hipaa and cybersecurity best practices · security risk analysis (sra) – healthit services §...

32
HIPAA and Cybersecurity Best Practices and Lessons Learned

Upload: others

Post on 13-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

HIPAAandCybersecurityBestPracticesandLessonsLearned

Page 2: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 2

Speakers

MollieMcCammon,RHIA,CHPOutreachSpecialist,AFMCHealthIT

WinnieAlobuia,RHIAHIPAASRASpecialist,AFMCHealthIT

TobyEdwards,CCFE,MSCybersecuritySecurityRiskAssessor,AFMCIT

Page 3: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 3

TopicsofDiscussion

§ CommonHIPAArisksandvulnerabilitiesandhowtoavoidthem

§ Cybersecurity

§ 2016onsiteriskassessmentresultsandlessonslearned

§ SecurityRiskAnalysis(SRA)– HealthIT services

Page 4: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 4

ExposedRecordsandDataBreachintheU.S.from2005to2016

Imageviastatista.com https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

Page 5: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 5

2017“WallofShame”ListContinuestoGrow– AHIMA

§ BreachesreportedtoHHSOCRfromthebeginningoftheyeartoMarch22include:• 66newreportsaffecting500ormoreindividuals• About440,000individualshavebeenaffectedby2017breachesalone• Over170millionindividualshavebeenaffectedsincebreachreportingbeganin2009

§ Typesofbreaches:• Unauthorizedaccess/disclosure:41%• Hacking/ITincident:27%• Theft:23%• Loss:6%• Improperdisposal:3%

‘WallofShame’ListContinuestoGrow.JournalofAHIMAMay,2017

Page 6: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 6

CommonHIPAARisksandVulnerabilitiesandHowtoAvoidThem

§ Noticeofprivacypracticesdistribution

§ Lackofriskanalysis

§ Inappropriateuseanddisclosure

§ HIPAAtraininganddocumentation

§ Cybersecurity

Page 7: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 7

NoticeofPrivacyPracticesDistribution

§ Updateyournoticeofprivacypractices

§ Contentofthenoticeofprivacypractices

§ Followrequirementsfordistributionandposting:• Providetonewpatientsandobtaingoodfaithacknowledgementofreceipt• Makecopiesavailabletopatientsinthewaitingroom• Havecopiesavailableuponrequest• Postinaclearandprominentlocationlikeawaitingroomorcommonarea• Postonwebsiteandelectronicallyavailable

Page 8: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 8

LackofRiskAnalysis

§ PerformriskanalysisonceayearforMU/ACI,and

§ Ongoingthroughouttheyear,anytimeyouhavechangestoyourbuilding,staffing,hardware,softwareetc.thatcouldeffectthesecurityofyourPHI

§ Documentthefindingsandworktocorrectthedeficiencies

§ Implementandupdatepoliciesandproceduresbasedonthosefindings

Page 9: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 9

ImpermissibleUsesandDisclosures

§ Employeesaccessingpatientfileswithoutaneedtoknow

§ Thentakingthenextstepandsharingtheinformationwiththewrongpeople

§ Givingrecordstothewrongpatient

§ Socialmedia

§ ReleaseofInformation

Page 10: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 10

LackofHIPAATraining

§ HIPAA-requiredtraining• newemployeeswhentheystartatyourorganizationshouldbetrainedongeneralHIPAAandHIPAArelevanttothejobdutiestheywillbeperforming

• AnytimeHIPAAisupdatedoryourpoliciesandproceduresareupdated• WhenemployeeschangejobdutiestheyshouldreceiveHIPAAtrainingspecifictotheirnewjob

• Periodictrainingtoexistingstaff• Updatestostaffwhenprivacyandsecurityissuesarise

Page 11: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 11

HIPAATrainingDocumentation

§ Trainingcanbedoneindifferentformats§ Besureanddocumentthetraining:when,where,who,what§ Keepthisdocumentationforsixyears

Page 12: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 12

Cybersecurity

§ Databasebreaches

§ Lostorstolendevices

§ Hacking

§ Trainstafftowatchforattacks

HHSOCRinActionforFebruary2017– ReportingandMonitoringCyberThreats

Page 13: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 13

2016OnsiteRiskAssessmentResultsandLessonsLearned

FacilityAssessments

Performedin2016360

Page 14: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 14

CommonHIPAADeficiencies,RisksandVulnerabilities

§ Lackofencryption§ Sharinglogincredentials,unattendedcomputersnotlocked,unsecuredwrittenpasswords

