99
Corporate Compliance HIPAA Privacy HIPAA Security

Corporate Compliance HIPAA Privacy HIPAA Security there any compliance implications for this type ... HIPAA including increased legal liability for non-compliance and greater enforcement

Embed Size (px)

Citation preview

Corporate Compliance

HIPAA Privacy

HIPAA Security

Training Objectives…

To Help:

– Bridge the Gap Between Ethics & Compliance

– Find Ways to Place Regulatory Theory into Practice

– Heighten Awareness of Non-Compliant Activities

Reality check…

Rules provide a set of expectations towards an expected

end…

…they serve as a roadmap for direction

The healthcare industry is full of…

RULES & REGULATIONS

But they do serve a purpose!

As noted by Withrow (1999):

• Healthcare expenditure = >$1 trillion/per year

• Healthcare billing fraud = $100 billion/per year

FEDERAL COSTS

Compliance as a buzz word

It’s really about doing the right thing.

…Liken it to an ethical responsibility.

Practice of Clinical Medicine

• Requires a strong knowledge-base of practical issues that can result in:

– Informed Consent

– Truthful Communication

– Confidentiality

– End of Life Care

– Pain Relief

– Patient Rights

(HCCA,2004)

SBUH Responsibility

Organizations should find the right balance between compliance

and integrity.

“Must do ” vs. “Ought to do ”

LET US LOOK at CASE EXAMPLES

Case # 1

Mr. Cope was admitted for inpatient treatment of obesity with a

protein-sparing modified fasting regimen. He was found

repeatedly in the cafeteria, cheating on the diet. His physician

made reasonable efforts to persuade him to change his behavior.

How should the physician handle this situation?

Response

It would be ethically permissible for the physician to abandon

therapeutic goals and to discharge the patient from the

Hospital. These goals are unachievable because of the

patient’s failure to participate in the treatment program.

(Jonsen, Siegler & Winslade, 1998)

Case # 2

A resident authorizes a medical student to obtain and

document the history and condition of a patient

without supervision. The resident then tells the student

to write a progress note and leave it unsigned.

Is there a compliance implication?

Response

Medical students are not considered residents under the

Medicare guidelines. Therefore, to meet the billing

requirements under PATH, services involving medical students

are only billable when performed in the physical presence of an

attending physician, or jointly with a resident.

Case # 3

Dr. Brown supervised resident physicians during the

hours of 8am and 10am on Monday morning.

Is Dr. Brown allowed to bill Medicare for services that

he provides to these patients?

Response

Graduate Medical Education (GME) is reimbursed under

Medicare Part A. Private physician services are reimbursed

under Medicare Part B. If Dr. Brown is unable to define the

line between where his academic, teaching activities end

and where his private physician activities begin, then billing

under Medicare Part B will be considered double-dipping,

which is a fraudulent billing practice.

Case # 4

Dr. Martin has just become a part-owner of XYZ

Clinical Laboratories. She intends to refer all of

her patients to this facility.

Are there any compliance implications for this type

of activity?

Response

This situation creates a conflict that violates the Stark Law; a

federal, civil prohibition. Under Stark a physician is not allowed

to self-refer to an entity in which the physician or an immediate

family member may have a financial interest.

The federal government initially surveyed Medicare patient

clinical laboratory referrals and found that when the doctor had

a financial interest in the facility, referrals were 65% higher

than for non-Medicare patient referrals.

Conflicts of Interests

• The Ethics Law and SBUH policy prohibit situations

that can create a conflict of interest.

A Conflict of Interests Arises… …when a person’s judgment and discretion is

or may be influenced by personal

considerations, or if the interests of SBUH

are compromised.

Examples include:

1. Accepting gifts from vendors

2. Misuse of Hospital assets

3. Activities that violate principles governing

research

What is a Gift?According to the NYS Ethics Commission a gift may

be in the form of:

• Money

• Loan

• Travel

• Meal

• Refreshment

• Entertainment

• Any Good or Service

Violations of Ethics Law…

With regard to gift taking, NYS employees are not

allowed to accept gifts valued above nominal Value

For example, coffee mug, pads, pens, key tags,

lanyards, jar grip openers, magnets business

Cards, retractable tape measures, etc.

