Top Banner
© CSOHIMSS 2011 Slide 1 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011 Presented by: Mac McMillan CEO CynergisTek, Inc. Chair, HIMSS Privacy & Security Task Force IT Security in a Meaningful Use Era C&SO HIMSS Meeting October 21, 2011
32

IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

Jul 07, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 1 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Presented by:

Mac McMillan

CEO CynergisTek, Inc.

Chair, HIMSS Privacy & Security Task Force

IT Security in a Meaningful

Use Era

C&SO HIMSS Meeting

October 21, 2011

Page 2: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 2 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Discussion Guide

Introduction

2

• Meaningful Use & Security

• HIPAA/HITECH

Compliance

• Health Information

Exchange Implications

Mac McMillan

CEO CynergisTek, Inc.

Chair, HIMSS Privacy & Security

Policy Task Force

Page 3: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 3 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Why is Data Security Important?

Page 4: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 4 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Why Health Data Exists

4

• People choose to disclose their most intimate information in order to get healthy

• Doctors earn their trust by guaranteeing privacy

• Privacy is achieved by properly protecting systems and information

• Breaches of security and privacy affect patient confidence

• No confidence people avoid treatment, lie or omit information, opt-out, and potentially GET SICKER.

• No one should ever have to choose between getting healthcare and privacy. We all deserve both.

Page 5: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 5 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Threats Are Increasing

5

• Good news – few exposed identities

• Bad news – the number of breaches is high (reporting mandates is part contributor)

Internet Security Threat Report

Page 6: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 6 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Consumer Expectations

6

• Individuals should have means of direct, secure access to e-health information

• Individuals should know how their e-health information may be used and who has access to it

• Individuals should have control over whether and how their information is shared

• Systems for e-health data exchange must protect the integrity, security, privacy and confidentiality of an individual’s information

• Governance and administration of e-health networks should be transparent and publicly accountable

Page 7: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 7 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

A Perception of Insecurity

7

• Public distrust of government/corporate management of data:

• Business associate for Stanford Hospital exposes 20,000 patient’s information for more than a year

• Business associate of Tricare exposes 4.9 Million patients data

• Business associate of HealthNet losses nine servers from data center

• 330 major breaches since 2009 involving over 11.8 Million individuals

Page 8: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 8 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Healthcare Concerns

8

• Pervasiveness of information being made available electronically has made Healthcare a target of cybercriminals. (1 in 6 attacks in 2009 were HC, greatest growth in attacks in 2010 in HC)

• In general Healthcare faces bigger risks going forward than the financial or retail sectors because the information they have is more valuable and theres greater access.

• Cybercrime in Healthcare is in its infancy, but only because health information sharing is in its infancy, it will grow with the opportunity.

Page 9: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 9 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Affect of State Breach Laws

9

• NEW State Breach Laws:

• CA SB 24 – Last of five breach notification laws in California requiring notification to State AG if breach affects more than 500 individual records

• TX HB 300 – Texas medical records privacy law that requires notifications to individuals in all 50 states of a breach by any company doing business in Texas

• Federal/State laws concerning HIV. Mental Health, Substance Abuse, etc.

Page 10: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 10 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use

Page 11: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 11 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use Privacy & Security

11

• Meaningful Use means providers need to show they are using certified EHR technology in ways that can be measured in quality and quantity.

• The requirement is the same as under the original HIPAA security rule; provide for the confidentiality, integrity and availability of ePHI.

• Attestation is different from compliance with HIPAA. One is a formal statement of eligibility to receive Federal funding, the other readiness with respect to a compliance standard.

• Both Stage 1 and 2 are focused primarily on adoption and implementation of an EHR.

Page 12: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 12 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use Stage 1

12

• Privacy & Security

– Conduct, or review, a risk assessment in accordance with 45 CFR 164.308(a)(1)

– Remediate deficiencies identified prior to or during the attestation period

• EHR Security Functionality

– Access control

– Emergency access

– Automatic log off

– Audit logs

– Integrity

– Authentication

– General encryption

– Encryption when exchanging information

– Accounting of disclosures

Page 13: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 13 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use Privacy & Security

13

• Common areas of concern in MU risk analysis:

• Incomplete risk analysis scope

• Insufficient documentation

• Use of generic accounts

• Lack of system activity review

• Lack of encryption or compensatory measures

Page 14: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 14 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use Privacy & Security

14

• Meaningful Use Stage 2 privacy and security requirements added last week during Health Information Technology Standards Committee.

• Reinforced requirements already levied such as risk analysis and enablement of security functionality.

• Recommends additional requirements for encryption, authentication and auditing.

