HIPAA and E-Mail:  Protecting PHI Maurene Caplan Grey Founder, Principal Analyst
HIPAA “101” Health Insurance Reform Administrative Simplification Standards for electronic health information transactions  Mandate on providers and health plans, and timetable Pre-emption of state law Penalties Privacy http://www.cms.hhs.gov/hipaa/hipaa2/default.asp  (CMS: HIPPA – Administrative Simplification, updated September 2005) http://www.hipaadvisory.com/regs/compliancecal.htm  (Status of HIPAA Regulations Compliance Calendar, updated August 2005)
Today’s Topics How is the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
Healthcare Industry Evolution Targeted treatments Focus on wellness Customer is the consumer Mass market treatment Focus on illness Customer is the doctor
Increasing Self-Management via E-Mail Physicians, Pharmacists, Peers… Source: Health Data Management Magazine, “Quick Poll,” 9 Sept 2005 Physician resistance to communicating with patients via e-mail is decreasing.   I wonder if I have diabetes? What more can I find out? What are other people doing to control it? Patient = Consumer Is this serious?  Do I need a checkup? 32.43 24 Disagree 67.7 50 Agree Percentage Respondents
Using an Online Consultation System for Self-Management
PHI within the Healthcare Community Patient’s PHI stored as record by the hospital. PHI sent to lab Insurance company stores patient record Lab report sent to doctor Hospital MD gathers PHI from patient Invoice sent to patient’s healthcare insurance
The New Healthcare Community Suppliers Providers Payers Employers Government Consumers Physicians Life Sciences
Today’s Topics How is the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
Why Security and Privacy Policies Fail Rulings are ambiguous and untested Poor or no business processes Social engineering Wrong technology Right technology, poorly implemented No auditing Lack of user training Poor or no governance Rulings change Fraud “ Lost”  PHI Local hard drives, cache, memory sticks, PDAs, smart phones, server storage, application data stores…
Approach 1: Gateway  1) File uploads to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to the gateway and downloads file Often used for  ad hoc relationships
Approach 2: End-to-End, Gateway  1) File sent to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to gateway and downloads file Often used for  ad hoc relationships, where extra  security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME …
Approach 3: Gateway-to-Gateway  Sender Recipient Sender’s gateway to recipient’s gateway Recipient Sender Often used for  trusted  relationships
Approach 4: End-to-End, Gateway-to-Gateway Sender’s gateway to recipient’s gateway Often used for  trusted relationships,  where extra security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME … Sender Recipient Recipient Sender
Scenario: University with Teaching Hospital Administrative Policies Information Security Information Management Securing E-Mail University’s standards Technology options Employee responsibilities Security Risk assessment templates HIPAA assessment plan Sys Admin toolkits Governance board Chancellor’s Office School of Dentistry School of Medicine School of Nursing School of Pharmacy Medical Center – IT Medical Center – Non-IT Student Academic Affairs Information Security Officer Privacy Officer Training
What You Need To Do Now  – People and Business Engage legal counsel to interpret HIPAA regulations for your scenario. Conduct, and reinforce, employee training. Appoint a privacy officer (rule requires). Educate business partners on your PHI security and privacy policies.
What You Need To Do Now   –  Technology Deploy secure e-mail technologies that fit the relationship model between sender and recipient. Simplicity at the user end is key for adoption.  Develop secure e-mail frameworks that are extensible as healthcare community needs evolve.  Budget for and carry out continuous vulnerability testing and security audits. HIPAA is designed to protect patient privacy. Architect security measures accordingly.
For further information on this topic, contact Grey Consulting [email_address]   845.531.5050 www.grey-consulting.com making messaging and collaboration work

HIPAA and E-Mail: Protecting PHI

  • 1.
    HIPAA and E-Mail: Protecting PHI Maurene Caplan Grey Founder, Principal Analyst
  • 2.
    HIPAA “101” HealthInsurance Reform Administrative Simplification Standards for electronic health information transactions Mandate on providers and health plans, and timetable Pre-emption of state law Penalties Privacy http://www.cms.hhs.gov/hipaa/hipaa2/default.asp (CMS: HIPPA – Administrative Simplification, updated September 2005) http://www.hipaadvisory.com/regs/compliancecal.htm (Status of HIPAA Regulations Compliance Calendar, updated August 2005)
  • 3.
    Today’s Topics Howis the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
  • 4.
    Healthcare Industry EvolutionTargeted treatments Focus on wellness Customer is the consumer Mass market treatment Focus on illness Customer is the doctor
  • 5.
    Increasing Self-Management viaE-Mail Physicians, Pharmacists, Peers… Source: Health Data Management Magazine, “Quick Poll,” 9 Sept 2005 Physician resistance to communicating with patients via e-mail is decreasing. I wonder if I have diabetes? What more can I find out? What are other people doing to control it? Patient = Consumer Is this serious? Do I need a checkup? 32.43 24 Disagree 67.7 50 Agree Percentage Respondents
  • 6.
    Using an OnlineConsultation System for Self-Management
  • 7.
    PHI within theHealthcare Community Patient’s PHI stored as record by the hospital. PHI sent to lab Insurance company stores patient record Lab report sent to doctor Hospital MD gathers PHI from patient Invoice sent to patient’s healthcare insurance
  • 8.
    The New HealthcareCommunity Suppliers Providers Payers Employers Government Consumers Physicians Life Sciences
  • 9.
    Today’s Topics Howis the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
  • 10.
    Why Security andPrivacy Policies Fail Rulings are ambiguous and untested Poor or no business processes Social engineering Wrong technology Right technology, poorly implemented No auditing Lack of user training Poor or no governance Rulings change Fraud “ Lost” PHI Local hard drives, cache, memory sticks, PDAs, smart phones, server storage, application data stores…
  • 11.
    Approach 1: Gateway 1) File uploads to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to the gateway and downloads file Often used for ad hoc relationships
  • 12.
    Approach 2: End-to-End,Gateway 1) File sent to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to gateway and downloads file Often used for ad hoc relationships, where extra security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME …
  • 13.
    Approach 3: Gateway-to-Gateway Sender Recipient Sender’s gateway to recipient’s gateway Recipient Sender Often used for trusted relationships
  • 14.
    Approach 4: End-to-End,Gateway-to-Gateway Sender’s gateway to recipient’s gateway Often used for trusted relationships, where extra security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME … Sender Recipient Recipient Sender
  • 15.
    Scenario: University withTeaching Hospital Administrative Policies Information Security Information Management Securing E-Mail University’s standards Technology options Employee responsibilities Security Risk assessment templates HIPAA assessment plan Sys Admin toolkits Governance board Chancellor’s Office School of Dentistry School of Medicine School of Nursing School of Pharmacy Medical Center – IT Medical Center – Non-IT Student Academic Affairs Information Security Officer Privacy Officer Training
  • 16.
    What You NeedTo Do Now – People and Business Engage legal counsel to interpret HIPAA regulations for your scenario. Conduct, and reinforce, employee training. Appoint a privacy officer (rule requires). Educate business partners on your PHI security and privacy policies.
  • 17.
    What You NeedTo Do Now – Technology Deploy secure e-mail technologies that fit the relationship model between sender and recipient. Simplicity at the user end is key for adoption. Develop secure e-mail frameworks that are extensible as healthcare community needs evolve. Budget for and carry out continuous vulnerability testing and security audits. HIPAA is designed to protect patient privacy. Architect security measures accordingly.
  • 18.
    For further informationon this topic, contact Grey Consulting [email_address] 845.531.5050 www.grey-consulting.com making messaging and collaboration work