SlideShare a Scribd company logo
1 of 7
HIPAA Compliance Scenario:
MA Healthcare
by
Brian Wong
September 11th
, 2014
Modern healthcare providers using Electronic Health Records can be targets of security
breaches. MA Healthcare inc. is a large regional healthcare provider and participates using Electronic
Health Records (EHR). It was discovered in a recent audit of the EHR system that multiple user
accounts were created and over the span of 2 weeks, these accounts were elevated to privileges that
would allow access to both clinical and financial records.
Approximately 37,000 to 50,000 records could have been accessed. No apparent damage was
done, an investigation is underway to ascertain the extent of the information breach. There is a lack of
audit logs since they overwrite themselves every two weeks. Though, the accounts were created
sometime ago (6 months), there is a glaring coincidence that the audit logs, which would assist the
investigation in determining the source of the account creation as well as who was elevating these
accounts. This could imply that the breach was done from the inside.
According to the National Institute of Standards and Technologies (NIST) , the Health
Insurance Portability and Accountability Act (HIPAA) indicate that all EHR records and systems are
maintained with security policies that are intended to protect and deter cyber attacks both externally
and internally (NIST Special Publication 800-66 Revision 1). Stephen S. Wu indicates from 42 U.S.C.
1320d-2 of HIPAA “each Covered Entitiy that maintains or transmits health information maintain
reasonable, and appropriate administrative, technical and physical safeguards.(Stephen S. Wu (2007))
There are three security principles that should be adhered to provide safeguards against said breaches.
1. Administrative – is a safeguard policy that is to provide stated and written standards, guidelines,
and procedures that would permit only the most qualified personnel to grant, promote, and
prevent access to system resources. Procedures that indicate how personnel are permitted
access, educated, and awareness of security training policies must be granted by expressed
written consent by their management. Requests of this nature would need to be specific to
exactly what kind of account it would be, what permissions the person would be given, and
systems that the user would need access to.
In the case for MA Healthcare Inc., the adoption of the Administrative policy would include a
review of all administrative accounts as well as the employees using these accounts. The review would
further include but not be limited to the review of the existing audit policies, justification, and approval
of senior administrative personnel upon account permission elevation. All administrators would be
required to attend cyber security and awareness training.
2. Technical – A safeguard policy that oversees authentication of its users and ensures that
information protected maintains its confidentiality, integrity, and authenticity (CIA). These
would be defined in (Matthew Scholl, Kevin Stine, Joan Hash, Pauline Bowen, Arnold
Johnson, Carla Dancy Smith, and Daniel I. Steinberg, U.S. Department of Commerce,
National Institute of Standards and Technology (2008).) Multiple methods of authentication
can be verified, this includes:
1. Biometric verification (example: retina or fingerprint scan)
2. Multi factor key authentication (examples: Key “FOB” that autogenerates a new PIN
for users to use along with their passwords)
3. Network and system group/role based access. (example: active directory or Novell
Lightweight directory services (LDAP))
The latter (#3) specifically addresses the access/authentication processes that authorized
personnel would be granted under their respective Group or role. For MA Healthcare, all accounts
would be assigned to a group that would include their respective roles. The application of this policies
would reinforce the Confidentiality, Authentication and Integrity of the Electronic Health Record
systems.
3. Physical – An important step in protecting electronic protected health information (EPHI) is to
implement reasonable and appropriate physical safeguards fro information systems and related
equipment and facilities. (U.S. Department of Health & Human Services (2005).) Software
or data backups of core systems like routers, firewalls, servers, etc should have be robust and
routine. Core systems should be enabled to prevent unauthorized access (physical and logical)
from both internal and external threats. Traffic should be encrypted bidirectionally when it
needs to leave the core infrastructure. All users would be prohibited from using USB or
external storage devices of any kind as well as ports such as bluetooth, IR, etc should be
disabled unless expressed permission from an Administrator has been granted
MA Healthcare’s password policy would need the following revision. All passwords would
require a minimum 8-12 characters, non-dictionary or actual words, upper and lower case, 2-4 numbers
and a special character. No standard names or common key patterns (eg. QWERTY) should not be
used. Password recovery would require a management or some kind of administrator to re-approve
account access. Password usage may not include similar patterns of the last ten previously used
passwords. All passwords would require being changed every 90 days or expire automatically however
advanced notice would be provided to inform users of an upcoming expiration with an oppurtunity to
change their passwords.
A well known organization that has a focus on information security, SANS institute, has
security guidance for password protection, complexity, and routine frequency of change of the
password which is documented under the Password Requirements policy (SAN. (nd)). This is also
indicated in ISO 27001:2005 standard. This guidance provides password lockout policies is geared to
prevent password guessing and cracking. The policy outlined makes for a reasonable amount of
security without impeding or creating an administrative nightmare for the administrators.
Updating the policies on both users and passwords can dramatically improve the security
position against unauthorized access. Provided that both polices are documented and training for both
new and existing users is essential to ensuring that confidentiality and integrity of the data is protected.
The added security further ensures that users are accountable for how they work and access the data
entrusted to them. Management signatures authorizing access also adds an escalation of responsibility
for the overall new user authentication policy.
EHR's are protected under the guidelines set forth by HIPAA. The three safeguard policies
mentioned above enhance these protections while maintaining “CIA” as described by the NIST. While
these policies will continually be updated to reflect the best practices on current environmental
changes, their core intentions have a solid foundation as described by HIPAA.
References:
Matthew Scholl, Kevin Stine, Joan Hash, Pauline Bowen, Arnold Johnson, Carla Dancy Smith, and
Daniel I. Steinberg, U.S. Department of Commerce, National Institute of Standards and Technology
(2008). An Introductory Resource Guide for Implementing the Health Insurance Portability and
Accountability Act (HIPAA) Security (Rule NIST Special Publication 800-66 Revision 1).
http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/nist80066.pdf
Stephen S. Wu, American Bar Association (2007). Guide to HIPAA Security and the Law
U.S. Department of Health & Human Services (2006). HIPAA Security Guidance,
http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf
SANS Institute. Password Policy. Retrieved October 1st
, 2014, from http://www.sans.org/security-
resources/policies/general/pdf/password-protection-policy
U.S. Department of Health & Human Services (2005). HIPAA Security Series,
http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf
Karen Scarfone, Murugiah Souppaya, National Institute of Standards and Technology (2009), Guide to
Enterprise Password Management (Draft). http://csrc.nist.gov/publications/drafts/800-118/draft-
sp800-118.pdf
sp800-118.pdf

