information security is for everyone by jill burrington-brown, ms, rhia

17
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Upload: jorden-hatheway

Post on 01-Apr-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Information Security Is for Everyone

By Jill Burrington-Brown, MS, RHIA

Page 2: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Setting the Standard for Security

• Electronic health information must be confidential, have integrity, and be available.

• Each provider must protect against threats or hazards to the security of the information.

Page 3: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Practical Security Safeguards

• For our system• At our workstation• When using e-mail

and the Internet

Page 4: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Safeguarding Our System

Page 5: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

What Are the Potential Risks to Our System?

• Theft

• Vandalism

• Snooping

• Environment

Page 6: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

How Can We Minimize the Risks?

Protect Physical Access• Control location• Lock equipment• Use screen filters• Label laptops• Lock or shut down

Page 7: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Protecting System Access

• Identifying

Who are you?

• Authenticating

Something you know

Something you have

Something you are

Page 8: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Protecting System Access…

• Authorizing

Rights and permissions

• Accounting

Audit trails and logs

Page 9: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Protecting System Access

Manage your Password!

• Choose a strong password!

• Don’t share it with anyone!

• Don’t write it down on a Post-It!

• Don’t “Save This Password!”

Page 10: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Protecting System Access…

• Remove default passwords

• Control software loaded on system

• Remove unused software

• Consider automatic log-off

• Consider encryption for sending sensitive information

Page 11: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Minimizing the Risks….

Education of the WorkforceWho are the• Data owners• Data users• Data custodians• And what can they do?

Page 12: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Minimizing the Risks….

Anticipate Environmental Hazards• Power outages/spikes• Fire• Flood

Page 13: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

How About the Internet?

• Downloading information

• E-mail

Page 14: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Downloading Information

• Freeware• Shareware

Be careful: some of these programs create vulnerability to viruses, unexpected software interactions, and subversion of security controls, and may violate your licensure agreements if you don’t purchase the software.

Page 15: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

E-mail

• Don’t open attachments from someone you don’t know

• Don’t open attachments from someone you do know if the message seems strange

Page 16: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Your PC

The only safe PC is a powered-off PCTwo thirds of all hacking is INTERNALMost hacking activity takes place off-hours

There is no such thing as a 100 percent secure system or network, but we can work toward better security practices.

Page 17: Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Your HIM Professionals Are a Valuable Resource!

Working together wecan manage theprivacy and securityof health information.

Sponsored by

© 2003 AHIMA