SlideShare a Scribd company logo
Healthcare:	
  HIPAA	
  &	
  HITECH	
  Compliance	
  	
  	
  	
  
	
  	
  	
  	
  	
  	
  Copyright	
  ©2015	
  aPersona,	
  Inc.	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  sales@apersona.com	
  	
  	
  	
  	
  -­‐	
  	
  	
  	
  	
  	
  	
  www.apersona.com	
  	
  	
  	
  	
  -­‐	
  	
  	
  	
  	
  	
  866-­‐229-­‐0177	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  v2.0	
  
Healthcare	
  IT	
  organizations	
  and	
  Healthcare	
  Services	
  companies	
  are	
  required	
  to	
  comply	
  and	
  adhere	
  to	
  Health	
  Insurance	
  Portability	
  
&	
  Accountability	
  Act	
  (HIPAA)	
  and	
  Health	
  Information	
  Technology	
  for	
  Economic	
  Health	
  (HITECH)	
  rules	
  and	
  regulations.	
  	
  
HIPAA/HITECH  Multi-­‐Factor  &  2-­‐Factor  Recommendations  
Historically,	
  HIPAA	
  and	
  HITECH	
  standards	
  for	
  authentication	
  have	
  recommended	
  multi-­‐factor	
  and	
  two-­‐factor	
  authentication	
  (M2FA)	
  
for	
  access	
  to	
  Electronic	
  Protected	
  Health	
  Information	
  (EPHI)	
  and	
  are	
  steadily	
  progressing	
  toward	
  requiring	
  M2FA.	
  	
  	
  
• December	
  2006:	
  	
  HIPAA	
  Security	
  Guidance	
  Highlights	
  2-­‐Factor	
  Authentication	
  for	
  EPHI	
  Access	
  
• September	
  2012:	
  DHHS	
  ONC	
  recommends	
  NIST	
  LOA3	
  Multi-­‐Factor	
  Assurance	
  
• February	
  2014:	
  	
   DHHS	
  Proposed	
  Rules	
  Seeking	
  Inclusion	
  of	
  2-­‐Factor	
  for	
  2017	
  Edition	
  Rulemaking	
  
• October	
  2015:	
  Final	
  Meaningful	
  Use	
  Stage	
  3	
  Requirements	
  and	
  Timeline	
  Announced	
  with	
  strong	
  indications	
  that	
  multi-­‐
factor	
  authentication	
  will	
  be	
  a	
  part	
  of	
  future	
  requirements.	
  
HITECH  Violations  and  Penalties  
At	
  the	
  same	
  time,	
  Violations	
  &	
  Respective	
  Penalty	
  Amounts	
  have	
  been	
  amended	
  and	
  updated	
  to	
  include	
  4	
  Violation	
  categories	
  
each	
  of	
  which	
  carry	
  a	
  maximum	
  penalty	
  of	
  $1.5M.	
  HITECH	
  Act	
  Enforcement	
  Interim	
  Final	
  Rule	
  
CATEGORIES	
  OF	
  VIOLATIONS	
  AND	
  RESPECTIVE	
  PENALTY	
  AMOUNTS	
  AVAILABLE	
  
Violation	
  Category	
  –	
  Section	
  1176(a)(1)	
   Each	
  Violation	
   All	
  such	
  violations	
  of	
  an	
  identical	
  provision	
  in	
  a	
  calendar	
  year.	
  
(A) Did	
  Not	
  Know……………………………….	
   $100-­‐$50,000	
   $1,500,000	
  
(B) Reasonable	
  Cause………………………..	
   $1,000-­‐$50,000	
   $1,500,000	
  
(C)(i)	
  	
  	
  	
  	
  Willful	
  Neglect-­‐Corrected………………..	
   $10,000-­‐$50,000	
   $1,500,000	
  
(C)(ii)	
  	
  	
  	
  	
  Willful	
  Neglect-­‐Not	
  Corrected…………	
   $50,000	
   $1,500,000	
  
	
  
Over  95%  of  Data  Breaches  Result  from  Exploitation  of  Weak  or  Stolen  Credentials  
At	
  the	
  intersection	
  of	
  the	
  current	
  regulatory	
  guidance	
  path	
  for	
  advanced	
  multi-­‐factor	
  &	
  2-­‐Factor	
  authentication,	
  and	
  the	
  current	
  
penalties	
  associated	
  with	
  EPHI	
  violations	
  lies	
  the	
  fact	
  that	
  over	
  95%	
  of	
  data	
  breaches	
  result	
  from	
  the	
  exploitation	
  of	
  weak	
  or	
  stolen	
  
credentials	
  (Verizon	
  2014	
  Data	
  Breach	
  Report).	
  	