More Related Content

What's hot

CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.comDavisMurphyA98
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comdonaldzs9
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comrobertlesew5
 
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.comDavis10a
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.comjonhson198
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.comDavisMurphyA97
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comdonaldzs7
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comdonaldzs7
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comclaric240
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comKeatonJennings104
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comagathachristie112
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comVSNaipaul15
 

What's hot (20)

CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 

Viewers also liked

North of Lehigh Plan--Executive Summary
North of Lehigh Plan--Executive SummaryNorth of Lehigh Plan--Executive Summary
North of Lehigh Plan--Executive SummaryCarla Castillo
 
Kenya Collins (G) Resume 2015
Kenya Collins (G) Resume 2015Kenya Collins (G) Resume 2015
Kenya Collins (G) Resume 2015Kenya Collins
 
ROY Resume` 2015
ROY Resume` 2015ROY Resume` 2015
ROY Resume` 2015Roy Dean
 
Triệu chứng thường gặp của bệnh viêm khớp
Triệu chứng thường gặp của bệnh viêm khớpTriệu chứng thường gặp của bệnh viêm khớp
Triệu chứng thường gặp của bệnh viêm khớptory103
 
Friends with benifits
Friends with benifitsFriends with benifits
Friends with benifitsRyan Pugh
 
Magik Theatre Pre-Visit Story
Magik Theatre Pre-Visit StoryMagik Theatre Pre-Visit Story
Magik Theatre Pre-Visit Storycgentry74
 
Recommendation system
Recommendation systemRecommendation system
Recommendation systemRishabh Mehta
 
Connaitre les pratiques numériques et l'offre culturelle sur Internet
Connaitre les pratiques numériques et l'offre culturelle sur InternetConnaitre les pratiques numériques et l'offre culturelle sur Internet
Connaitre les pratiques numériques et l'offre culturelle sur InternetBruno Méraut
 
Plan de developpement de france pro conseil
Plan de developpement de france pro conseilPlan de developpement de france pro conseil
Plan de developpement de france pro conseildgerne06270
 
Prentacionde la instalacion de windows server 2008
Prentacionde la instalacion de windows server 2008Prentacionde la instalacion de windows server 2008
Prentacionde la instalacion de windows server 2008gerardopelochas
 
Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...
Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...
Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...Bruno Méraut
 
Conception d'outils de médiation numérique
Conception d'outils de médiation numériqueConception d'outils de médiation numérique
Conception d'outils de médiation numériqueBruno Méraut
 
Journée de lutte contre la surveillance massive
Journée de lutte contre la surveillance massiveJournée de lutte contre la surveillance massive
Journée de lutte contre la surveillance massiveJulie PAYET
 

Viewers also liked (15)

North of Lehigh Plan--Executive Summary
North of Lehigh Plan--Executive SummaryNorth of Lehigh Plan--Executive Summary
North of Lehigh Plan--Executive Summary
 
Kenya Collins (G) Resume 2015
Kenya Collins (G) Resume 2015Kenya Collins (G) Resume 2015
Kenya Collins (G) Resume 2015
 
