CPHIMS Privacy and Security - 07072016 PDF
CPHIMS Privacy and Security - 07072016 PDF
CPHIMS Privacy and Security - 07072016 PDF
JULY 7, 2016
ADDI TI ONS BY JACK KOLK, CI SSP, CSSLP
CONTENT
• General
• Healthcare Environment (19)
• Technology Environment (10)
• Systems
• Analysis (14)
• Design (5)
• Selection, Implementation, Support, and Maintenance (8)
• Testing and Evaluation (3)
• Privacy and Security (6)
• Administration
• Leadership (29)
• Management (6)
3
PRIVACY & SECURITY OBJECTIVES
1. Participate in defining organizational privacy and security
requirements, policies and procedures
2. Utilize procedures and tools to identify potential privacy and security
breaches
3. Provide appropriate physical environment and safeguards to protect
assets
4. Assess privacy and security risks
5. Implement processes to mitigate privacy and security vulnerabilities
6. Manager user access control according to established policies and
procedures
7. Ensure confidentiality, integrity, and availability of data
8. Define organization roles (e.g., information security, physical security,
compliance) responsible for managing vulnerabilities
9. Develop data management controls (e.g., data ownership, criticality,
security levels, protection controls, retention and destruction
requirements, access controls)
10. Maintain disaster recovery and business continuity plans
11. Perform privacy and security audits
4
VULNERABILITIES ARE MORE COMMON
THAN YOU KNOW AND GROWING
5
VULNERABILITIES ARE MORE COMMON
THAN YOU KNOW AND GROWING
6
INTRODUCTIONS
7
PRIVACY VS SECURITY
8
KROLL PREDICTS THAT THE NEW CYBERSECURITY
ISSUES FOR 2014 WILL INCLUDE:
9
KEY COMPONENTS OF PRIVACY LAWS
10
GENERAL RULES OF PRIVACY
11
INDIVIDUAL RIGHTS
12
PRIVACY ADMINISTRATIVE
REQUIREMENTS
• Designation of privacy/security officer
• Development of policies and procedures
• Processing of complaints
• Monitoring of ongoing compliance
• Training program
• Sanctions program
13
GENERAL SECURITY
14
COMPLIANCE PROCESS
• Awareness
• Assessment
• Remediation
• Maintenance
15
ASSESSMENT
16
DOCUMENT GATHERING
17
GAP ANALYSIS
18
FACILITY WALKTHROUGH
19
TECHNICAL BASELINE
20
THREATS AND VULNERABILITIES
• Identification of threats
• Identification of Vulnerabilities
• NIST ICAT vulnerability database:
• http://icat.nist.gov
• Likelihood Determination
• Impact Analysis
• Risk Determination
21
THREATS AND VULNERABILITIES
22
REMEDIATION
23
POLICIES AND PROCEDURES (P&P)
24
PHYSICAL ENVIRONMENT
25
TECHNICAL ACCESS CONTROLS
• Minimum Necessary
• Principles for Access Profiles
• Access to information must not be so restricted as to
interfere with the quality and efficiency of healthcare
• Access shall be sufficiently restricted to afford
patients’/members’ information as much privacy and
security as possible
• Modification or Termination of Access
26
DATA MANAGEMENT CONTROLS
27
MAINTENANCE
28
TRAINING
• Methods of Training
• Direct review of P&P
• Powerpoint slides and lectures
• Online/automated training
• Use of examples/vignettes
• Use of video
• Training Content
• Awareness training
• Workstation use
• P&P
• Sanctions/testing
• Training Delivery Controls
29
RISK MANAGEMENT
30
AUDITING/MONITORING TOOLS
• Self Audit
• Checklists
• Facility walkthroughs
• Interviews
• Report of Findings
• Areas of Non-compliance
• Corrective Action Plans
31
PRIVACY AND SECURITY INCIDENTS
32
AUDIT TRAIL
33
CONTINGENCY PLANNING
34
QUESTION 32
35
ANSWER 32
36
QUESTION 33
37
ANSWER 33
38
QUESTION 34
39
ANSWER 34
40
QUESTION 35
41
ANSWER 35
42
QUESTION 36
43
ANSWER 36
44