Penalties imposed by the Ethics Commission

are up to $10,000/per incident.

ABOUT CODING AND

DOUMENTATION

Evaluation and Management/E&M codes…

• Are categorized by place of service

(i.e. Hospital, Office, ER, etc.)

• Provide definitions for new and established patients

• Begin with “99” and are 5 digits in length

• Require history, physical examination and/or medical decision making

• Describe the “Who, What, Where, and Why”

Accurate billing = diagnosis code + procedure code

These two elements should be in harmony.

Documentation is Key…

Medicare says…

“…If it’s not documented then it didn’t

happen.”

FACT:

Documentation must always support the

billing for a claim.

EXAMPLE

A patient is admitted to a unit after complaining of pain in

his left arm.

Any tests ordered should support this condition.

Without proper documentation an order for an MRI of

the brain would be questionable.

Down the Pipeline…

Billing codes are based on the documentation

Codes that don’t match will raise a flag!

Implications

> Rejected/Denied claims> Possible audit of the organization

Consequence

> Increased governmental scrutiny> Fines

> Loss of revenue> Service and staffing cuts

> Loss of privileges > (i.e., exclusion from the Medicare Program)

The Joint Commission is…

A private agency entrusted by Medicare to certify

that healthcare organizations meet a set of

established standards. These criteria are

incorporated in:

Medicare’s Conditions of Participation

The formula:Delivery of quality healthcare services

+

Imposition of governmental mandates

+

Cost-cutting measures by insurance carriers

+

Accrediting body rules

= Guidance for Clinical Practice

Patient Choice vs. Patient Consent

1) Patient consent:

– Patient agrees to a proposed course of treatment by

medically authorized personnel.

It is best to have consent in writing

Patient Choice vs. Patient Consent

2) Patient choice:

– Preferences are based on patient values and personal

assessment of benefits and burdens.

(HCCA, 2004)

Patient choice… What to ask?

Physicians should ask…

1. What does the patient want?

2. What are the patient’s treatment goals?

3. Is the patient’s right to choose being respected?

• Physicians are challenged when patients fail to

accept or cooperate with a medical

recommendation. However…

• “Clinicians should not be expected to render

treatment that is illegal or contradictory to the

recognized standard of care” (HCCA, 2004)

Beyond the Hippocratic Oath

Professional Ethics for Residents must include

adherence to the following doctrines:

– Medical Necessity

– Physicians at Teaching Hospitals (PATH)

PATH

Teaching Physicians:

– Are required to be present during complex procedures

– Must be available to furnish all procedures for Medicare

patients

PATH Constraints

FACT:

The inherent nature of academic medical center (AMC)

operations preclude attending physicians from being present

in every situation.

Deficit Reduction/False Claims Act

• Federal and State Laws:

• Imposes penalties and fines on INDIVIDUALS and ORGRANIZATIONS that

file false or fraudulent claims for payment from Medicare, Medicaid or

other federal health programs.

• NYS False Claims can be Civil and or Criminal

• Both provide Whistleblower protections

– An employer MAY NOT take retaliatory action against an employee if the employee

discloses information about the employer’s policies, practices or activities to a regulatory,

law enforcement or other similar agency or public official.

– The employee’s disclosure is protected only if the employee FIRST brought up the matter

with a supervisor (departmental chain or command) and gave the employer a reasonable

opportunity to correct the alleged violation

Compliance is more than…Adherence to regulatory requirement (i.e.):

•EMTALA

•Medicare & Medicaid Regulations

•HIPAA

•Anti-Kickback & Stark Law(s)

•Deficit Reduction/False Claims Act(s)

HIPAA & HITECH REGULATIONS Stephanie Musso, SBUH HIPAA Privacy Officer

What is HIPAA?

Health Insurance Portability and Accountability Act of 1996

Focus: Title II

Addresses the privacy (4/14/03) & security (4/20/05) of health care information

Guaranteed individuals’ rights

Establish national standards for e-health care transactions

Reduce health care fraud and abuse

What is HITECH?