ROY Resume` 2015
ROY Resume` 2015ROY Resume` 2015
ROY Resume` 2015
 
Triệu chứng thường gặp của bệnh viêm khớp
Triệu chứng thường gặp của bệnh viêm khớpTriệu chứng thường gặp của bệnh viêm khớp
Triệu chứng thường gặp của bệnh viêm khớp
 
Friends with benifits
Friends with benifitsFriends with benifits
Friends with benifits
 
B7 ppt
B7 pptB7 ppt
B7 ppt
 
doc
docdoc
doc
 
Magik Theatre Pre-Visit Story
Magik Theatre Pre-Visit StoryMagik Theatre Pre-Visit Story
Magik Theatre Pre-Visit Story
 
Recommendation system
Recommendation systemRecommendation system
Recommendation system
 
Connaitre les pratiques numériques et l'offre culturelle sur Internet
Connaitre les pratiques numériques et l'offre culturelle sur InternetConnaitre les pratiques numériques et l'offre culturelle sur Internet
Connaitre les pratiques numériques et l'offre culturelle sur Internet
 
Plan de developpement de france pro conseil
Plan de developpement de france pro conseilPlan de developpement de france pro conseil
Plan de developpement de france pro conseil
 
Prentacionde la instalacion de windows server 2008
Prentacionde la instalacion de windows server 2008Prentacionde la instalacion de windows server 2008
Prentacionde la instalacion de windows server 2008
 
Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...
Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...
Les ressources numériques en ligne pour les bibliothécaires : L’offre culture...
 
Conception d'outils de médiation numérique
Conception d'outils de médiation numériqueConception d'outils de médiation numérique
Conception d'outils de médiation numérique
 
Journée de lutte contre la surveillance massive
Journée de lutte contre la surveillance massiveJournée de lutte contre la surveillance massive
Journée de lutte contre la surveillance massive
 

Similar to HIPAA compliance MA Healthcare scenario

Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfmohammedfootwear
 
Electronic Health Record (EHR)
Electronic Health Record (EHR)Electronic Health Record (EHR)
Electronic Health Record (EHR)sourav goswami
 
Week 1 confidentiality discussion 2
Week 1 confidentiality discussion 2Week 1 confidentiality discussion 2
Week 1 confidentiality discussion 2relewi1385
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
Survey of open source health information systems
Survey of open source health information systemsSurvey of open source health information systems
Survey of open source health information systemshiij
 
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS hiij
 
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docxCYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docxtheodorelove43763
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associatesgppcpa
 
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical ResearchMosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical ResearchMosio
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.comBaileyabw
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cistb45004
 

Similar to HIPAA compliance MA Healthcare scenario (19)

Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
CIS Project
CIS ProjectCIS Project
CIS Project
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
Electronic Health Record (EHR)
Electronic Health Record (EHR)Electronic Health Record (EHR)
Electronic Health Record (EHR)
 
Week 1 confidentiality discussion 2
Week 1 confidentiality discussion 2Week 1 confidentiality discussion 2
Week 1 confidentiality discussion 2
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Survey of open source health information systems
Survey of open source health information systemsSurvey of open source health information systems
Survey of open source health information systems
 
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS
 
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docxCYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical ResearchMosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
 
Evaluation of A CIS
Evaluation of A CISEvaluation of A CIS
Evaluation of A CIS
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cis
 