§ UnsecuredITequipment§ Outdatedoperatingsystems§ UnsecuredpaperPHI,medicalrecords,X-rays§ PaperPHIandX-raystobedestroyed

Page 15: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 15

2016OnsiteRiskAssessmentResultsandLessonsLearned

82

224

34

166

160

124

204

PHIDISPOSAL

PHISTORAGE

OUTDATEDOPERATINGSYSTEMS

NETWORKEQUIPMENTSTORAGE

WORKSTATIONACCESSCONTROL

ENCRYPTION

NOTICEOFPRIVACYPRACTICES

0 50 100 150 200 250 300 350

2016OnsiteAssessmentResults

Page 16: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 16

CommonHIPAADeficiencies,RisksandVulnerabilities

§ Lackofencryption

Page 17: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 17

CommonHIPAADeficiencies,RisksandVulnerabilities

§ Sharinglogincredentials,unattendedcomputersnotlocked,unsecuredwrittenpasswords

Page 18: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 18

CommonHIPAADeficiencies,RisksandVulnerabilities

§ UnsecuredITequipment

Page 19: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 19

CommonHIPAADeficiencies,RisksandVulnerabilities

§ Outdatedoperatingsystems

Page 20: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 20

CommonHIPAADeficiencies,RisksandVulnerabilities

§ UnsecuredpaperPHI,medicalrecords,X-rays

Page 21: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 21

CommonHIPAADeficiencies,RisksandVulnerabilities

§ PaperPHIandX-raysto-be-destroyed

Page 22: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 22

UncommonHIPAADeficiencies,RisksandVulnerabilities

§ VOIPservers§ Homeeditionoperatingsystems§ TransportingPHIinemployeevehicles§ UsingMicrosoftWord

Page 23: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 23

UncommonHIPAADeficiencies,RisksandVulnerabilities

§ VOIPservers

Page 24: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 24

UncommonHIPAADeficiencies,RisksandVulnerabilities

§ Homeeditionoperatingsystems

Page 25: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 25

UncommonHIPAADeficiencies,RisksandVulnerabilities

§ TransportingPHI inemployeevehicles

Page 26: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 26

UncommonHIPAADeficiencies,RisksandVulnerabilities

§ UsingMicrosoftWord

Page 27: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 27

TriggersforFollow-upAssessmentsin2017

§ PHI§ Lackofencryption§ UnsecuredITequipment§ Outdatedoperatingsystems

Page 28: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 28

RoleoftheAssessor

§ Thinklikeathief

Page 29: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 29

RoleoftheAssessor

§ Wearenot HIPAAauditors!§ HIPAAisnotoptional§ Don’tsugarcoatthings

Page 30: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 30

SecurityRiskAnalysis(SRA)– HealthITServices

§ MeaningfulUse:ProtectPatientHealthInformation:Conductorreviewasecurityriskanalysisper45CFR164.308(a)(1),includingaddressingthesecurity(toincludeencryption)ofelectronicpersonalhealthinformation(ePHI)createdormaintainedinCEHRTinaccordancewith45CFR164.312(a)(2)(iv)and45CFR164.306(d)(3)

§ HealthITworkswithclinicsandhospitalsacrossthestateonannualSRAstomeetthemeaningfulusemeasure

§ WeprovidetemplateHIPAAsecuritypoliciesthatcanbecustomizedforyourpractice,guidancethroughtheSRAprocessandadditionaltoolstohelpwithHIPAA

Page 31: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 31

ContactInformation

Ifyouareinterestedintheseservicesorhavequestions,pleasecontactHealthIT HIPAASRAspecialistWinnieAlobuia at:§ (501)212-8785§ [email protected]

Page 32: HIPAA and Cybersecurity Best Practices · Security Risk Analysis (SRA) – HealthIT Services § Meaningful Use: Protect Patient Health Information: Conduct or review a security risk

5/23/17 Copyright©2017AFMC,Inc.AllRightsReserved. 32

References

§ Primeau,Debra."HowSmallOrganizationsHandleHIPAACompliance" JournalofAHIMA88,no.4(April2017):18-21.

§ [email protected]§ AFMCHealthITsecurityriskassessors§ JournalofAHIMA,May2017– ‘WallofShame’ListContinuestoGrow.