Overview of IT - Compliance - C1
Overview of IT - Compliance - C1
Overview of IT - Compliance - C1
An Overview
https://www.youtube.com/watch?
v=ZUrNwo6Rlsc
Motivation
Objective
Guarantee health insurance coverage of employees
Reduce health care fraud and abuse
Protect the health information of individuals against
access without consent or authorization
Health Insurance Portability and
Accountability Act of 1996 (HIPAA)
15
HIPPA: What are the Information Security
Standards for Protection of ePHI?
16
HIPPA: What are the Federal Security
Rule - General Requirements
Ensure the “CIA” (confidentiality, integrity and availability) of all
electronic protected health information (ePHI) that the covered
entity creates, receives, maintains, or transmits.
Protect against reasonably anticipated threats or hazards to
the security or integrity of ePHI, e.g., hackers, virus, data
back-ups
Protect against unauthorized disclosures
Train workforce members (“awareness of good computing
practices”)
17
HIPPA: Who is a “Covered Entity”?
HIPAA's regulations directly cover three basic groups of
individual or corporate entities: health care providers,
health plans, and health care clearinghouses.
Health Care Provider means a provider of medical or health
services, and entities who furnishes, bills, or is paid for
health care in the normal course of business
Health Plan means any individual or group that provides or
pays for the cost of medical care, including employee
benefit plans
Healthcare Clearinghouse means an entity that either
processes or facilitates the processing of health information,
e.g., billing service, re-pricing company
18
HIPPA:“Isn’t this just an I.T. Problem?”
19
HIPPA: What are the Consequences for
Security Violations?
Risk to integrity of confidential information, e.g., data corruption,
destruction, unavailability of patient information in an emergency
Risk to security of personal information, e.g., identity theft
Loss of valuable business information
Loss of confidentiality, integrity & availability of data (and time) due to
poor or untested disaster data recovery plan
Embarrassment, bad publicity, media coverage, news reports
Loss of patients’ trust, employee trust and public trust
Costly reporting requirements for SB-1386 issues
Internal disciplinary action(s), termination of employment
Penalties, prosecution and potential for sanctions / lawsuits
20
Payment Card Industry Data Security
Standard
Control Objectives PCI DSS Requirements
Build and Maintain a Secure 1. Install and maintain a firewall configuration to protect
Network cardholder data
2. Do not use vendor-supplied defaults for system
passwords and other security parameters
Regularly Monitor and Test 10. Track and monitor all access to network resources
Networks and cardholder data
11. Regularly test security systems and processes
31
Safeguard - #1: Unique User Log-In / User
Access Controls
Access Controls:
Users are assigned a unique “User ID” for log-in purposes
Each individual user’s access to ePHI system(s) is
appropriate and authorized
Access is “role-based”, e.g., access is limited to the minimum
information needed to do your job
Unauthorized access to ePHI by former employees is
prevented by terminating access
User access to information systems is logged and audited for
inappropriate access or use.
32
Safeguard-#2: Password Protection
33
Safeguard-#3: Workstation Security
– Physical Security
34
Safeguard-#4: Security for Portable
Devices & Laptops with ePHI
Implement the workstation physical security measures listed in Safeguard #3,
including this Check List:
Use an Internet Firewall
Use up-to-date Anti-virus software
Install computer software updates, e.g., Microsoft patches
Encrypt and password protect portable devices, e.g. USB memory stick
Lock-it up!, e.g., Lock office or file cabinet, cable
Automatic log-off from programs is possible
Use password protected screen savers
Back-up critical data and software programs
De-identify ePHI or delete ePHI from memory stick or PDA
Disable wireless or use VPN
35
Safeguard-#5: Data Management &
Security
Data backup and storage
Backup original data files with ePHI and other essential data and software programs
frequently based on data criticality, e.g., daily, weekly, monthly.
Consider encrypting back-up disks
Permanent copies of ePHI should not be stored for archival purposes on portable
device, such as laptop computers, PDAs and memory sticks.
If necessary, temporary copies could be used on portable devices, only when:
▪ The storage is limited to the duration of the necessary use; and
▪ If protective measures, such as encryption, are used to safeguard the confidentiality, integrity and
availability of the data in the event of theft or loss.
Transferring and downloading data
Encryption is an important tool for protection of ePHI in transit across unsecured
networks and communication systems
Data disposal
Destroy EPHI data which is no longer needed (professional overwrite)
36
Safeguard-#6: Remote Access
Need consider authentication such as Radius
Can adopt Virtual Private Network to encrypt
communication in transit
Use access control to authorize users
Audit behavior of remote users
Safeguard-#7: E-Mail Security
Email is like a “postcard”. Email may potentially be viewed in transit by many
individuals, since it may pass through several switches enroute to its final
destination or never arrive at all! Although the risks to a single piece of email are
small given the volume of email traffic, emails containing ePHI need a higher level
of security.
38
7-2. E-Mail Security – Risk Areas
1. Spamming. Unsolicited bulk e-mail, including commercial
solicitations, advertisements, chain letters, pyramid schemes, and
fraudulent offers.
Do not reply to spam messages. Do not spread spam. Remember,
sending chain letters is against UC policy.
Do not forward chain letters. It’s the same as spamming!
Do not open or reply to suspicious e-mails.
2. Phishing Scams. E-Mail pretending to be from trusted names, such
as Citibank or Paypal or Amazon, but directing recipients to rogue
sites. A reputable company will never ask you to send your password
through e-mail.
3. Spyware. Spyware is adware which can slow computer processing
down; hijack web browsers; spy on key strokes and cripple computers
39
7-3. Instant Messaging (IM) - Risks
Instant messaging (IM) and Instant Relay Chat (IRC) or
chat rooms create ways to communicate or chat in “real-
time” over the Internet.
Exercise extreme caution when using Instant Messaging on
UC Computers:
Maintain up-to-date virus protection and firewalls, since
IM may leave networks vulnerable to viruses, spam and
open to attackers / hackers.
Do not reveal personal details while in a Chat Room
Be aware that this area of the Internet is not private and
subject to scrutiny
40
Safeguard-#8: Internet Use
Be careful about providing personal, sensitive or confidential
information to an Internet site or to web-based surveys that
are not from trusted sources.
Personal information posted to web-pages may not be
protected from unauthorized use.
Even unlinked web pages can be found by search engines
Some web sites try to place small files (“cookies”) on your
computer that might help others track the web pages you
access
42
Safeguard-#10: User Responsibility to
Adhere to Information Security Policies
CIO or CISO may use the following language in their trainings
“Users of electronic information resources are responsible for complying
with all policies, procedures and standards relating to information security.”
“Workforce members who violate policies regarding privacy / security of
confidential, restricted and/or protected health information or ePHI are
subject to further corrective and disciplinary actions according to existing
policies.”
“Actions taken could include:
Termination of employment
Possible further legal action
Violation of local, State and Federal laws may carry additional
consequences of prosecution under the law, costs of litigation, payment
of damages, (or both); or all.
Knowing, malicious intent Penalties, fines, jail!”
43
statistical database
statistical database
A statistical database is a database used for
statistical analysis purposes.
Statistical databases often incorporate support for
advanced statistical analysis techniques, such as
correlations, which go beyond SQL.
They also pose unique security concerns, which
were the focus of much research, particularly in the
late 1970s and early to mid 1980s.
Securing statistical database is difficult