Improving data security and maintaining patient confidentiality in a time of evolving information technology (IT) and limited resources.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Meet Grace! Grace is our newest team member! She is here to make it easier to keep track of all your HR related documents digitally. Grace will always.
Nancy Cole, BS, CTR 1,2 Iris Zachary, MS, CTR, Doctoral Candidate 1,2,3 J. Jackson-Thompson, PhD, MSPH 1,2,3 1 Missouri Cancer Registry and Research Center.
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
Purpose: To: 1) examine participation of target groups (older women, inner city and rural women; African-American women); and 2) assess impact of the “high.
Help Is On The Way: Computer-based Training (CBT) for Non-registry Hospitals Brenda L. Lee, CTR Missouri Cancer Registry University of Missouri-Columbia.
Web Plus Overview Division of Cancer Prevention and Control National Center for Chronic Disease Prevention and Health Promotion CDC Registry Plus Training.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Recruitment and Retention of Tumor Registrars: the Missouri experience J. Jackson-Thompson, MSPH, PhD Sue Vest, BA, CTR Missouri Cancer Registry, University.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Record Management Medical Center Administrative Group Fall Symposium November 15, 2000 University Audit.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Network security policy: best practices
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Creating a Career Track for Cancer Registrars. J. Jackson-Thompson, MSPH, PhD Missouri Cancer Registry, University of Missouri, Columbia
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
Alena Headd, MSIT, Software Support Analyst, Missouri Cancer Registry and Research Center (MCR-ARC) University of Missouri School of Medicine, Health Management.
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
New Data Regulation Law 201 CMR TJX Video.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Security and Privacy Strategic Global Partners, LLC.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
Compliance Strategies for Records Management
IN THE MEANTIME…. INTERIM SOLUTIONS TO AUTOMATED DATA CAPTURE.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
MCR and WebPlus: Melanoma Reporting Nancy Cole, Missouri Cancer Registry.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
ABSTRACT Background: In late 2003, a group of Centers for Disease Control and Prevention/National Program of Cancer Registries (CDC/NPCR) staff and faculty/staff.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
SPH Information Security Update September 10, 2010.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Data Sources-Cancer Betsy A. Kohler, MPH, CTR Director, Cancer Epidemiology Services New Jersey Department of Health and Senior Services.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
J. Rick Mihalevich Dean of Information Technology Linn State Technical College June 18, 2009.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Say Goodbye to Paper: Web-Based Reporting is Here! Iris Zachary, MS, CTR, Missouri Cancer Registry.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Integrating Central and Hospital Registries To Improve Timeliness and Data Quality (The Central Cancer Registry as a Hub for Data Exchange) David Rousseau,
Scott Van Heest IT Specialist NAACCR 2010, Quebec City, Canada June 24, 2010 Central Cancer Registry: Data Security The Reporting of Veterans Health Administration.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Scott Van Heest IT Specialist, Data Analysis and Support Team, NPCR, CDC Denise Farmer CDC/NPCR Contractor Division of Cancer Prevention and Control National.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NPCR – Advancing E-cancer Reporting and Registry Operations (NPCR-AERRO): An Update on Innovative Activities NAACCR Annual Conference June 16, 2009 Sandy.
Innovations in Training and Education. How to Stretch Budgets without Stressing Staff J. Jackson-Thompson, MSPH, PhD Missouri Cancer Registry, University.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Chapter 7. Identifying Assets and Activities to Be Protected
ELECTRONIC RETURN ORIGINATOR (ERO) (Transmitter in Tax-Wise)
Web Plus Version 2: Secure Web-based Functions For Death Certificate and Pathology Lab Follow-back Efforts Kathleen Thoburn, Sanjeev Baral (CDC/NPCR.
Introduction to the Federal Defense Acquisition Regulation
Awatef Ahmed Ben Ramadan
Move this to online module slides 11-56
Move this to online module slides 11-56
Introduction to the PACS Security
TRACE INITIATIVE: Confidentiality, Data Security, and Procedures for Protocol Violation or Adverse Event.
School of Medicine Orientation Information Security Training
Presentation transcript:

Improving data security and maintaining patient confidentiality in a time of evolving information technology (IT) and limited resources

J. Jackson-Thompson, MSPH, PhD Operations Director, Missouri Cancer Registry and Research Associate Professor, Health Management & Informatics, University of Missouri- Columbia

Acknowledgments Co-author: Nancy Cole, BS, CTR, MCR Operations Manager MCR Staff – Saba Yemane, BA, BS, Database Manager – Iris Zachary, CTR, MS (Informatics), Asst DBM – Alena Headd, MSIT Systems Analyst University of Missouri IT Security Team

This project was supported in part by a cooperative agreement between the Centers for Disease Control and Prevention (CDC) and the Missouri Department of Health and Senior Services (DHSS) (U58/DP /3) and a Surveillance contract between DHSS and the University of Missouri. No personal financial relationships with commercial interests relevant to this presentation existed during the past 12 months.

Background All U.S. states and Canadian provinces maintain a central cancer registry (CCR) that collects information on all (≥ 95%) new cases of cancer. All CCRs collect demographic, tumor & treatment data on each case, using – text and standard codes – standard data layout.

Background: Uses of CCR Data Public health surveillance – Cancer incidence/trends by race, gender, age group, specific site, stage at diagnosis, etc.; Program evaluation; Research – QOL, patterns of care studies, etc.

