SlideShare a Scribd company logo
1 of 12
Technical Safeguards Overview Technical Security and Policy Management for Healthcare Operators
The importance of Security Audits Conduct Audits regularly, and as part of any upgrade or training effort. Document and file the results of each audit. Understand how important these are to forming and updating security policy. Ensure your technical components are capable of meeting your security expectations. Update hardware as necessary. Be prepared to address any gaps revealed through the audits and conduct risk analyses before implementing solutions.
Features for Technical Security Intrusion Detection Systems, such as HP OpenView Encryption and proper maintenance of encryption keys Anti-Virus auto-scanning for all downloads, emails, and nightly for the network. Configure system privileges appropriate for each level of work that is needed.
Technology Infrastructure Ideas Technology specifications for safeguards will be different for each covered entity. There is no set configuration of hardware or software for everyone. All technologies used must meet or exceed HIPAA required safeguards. Content filtering, firewalls, access tokens, and timeouts are all ways to increase security.
Network Safeguards Restrict personal device use on the network. Access tracking logs for all files Implement high password-strength requirements Layer your protection on your network, for example with firewalls, a honey pot and an authentication server. Install protection and tracking features at all levels of the network, from applications down to hardware. Limit displays to need-to-know applications for each relevant work area.
Indicate Levels of Responsibility Each user responsible for what happens under their login. Maintain a locked workstation policy anytime a terminal needs to be unattended. For technical or password issues, have a supervisor or helpdesk responsible for solutions. For network or organization-wide issues or suggestions, have a committee or team responsible for implementing solutions. Use a ticket system if that will help with efficiency and organizing queries.
Incident Procedures	 Have a designated response team. Identify, report, and respond to all known or suspected incidents. This is a required safeguard. Ensure the Privacy Officer is notified in every instance. Determine what criteria, tools, and communication methods need to be used. Determine or review what the desired recovery method and desired outcome will be.
Contingency Plans Are of upmost importance for maintaining security and compliance. Are designed as part of the HIPAA required technical safeguards, as with backups. Can be the difference between a security attack and network loss. Document Contingency Procedures and any incidents when whey are used. Reporting can be key to forming policy if a common flaw is found.
Importance of Documentation Information Security Policies are necessary, and management cannot just assume that everyone knows the company’s security needs. Anyone joining the company is unaware of the company’s security needs until they are shown a policy. Having a documented policy can reduce liability damages and fines in the event of a serious breach. Work directly with the Chief Information Officer on what can be done to maintain compliance.
Service Level Agreements	 Be sure to maintain SLA’s with all of your providers including your ISP contract. Keep all BA agreements on file and ensure they are maintained to the required extent. Ensure all PHI is handled appropriately or de-identified as necessary. Ensure any remote storage agreements are upheld to legal and contract specifications.
Security Policy Management State a Purpose. Include permitted uses for workstations and applications. Monitor compliance. Understand that security policy is ongoing and adaptable. Have a committee responsible for policy development. Maintain a hard copy on file, especially of any changes.
Summary and Credits	 Important Points:	 Maintain Documentation Keep staff informed  Ensure multiple security features are in place. Chapters 13, 21, 22, and 25 were used to source the material for this slideshow.

More Related Content

What's hot

Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials Qonex
 
Building HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teamsBuilding HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teamsGaurav Garg
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerHernan Huwyler, MBA CPA
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139evaleng2
 
Technical Services eBook
Technical Services eBookTechnical Services eBook
Technical Services eBookIdeba
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableMedigate
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security ManagementNick Krym
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunityamiable_indian
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran Krishnan
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
Basics of assessing a system
Basics of assessing a systemBasics of assessing a system
Basics of assessing a systemMuffett Llewellyn
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for HealthcareSteve Dunn
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityDr. Lasantha Ranwala
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security RoadmapAustin Songer
 

What's hot (18)

Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Building HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teamsBuilding HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teams
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan Huwyler
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
 
Technical Services eBook
Technical Services eBookTechnical Services eBook
Technical Services eBook
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Basics of assessing a system
Basics of assessing a systemBasics of assessing a system
Basics of assessing a system
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Isms3
Isms3Isms3
Isms3
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
 

Viewers also liked

Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...Quinnipiac University
 
Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...chshanah
 
Clinical information system-final copy
Clinical information system-final copyClinical information system-final copy
Clinical information system-final copyCISgroup
 
Clinical Information System
Clinical Information SystemClinical Information System
Clinical Information SystemFreeman Hospital
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rulecomplianceonline123
 
Clinical information system
Clinical information systemClinical information system
Clinical information systemNUR3563Team1
 
Overview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalOverview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalSanjoy Sanyal
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 

Viewers also liked (13)

Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
 
Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...
 
