




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Healthcare andNew Federal Security Protections (HIPAA)1Contact info:Kate Borten, CISSPPresident, The Marblehead GroupOne Martin TerraceMarblehead, MA 01945Tel: 781 639-0532Fax: 781 639-05622AgendaHIPAA: What? When? Why?HIPAAs Security and Privacy RulesImplications for vendors and productsBusiness co
2、ntractsTechnical featuresHealthcare Resources3HIPAA4HIPAAHealth Insurance Portability and Accountability Act of 1996aka the Kennedy-Kassebaum billTo assure health insurance after leaving job (“insurance portability”)Congress added “Administrative Simplification” /admnsimpPOW!5“Administra
3、tive Simplification”Goal: Save moneyMeans: Standard electronic transactionsStandard record formats, code sets, and identifiersFor common transactions such as enrollment, claims, remittance, eligibility, and referralsCompliance date: October 20026Downside to Electronic StandardizationIncreased risk t
4、o information security and patient privacySo Congress added HIPAA requirementsUS Dept. of Health and Human Services (HHS) to develop security regulationsCongress to pass health privacy law (but they missed their deadline in 1999, so HHS wrote privacy regulations)7“Security” vs. “Privacy”Security = A
5、ssurance of Confidentiality, Integrity, and AvailabilityPrivacy = a personal “right” (wed like to think) to control info about oneselfOrganizations have formal infosec programs in order to assure patients or members privacyNo privacy without security!8Fair Information PracticesWhen you think privacy
6、, think Fair Info Practices (HHS Secy Shalala):Security (obligation to protect)Boundaries (limit use of info)Consumer Control (right to copy, correct, review audit trail.)Accountability (penalties)Public Responsibility (balance public good vs. individual privacy rights)9Scope: Whos CoveredRules appl
7、y directly to health care plans, providers, and clearinghouses - called “covered entities”Rules apply only indirectly to “business associates” of those covered (until a broader privacy law is passed)Rules do not apply to life insurers, workers comp, etc. (until a broader privacy law is passed)10Scop
8、e: Whats CoveredPrivacy Rule covers all individually-identifiable health data in any formincludes demographic data, even if in public realmincludes data unless thoroughly de-identifiedProposed Security Rule covers subset of above - only electronic data11Compliance DeadlinesPrivacy Rule compliance da
9、te: Feb. 26, 2003 (for all but smallest plans which have until 2004)Expect Security Rule compliance date shortly thereafter 12Why Comply? Penalties!Civil penalty for “failure to comply”: up to $100/person/violation; maximum of $25,000/person/violation/year (can add up!)Criminal penalties for “wrongf
10、ul disclosure” “knowingly and in violation of HIPAA” up to $50,000 and/or 1 year prison for knowing misuseup to $100,000 and/or 5 years prison when under false pretensesup to $250,000 and/or 10 years prison when intent to sell, use for personal gain or commercial advantage, malicious harm13Why Compl
11、y?HIPAA penalties for health plans, providers, and clearinghouses onlyBut their “business associates” will be bound by contract (indemnified?)Vendors could be out of business if their products dont meet basic requirements!14Security & Privacy Rules15Patient RightsReceive copy of own recordRequest re
12、cord amendment/correctionVoluntarily authorize and revoke secondary uses of own dataReceive report of certain disclosuresReceive Notice of Privacy Practices of non-compliance16Privacy Rule RequirementsSecurity safeguardsPrivacy OfficerUse/disclosure policies and procedureswhen OK, when not, when aut
13、horization reqd, etc.de-identification; minimum necessary dataverification of requestor identity, authorityAudit/reporting of secondary disclosuresWorkforce training and certificationStringent business contractsSanctionsNotice of Privacy Practices17Security Rule RequirementsA comprehensive, formal i
14、nfosec program:“Administrative Procedures”PoliciesProceduresEducation of workforcePhysical SafeguardsTechnical controlsInformation Security Officer18“Administrative Procedures”CertificationChain-of-trust partner agreementContingency planRecord processing controlsAccess controlsAuditingPersonnel secu
15、rityConfiguration mgmtSecurity incident proceduresSecurity mgmt processTermination processTraining19Physical SafeguardsMedia controlsPhysical access controlsWorkstation use policy, guidelinesSecure workstation location/positionSecurity awareness training20Technical ControlsAccess controlsAudit contr
