32
1 © Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission You Think You Are Secure, But Can You Pass a Compliance Audit Or Data Breach Investigation ???

You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

1© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

You Think You Are Secure,

But Can You Pass

a Compliance Audit

Or

Data Breach Investigation

???

Page 2: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

2© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Mike Semel

Mike SemelPresident

Chief Compliance OfficerSEMEL Consulting

35-year IT business owner/manager 12 year certified HIPAA Professional Hospital CIO (2004 – 2006) School District CIO (2007 – 2012) Certified HIPAA Administrator Certified HIPAA Security Professional author Certified Security Compliance Specialist Certified Health IT Consultant Certified Business Continuity Professional Chair, CompTIA Security Community (retired) CompTIA Security Trustmark Plus (holder, development team,

author- quick reference guide, coach)

Page 3: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

3© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Rose Ketchum

• VP, Business Development• 30-year IT industry• Certified HIPAA Security Professional

Page 4: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

4© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

DEFINITION: Security

Security is…

The protection of data against…

LOSS,

THEFT,

and UNAUTHORIZED ACCESS.

Page 5: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

5© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

How to Approach Security

Security is a BUSINESS problem

With a TECHNICAL solution

Page 6: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

6© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

DEFINITION: Compliance

• Having to meet requirements set by others– Governments – federal & state

• HIPAA, GLBA, FFIEC, SEC, FDIC, NCUA, FISMA, CIPA, FERPA, E-Rate, State Breach Laws, State Agency Requirements

– Industry• PCI-DSS, Bar Association Ethics Requirements

– Insurance Companies• Application Requirements

– Client Requirements• Contract Requirements

• Cyber Security Controls

• Data Breach Prevention / Response / Reporting

Page 7: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

7© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Definition: Audits - Investigations

• Audits – Proactive

– Random

– Desk Audits

– Site Audits

• Data Breach Investigations– Reactive

– Triggered by Known or Suspected Breach, or Allegation

Page 8: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

8© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

First Question after Data Breach

How did our IT department #&%%! up to cause this to happen ????!!!!

Page 9: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

9© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Public Sector Data Breach

• Media

• Politicians

• Public

Page 10: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

10© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

What does the person talking to the

public know about computers?

Page 11: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

11© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

CIO – IT Director Scapegoat

Page 12: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

12© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Regulatory Compliance Examples

• HIPAA – applies to health care providers, health plans (including self-funded) & Business Associates that provide services to health care organizations

• State Data Breach Laws – protect Social Security & Driver’s License Numbers

• Cyber Liability Insurance Policy Requirements

• Contracts

Page 13: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

13© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

HIPAA Fundamentals

• Patient Privacy

• Data Security

– Secure Systems – auto lockout, physical security

–Unique User ID, password protection, encryption

• Breach Reporting

– Timely patient notification, government notification

Page 14: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

14© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

• Protected Health Information

– Identifiable

(18 different identifiers)

–Plus treatment and/or diagnostic information

• Electronic Protected Health Information

–PHI in electronic form

–Words, images, voice files

–On any media

What is PHI & ePHI ?

Page 15: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

15© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

PHI & ePHI are EVERYWHERE

ANSWERING SERVICE

Page 16: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

16© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

FBI Warning to Healthcare

The biggest vulnerability (to the security of patient data) was the perception of IT healthcare professionals’ beliefs that their current perimeter defenses and compliance strategies were working when clearly the data states otherwise.