CCRs are required to: Meet national standards for completeness, timeliness & quality – e.g., NAACCR, CDC/NPCR, NCI/SEER Protect patient and provider confidentiality – Specific state & federal statutes/laws/regs Maintain data security – Some guidelines

MCR Data Process > 50-60,000+ records/year – c. 29,000 MO incident cases – Data exchange w/ 20 states Database >1 million records ( ) – Population-based since 1985 – NPCR reference year 1996

MCR Software Registry Plus suite of products – Started w/ Abstract Plus, then Web Plus & Link Plus – Switched to CRS Plus in 2007 Use other software as needed – SEERStat* and SAS for data analysis – MoveIT for importing VA data

MCR Approach to Data Security Similar to reporting of cancer cases: – Report not because of a law but so we can work together for better patient outcomes. Be vigilant about data security not based on statutory & contractual obligations but because it is the right thing to do: – Reporting facilities & cancer patients trust us.

MCR Concerns Minimal IT input on MCR software, hardware or data flow since 2005; No strong passwords on Registry Plus products: – Web +, CRS +, Abstract +, Prep + Strong passwords not on all laptops: – Passwords taped to some laptops.

Purpose of Presentation To describe steps taken by MCR to assess and improve the security of data, systems and processes.

Methods Reviewed MCR’s security processes and procedures. Identified and assessed data security measures already in place. Measures: – Designed to cover all data, electronic or paper – Included Policies and Procedures that were updated as needed

Examples of Data Policies and Procedures No PHI on thumb drives No PHI in s or attachments Lock file cabinets & offices Only MCR staff have keys to MCR offices Send charts/records to PO Box or by FedEx Carry mail & data in locked bags

Data Security Measures Ongoing training for staff All MCR staff reminded annually by signing: – Confidentiality agreement; – Acknowledgment of state and federal laws about penalties; and – MCR laptop security policy. “The Security Mouse was here”

Weather alert changed MCR’s paper-handling policies Tornado drill – staff from another unit directed to MCR office Led to changes: – Change in drill location – More locking cabinets – Lock doors if leave – No papers visible – Cross-cut shredder

Actions re. electronic data security Requested that the University of Missouri’s (MU) IT security team audit our systems & business practices.

Data Security Structure MU – IT: dept, campus and hospital – Servers housed off- site in 24/7 IT facility – Most reporting facilities use Web Plus (VA hospitals use MoveIT) DHSS/State Office of Administration – SFTP site folder restrictions at DHSS – BCCCP data – Some path lab data (PHIN/MS)

MU Information Security Program System initiative - all 4 campuses MCR & IT Security Team met to review issues: – Data classification systems – General security procedures strong passwords, encryption, etc. – Workplace security manual – Audits

Steps for each phase of security inspection program Identification Coordination Inspection Evaluation Recommendation Repetition

What IT Audit Includes Hard drive security Data flow Applications Desktop risks Firewall issues with individual computers Hardening operating system Laptop & jump drive encryption Virtual servers

Audit priorities established Start with Web Plus: – Considered MCR’s most vulnerable area by Audit team – Concern about text fields – places where hackers could include hazardous characters.

First phase: Applications – Web Plus Audit Facility abstractor/uploader and central administrator/central abstractor/reviewer. – 52 hours of testing using an automated vulnerability scanner and manual inspection of web pages. Results: 4 high-risk vulnerabilities, several moderate risks. Auditor comments: – “ Went better than expected.” – “Web Plus is a good application.”

Web Plus Audit - continued Results sent to CDC – High-risk vulnerabilities & some moderate risks fixed immediately – Requested 2 nd scan to test fixes Second scan results – No high-risk vulnerabilities detected – Fixes on moderate risks also worked Remaining moderate risks fixed.

Second Phase: Hardening operating systems Server audit issues related to: – Configuration Proper port use, etc. – Management Managing administrative infrastructure Controlled access to file system & resources Process is ongoing (virtual servers)

Next Steps Increase security on mobile devices (Laptops, external hard drives, etc.): – Identify & purchase encryption software Consider alternatives: – Remote access reduces need for abstracting software (and PHI) on laptops.

Future Steps Research use of encryption software for desktop computers: – TruCrypt (an open-source software) – Other options Determine security level of networked drive.

Other Security Concerns Physical space: – MCR has P & Ps for off-site and commuting staff – MCR developed P & Ps for paper containing PHI, locking office, etc. – Audit of MCR’s space by MU Security requested 10/09 Attempt to kick in door

Recommendations Start with your institution’s P&Ps: – CCR’s may need to be more restrictive. Use CDC/NPCR or other guidance. Annually, require that CCR staff sign: – Confidentiality agreement; – Acknowledgments of state and federal laws about penalties; and – CCR security policy.

Recommendations continued Look for opportunities to further employee awareness: – Items in the news, etc. – Computer stolen from unsecured work station. Learn from other organizations’ practices and mistakes.

Conclusions Frequent review of security processes and business practices is needed to maintain data security. Many improvements involve minimal cost; others require funding.

Causes of Data Breaches Private files available in public spaces. Unused files with personal information. Lost or stolen laptops. Old or unused equipment without updated security protection. Sending files/allowing file access to wrong (reporting) facility.

You think you are secure! “…no matter how secure you are you fundamentally still are at risk.” – Howard, Schmidt, a former Bush cyber-security adviser, now president of the Information Security Forum. February 23, 2009 – fcw.com “The only way to 100 percent protect yourself from attacks is to turn off your computers.” – Dan Chenok, chairman of the Information Security and Privacy Advisory Board, an advisory panel to NIST. February 23, 2009 – fcw.com

Resources CDC/NPCR Data Security: For complete details about MU’s Information Security program: Federal Computer Week - Complimentary paper subscriptions, also available on-line. Variety of topics, including security:

MU IT security team Manager - Brandon Hough Auditors - – Tyler Hargis – Michael Morrison – Caine Henderson – Sara Rohrs Audit coordinator - Becky Fowler Safety awareness - Kristy White Account management: – Megan Hartz – Joanne Boomer