Page 15: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 15 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use Stage 2

15

• Privacy & Security

– Patients are offered secure messaging online and at least 25 patients have sent secure messages on line

– Patient portal controls:

– Single Factor Authentication

– Audit trail for access

– Establish data provenance

– Secure download ability

– Warning message before downloading PHI

• Privacy & Security

– Perform, or update, security risk assessment and address deficiencies

– Address encryption for data at rest, in data centers and on mobile devices (e.g. Laptops, PDAs, etc.)

– EPs and EHs attest to this policy

Page 16: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 16 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Meaningful Use Stage 2

16

• Privacy & Security

– 2-Factor authentication for controlled substances

– Entity level digital certificates

– Capability to detect and block programmatic attacks or attacks from a known, but unauthorized user (such as auto lock out after a certain number of attempts)

Page 17: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 17 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH

Page 18: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 18 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH Security

18

• Recurring challenges in data security:

• Two thirds of all breaches still result from non encrypted devices and media

• Inadequate risk assessment, evaluation or system activity monitoring

• Inadequate/reactive auditing

• Lack of readiness or inability to demonstrate processes/compliance

• Unsupported systems and applications

Page 19: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 19 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH Security

19

• Recurring challenges in data security:

• Lack of entity authentication/weak security on wireless segments

• Lack of auditing of users with elevated privileges

• Unfiltered web mail and social media outlets

• Over reliance on generic logins

• Transmission security vulnerabilities

• Device and media security weaknesses

• Inadequate vender management

Page 20: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 20 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH Security

20

• Vender breaches account for nearly 42% of all breaches now. Vender management needs to improve:

• Data Access – Minimum Necessary

• Data Retention Policy - Termination

• Technological Infrastructure – Integrity/3rd Parties

• Business Continuity – Procedures/Tests

• Incident Response Plan - Notifications

Page 21: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 21 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH Security

21

• Common trends from security surveys:

• Half of respondents say their organization’s ability to counter threats is less than adequate

• 25% report they have suffered breaches

• The single biggest concerns are mistakes by staff followed closely by insider threats

• User education is generally viewed as ineffective

Page 22: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 22 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH Security

22

• Steps to improve readiness/reduce risks:

• Conduct a thorough risk assessment/use third party for objectivity/due diligence

• Develop detailed remediation roadmap/create ongoing project

• Ensure IT security personnel receive appropriate training

• Implement robust system and user audit practices

• Implement rigorous vender management

Page 23: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 23 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIPAA & HITECH Security

23

• Technologies you should be considering:

• Encryption

• Privacy audit monitoring

• Network log monitoring

• Intrusion Detection Systems

• Data Loss Prevention

• Security Incident Event Monitoring

• Network Access Control

Page 24: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 24 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

HIE Privacy & Security Considerations

Page 25: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 25 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Increased Risk

25

• Data aggregation accentuates risk:

• Data aggregations increases the value of the centralized store thereby creating a lucrative target for attackers

• Increases the number of legitimate users who access the centralized store thereby multiplying the number attack vectors

• Creates attractive target for others requesting access to information for non healthcare related purposes

Page 26: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 26 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Privacy & Security Considerations

26

• Legal issues

– Variations in State Laws

– Other Federal Laws

– Participation Agreements

– Business Associate Agreements

Page 27: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 27 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Privacy & Security Considerations

27

• Minimum Necessary

– Routine releases/access

– Non-Routine releases/access

– Limited Data Set vs Minimum Necessary

• Access to Health Information

– Authorization

– Audit & Accounting

– Patient Access

– Designated Record Set

Page 28: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 28 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Privacy & Security Considerations

28

• Identity Management

– Patient identification processes

– Privacy concerns (accuracy/exposure)

– Search rules narrowly defined

• Opt-in/Opt-out

– Defined process/decision points

– Federal/State preemption analysis

– Patient education

Page 29: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 29 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Privacy & Security Considerations

29

• Quality of Information

– Standards for content/definitions

– Participants responsibility

– A common dictionary

• Security & Communications

– A common framework for controls

– EHR certification standards

– Consistent risk management approach

Page 30: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 30 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Privacy & Security Considerations

30

• Other Operational Impacts

– Multistate Considerations

– HIV, Mental, Substance Abuse Data

• Patient Education

– Consumer Trust Issues

– Quality of Care Benefits

– Patient Rights

Page 31: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 31 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Questions

Page 32: IT Security in a Meaningful Use Eras3.amazonaws.com/rdcms-himss/files/production/... · © CSOHIMSS 2011 Slide 2 October 21, 2011 Health Care Quality, Security and HIE Synergy 2011

© CSOHIMSS 2011 Slide 32 Health Care Quality, Security and HIE Synergy 2011 October 21, 2011

Thank you.

For Additional Information please contact:

32

Mac McMillan [email protected]

(512) 402-8555

Stephanie.crabb [email protected]

om

(954)298.4702