  
What  Should  You  Do?  How  Can  You  Prepare?  
Given	
  the	
  projected	
  HIPAA	
  &	
  HITECH	
  authentication	
  requirements,	
  current	
  escalating	
  penalties	
  and	
  data	
  breach	
  risks	
  associated	
  
with	
  accessing	
  Electronic	
  Protected	
  Health	
  Information,	
  it	
  is	
  abundantly	
  clear	
  that	
  your	
  organization	
  should	
  have	
  an	
  active	
  and	
  
progressing	
  multi-­‐factor/2-­‐factor	
  authentication	
  strategy	
  in	
  place.	
  
If	
  you	
  have	
  spent	
  much	
  time	
  on	
  this	
  topic	
  and	
  reviewed	
  M2FA	
  products	
  and	
  solutions	
  you	
  have	
  likely	
  discovered	
  a	
  number	
  of	
  road	
  
blocks.	
  	
  
• Expensive	
  per/user	
  licensing	
  fees	
  are	
  simply	
  out	
  of	
  line	
  with	
  the	
  reality	
  of	
  today’s	
  user	
  populations.	
  
• Lack	
  of	
  intelligence	
  and	
  adaptability	
  forces	
  users	
  to	
  jump	
  through	
  additional	
  login	
  steps	
  every	
  time	
  they	
  login,	
  obliterating	
  
the	
  user	
  access	
  experience.	
  
• Physical	
  Token	
  requirements	
  are	
  expensive	
  to	
  deploy	
  and	
  manage	
  –	
  especially	
  with	
  large	
  user	
  groups.	
  
• Lack	
  of	
  integration	
  capability	
  prevents	
  the	
  use	
  of	
  M2FA	
  post	
  login	
  where	
  potentially	
  higher	
  risk	
  transactions	
  may	
  require	
  
additional	
  layers	
  of	
  security.	
  
• 	
  The	
  ability	
  to	
  align	
  transaction	
  risk	
  with	
  the	
  appropriate	
  additional	
  layers	
  of	
  authentication	
  factors	
  and	
  the	
  capability	
  to	
  
monitor	
  and	
  evaluate	
  risk	
  analytics	
  are	
  simply	
  missing.	
  
aPersona  –  Adaptive  Security  Manager™  for  HIPAA  &  HITECH  Compliance  
aPersona’s	
  Adaptive	
  Security	
  Manager™	
  (ASM™)	
  was	
  developed	
  to	
  address	
  all	
  the	
  shortcomings	
  found	
  in	
  the	
  Multi-­‐Factor/2-­‐Factor	
  marketplace.	
  
aPersona’s	
  adaptive	
  multi-­‐factor	
  solution,	
  ASM™,	
  is	
  designed	
  to	
  scale	
  and	
  provide	
  a	
  customized	
  set	
  of	
  additional	
  factors	
  that	
  can	
  be	
  dialed-­‐in	
  and	
  
tuned	
  to	
  reach	
  any	
  required	
  level	
  of	
  risk	
  and	
  compliance	
  level.	
  These	
  additional	
  factors	
  include	
  public	
  and	
  private	
  IP	
  addresses,	
  IP	
  geographical	
  
location,	
   cookies,	
   hundreds	
   of	
   user	
   device	
   attributes,	
   application	
   specific	
   factor	
   verifications,	
   user	
   specific	
   factor	
   verification	
   overrides,	
  
application	
  specific	
  factor	
  time-­‐outs,	
  device	
  category	
  factor	
  time-­‐outs,	
  Man-­‐in-­‐the-­‐Middle	
  detection	
  &	
  real-­‐time	
  risk	
  scoring.	
  	
  
aPersona	
  has	
  multiple	
  modes	
  including	
  adaptive	
  learning,	
  monitoring	
  risk	
  without	
  challenging	
  users,	
  	
  active	
  adaptive	
  mode	
  and	
  full	
  challenge	
  
mode.	
  	