Page 17: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

17© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

2016 HIPAA Audits

• 1,200 audits have started

• Will become permanent program

• Desk Audits – send in required documents

• Site Audits – on-site audits

• 10 days to respond

• Business Associates will also be audited

• If Business Associate fails, Covered Entity fails

Page 18: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

18© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

176 HIPAA Audit Controls2016 HIPAA Audit Protocol List

HIPAA PRIVACY RULE1. Prohibited uses and disclosures - Use and disclosure of genetic information for underwriting purposes2. Deceased individuals3. Confidential communications4. Uses and disclosures consistent with notice5. Disclosures by whistleblowers6. Disclosures by workforce members who are victims of a crime7. Business associate contracts8. Requirements for group health plans9. Requirements for a covered entity with multiple covered functions10. Permitted uses and disclosures11. Consent for uses and disclosures12. Authorizations for uses and disclosures is required13. Compound authorizations – Exceptions14. Prohibition on conditioning of authorizations15. Uses and Disclosures for which an Authorization is Required – Documentation and Content16. Use and Disclosure for Facility Directories; Opportunity to Object17. Uses and Disclosures for Facility Directories in Emergency Circumstances18. Permitted uses and disclosures19. Uses and disclosures with the individual present20. Limited uses and disclosures when the individual is not present21. Uses and disclosures for disaster relief purposes22. Uses and disclosures when the individual is deceased23. Uses and disclosures required by law24. Uses and disclosures for public health activities25. Disclosures about victims of abuse, neglect or domestic violence26. Uses and disclosures for health oversight activities27. Disclosures for judicial and administrative proceedings28. Disclosures for law enforcement purposes29. Disclosures for law enforcement purposes - for identification and location30. Disclosures for law enforcement purposes-- PHI of a possible victim of a crime31. Disclosures for law enforcement purposes-- an individual who has died as a result of suspected criminal conduct32. Disclosures for law enforcement purposes: crime on premises33. Disclosures for law enforcement purposes34. Uses and disclosures about decedents35. Uses and disclosures for cadaveric organ, eye or tissue donation36. Uses and disclosures for research purposes -- Permitted Uses and Disclosures37. Uses and disclosures for research purposes -- Documentation of Waiver Approval38. Uses and disclosures for specialized government functions -- Military39. Uses and disclosures for specialized government functions -- National Security and intelligence activities40. Uses and disclosures for specialized government functions -- Medical Suitability Determinations41. Uses and disclosures for specialized government functions – Correctional institutions42. Uses and disclosures for specialized government functions – Providing public benefits43. Disclosures for workers' compensation44. Requirements for De-Identification of PHI & Re-Identification of PHI45. Minimum Necessary - Disclosures of PHI46. Minimum Necessary requests for protected health information47. Minimum Necessary - Other content requirement48. Limited Data Sets and Data Use Agreements49. Uses and Disclosures for Fundraising50. Uses and Disclosures for Underwriting and Related Purposes51. Verification Requirements52. Notice of Privacy Practices Content requirements53. Provisions of Notice - Health Plans54. Provisions of Notice - Certain Covered Health Care Providers55. Provision of Notice - Electronic Notice56. Joint Notice by Separate Covered Entities57. Documentation58. Right of an Individual to Request Restriction of Uses and Disclosures59. Terminating a Restriction60. Documentation61. Confidential Communications Requirements62. Right to access63. Denial of Access64. Unreviewable grounds for denial65. Reviewable grounds for denial66. Review of denial of access67. Documentation68. Right to Amend69. Denying the Amendment70. Accepting the Amendment71.

Denying the Amendment72. Right to an Accounting of Disclosures of PHI73. Content of the Accounting74. Provision of the Accounting75. Documentation76. Personnel designations77. Training78. Safeguards79. Complaints to the Covered Entity80. Complaints to the Covered Entity81. Mitigation82. Refraining from Intimidating or Retaliatory Acts83. Waiver of rights84. Policies and Procedures85. Documentation

HIPAA SECURITY RULE86. General Requirements87. Flexibility of approach88. Security Management Process89. Security Management Process -- Risk Analysis90. Security Management Process -- Risk Management91. Security Management Process – Sanction Policy92. Security Management Process --Information System Activity Review93. Assigned Security Responsibility94. Workforce Security95. Workforce security -- Authorization and/or Supervision96. Workforce security -- Workforce Clearance Procedure97. Workforce security -- Establish Termination Procedures98. Information Access Management99. Information Access Management -- Isolating Healthcare Clearinghouse Functions100. Information Access Management -- Access Authorization101. Information Access Management -- Access Establishment and Modification102. Security Awareness and Training103. Security Awareness and Training -- Security Reminders104. Security Awareness, Training, and Tools -- Protection from Malicious Software105. Security Awareness, Training, and Tools -- Log-in Monitoring106. Security Awareness, Training, and Tools -- Password Management107. Security Incident Procedures108. Security Incident Procedures -- Response and Reporting109. Contingency Plan110. Contingency Plan – Data Backup Plan111. Contingency Plan –Disaster Recovery Plan112. Contingency Plan -- Emergency Mode Operation Plan113. Contingency Plan -- Testing and Revision Procedure114. Contingency Plan --Application and Data Criticality Analysis115. Evaluation116. Business Associate Contracts and Other Arrangements117. Business Associate Contracts and Other Arrangements -- Written Contract or Other Arrangement118. Facility Access Controls119. Facility Access Controls -- Contingency Operations120. Facility Access Controls -- Facility Security Plan121. Facility Access Controls -- Access Control and Validation Procedures122. Facility Access Controls -- Maintain Maintenance Records123. Workstation Use124. Workstation Security125. Device and Media Controls126. Device and Media Controls – Disposal127. Device and Media Controls -- Media Re-use128. Device and Media Controls – Accountability129. Device and Media Controls -- Data Backup and Storage Procedures130. Access Control131. Access Control -- Unique User Identification132. Access Control -- Emergency Access Procedure133. Access Control -- Automatic Logoff134. Access Control -- Encryption and Decryption135. Audit Controls136. Integrity137. Integrity -- Mechanism to Authenticate ePHI

