paper Rx pads Training How to protect patient information that is stored on device How to protect patient information transmitted during synchronization or through wireless

From Toys to Mobile Tools EDUCAUSE 2002 Gearing Up for Confidentiality Institutions must analyze their electronic communication and exchange of health information that occurs over networks and ensure that it includes strong authentication, adequate encryption, and administration of keys and passwords for encryption. During transmission of data, maintain an audit trail Also automatic logoff/lockout after a specified period of inactivity of interaction with that application or device

From Toys to Mobile Tools EDUCAUSE 2002

From Toys to Mobile Tools EDUCAUSE 2002 HIPAA National standards Deploy national standards for electronic data interchange (EDI) across the industry

HIP- HIP- ha -AA? HIPAA’s role in health care and medical education

From Toys to Mobile Tools EDUCAUSE 2002 Protected Health Information Encompasses all individually identifiable health information transmitted or maintained by a covered entity, regardless of form Name Address Birth Date Social Security Number Medical Record Number Telephone Numbers Addresses Names of Relatives URL Address Account Number Certificate/License Number IP Address Finger or Voice Prints Photographic Images Name of Employer Health Plan Beneficiary Number Any Other Unique Identifier

From Toys to Mobile Tools EDUCAUSE 2002 Security Secure electronic individual health information Security is the means to control access to your information

From Toys to Mobile Tools EDUCAUSE 2002 Privacy Ensure uniform privacy related to access and disclosure of patient information Definition of Privacy Privacy is freedom from intrusion into your affairs and the right to maintain control over your information Confidentiality is the organization’s responsibility to limit disclosure of your private matters

From Toys to Mobile Tools EDUCAUSE 2002 Compliance Require documentation of organization-wide compliance with security and privacy regulations When?

From Toys to Mobile Tools EDUCAUSE 2002 OpenPendingSecurity April, 2003December, 2000Privacy October, 2002August, 2000EDI Compliance DateEffective DateHIPAA Component

From Toys to Mobile Tools EDUCAUSE 2002 Penalties HIPAA penalties Unintentional violations could result in fines ranging from $100 - $25,000 for each violation Intentional violations could result in — Up to 10 years imprisonment — Up to $250,000 per offense

From Toys to Mobile Tools EDUCAUSE 2002

From Toys to Mobile Tools EDUCAUSE 2002 Day to Day Operations with HIPAA HIPAA affects the way we work with PDAs Patient scheduling — Office visits — Operating room schedules — Delivery room schedules Education — Conferences — Presentations — Credentialing — Accreditation (LCME)

From Toys to Mobile Tools EDUCAUSE 2002 Education Education of our students, faculty and staff on HIPAA requirements Orientation requirements for students and faculty - confidentiality statement and oath Instruction on the use of security mechanism “…..All that may come to my knowledge in the exercise of my profession or outside of my profession or in daily commerce with men …

From Toys to Mobile Tools EDUCAUSE 2002 “Which ought not to be spread abroad, I will keep secret and will never reveal. If I keep this oath faithfully… May I enjoy my life and practice my art, respected by all men and in all times; but if I swerve from it or violate it, may the reverse be my lot.” Taken from the Oath of Hippocrates circa 400 B.C.

From Toys to Mobile Tools EDUCAUSE 2002 Regulations Information on PDAs related to the following are subject to HIPAA regulations Lab Results  Patient demographics  Charge coding  Prescription writing  Patient tracking programs  Databases

From Toys to Mobile Tools EDUCAUSE 2002 FAQ’s and Future Anticipated Questions (the other FAQ’s) Is it possible that the loss or theft of a PDA could implicate national security?