• On February 17, 2009 the Federal Stimulus Bill or

American Recovery and Reinvestment Act (ARRA) was

signed into law and included provisions to address Health

Information Technology For Economic and Clinical Health

Act (HITECH).

• Purpose is to create a national health information

infrastructure and widespread adoption of electronic

health records through monetary incentives.

• Provide enhanced Privacy & Security Protections under

HIPAA including increased legal liability for non-

compliance and greater enforcement.

Who must comply?

Organizations Involved in the Provision of Healthcare

Services

Individuals Involved in the Delivery of Healthcare Services

Under the HITECH Act 2009 Business Associates are now

held to the same regulatory requirements as the health

care provider they do business with.

What are the HIPAA Privacy and

Security Rules Protecting?

PHI = Protected Health Information

Any form of information that can identify, relate or be

associated with an individual obtaining healthcare services

and can be electronic, hard copy or verbal.

What Constitutes PHI?

Personal Information

Name, Address, Phone Number, Fax Number, E-mail Address. Dates: Birth/Death, Admission/Discharge, Procedure/Surgery. Numbers: SSN, Certificate/License Number, Automobile/Vehicle Identifiers

Medical Information

Medical Record Number, Health Plan Information, Test Results, Clinical Notes and Procedural Information, Care Plans, Diagnoses

Technical Information All of the above in electronic format and Biometric Identifiers (finger or voice prints), Full-Facial Photographic Images, Device Identifiers/Serial numbers, Web URL’s, IP addresses, Account Numbers

The information can be written, verbal or electronic

Patient Rights

Receive Notice - Inform them how their health information is being used and shared – Joint Notice of Privacy Practices (JNPP)

Restrict - Decide whether to give permission before their information can be used or shared for certain purposes other then treatment, payment or operations (opt-out)

Access - Ask to see and get a copy of their health records

Amend - Ask to have corrections added to their health information

Accounting - Request a report on when and why their health information was shared

File a Complaint - If they believe their PHI was used or shared in a way that is not allowed under the privacy law or they were not able to exercise a right.

How is HIPAA Enforced?

• Civil monetary penalty:

Civil penalty for inadvertent violation = fines of $100/per

incident up to $25,000/per year for each similar offense.

EXAMPLE

A hospital employee violates HIPAA by misdialing a fax

number and sending 100 patient records to Starbucks.

The hospital & the employee may have to pay a $10,000

($100 X 100) fine.

Worse Case Scenario…….

• Criminal Penalties :

Criminal penalties = large fines + jail time, and increase

with the degree of the offense.

Example:

A hospital employee steals and sells patient information

for personal profit. Criminal penalties could be as much

as $1.5 million and/or 10 years in jail.

What Must I Do?• Maintain Confidentiality:

Find private locations to discuss patient information

Always Close doors & pull privacy curtains

Do Not discuss patient information in public places

Use, disclose & access only the Minimal Necessary

Leave generic messages on patient answering machines…”This is Dr. Smith calling for Mr. Jones please call me at 444-XXXX at your earliest convenience”

Direct ALL media inquiries to the Public Affairs Office

Discard ALL material containing PHI in the Confidentiality Bins(paper, whole binders, folders, scrap notes, computer disks & CD’s)

Do Not leave any materials containing PHI open to public viewing

LOG-OFF computers when you have completed your task

DO NOT leave handheld devices, PDAs or laptops unattended

Use your unique user ID and password and DO NOT share ID/Passwords

DO NOT send PHI over the internet or via e-mail including file attachments in an e-mail outside of the UHMC – Lotus Notes Network

Do Not Snoop (neighbors, friends, relatives, immediate family members, colleagues)

When in doubt ask the HIPAA Privacy Officer at 4-5796.

What changes can I expect under HITECH?• Effective September 23, 2009 Breach Notification is

required for any unauthorized acquisition, access, use or

disclosure of “unsecured” PHI (PHI that is not secured through the use of

a technology or methodology specified by the Secretary of HHS > encryption or

destruction). Notice Requirements > Patient, Secretary of HHS

• Business Associates of a Covered Entity are held to the

same standards and are liable under the HITECH Act.