138. Person or Entity Authentication139. Transmission140. Transmission Security -- Integrity Controls141. Transmission Security –Encryption142. Business Associate Contracts or Other Arrangements143. Business associate contracts.144. Business associate contracts.145. Business associate contracts.146. Other Arrangements147. Business associate contracts with subcontractors148. Requirements for Group Health Plans149. Group Health Plan Implementation Specification150. Group Health Plan Implementation Specification151. Group Health Plan Implementation Specification152. Group Health Plan Implementation Specification153. Policies and Procedures154. Documentation155. Documentation – Time Limit156. Documentation- Availability157. Documentation – Updates

HIPAA DATA BREACH RULE158. Administrative Requirements159. Training160. Complaints161. Sanctions162. Refraining from Retaliatory Acts163. Waiver of Rights164. Policies and Procedures165. Documentation166. Definitions: Breach – Risk Assessment167. Definitions: Breach - exceptions Unsecured PHI168. Notice to Individuals169. Timeliness of Notification170. Content of Notification171. Methods of Notification172. Notification to the Media173. Notification to the Secretary174. Notification by a Business Associate175. Law Enforcement Delay176. Burden of Proof

http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/protocol-current/index.html

71 Data Security Auditable Items

Page 19: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

19© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

71 HIPAA Data Security Audit Controls

Examples

Password Expiration

Unique User Identification

No Terminated Users with Access

Systems with Supported Software

Current Patches & Updates

Data Backed Up Offsite

Page 20: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

20© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

CIO: “We have Security handled”

Network Assessment Scan

Page 21: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

21© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Questionnaire

Page 22: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

22© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Network Scan Results - Passwords

Page 23: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

23© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Questionnaire

Network Assessment Scan Results - Patches

Page 24: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

24© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

OCR Penalties

• $ 100,000 – 5-doctor practice in Phoenix for sending PHIby unsecure e-mails• $ 1.7 million – Alaska state health dept. lost backup drive• $ 1.5 million – Massachusetts hospital stolen laptop• $ 400,000 – university clinic failed firewall• $ 1.2 million – data left on copier hard drives at end of lease• $ 150,000 – lost thumb drive• $ 1.7 million – lost unencrypted laptop, was listed in Risk Analysis• $ 4.8 million – two NYC hospitals – doctor used own server & published patient info

to Internet• $ 150,000 – Non-profit mental health clinic – no firewall/unsupported software• $ 750,000 – small cancer radiology group – stolen bag with laptop & backup media• $ 750,000 – ortho clinic – sharing PHI without a Business Associate Agreement• Plus costs to notify patients & remediate problems• Publication on the HIPAA ‘Wall of Shame’

Page 25: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

25© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Lawsuits

• Medical Malpractice

– Medical Treatment

– Complaint from 1 patient

– Insurance coverage

– Liability Limitations

Then -

• Medical Malpractice– Data Breach– Complaint from ALL patients

at same time– Insurance coverage ???– Liability Limitations ???

• Breach of Contract• Negligent Misrepresentation

– Court considered Notice of Privacy Practices a contract with patients

– Complaint from ALL patients at same time

– Insurance ???

Now -

Page 26: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

26© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Cyber Liability Insurance

Columbia Casualty alleges that Cottage Health's application for coverage under the Columbia policy "contained misrepresentations and/or omissions of material fact that were made negligently or with intent to deceive concerning Cottage's data breach risk controls," according to the insurer's lawsuit.

Page 27: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

27© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Security & Compliance

Page 28: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

28© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

More than Technology Tools

Page 29: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

29© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

How to Manage Compliance

• Understand Compliance Regulations

• Pay Attention to the Details

– Review Reports

– Check Devices

– Demand appropriate documentation

• Trust but Verify

• Get Independent Opinion

• Repeat

Page 30: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

30© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

How to Get Budget

• Tie technology to business needs

• School District receives $ 1 million E-Rate Funding

• E-Rate requires compliance with Children’s Internet Protection Act (CIPA)

• CIPA compliance required $ 50,000 in new firewalls

• School Board Presentation connected the dots

“To protect our $ 1 million E-Rate funding we only

need to spend $ 50,000 on firewalls.”

• Immediate vote to purchase firewalls

Page 31: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

31© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

Security is Mostly People

https://www.youtube.com/watch?v=opRMrEfAIiI

Page 32: You Think You Are Secure, But Can You Pass · 176 HIPAA Audit Controls 2016 HIPAA Audit Protocol List HIPAA PRIVACY RULE 1. Prohibited uses and disclosures - Use and disclosure of

32© Copyright 2016 Semel Consulting LLC ALL RIGHTS RESERVED – Slides and Cartoons may not be shared without permission

• Outsourced Security Officer Services• Assessments• HIPAA Compliance Remediation• Meaningful Use Security Risk Analysis• Work with practice & IT staff/provider

Mike Semel – [email protected] 888-997-3635 x101