  You	
  can	
  deploy	
  it	
  everywhere,	
  monitor	
  everything,	
  challenge	
  where	
  needed	
  and	
  modify	
  risk	
  settings	
  over	
  time	
  to	
  match	
  your	
  data	
  risk	
  
requirements,	
  reduce	
  your	
  data	
  breach	
  exposures,	
  and	
  easily	
  adapt	
  to	
  changing	
  regulations	
  over	
  time	
  all	
  at	
  a	
  price	
  point	
  that	
  fits	
  reality!	
  	
  	
  

More Related Content

What's hot

RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
CPaschal
 
NIST sp800 53-v4 Topology
NIST sp800 53-v4 TopologyNIST sp800 53-v4 Topology
NIST sp800 53-v4 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Skoda Minotti
 
HITRUST Article
HITRUST ArticleHITRUST Article
HITRUST Article
Alexis Kennedy, CPA, CISA
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
sukiennong.vn
 
Soc Compliance Overview
Soc Compliance OverviewSoc Compliance Overview
Soc Compliance Overview
Fabio Ferrari
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
OnRamp
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
EC-Council
 
HIPAA Security Risk Assessment
HIPAA Security Risk Assessment HIPAA Security Risk Assessment
HIPAA Security Risk Assessment
Marci Fugarino SPHR, SHRM-SCP
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
Resilient Systems
 
Redspin Webinar Business Associate Risk
Redspin Webinar Business Associate RiskRedspin Webinar Business Associate Risk
Redspin Webinar Business Associate Risk
Redspin, Inc.
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
Tony Moroney
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
MBMeHealthCareSolutions
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)
BeyondTrust
 
Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813
Kinetic Potential
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in India
iFour Consultancy
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
Maurizio Milazzo
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
stevemeltzer
 

What's hot (20)

RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
NIST sp800 53-v4 Topology
NIST sp800 53-v4 TopologyNIST sp800 53-v4 Topology
NIST sp800 53-v4 Topology
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
HITRUST Article
HITRUST ArticleHITRUST Article
HITRUST Article
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Soc Compliance Overview
Soc Compliance OverviewSoc Compliance Overview
Soc Compliance Overview
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
HIPAA Security Risk Assessment
HIPAA Security Risk Assessment HIPAA Security Risk Assessment
HIPAA Security Risk Assessment
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Redspin Webinar Business Associate Risk
Redspin Webinar Business Associate RiskRedspin Webinar Business Associate Risk
Redspin Webinar Business Associate Risk
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)
 
Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in India
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
 

Viewers also liked

Wor(l)d gn & zapping phone m.d innovation numérique responsable..
Wor(l)d gn & zapping phone m.d   innovation numérique responsable..Wor(l)d gn & zapping phone m.d   innovation numérique responsable..
Wor(l)d gn & zapping phone m.d innovation numérique responsable..
zapping-phone
 
Ecuextre 2012 Feria del Caballo y del Toro
Ecuextre 2012 Feria del Caballo y del ToroEcuextre 2012 Feria del Caballo y del Toro
Ecuextre 2012 Feria del Caballo y del Toro
FERIA BADAJOZ IFEBA
 
Prisão de assaltantes, apreensão de armas e recuperação de objetos roubados
Prisão de assaltantes, apreensão de armas e recuperação de objetos roubadosPrisão de assaltantes, apreensão de armas e recuperação de objetos roubados
Prisão de assaltantes, apreensão de armas e recuperação de objetos roubados
Roberto Rabat Chame
 
Informativo dez-12
Informativo   dez-12Informativo   dez-12
la familia y yo
la familia y yola familia y yo
la familia y yo
Estudiar a ultima hora
 
Mapas de la caza del tesoro tras los pasos del cid
Mapas de la caza del tesoro  tras los pasos del cidMapas de la caza del tesoro  tras los pasos del cid
Mapas de la caza del tesoro tras los pasos del cid
euvalledorfer
 
