hipaa violations explained - netwrix · hipaa requirements –breach notification • focuses on...

28
HIPAA Violations Explained How to Create a Realistic Program to Pass an Audit

Upload: others

Post on 23-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Violations Explained

How to Create a Realistic Program to Pass an Audit

Page 2: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Presenters

President

PrivaPlan Associates, Inc.

David Ginsberg

Jeff Melnick

Solutions Engineer

Netwrix Corporation

Page 3: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Agenda

• The HIPAA Privacy, Security Rule and Breach

requirements

• What is a violation?

• Safeguards-people and processes, technical controls

• Data discovery as the new normal

• Best practices

• Features and benefits of Netwrix solution

• Q&A session

Page 4: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Requirements – Privacy Rule

• Sets the foundation for HIPAA

• Establishes the standard for safeguarding Protected Health Information

• Establishes a subject individual’s rights:

• Restriction, access, amendment, accounting, complaints, Notice of Privacy

Practices

• Establishes safeguards such as minimum necessary, verification of identity,

policies and procedures, administrative, physical and technical controls

Page 5: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Requirements – Security Rule

• Focuses on ensuring the confidentiality, availability and integrity of

electronic Protected Health Information

• Required standards and specifications for safeguards/controls--

Administrative

Physical

Technical

Organization

Page 6: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Requirements – Breach Notification

• Focuses on requirements to respond to a breach of unsecured

Protected Health Information

• Establishes the definition of unsecured

• Creates an inherent need to classify and map data, establish uses

and disclosures, and establish data security

Page 7: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Violations

• A violation occurs whenever one of the Privacy, Security or Breach

standards and implementation specifications are not followed

• Both civil and criminal enforcement can take place

• Enforcement is by the Office for Civil Rights, or a State Attorney General

• Civil enforcement can result in a fine (and settlement), or corrective action

Page 8: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Violations

Skype Social Media

Texting

Page 9: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Penalties for Texting in Violation of HIPAA

Penalties are per violation per year*

Min Max

Did Not Know $100 $50,000

Reasonable Cause $1,000 $50,000

Willful Neglect – Corrected $10,000 $50,000

Willful Neglect – Not Corrected $50,000 $1,500,000

* hipaajournal.com/texting-violation-hipaa/

Page 10: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

HIPAA Requirements – Practical Application

To respond or prevent violations, audit controls are essential.

The Security Rule defines this as “Implement hardware, software,

and/or procedural mechanisms that record and examine activity

in information systems that contain or use electronic protected

health information.”

Page 11: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Passing and Audit

• Enforcement agencies can investigate for cause, or conduct an audit

• The OCR has developed audit checklists

• Passing an audit is best done by being ready before an official audit or

investigation takes place!

• Regular Privacy and Breach notification reviews and assessments

• Regular HIPAA and Information Security Risk Analyses

Page 12: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Passing and Audit

For the purposes of this presentation, lets examine a technical audit

Page 13: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

What Do You Need to Audit

Operating systems – including Active Directory

Applications like the EHR or LIS

Web applications

Diagnostic devices

Hardware

Files and folders

Page 14: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

What Do You Need to Audit

InterfacesMalware and

PatchesProcesses

Termination of access

Access permissions

Page 15: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

What Do You Need to Know

• Where is PHI used, disclosed, stored, transmitted, etc.

• Where is PII used, disclosed, stored, transmitted, etc.

• PHI Governance

• PII Governance

Page 16: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Best Practices

Data discovery and classification tools

Network asset identification

Discovery for domain and non domain

instances (!)

Corrective action plan:- Endpoint analysis- Locations – physical inventories

Page 17: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

About Netwrix Auditor

Netwrix Auditor is an agentless data security platform that empowers organizations to accurately identify

sensitive, regulated and mission-critical information and apply access controls consistently, regardless of

where the information is stored.

It enables them to minimize the risk of data breaches and ensure regulatory compliance by proactively

reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior.

Netwrix Auditor

Page 18: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Netwrix Auditor Unified Platform

Netwrix Auditor for

Active Directory

Netwrix Auditor for

Windows File Servers

Netwrix Auditor for

Oracle Database

Netwrix Auditor for

Azure AD

Netwrix Auditor for

EMC

Netwrix Auditor for

SQL Server

Netwrix Auditor for

Exchange

Netwrix Auditor for

NetApp

Netwrix Auditor for

Windows Server

Netwrix Auditor for

Office 365Netwrix Auditor for

SharePoint

Netwrix Auditor for

VMware

Netwrix Auditor for

Network Devices

Add-on for

Amazon Web Services

Add-on for

Generic Linux Syslog

Add-on for

Splunk

Add-on for

ServiceNow ITSM

Add-on for

IBM QRadar

Infrastructure Unstructured Data Structured Data Cloud Free Add-ons

Data Discovery & Classification

Page 19: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Netwrix Auditor Evolution

2008 2018

Standalone Change

Auditing Tools

Unified Platform for

Change, Configuration

and Access Auditing

Visibility Platform for User Behavior Analysis

and Risk Mitigation

File Analysis

Alerts on Threat Patterns

Compliance Reports

Virtual and Cloud Deployment

RESTful APIInteractive Search

Dashboards

Predefined Change Auditing Reports

Risk Assessment

Behavior Anomaly Discovery

Add-on Store

Visibility and

Governance Platform for

Hybrid Cloud Security

2013 2016 2017

Data Discovery & Classification Edition

2019

User Profile

Automated Response

Page 20: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Demonstration

Netwrix Auditor

Page 21: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Product Demonstration

Page 22: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Product Demonstration

Page 23: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Product Demonstration

Page 24: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Product Demonstration

Page 25: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Product Demonstration

Page 26: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Useful Links

Free trial: Set up Netwrix Auditor in your own test environment netwrix.com/auditor9.7

Virtual appliance: Get Netwrix Auditor up and running in minutes netwrix.com/go/appliance

In-browser demo: Run a demo right in your browser with no need to install anything

netwrix.com/go/browser_demo

Contact Sales to obtain more information: netwrix.com/contactsales

Page 27: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

Questions?

Page 28: HIPAA Violations Explained - Netwrix · HIPAA Requirements –Breach Notification • Focuses on requirements to respond to a breach of unsecured Protected Health Information •

www. .com

David Ginsberg

PresidentPrivaPlan Associates, Inc.

Jeff Melnick

Solutions EngineerNetwrix Corporation

Thank You!