Business Associate Agreements must be updated to

include HITECH provisions. (SUNY effective July 1, 2009)

• Accounting of Disclosures from the electronic medical

record to now include treatment, payment and healthcare

operations for up to a 3 year period.

What changes can we expect? Continued…

• Patient’s can get a copy of their record in an electronic

format and can request we send it to their PHR provider.

• Individually Directed Privacy Restrictions – patient pays

out-of-pocket in full for services can restrict all disclosures

• Restrictions on Marketing, Fundraising and the sale of PHI

• Preference for Limited Data Sets and De-Identified Info

• Clarification on Minimum Necessary guidance expected 8/17/10

• Enforcement and New Penalties – Increased enforcement

and oversight activities; CE’s and individual subject to

criminal provisions; State AG’s can bring civil suit in

Federal Courts on behalf of state residents; harmed

individuals can receive a % of CMP’s or settlement

Outpatient Services

• Be aware that many of our Physician Practices are

maintaining outpatient health care records

• Several Physician Practices are using some form

of electronic outpatient health care record

• These records are governed by the same

Privacy/Security Regulations defined by the HIPAA

Rule and NYS Law

• SBUH HIM department provides guidance to the

physician practices in order to ensure compliance

with HIPAA and NYS Regulations

Myth or Fact

A doctor's office can send medical records of a patient to

another doctor's office without that patient's

authorization.

Fact

Authorization is not necessary for one doctor's office to

transfer a patient's medical records to another doctor's

office for treatment purposes.

However, an ancillary service department (Radiology,

Laboratory) can not send a report to a physician who calls

in a request if they are not the ordering physician or the

patient did not request at the time of the testing the

additional physician(s) who should receive the report.

Myth or Fact

A hospital is prohibited from sharing information with the

patient’s family without the patient’s authorization.

Myth

Under the Privacy Rule, a health care provider may “disclose to a family member, other relative, or a close personal friend of the individual, or any other person identified by the individual” , the medical information directly relevant to such person’s involvement with the patient’s care or payment related to the patient’s care. What we should not be doing is providing information related to the patient’s past medical history, only information pertinent to his/her present condition.

Myth or Fact

A patient’s family member can no longer pick up

prescriptions for the patient.

Myth

Under the Regulation, a family member or other individual may act on the patient’s behalf to pick up: prescriptions, medical supplies, X-rays or other similar forms of protected health information (appropriate authorization by the patient must have been obtained – medical records).

Myth or Fact

A patient can not sue me if I violation HIPAA

Myth

HIPAA does not provide for a private right to sue.

However, under HITECT States AG can bring civil action in

federal court on behalf of the residents of his/her state

who have been or are threatened to be adversely affected

by a HIPAA violation.

Myth or Fact

The press can access information from hospitals about

accident or crime victims.

Fact

• HIPAA allows hospitals to continue to make public

(including to the press) certain patient information:

including the patient’s location in the facility and condition

in general terms - unless the patient has specifically opted

out of having such information made publicly available.

Scenario # 1

Two physicians are discussing a patient’s treatment in an

elevator filled with people. During the conversation, the

physicians mention the patient’s name.

Is this a HIPAA violation?

What steps should the physicians have taken to safeguard

the patient’s privacy?

Response• Yes, this is a HIPAA violation

The physicians should have held this conversation

in a private location.

This is not considered an “incidental disclosure“.

This is an “inappropriate disclosure” that must be

avoided by utilizing appropriate safeguards.

These safeguards include, but are not limited to,

holding the conversation in a private location,

behind closed doors or in the absence of others

(not in public locations such as elevators,

cafeterias, hallways, etc.).

Scenario # 2

• A physician calls a patient’s home and leaves the following

message with the patient’s wife: “Please tell your husband

that I called in the prescription for his prostate infection

this morning and that he can call the pharmacy to see

when the medication will be ready for pickup.”

Did the physician do anything wrong?

Response

• Yes, this is a HIPAA violation.

The physician must remember to use only the “minimal

necessary” when disclosing patient information (PHI).

This message should have been either a simple “I have

called in a prescription for your husband to his pharmacy.