16、olsAuthorization controlsData “authentication” (integrity)Entity authenticationEvent reporting, alarms21Implications for Vendorsand Products22Business Associate ContractsApplies to business associates (BA) who may have access to patient-identifiable data, even inadvertentlyHealthcare organization ma
17、y terminateContracts likely to require BA to have appropriate infosec programsBA required to report breach/improper disclosureaudit certain re-disclosurespermit access by Secy of HHS 23Explicit Technical RequirementsIdentification - unique userIDsAuthentication -Password or PIN or token or smartcard
18、 or biometric (or call-back?)If over “open” network (at least the Net), must be “irrefutable” (2-factor)24Explicit Technical RequirementsAuthorization - at least necessary levelRole- or user-basedOptionally modified by location, by date/timeOrganization must be able to periodically review who has ac
19、cess and with what privileges, so systems must be able to provide reports25Explicit Technical RequirementsAutomatic logoff (inactivity timeout)to “cause electronic session to terminate” (i.e., not suspend)(Healthcare organizations will look for intelligent implementation - preferably allowing variab
20、le timeouts based on different risks in different environments. Ex: Emergency room 2 mins vs. private office 180 mins)26Explicit Technical RequirementsData integritySuggested mechanisms includecheck sumsdouble keyingmessage authentication codedigital signature (providing message hash.)(Healthcare or
21、ganizations may look more closely at software edits. Implement “double keying” in s/w for critical fields?)27Explicit Technical RequirementsProtections for data in transit Integrity controlsMessage authenticationAccess controls and/or encryption28Explicit Technical RequirementsPlus, when in transit
22、over “open” networksAlarms (“signal of abnormality”)Audit trailsEntity authenticationEvent reporting (of “operational irregularities in physical elements of network . or response to occurrence of a significant task, e.g., completion of request for information”)Encryption29Use Standards Wherever You
23、Can Find Them!HCFA Internet Security Policy (1998)Intended for HCFA, but expected to meet HIPAA: minimum encryption standards -Symmetric: 3DES with 112 bit keyAsymmetric: RSA-type with 1024 bit keyElliptic Curve: 160 bit key(Assume AES also acceptable)Common examples: SSL (3.0+); S-MIME30Explicit Te
24、chnical RequirementsSecure remote accessProtection of “remote access points” and “external electronic communications”(HIPAA leaves it up to the organization to figure out what this means! But HIPAA does expect firewalls.)31Explicit Technical RequirementsSecurity event auditingHIPAA non-specific, but
25、 gives example of logon attempts(Healthcare organizations will want to audit security parameter changes, security-related events, other suspicious or unusual activity. Will need tools to do this.)32Explicit Technical RequirementsSecurity event auditing (contd)Security Rule implies also auditing at t
26、he patient level, i.e., internal to the application(This level of audit is not uncommon in healthcare as a deterrent to “snooping” and includes read-only access. Requires good tools for reviewing audit log to identify inappropriate patient access.) 33Explicit Technical RequirementsSystem (and networ
27、k if applicable) certificationCan be done internally or externally(Healthcare organizations will look for guidance on secure configuration of each platform, database, application.)34Explicit Technical RequirementsDisaster recovery/business continuity planHardware/software inventory and criticality a
28、nalysisBackups/restoresPlan tested regularlyVirus protection35Optional or Implicit Technical RequirementsDe-identification of dataAudit of some disclosuresLimiting access by reason, and depending on voluntary patient authorization Amendment of records36Implicit Technical ControlsEven though HIPAA do
29、esnt discuss password features, they should be considered implicitly required, e.g.:Password minimum length controlPassword agingPassword encrypted and never displayed in clear textMany other security features arent mentioned, but should be available37Healthcare Resources38“Common Criteria”Applying ISO standards to healt
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025至2030年中国水性丝印油墨数据监测研究报告
- 多进制LDPC码构造与性能评估方法的研究
- 基于天然离电界面的触觉传感器设计及其植物识别应用研究
- 2025至2030年中国智能卡膜块数据监测研究报告
- 个人房产合同范本
- 经理年终总结及明年计划
- 2025至2030年中国扁管单挂架散热器数据监测研究报告
- 剧组道具转让合同范本
- 内部划转合同范本
- 商务演出劳务合同范本
- 2024全国各省高考诗歌鉴赏真题及解析
- 《临床科研思维》课件
- GA/T 761-2024停车库(场)安全管理系统技术要求
- 大学生创新创业基础(创新创业课程)完整全套教学课件
- 人教版小学数学四年级下册第一单元测试卷附答案(共9套)
- 广西版三年级美术下册全册教案
- 2024年青岛酒店管理职业技术学院高职单招(英语/数学/语文)笔试历年参考题库含答案解析
- X射线衍射课件(XRD)
- 阳泉气象地质资料
- 家用和类似用途空调器安装规范
- 游船安全生产事故调查处理及责任追究制度
评论
0/150
提交评论