Guia 3
Guia 3Guia 3
Guia 3
johanaduart
 
arlamento europeo
arlamento europeoarlamento europeo
arlamento europeo
jvallinar01
 
QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA!
QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA! QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA!
QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA!
Semente de Chia
 
Mafia driver omerta apk
Mafia driver omerta apkMafia driver omerta apk
Mafia driver omerta apk
appbox
 
Fullan
FullanFullan
Fullan
citlalis
 
Opinión de los Puertorriqueños sobre los Restaurantes Chilis
Opinión de los Puertorriqueños sobre los Restaurantes Chilis Opinión de los Puertorriqueños sobre los Restaurantes Chilis
Opinión de los Puertorriqueños sobre los Restaurantes Chilis
Luis Baquero
 
Ppp
PppPpp
HR Maturity Hierarchy_2
HR Maturity Hierarchy_2HR Maturity Hierarchy_2
HR Maturity Hierarchy_2
Chris Reese
 
Preferencias de los Planes Médicos en Puerto Rico
Preferencias de los Planes Médicos en Puerto RicoPreferencias de los Planes Médicos en Puerto Rico
Preferencias de los Planes Médicos en Puerto Rico
Luis Baquero
 
Krispy Kream Puerto Rico - Análisis Estratégico
Krispy Kream Puerto Rico - Análisis EstratégicoKrispy Kream Puerto Rico - Análisis Estratégico
Krispy Kream Puerto Rico - Análisis Estratégico
Luis Baquero
 
Estilos de Vida y Patrones de Ejercicios de la Mujer Puertorriqueña
Estilos de Vida y Patrones de Ejercicios de la Mujer PuertorriqueñaEstilos de Vida y Patrones de Ejercicios de la Mujer Puertorriqueña
Estilos de Vida y Patrones de Ejercicios de la Mujer Puertorriqueña
Luis Baquero
 
Patron de Consumo de Gasolina en Puerto Rico
Patron de Consumo de Gasolina en Puerto RicoPatron de Consumo de Gasolina en Puerto Rico
Patron de Consumo de Gasolina en Puerto Rico
Luis Baquero
 
Cuento i talia, mi nuevo hogar
Cuento i talia, mi nuevo hogarCuento i talia, mi nuevo hogar
Cuento i talia, mi nuevo hogar
chamaca23
 

Viewers also liked (19)

Wor(l)d gn & zapping phone m.d innovation numérique responsable..
Wor(l)d gn & zapping phone m.d   innovation numérique responsable..Wor(l)d gn & zapping phone m.d   innovation numérique responsable..
Wor(l)d gn & zapping phone m.d innovation numérique responsable..
 
Ecuextre 2012 Feria del Caballo y del Toro
Ecuextre 2012 Feria del Caballo y del ToroEcuextre 2012 Feria del Caballo y del Toro
Ecuextre 2012 Feria del Caballo y del Toro
 
Prisão de assaltantes, apreensão de armas e recuperação de objetos roubados
Prisão de assaltantes, apreensão de armas e recuperação de objetos roubadosPrisão de assaltantes, apreensão de armas e recuperação de objetos roubados
Prisão de assaltantes, apreensão de armas e recuperação de objetos roubados
 
Informativo dez-12
Informativo   dez-12Informativo   dez-12
Informativo dez-12
 
la familia y yo
la familia y yola familia y yo
la familia y yo
 
Mapas de la caza del tesoro tras los pasos del cid
Mapas de la caza del tesoro  tras los pasos del cidMapas de la caza del tesoro  tras los pasos del cid
Mapas de la caza del tesoro tras los pasos del cid
 
Guia 3
Guia 3Guia 3
Guia 3
 
arlamento europeo
arlamento europeoarlamento europeo
arlamento europeo
 
QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA!
QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA! QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA!
QUER EMAGRECER COM SAÚDE? EXPERIMENTE SEMENTE DE CHIA!
 