From Toys to Mobile Tools EDUCAUSE 2002

From Toys to Mobile Tools EDUCAUSE 2002 Don’t Compromise Your PDA! Ownership – who is responsible — IT Managers — Owners What information on the device can be compromised Everything! – Contacts/clients; meetings; patient data; legal and financial information

From Toys to Mobile Tools EDUCAUSE 2002 Guidelines Patient identifiable data on device? — Data should be encrypted and access should be password protected. Patient identifiable data transmitted during synchronization? — Ensure proper user/device authentication before transmitting data and maintain an audit trail. Patient identifiable data transmitted wirelessly? — Ensure proper user/device authentication before transmission, encrypt data during the transmission and maintain an audit trail.

From Toys to Mobile Tools EDUCAUSE 2002 Confidentiality Solutions Passwords – good first line defense User ID/Power – passwords — Alphanumeric — 4 Character — Problems – data not encrypted Security specific software Biometrics

From Toys to Mobile Tools EDUCAUSE 2002 Some Common Sense The lonely PDA…not for long Left on a desk Left on an airplane Dropped from a pocket or bag Stolen! The PDA and all its contents immediately are released to another individual unless protected SECURITY IS PARAMOUNT!

From Toys to Mobile Tools EDUCAUSE 2002 Defense PocketPC: 4-digit userid password Card Backup: backup the databases on a PalmOS device and store them on an expansion card Backup Buddy: performs a complete backup of your entire Palm Computing organizer each and every time you HotSync SecureCard: encrypting a single or multiple files, or the entire card

From Toys to Mobile Tools EDUCAUSE 2002 Beam me – Lose me.. Transmitted Information (Infrared) — Need user and device validation to ensure proper user authentication with the matching device — Maintenance of an audit trail of synchronization

From Toys to Mobile Tools EDUCAUSE 2002 Software Protection EasyLock TealLock

From Toys to Mobile Tools EDUCAUSE 2002 Biometrics Types – signature, fingerprint, voice, face or iris Fingerprint sensor would probably be the most effective Biometrics are natural technologies to use on all handheld devices from cellphones to PDAs to tablets Biometrics solutions: — Indentix — Sign-On — SmartCard

From Toys to Mobile Tools EDUCAUSE 2002 Comparisons SoftwarePricePalmPocketPCStandardEnterpriseFeatures Cloak$19.95XX Password Encrypt database PDA Secure PDA Standard PDA Premium PDA Enterprise $29-$49XXXX Encrypt files/card Protects data stored on expansion memory cards Blocks synchronization/download to a desktop PC Control wireless access Six different encryption standards Secure password and data encryption PDA Defense PDA Defense Stand. PDA Defense Prof. PDA Defense Enter. $ $29.95 XXXX 128-bit encryption Decryption on-demand Hardware button password entry Auto-lock setting Stealth mode Auto-encryption of new databases JotLoc$11.95X Picture based security Lock delay Lock only between certain days Simple to use, low memory footprint

From Toys to Mobile Tools EDUCAUSE 2002 Comparison, cont. SoftwarePricePalmPocketPCStandardEnterpriseFeatures MovianCrypt$39.95XXXX Advanced password security Enterprise IPSec-based software Client PocketLock$19.95XX Seven different encryption standards. Lets you password protect individual files Lets you password entire folders Optional numeric PINS for quick entry SafeGuard Easy$480.00x Symbol PIN or password Choice of different Symbol PIN sets Authenticated ActiveSync connection Emergency mechanisms in case of forgotten passwords Timed delay, alarm or even complete reset wiping all data of the PDA in case of repeated false logon Protection against unauthorized de-installation Encrypted data storage Self extracting encrypted files for secure data exchange with other users Data compression "secure wipe" of files Biometric signature recognition

From Toys to Mobile Tools EDUCAUSE 2002 Are You Protected? Policies Infrastructure/Network Encryption software

From Toys to Mobile Tools EDUCAUSE 2002 PDA Resources American Medical Student Association PDA Resources Brody School of Medicine at East Carolina University PDA resource page: East Carolina University PDA Resource Page Thanks to Laurie Godwin and David Jones from East Carolina University’s University Multimedia Center for assistance in this presentation.