Have him call me if he has any questions” or better yet

“have your husband call my office.”

Scenario #3

• A physician, after documenting a note in a patient’s

medical record, places the chart in an unlocked chart

holder outside the patient’s room.

Is this a violation of HIPAA’s Privacy Rule?

Response

• No, this is not a HIPAA violation.

The chart must be closed and placed in the appropriate location whether it is in a chart holder in the nurses station or in a unlocked chart holder outside the patient’s room. The responsibility is to ensure that PHI is not left out in the open and easily assessable for viewing by a passerby. We must utilize the safeguards that are in place to meet this expectation - in this case an unlocked chart holder.

Health Insurance Portability &

Accountability Act

HIPAA

and related

State & Federal Information Security Laws

Electronic Information Security to Ensure

Privacy, and Trust of Information

Tom ConsalvoInformation Security Officer, SBUMC, HSC, and Dental School

Information Security

• The Privacy Rule sets the standards for, among other

things, who may have access to PHI, while the Security

Rule sets the standards for ensuring that only those who

should have access to e- PHI will actually have access.

• The Security Rule applies only to e-PHI, while the Privacy

Rule applies to PHI which may be in electronic, oral, and

paper form.

• e-PHI = Electronic Protected Health Information

Privacy vs. Security

Information Security is the process of protecting data

from accidental or intentional misuse by persons inside

or outside of Stony Brook Hospital

What is Information Security?

State and Federal Laws as relates to

Information Security

• NYS Cyber Security Policy, P03-002 Information Security

• NYS Cyber Security P03-001, Incident Reporting Policy

• SUNY Cyber Security Reporting procedure

• Federal HIPAA Security regulation 45 CFR Parts 160, 162 & 164

• Federal HIPAA Security Guidelines Dec 28, 2006 for Removable Devices

• JCAHO Information Management (IM) section 2

• NYS Information Security Breach & Notification Act, General Business Law (Section 899-aa), Technology Law (Section 208)

• New York’s Social Security Number Protection Law, General Business Statutes, Article 26, Section 399-DD

• SUNY Minimal Required Actions of a SUNY Campus Information Security Program. Effective January 2008, Ted Phelps SUNY ISO

• HIPAA 45 CFR Parts 160 and 164 Final Enforcement Rule, Feb. 2006

• NYS Technology Law, Internet Security & Privacy Act

As part of the daily processes the Hospital must be

ready to be audited at any time, without notice.

What is the Security Rule??

Bottom Line: We must assure that systems and

applications operate effectively and provide

appropriate confidentiality, integrity and

availability (CIA).

1. HIPAA asks that organizations to continually look at

themselves to find their vulnerabilities,

2. To continually implement measures to address their

deficiencies,

3. To apply appropriate sanctions against those who do

not comply with the rules they set, and

4. Have the appropriate technology in place to track all

changes that occur.

HIPAA Security Standards

HIPAA Information Security

• HIPAA Information Security has three categories

•Administrative

•Physical

•Technical controls

Note: The Federal HIPAA Security Regulation requirements are mappable to the NYS

Cyber & Information Security Law and Policies including JC and the DOH.

HIPAA Administrative Safeguards

■ Designate a Security Officer (Also required by NYS Cyber Security Law)

■ Implement work-force security policies and procedures for appropriate access to electronic PHI; access authorization; ensure access level is appropriate; and termination of access.

■ Train the work force in security awareness.

■ Establish procedures to address security incidents.

■ Prepare a contingency plan to permit data recovery and access in the event of an emergency.

■ Perform periodic evaluations to ensure technical and non-technical compliance to the code.

■ Create business associate agreements for vendors who need access to Electronic Protected Health Information (ePHI).

HIPAA Physical Safeguards

■ Facility access controls: Implement policies and procedures to limit unauthorized physical access to electronic information systems or facilities.

■Work station use: Implement policies and procedures for proper use and physical attributes of the work station and surroundings.

■Workstation security: Implement physical policies and procedures for all workstations that have access to PHI.

■ Device and media controls: Implement physical policies and procedures that govern the receipt and removal of hardware and electronic media in and into and out of a facility.