Mafia driver omerta apk
Mafia driver omerta apkMafia driver omerta apk
Mafia driver omerta apk
 
Fullan
FullanFullan
Fullan
 
Opinión de los Puertorriqueños sobre los Restaurantes Chilis
Opinión de los Puertorriqueños sobre los Restaurantes Chilis Opinión de los Puertorriqueños sobre los Restaurantes Chilis
Opinión de los Puertorriqueños sobre los Restaurantes Chilis
 
Ppp
PppPpp
Ppp
 
HR Maturity Hierarchy_2
HR Maturity Hierarchy_2HR Maturity Hierarchy_2
HR Maturity Hierarchy_2
 
Preferencias de los Planes Médicos en Puerto Rico
Preferencias de los Planes Médicos en Puerto RicoPreferencias de los Planes Médicos en Puerto Rico
Preferencias de los Planes Médicos en Puerto Rico
 
Krispy Kream Puerto Rico - Análisis Estratégico
Krispy Kream Puerto Rico - Análisis EstratégicoKrispy Kream Puerto Rico - Análisis Estratégico
Krispy Kream Puerto Rico - Análisis Estratégico
 
Estilos de Vida y Patrones de Ejercicios de la Mujer Puertorriqueña
Estilos de Vida y Patrones de Ejercicios de la Mujer PuertorriqueñaEstilos de Vida y Patrones de Ejercicios de la Mujer Puertorriqueña
Estilos de Vida y Patrones de Ejercicios de la Mujer Puertorriqueña
 
Patron de Consumo de Gasolina en Puerto Rico
Patron de Consumo de Gasolina en Puerto RicoPatron de Consumo de Gasolina en Puerto Rico
Patron de Consumo de Gasolina en Puerto Rico
 
Cuento i talia, mi nuevo hogar
Cuento i talia, mi nuevo hogarCuento i talia, mi nuevo hogar
Cuento i talia, mi nuevo hogar
 

Similar to aPersona-HIPAA-HITECH-Compliance-v2

RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™
CPaschal
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
Chris Reese
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
Kimberly Simon MBA
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
ControlCase
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
ControlCase
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
Health IT Conference – iHT2
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
Allan Crowe PCIP
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
PYA, P.C.
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
CPaschal
 
What Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​sWhat Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​s
Iatric Systems
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
Abhishek Sood
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
lgcdcpas
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
Priyanka Aash
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
KeySys Health
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
Lumension
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 

Similar to aPersona-HIPAA-HITECH-Compliance-v2 (20)

RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™RiskWatch for HIPAA Compliance™
RiskWatch for HIPAA Compliance™
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
What Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​sWhat Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​s
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 

