0
eHealth Privacy and SecurityPlain Talk in Complex Times<br />By: Ira J. Rothman, MBA, CPHIMS, CIPP<br />Senior Vice Presid...
Agenda<br />eHealth Privacy in the News<br />eHealth Privacy Concerns<br />HIPAA – the Legal Basis for eHealth Privacy<br ...
eHealth Privacy in the News<br />Privacy issues getting major attention by Congress and the media<br />New York Times fron...
eHealth Privacy in the News<br />HHS Recently Sent Breach Report to Congress<br />Department of Health and Human Services ...
eHealth Privacy Concerns<br />What is privacy?<br />The right to keep something confidential until the owner chooses to re...
HIPAA – the Legal Basis for eHealth Privacy<br />HIPAA stands for the Health Insurance Portability and Accountability Act ...
The HIPAA Privacy Rule and PHI<br />The HIPAA Privacy Rule states that health care organizations must protect the privacy ...
State Privacy and Security Regulations<br />45 states have laws governing privacy and security<br />Most deal with electro...
eHealth Security Concerns<br />What is security?<br />Security is the degree of protection against danger, damage and loss...
Privacy Actions You Should Take<br />Create strong privacy and security policies and procedures<br />Enforce policies with...
Privacy Actions You Should Take<br />Make sure subcontractors are following HIPAA privacy regulations<br />Many subcontrac...
Security Actions You Should Take<br />Focus on reducing corporate and personal risks<br />Use strong passwords<br />8 digi...
Security Actions You Should Take<br />Don’t post personal information on web sites that may be subject to breach, e.g., Fa...
Security Actions You Should Take<br />Educate staff and family<br />Malware or malicious software includes<br />Trojans<br...
Questions?<br />Contact information<br />Ira J. Rothman<br />Senior Vice President – Privacy Official<br />MAXIMUS, Inc.<b...
Upcoming SlideShare
Loading in...5
×

Ira Rothman - eHealth Privacy and Security

797

Published on

"eHealth Privacy and Security" was presented at the Center for Health Literacy Conference 2011: Plain Talk in Complex Times by Ira J. Rothman, MBA, CPHIMS, CIPP, Senior Vice President and Privacy Official, MAXIMUS.

Description: This session will provide an overview of the principal eHealth privacy and security issues. Understand the basic privacy and security issues that impact Protected Health Information (PHI) and what you can do to protect yourself and your patients or clients.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
797
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Ira Rothman - eHealth Privacy and Security"