HIPAA compliance MA Healthcare scenario

  • 1. HIPAA Compliance Scenario: MA Healthcare by Brian Wong September 11th , 2014
  • 2. Modern healthcare providers using Electronic Health Records can be targets of security breaches. MA Healthcare inc. is a large regional healthcare provider and participates using Electronic Health Records (EHR). It was discovered in a recent audit of the EHR system that multiple user accounts were created and over the span of 2 weeks, these accounts were elevated to privileges that would allow access to both clinical and financial records. Approximately 37,000 to 50,000 records could have been accessed. No apparent damage was done, an investigation is underway to ascertain the extent of the information breach. There is a lack of audit logs since they overwrite themselves every two weeks. Though, the accounts were created sometime ago (6 months), there is a glaring coincidence that the audit logs, which would assist the investigation in determining the source of the account creation as well as who was elevating these accounts. This could imply that the breach was done from the inside. According to the National Institute of Standards and Technologies (NIST) , the Health Insurance Portability and Accountability Act (HIPAA) indicate that all EHR records and systems are maintained with security policies that are intended to protect and deter cyber attacks both externally and internally (NIST Special Publication 800-66 Revision 1). Stephen S. Wu indicates from 42 U.S.C. 1320d-2 of HIPAA “each Covered Entitiy that maintains or transmits health information maintain reasonable, and appropriate administrative, technical and physical safeguards.(Stephen S. Wu (2007)) There are three security principles that should be adhered to provide safeguards against said breaches. 1. Administrative – is a safeguard policy that is to provide stated and written standards, guidelines, and procedures that would permit only the most qualified personnel to grant, promote, and prevent access to system resources. Procedures that indicate how personnel are permitted access, educated, and awareness of security training policies must be granted by expressed
  • 3. written consent by their management. Requests of this nature would need to be specific to exactly what kind of account it would be, what permissions the person would be given, and systems that the user would need access to. In the case for MA Healthcare Inc., the adoption of the Administrative policy would include a review of all administrative accounts as well as the employees using these accounts. The review would further include but not be limited to the review of the existing audit policies, justification, and approval of senior administrative personnel upon account permission elevation. All administrators would be required to attend cyber security and awareness training. 2. Technical – A safeguard policy that oversees authentication of its users and ensures that information protected maintains its confidentiality, integrity, and authenticity (CIA). These would be defined in (Matthew Scholl, Kevin Stine, Joan Hash, Pauline Bowen, Arnold Johnson, Carla Dancy Smith, and Daniel I. Steinberg, U.S. Department of Commerce, National Institute of Standards and Technology (2008).) Multiple methods of authentication can be verified, this includes: 1. Biometric verification (example: retina or fingerprint scan) 2. Multi factor key authentication (examples: Key “FOB” that autogenerates a new PIN for users to use along with their passwords) 3. Network and system group/role based access. (example: active directory or Novell Lightweight directory services (LDAP)) The latter (#3) specifically addresses the access/authentication processes that authorized personnel would be granted under their respective Group or role. For MA Healthcare, all accounts would be assigned to a group that would include their respective roles. The application of this policies would reinforce the Confidentiality, Authentication and Integrity of the Electronic Health Record
  • 4. systems. 3. Physical – An important step in protecting electronic protected health information (EPHI) is to implement reasonable and appropriate physical safeguards fro information systems and related equipment and facilities. (U.S. Department of Health & Human Services (2005).) Software or data backups of core systems like routers, firewalls, servers, etc should have be robust and routine. Core systems should be enabled to prevent unauthorized access (physical and logical) from both internal and external threats. Traffic should be encrypted bidirectionally when it needs to leave the core infrastructure. All users would be prohibited from using USB or external storage devices of any kind as well as ports such as bluetooth, IR, etc should be disabled unless expressed permission from an Administrator has been granted MA Healthcare’s password policy would need the following revision. All passwords would require a minimum 8-12 characters, non-dictionary or actual words, upper and lower case, 2-4 numbers and a special character. No standard names or common key patterns (eg. QWERTY) should not be used. Password recovery would require a management or some kind of administrator to re-approve account access. Password usage may not include similar patterns of the last ten previously used passwords. All passwords would require being changed every 90 days or expire automatically however advanced notice would be provided to inform users of an upcoming expiration with an oppurtunity to change their passwords. A well known organization that has a focus on information security, SANS institute, has security guidance for password protection, complexity, and routine frequency of change of the password which is documented under the Password Requirements policy (SAN. (nd)). This is also indicated in ISO 27001:2005 standard. This guidance provides password lockout policies is geared to prevent password guessing and cracking. The policy outlined makes for a reasonable amount of security without impeding or creating an administrative nightmare for the administrators.
  • 5. Updating the policies on both users and passwords can dramatically improve the security position against unauthorized access. Provided that both polices are documented and training for both new and existing users is essential to ensuring that confidentiality and integrity of the data is protected. The added security further ensures that users are accountable for how they work and access the data entrusted to them. Management signatures authorizing access also adds an escalation of responsibility for the overall new user authentication policy. EHR's are protected under the guidelines set forth by HIPAA. The three safeguard policies mentioned above enhance these protections while maintaining “CIA” as described by the NIST. While these policies will continually be updated to reflect the best practices on current environmental changes, their core intentions have a solid foundation as described by HIPAA. References: Matthew Scholl, Kevin Stine, Joan Hash, Pauline Bowen, Arnold Johnson, Carla Dancy Smith, and Daniel I. Steinberg, U.S. Department of Commerce, National Institute of Standards and Technology (2008). An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security (Rule NIST Special Publication 800-66 Revision 1). http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/nist80066.pdf Stephen S. Wu, American Bar Association (2007). Guide to HIPAA Security and the Law U.S. Department of Health & Human Services (2006). HIPAA Security Guidance, http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf SANS Institute. Password Policy. Retrieved October 1st , 2014, from http://www.sans.org/security- resources/policies/general/pdf/password-protection-policy U.S. Department of Health & Human Services (2005). HIPAA Security Series, http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf Karen Scarfone, Murugiah Souppaya, National Institute of Standards and Technology (2009), Guide to Enterprise Password Management (Draft). http://csrc.nist.gov/publications/drafts/800-118/draft-