aPersona-HIPAA-HITECH-Compliance-v2

  • 1. Healthcare:  HIPAA  &  HITECH  Compliance                    Copyright  ©2015  aPersona,  Inc.                          sales@apersona.com          -­‐              www.apersona.com          -­‐            866-­‐229-­‐0177                                              v2.0   Healthcare  IT  organizations  and  Healthcare  Services  companies  are  required  to  comply  and  adhere  to  Health  Insurance  Portability   &  Accountability  Act  (HIPAA)  and  Health  Information  Technology  for  Economic  Health  (HITECH)  rules  and  regulations.     HIPAA/HITECH  Multi-­‐Factor  &  2-­‐Factor  Recommendations   Historically,  HIPAA  and  HITECH  standards  for  authentication  have  recommended  multi-­‐factor  and  two-­‐factor  authentication  (M2FA)   for  access  to  Electronic  Protected  Health  Information  (EPHI)  and  are  steadily  progressing  toward  requiring  M2FA.       • December  2006:    HIPAA  Security  Guidance  Highlights  2-­‐Factor  Authentication  for  EPHI  Access   • September  2012:  DHHS  ONC  recommends  NIST  LOA3  Multi-­‐Factor  Assurance   • February  2014:     DHHS  Proposed  Rules  Seeking  Inclusion  of  2-­‐Factor  for  2017  Edition  Rulemaking   • October  2015:  Final  Meaningful  Use  Stage  3  Requirements  and  Timeline  Announced  with  strong  indications  that  multi-­‐ factor  authentication  will  be  a  part  of  future  requirements.   HITECH  Violations  and  Penalties   At  the  same  time,  Violations  &  Respective  Penalty  Amounts  have  been  amended  and  updated  to  include  4  Violation  categories   each  of  which  carry  a  maximum  penalty  of  $1.5M.  HITECH  Act  Enforcement  Interim  Final  Rule   CATEGORIES  OF  VIOLATIONS  AND  RESPECTIVE  PENALTY  AMOUNTS  AVAILABLE   Violation  Category  –  Section  1176(a)(1)   Each  Violation   All  such  violations  of  an  identical  provision  in  a  calendar  year.   (A) Did  Not  Know……………………………….   $100-­‐$50,000   $1,500,000   (B) Reasonable  Cause………………………..   $1,000-­‐$50,000   $1,500,000   (C)(i)          Willful  Neglect-­‐Corrected………………..   $10,000-­‐$50,000   $1,500,000   (C)(ii)          Willful  Neglect-­‐Not  Corrected…………   $50,000   $1,500,000     Over  95%  of  Data  Breaches  Result  from  Exploitation  of  Weak  or  Stolen  Credentials   At  the  intersection  of  the  current  regulatory  guidance  path  for  advanced  multi-­‐factor  &  2-­‐Factor  authentication,  and  the  current   penalties  associated  with  EPHI  violations  lies  the  fact  that  over  95%  of  data  breaches  result  from  the  exploitation  of  weak  or  stolen   credentials  (Verizon  2014  Data  Breach  Report).     What  Should  You  Do?  How  Can  You  Prepare?   Given  the  projected  HIPAA  &  HITECH  authentication  requirements,  current  escalating  penalties  and  data  breach  risks  associated   with  accessing  Electronic  Protected  Health  Information,  it  is  abundantly  clear  that  your  organization  should  have  an  active  and   progressing  multi-­‐factor/2-­‐factor  authentication  strategy  in  place.   If  you  have  spent  much  time  on  this  topic  and  reviewed  M2FA  products  and  solutions  you  have  likely  discovered  a  number  of  road   blocks.     • Expensive  per/user  licensing  fees  are  simply  out  of  line  with  the  reality  of  today’s  user  populations.   • Lack  of  intelligence  and  adaptability  forces  users  to  jump  through  additional  login  steps  every  time  they  login,  obliterating   the  user  access  experience.   • Physical  Token  requirements  are  expensive  to  deploy  and  manage  –  especially  with  large  user  groups.   • Lack  of  integration  capability  prevents  the  use  of  M2FA  post  login  where  potentially  higher  risk  transactions  may  require   additional  layers  of  security.   •  The  ability  to  align  transaction  risk  with  the  appropriate  additional  layers  of  authentication  factors  and  the  capability  to   monitor  and  evaluate  risk  analytics  are  simply  missing.   aPersona  –  Adaptive  Security  Manager™  for  HIPAA  &  HITECH  Compliance   aPersona’s  Adaptive  Security  Manager™  (ASM™)  was  developed  to  address  all  the  shortcomings  found  in  the  Multi-­‐Factor/2-­‐Factor  marketplace.   aPersona’s  adaptive  multi-­‐factor  solution,  ASM™,  is  designed  to  scale  and  provide  a  customized  set  of  additional  factors  that  can  be  dialed-­‐in  and   tuned  to  reach  any  required  level  of  risk  and  compliance  level.  These  additional  factors  include  public  and  private  IP  addresses,  IP  geographical   location,   cookies,   hundreds   of   user   device   attributes,   application   specific   factor   verifications,   user   specific   factor   verification   overrides,   application  specific  factor  time-­‐outs,  device  category  factor  time-­‐outs,  Man-­‐in-­‐the-­‐Middle  detection  &  real-­‐time  risk  scoring.     aPersona  has  multiple  modes  including  adaptive  learning,  monitoring  risk  without  challenging  users,    active  adaptive  mode  and  full  challenge   mode.    You  can  deploy  it  everywhere,  monitor  everything,  challenge  where  needed  and  modify  risk  settings  over  time  to  match  your  data  risk   requirements,  reduce  your  data  breach  exposures,  and  easily  adapt  to  changing  regulations  over  time  all  at  a  price  point  that  fits  reality!