  1. 1. eHealth Privacy and SecurityPlain Talk in Complex Times<br />By: Ira J. Rothman, MBA, CPHIMS, CIPP<br />Senior Vice President – Privacy Official<br />September 23, 2011<br />
  2. 2. Agenda<br />eHealth Privacy in the News<br />eHealth Privacy Concerns<br />HIPAA – the Legal Basis for eHealth Privacy<br />eHealth Security Concerns<br />Privacy Actions You Should Take<br />Security Actions You Should Take<br />Questions<br />Sept 23, 2011<br />2<br />
  3. 3. eHealth Privacy in the News<br />Privacy issues getting major attention by Congress and the media<br />New York Times front page Friday, Sept 9, 2011<br />Medical Data of Thousands Posted Online<br />Billing Vendor Handled Leaked Records<br />“Everyone with an electronic medical record is at risk, and that means everyone.”<br />Sept 23, 2011<br />3<br />
  4. 4. eHealth Privacy in the News<br />HHS Recently Sent Breach Report to Congress<br />Department of Health and Human Services (HHS) reported to Congress that 5.4 million individuals were affected by breaches of protected health information (PHI) in 2010<br />207 breaches involved over 500 individuals per breach<br />5.4 million individuals notified<br />25,000 breaches involved less than 500 individuals per breach<br />50,000 individuals notified<br />Five general causes in the report of large breaches<br />Theft<br />Loss of electronic media or paper records containing PHI<br />Unauthorized access to, use, or disclosure of PHI<br />Human error<br />Improper disposal<br />Majority of small breaches involved misdirected communications and affected just one individual each on average.<br />Sept 23, 2011<br />4<br />
  5. 5. eHealth Privacy Concerns<br />What is privacy?<br />The right to keep something confidential until the owner chooses to reveal it.<br />E.g., sending an envelope with the contents not revealed. The information inside remains private until the addressee opens the envelope.<br />What is Protected Health Information (PHI)?<br />Who defines it?<br />Who can look at it?<br />Common concerns<br />Medical staff and others looking at PHI they have no need or right to review<br />Employers and others (e.g., government, police) reviewing PHI to make decisions<br />Outsiders gaining access to private emails<br />Sept 23, 2011<br />5<br />
  6. 6. HIPAA – the Legal Basis for eHealth Privacy<br />HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. <br />HIPAA sets federal requirements for handling Protected Health Information (PHI). It gives individuals privacy rights and imposes requirements on health-related companies including providers, insurers, and government agencies on how to handle PHI.<br />The HIPAA rules were modified by the American Recovery and Reinvestment Act (ARRA) effective February 18, 2009.<br />Includes the Health Information Technology for Economic and Clinical Health (HITECH) Act<br />Extends privacy and security coverage to business associates<br />Establishes breach notification requirements<br />Maximum penalty amount of $1.5 million<br />Sept 23, 2011<br />6<br />
  7. 7. The HIPAA Privacy Rule and PHI<br />The HIPAA Privacy Rule states that health care organizations must protect the privacy of individual's medical records and other personal health information. Individual's data must be protected from intentional or unintentional use or disclosure, except for legitimate medical or business reasons.<br />Protected Health Information (PHI) is information that can be used to identify an individual or that relates to that individual's:<br />Past, present or future physical or mental condition<br />Health care provided to that individual<br />Payment for health care<br />PHI includes all individually identifiable health information. This includes:<br />Name, address, phone numbers, date of birth <br />Social Security Number<br />Payment for health care<br />Insurance coverage or enrollment/disenrollment<br />Medical, dental, or prescription drug records<br />Health plan beneficiary number<br />Participation status in a government program<br />Hospital admittance and discharge dates<br />Sept 23, 2011<br />7<br />
  8. 8. State Privacy and Security Regulations<br />45 states have laws governing privacy and security<br />Most deal with electronic transmission of data on the internet or breaches of personal information<br />Personal information can include name, social security number, credit card number, birth date and other identifying information<br />Penalties often include civil fines<br />Sept 23, 2011<br />8<br />
  9. 9. eHealth Security Concerns<br />What is security?<br />Security is the degree of protection against danger, damage and loss.<br />E.g., Sending an envelope with the contents protected from prying eyes. Security is the ability to keep the envelope from being opened or see inside until it arrives at the addressee and they decide to open it.<br />What are common eHealth Security concerns?<br />Personal information including health and financial information being available on the internet for anyone to see<br />Employers, contractors, vendors or others with personal information databases may inadvertently expose the data to search engines, e.g., Google, violating privacy.<br />Information sent over the internet may be intercepted.<br />Information on hard drives or other portable storage devices containing PHI being lost or stolen. Someone can then sell this information or use it for identity theft.<br />PHI in electronic records being looked at by people that have no need or right to look at<br />Sept 23, 2011<br />9<br />
  10. 10. Privacy Actions You Should Take<br />Create strong privacy and security policies and procedures<br />Enforce policies with sanctions<br />Required by HIPAA<br />Have a sanctions policy defining penalties for serious violations, e.g., removing PHI from the facility against policy, unauthorized access.<br />Define who can look at PHI<br />Only those with a need to know<br />Define security policies and procedures to support the privacy policy<br />Control and log access<br />Privacy and security need to work together<br />Educate staff concerning privacy and security<br />HIPAA requires training appropriate to employee job responsibilities<br />Deliver annual refresher<br />Value staff who recognize privacy risks and correct or report them<br />Sept 23, 2011<br />10<br />
  11. 11. Privacy Actions You Should Take<br />Make sure subcontractors are following HIPAA privacy regulations<br />Many subcontractors (also called business associates) that handle PHI may not have adequate privacy and security policies and procedures in place<br />A legal agreement (business associate agreement) is required by HIPAA defining their responsibilities<br />Conduct audits to verify compliance<br />Frequent cause of breaches is subcontractor lack of attention to privacy and security<br />Don’t forget to shred paper<br />Cross cut shredder best for shredding documents containing PHI<br />Perform a risk assessment<br />Survey the environment with an open mind to identify risks<br />Develop and implement a strategy to mitigate risks<br />Sept 23, 2011<br />11<br />
  12. 12. Security Actions You Should Take<br />Focus on reducing corporate and personal risks<br />Use strong passwords<br />8 digits consisting of upper and lower case letters and numbers and special characters.<br />Don’t use easily guessed words<br />Put a password on your smartphone or tablet<br />Have the password automatically set after a short period of time, e.g., 10 minutes<br />Don’t use wifi in a public place to access a website containing personal information<br />Particularly be aware of web sites that don’t use https as part of the web address<br />Wifi can be intercepted<br />Don’t use email or text messages or Twitter to send personal information<br />Only use encryption, if available for email.<br />Sept 23, 2011<br />12<br />
  13. 13. Security Actions You Should Take<br />Don’t post personal information on web sites that may be subject to breach, e.g., Facebook.<br />Privacy policies change frequently with no notice<br />Private information may be made public<br />Use antivirus software<br />Detects and removes malicious software<br />Keep up to date with subscriptions<br />Can detect and protect against new threats<br />Use encryption<br />Makes data unreadable to unauthorized viewers.<br />Encrypt data on hard drives and other removable memory, e.g. USB sticks.<br />Commercial software is available to encrypt entire hard drives.<br />Make sure meets standard of FIPS 140-2 (i.e., standard set by Federal agency)<br />Common cause of data breach is lack of appropriate encryption.<br />Sept 23, 2011<br />13<br />
  14. 14. Security Actions You Should Take<br />Educate staff and family<br />Malware or malicious software includes<br />Trojans<br />Viruses<br />Hoaxes<br />Phishing<br />Worms<br />Hackers<br />Don’t open unsolicited attachments.<br />Malware may be hidden in the attachment<br />User should lock screens when not at desk.<br />Set screen saver password<br />Don’t click on popup ads while surfing the web.<br />Another opportunity for malware to be installed.<br />Report strange activity to network administration.<br />Could reflect malware installed on computer<br />Sept 23, 2011<br />14<br />
  15. 15. Questions?<br />Contact information<br />Ira J. Rothman<br />Senior Vice President – Privacy Official<br />MAXIMUS, Inc.<br />Email: IraRothman@maximus.com<br />Phone: 916-673-4152<br />Sept 23, 2011<br />15<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×