• Access controls: Implement technical policies and procedures for electronic information systems with PHI to allow access only to those authorized or to authorized software programs as per 164.306 (a)(4).

• Audit controls: Implement hardware, software, and /or procedural mechanism that record and examine system activity for Electronic PHI.

• Integrity: Implement policies and procedures to protect health information from improper alteration or destruction.

• Person or entity authentication: Implement procedures to verify that a person or entity seeking access to EPHI is the one claimed.

• Transmission security: Implement technical security measures to guard against unauthorized access to electronically transmitted PHI over a communications network.

HIPAA Technical Safeguards

What can be a threat to Information

Security?

• Natural Disasters

– Hurricane

• LI has had 6 category 3 or above since 1938, last was Sandy in 2012

– Earthquake

• 4.0 in Smithtown in 1985 and 2.8 in Montauk in 1992

– Flood

– Tornado

• F-Zero (40-70 mph) in East Massapequa 2006

– Fire

• Fire In HSC Elevator By Data Center Sept 2006

• Nonhuman

– Product failures, bugs, etc.

• Human

– Unauthorized Access

– Data Entry Errors

– Poor Training in Application Use

The Effects of a Compromise

Business Impact

• Loss of revenues or other

assets

• Legal liability (HIPAA)

• Tarnished name, bad press

• Degraded customer service

• Privacy violations

• Lost productivity

Effects of Attacks

• Alter or destroy data

(Integrity of patient data)

• Steal passwords or data

• Damage or disable drives

• Tie up system resources

(Delay treatment)

If the patient is not in your chain of care

Don’t look at their Data

Don’t be curious if you heard that some VIP is in the Hospital

If you are working on 3, don’t look up patients on 9.

Don’t be curious about why your neighbor was admitted.

If you look at patient data that has nothing to do with the

patients you treat…

You are breaking Federal and State Law.

If You Have Access

To Patient Information System

Don’t give it out, and most importantly,

Never Share Your Passwords

If you give out your username and password to

someone, You are in violation of Federal and State Law.

If the audit trail comes back to your account, you can be

held liable to sanctions, up to but not limited to fines,

suspension, termination, and criminal prosecution.

Your New User Accounts

Once you get an account

you are given a unique user name.

Treat your passwords like your toothbrush –

Don’t share them!!!

NEVER tell anyone your password.

NEVER write your password down, such as on a post-it note.

Don’t use common info about you or your family, pets, or friends names,

SS #, birthdates; anniversary, credit card number, telephone number, etc.

to create a password.

Don’t use names you have used before, variation of your user ID, or

something significant about yourself as a password.

Don’t let someone see what you are entering as your password.

If you think there is even a slight chance someone knows your password,CHANGE IT

Remember if someone logs on as you and does something improper,

you can be held responsible.

The best way to protect yourself…

make your passwords difficult to guess

Weak Passwords (examples):

• Cat, dog, querty hart, heat, heart, mary

• September, superman, mickeymouse, r2d2

• Aaaabbbccd, 12345678, a1b2c3d4

Strong Passwords (examples):

Wweand nadtd 2BoN2bTist?

IsfgaWDo6 3bmstfw1491

This can’t be stressed enough…

What can I use in a Password?

• Use a combination of alphanumeric symbols consisting of at least 8 letters, numbers, and symbols.

• Passwords are usually case sensitive so capitalizing random letters makes it even harder to guess.

• Alphabetic – A to Z and a to z

• Numeric – 0 to 9

• Special Characters – ~; !: @; #; $; %; ^; & ; *; (; ); +; =; [; ]; {; }; /; ?; <; >; ,; ;; :; \; |; `; ’; ”; .

Mnemonics Made Easy

• Change them periodically. Take a phrase that is easy for you to remember and convert it into characters.

• It could be the first line of a poem or a song lyric.

• “Water, water everywhere and not a drop to drink” (Rhyme of the Ancient Mariner) converts to

Wweandnadtd.

• “We Three Kings from Orient Are” converts to w3KfOa to get beyond six characters add a number.

• w3KfOa 3691 (3691 is the year 1963 backwards to extend beyond

six.)