Clinical information system-final copy
Clinical information system-final copyClinical information system-final copy
Clinical information system-final copy
 
Clinical Information System
Clinical Information SystemClinical Information System
Clinical Information System
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rule
 
Clinical information system
Clinical information systemClinical information system
Clinical information system
 
Overview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalOverview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy Sanyal
 
Information security management
Information security managementInformation security management
Information security management
 

Similar to HIPAA Safeguard Slides

Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...SBWebinars
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersAcquaint Softtech Private Limited
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps Security10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps SecurityDev Software
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimemuhammad awais
 

Similar to HIPAA Safeguard Slides (20)

Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
 
Healthcare Compliance Software
Healthcare Compliance SoftwareHealthcare Compliance Software
Healthcare Compliance Software
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote Developers
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
SECURITY
SECURITYSECURITY
SECURITY
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps Security10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps Security
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 

HIPAA Safeguard Slides

  • 1. Technical Safeguards Overview Technical Security and Policy Management for Healthcare Operators
  • 2. The importance of Security Audits Conduct Audits regularly, and as part of any upgrade or training effort. Document and file the results of each audit. Understand how important these are to forming and updating security policy. Ensure your technical components are capable of meeting your security expectations. Update hardware as necessary. Be prepared to address any gaps revealed through the audits and conduct risk analyses before implementing solutions.
  • 3. Features for Technical Security Intrusion Detection Systems, such as HP OpenView Encryption and proper maintenance of encryption keys Anti-Virus auto-scanning for all downloads, emails, and nightly for the network. Configure system privileges appropriate for each level of work that is needed.
  • 4. Technology Infrastructure Ideas Technology specifications for safeguards will be different for each covered entity. There is no set configuration of hardware or software for everyone. All technologies used must meet or exceed HIPAA required safeguards. Content filtering, firewalls, access tokens, and timeouts are all ways to increase security.
  • 5. Network Safeguards Restrict personal device use on the network. Access tracking logs for all files Implement high password-strength requirements Layer your protection on your network, for example with firewalls, a honey pot and an authentication server. Install protection and tracking features at all levels of the network, from applications down to hardware. Limit displays to need-to-know applications for each relevant work area.
  • 6. Indicate Levels of Responsibility Each user responsible for what happens under their login. Maintain a locked workstation policy anytime a terminal needs to be unattended. For technical or password issues, have a supervisor or helpdesk responsible for solutions. For network or organization-wide issues or suggestions, have a committee or team responsible for implementing solutions. Use a ticket system if that will help with efficiency and organizing queries.
  • 7. Incident Procedures Have a designated response team. Identify, report, and respond to all known or suspected incidents. This is a required safeguard. Ensure the Privacy Officer is notified in every instance. Determine what criteria, tools, and communication methods need to be used. Determine or review what the desired recovery method and desired outcome will be.
  • 8. Contingency Plans Are of upmost importance for maintaining security and compliance. Are designed as part of the HIPAA required technical safeguards, as with backups. Can be the difference between a security attack and network loss. Document Contingency Procedures and any incidents when whey are used. Reporting can be key to forming policy if a common flaw is found.
  • 9. Importance of Documentation Information Security Policies are necessary, and management cannot just assume that everyone knows the company’s security needs. Anyone joining the company is unaware of the company’s security needs until they are shown a policy. Having a documented policy can reduce liability damages and fines in the event of a serious breach. Work directly with the Chief Information Officer on what can be done to maintain compliance.
  • 10. Service Level Agreements Be sure to maintain SLA’s with all of your providers including your ISP contract. Keep all BA agreements on file and ensure they are maintained to the required extent. Ensure all PHI is handled appropriately or de-identified as necessary. Ensure any remote storage agreements are upheld to legal and contract specifications.
  • 11. Security Policy Management State a Purpose. Include permitted uses for workstations and applications. Monitor compliance. Understand that security policy is ongoing and adaptable. Have a committee responsible for policy development. Maintain a hard copy on file, especially of any changes.
  • 12. Summary and Credits Important Points: Maintain Documentation Keep staff informed Ensure multiple security features are in place. Chapters 13, 21, 22, and 25 were used to source the material for this slideshow.