Risk assessment of integrated Electronic Health Records EFMI STC 2010 – 3 June 2010 Gudlaug Sigurdardottir Bjarni Thor Bjornsson.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. MEDICAL LAW Medical law is the branch of law which concerns the rights and responsibilities of medical.
Advertisements

Developing a Risk-Based Information Security Program
PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. LEARNING LOG What is the difference between laws and ethics? Who comes up with the laws? Who comes up with.
Effective Design of Trusted Information Systems Luděk Novák,
EFFECTIVE DELEGATION AND SUPERVISION
Security Controls – What Works
Laboratory Personnel Dr/Ehsan Moahmen Rizk.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
First Practice - Information Security Management System Implementation and ISO Certification.
Purpose of the Standards
Session 3 – Information Security Policies
Building Public Health / Clinical Health Information Exchanges: The Minnesota Experience Marty LaVenture, MPH, PhD Director, Center for Health Informatics.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
Internal Auditing and Outsourcing
Information Asset Classification
Lecture 14 Policy, Legal, and Regulatory Issues in HIS (Chapters 18,19,20)
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
Evolving IT Framework Standards (Compliance and IT)
HIPAA PRIVACY AND SECURITY AWARENESS.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Community Paramedic. Benchmark 101 We need a description of the epidemiology of the medical conditions targeted by the community paramedicine program.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Local Public Health System Assessment using the NPHPSP Local Instrument Essential Service 6 Enforce Laws and Regulations that Protect Health and Ensure.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
A major step towards a Europe for Health Directive on patients’ rights in cross-border healthcare DG SANCO D2 Healthcare Systems.
Chapter 6 – Data Handling and EPR. Electronic Health Record Systems: Government Initiatives and Public/Private Partnerships EHR is systematic collection.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Por Guan Xiong PROJECT OBJECTIVES To develop a sense of ‘keNegaraan’, collaboration, responsibility and ownership to the communities during.
CiTiZEN Group Member: Chew Swee Guan Goh Si Hui
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Environmental Management System Definitions
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Introduction to Information Security
Your Answer to All Things EHR.  Federally-designated Regional Extension Center for the State of Missouri  University of Missouri:  Department of Health.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Linking the learning to the National Standards for Safer Better Healthcare Joan Heffernan Inspector Manager Regulation – Healthcare Health Information.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Chapter 3-Auditing Computer-based Information Systems.
Information Security tools for records managers Frank Rankin.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. MEDICAL LAW Medical law is the branch of law which concerns the rights and responsibilities of medical.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
EFFECTIVE DELEGATION AND SUPERVISION
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
IS Risk Management Report (Template)
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Awareness and Auditor training kit
Presentation transcript:

Risk assessment of integrated Electronic Health Records EFMI STC 2010 – 3 June 2010 Gudlaug Sigurdardottir Bjarni Thor Bjornsson

Introduction Electronic Health Record (EHR) systems and network must fulfill demands of modern society New legislation in Iceland allows sharing of health information between institutions Security must be guaranteed Security requirements and risk assessment

Legislative requirements Opens the door for information sharing between health information systems –Results in a better and more secure public health care service since information is available when required on a need-to-know basis –Security guarantees and adherence to the Personal Data Act legislation are prerequisites for information sharing and integration of systems –Allows for public access to EHR information through health information gateways

Future Vision Greater interaction between different EHR systems Interoperable EHRs will appear as a unified view of all health care data Health care professionals will have all the necessary data available when needed The public will be able to monitor their EHRs directly via Internet access

EHR integration and users Electronic Health Record keepers Private Practices Private Practices Community Health Centers Hospitals Other health care providers Governmental Authorities The Directorate of Health Internetwork Access control DB Health care professionals Supervisory authorities Public access

EHR related security issues Highly critical, personal and sensitive information Falls under the act and regulations on the protection and processing of personal data Great demand on having EHRs easily accessible for health care providers Privacy concerns need to be addressed with adequate controls to minimize risk of misuse and accidental disclosure Information can be categorized and access restriction imposed on a system-by-system or even record-by-record basis

Risk management methodology Important to use a standardized, systematic method The ISO/IEC 27005:2008 guidelines for information security risk management provides a standardized methodology Takes into account all aspects of the risk assessment requirements of the ISO/IEC security standard

Risk assessment – step by step Define the scope and criteria Identify assets and their value Identify and evaluate threats Evaluate and manage risk – risk treatment boundaries

Define scope and criteria Identify in-scope systems, services, procedures etc. Define boundaries Risk criteria, level of acceptable risk Scope and Criteria

Identify assets and their value

Identify and evaluate threats

Outcome of risk assessment

Risk treatment process Risk evaluation 1. Select risk treatment option Risk communication Risk monitoring and review 2. Define the risk treatment plan 3. Calculation of the residual risk 4. Acceptance of residual risk

Reducing risk Select and implement controls to reduce risk

Risk acceptance – Security awareness After completing the risk treatment it is important to obtain management approval of the proposed residual risk Plan Risk assessment Do Implement risk treatment plan Check Continual monitoring and reviewing of risk Act Maintain and improve Risk communication, monitoring and reviewing of risk is important for the security awareness and for continuous improvements in risk management

Conclusion EHR integration, increased interoperability and access are important steps in advancing the state of health care services By applying best practices, using an information security management system, performing regular risk assessments, and adhering to international standards, these steps can be safely realized The result will be a better and more secure health care system for the benefit of the public

Thank you All screenshots in presentation are from RM Studio, a risk management software provided by Stiki