You’re provided a computer that belongs to the State of New York or the

Research Foundation and as such it is auditable by Information Security

and SBUMC IT.

Only SBUMC IT may install applications and hardware.

Don’t bring in any games or software from home

Use only approved software

Don’t try to install or download any unauthorized applications.

Licensing violations can cost millions in fines

Bugs and Malware can bring down the network.

All approved applications go through an in-depth testing process.

Don’t save important files to your local hard drive, save to your network

drive (U) or request a secure share.

All requests for computer devices that allow information to be portable (ie:

CD burners, USB drives, PDA’s, laptop computers, etc) must be approved

by the ISO. NO e-PHI should be stored on these mobile devices. Use VPN

Workstation Rules

and Storage of Important Data

Security for USB Memory Sticks &

Storage Devices

Memory Sticks are devices which pack large amountsof data in tiny packages, e.g., 1G, 4G, 16GB.

NEVER store e-PHI on these memory sticks.

Unless used for external presentations or education these devices are not allowed.

Use VPN connectivity instead!

Primary Carriers of Malicious Software

• Viruses - A virus is a small piece of software that piggybacks on real programs in order to run destructive

• E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

• Worms - A worm is a small piece of software that usesComputer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

• Spyware: Computer software that obtains information from a user’s computer without the user’s knowledge or consent.

• Web pages

• E-mail

• Games

• Freeware /

shareware

• Programs from

associates/home

Stony Brook Information Security runs many tools

such as Internet browser reporting and filtering.

Social Networking Sites such as Facebook, You-Tube, Twitter, etc are

not permitted unless a business need is defined and approved by the

Information Security Officer.

Email Security

• Email is NOT the same as a letter sent through the normal mail. It is the electronic equivalent of Postcards!!

• Within SBUH’s Email system messages are encrypted!

• If an e-mail is sent outside of the Stony Brook system (i.e. to Optonline, AOL, etc…) it is sent in clear text and anyone can intercept and read it.

• Do NOT use non-SBUH email such as Web Mail (Yahoo, AOL, Hotmail, etc)to conduct business or send information about a patient. If you or one of your vendors feels that this must be done for any reason, call the Help Desk first (631-444-HELP /444-4357)

E-Mail Security – Cont.

E-Mail Should Never Be Used for:

• Inappropriate and nonproductive material

• The misuse of company resources

• Forwarding of confidential information

REMEMBER

Never open any e-mail

if you don’t know the source.

1. Never share your login or password and if you see

someone watching you enter your password, change it.

2. Never browse and look at sensitive information that

you don’t have a need to know to perform your work

responsibilities.

3. Shut down or LOCK your computer at night.

4. Never use Cell Phone Cameras in and around patients

and patient information!

• When leaving your desk log off or:

• Do a CTRL-ALT-DEL

• Then click to “LOCK COMPUTER”

• This assures no one can sit down and your desk

and pretend to be you

Security Best Practices

REPORT SECURITY VIOLATIONS

Compliance Officer - Privacy Officer

Security Officer - University Counsel

Compliance Hotline1-866-623-1480

Report a Security Incident if:

a. You receive an email which includes threats or material that could be

considered harassment.

b. Someone asks you for your password or asks to use your login account.

c. You suspect that someone is inappropriately using confidential data.

d. You discover unauthorized or missing hardware or software.

The SBUH HELP DESK

is here to help!

(631) 444-HELPIf they don’t know,

they’ll assist in pointing you in the right direction.

One of the Hospital’s Most

Valuable Assets is:

The patient information that is stored electronically!!

Patients, Families and the Community trust us to protect it!

Good Security Begins with you!!!

You are the first line of defense in

Information Security!!

COMPLIANCE HOTLINE

•1-866-623-1480• on-line at

• https://www.compliance-helpline.com/sbuh.jsp

• Both Allow for anonymous reporting

COMPLIANCE OFFICE

Located @ 3 Technology Drive, Suite 200

East Setauket, NY 11733-9296

Main Office # (631) 444-5776

99

By clicking the button below, you attest that you have viewed this

presentation and have understood all its contents.

After clicking the button, you will be returned to the

Orientation website.

ATTEST