SlideShare a Scribd company logo
Protecting ePHI
Transmissions in
Healthcare:
Are You Secure?
2
Your Speaker
Brad Spannbauer
Senior Director
Product Development
HIPAA Privacy Officer
eFax Corporate®
,
Part of j2 Cloud
Services™.
3
Agenda
1 The Minimum Requirements for a “Secure Transmission”
2 Common Methods for Transmitting ePHI
3 Industry Misconceptions About Secure ePHI Transmissions
4 What the HITECH Act and Omnibus Rule Say About ePHI
5 The HIPAA Standard on Transmission Encryption and Integrity
6 How a Cloud Fax Model Can Enhance Compliance with HIPAA
4
HIPAA 101 Review:
What Addresses the Security of ePHI?
Security Standards:
…Ensure the confidentiality, integrity and
availability of all electronic protected health
information…a CE or BA creates…or transmits.
…with Specifications that are either
“Required or Addressable”Security Rules of HIPAA:
Address the Administrative, Physical and
Technical Safeguards for protection of PHI in
digital form (aka “ePHI”).
45 CFR S164.306
General Rules…
The Final Rule requires
Covered Entities (CEs)
and Business
Associates (BAs) to…
5
What’s our Responsibility?
Covered Entity and Business Associate Considerations
HIPAASecurity Rule:
…must reasonably safeguard ePHI from any
unintentional disclosure or use… to limit
incidental uses or disclosures…
TechnicalSafeguards
Standard: Flexibility of Approach
A CE or BA must “take reasonable and
appropriate measures” taking into account:
• Size, Complexity, Capabilities
• Technical Infrastructure & Capabilities
• Costs of the Security Measures
• Probability & Risks to ePHI
45 CFR S164.306
General Rules
Implementation
Specification:
6
Technical Safeguards – Where is Encryption Addressed?
Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf
Access Control and Transmission Security:
Section 4 of the Tech Standards
Standard Implementation Spec. Required or Addressable?
Access Control
§ 164.312(a)(1)
User ID, Emergency Access, Auto Logoff, Encryption
and Decryption
(R), (R )
(A), (A)
Audit Controls
§ 164.312(b)
(A)
Integrity
§ 164.312(c)(1)
Mechanism to Authenticate ePHI (A)
Person or Entity Authentication
§ 164.312(d)
-
Transmission Security
§ 164.312(e)(1)
Integrity Controls and Encryption (A), (A)
7
So is Encryption Required?
HIPAASecurity Rule:
“Implement a mechanism to
encrypt and decrypt electronic
protected health information.”
Technical Safeguards…Encryption
• Access Control
• Transmission Security
(Integrity Controls and Encryption)
45 CFR §
164.312(a)(2)(iv)
Required?
No - but the Standard states that it’s an
‘Addressable’ issue…
Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf
8
What is a “Secure” ePHI Transmission?
TLS 1.2 encryption
AES 256-bit encryption
NIST
encryption standards
for ePHI in motion…
NIST
encryption standards
for ePHI at rest…
AES
TLS
9
How Do Covered Entities
Access and Disclose ePHI?
Secure messaging apps
(e.g., TigerText)
Desktop
Virtualization
Roaming
desktop/SSO
Email
(via corporate
network or personal
email client)
EHRs
(e.g., Cerner,
Athena Health)
Secure fax by email
(with TLS encryption)
BYOD
(text, email, cloud fax)
Paper
Voice
Health
Information
Exchange
@
10
Secure ePHI Transmission Myths
”As long as a healthcare
provider keeps their mobile
device secure, it’s okay to
text another co-worker info
containing PHI.”
“Email is secure as long as
it goes only to the
appropriate Covered Entity,
Business Associate or
authorized recipient.”
“If our BA suffers a breach of
our ePHI, they’re liable —
not us.”
“After a device that
contained ePHI is disposed
of, our organization is no
longer liable for the ePHI on
it.”
11
HITECH and Omnibus
OMNIBUS
Redefined Breach
BA Subs must Comply (BAA)
Notice of Privacy Practices
HITECH
BA’s Directly Liable
Breach Notification
12
The HIPAA Standard:
Security Standards:
• May use any security measures that comply
• Measures must reflect…
• Company’s size and capabilities
• Cost
• Probability and criticality of risks
45 CFR 164.306
Flexibility of Approach
• Ensure ePHI confidentiality
• Protect from reasonably anticipated threats
• Ensure workforce compliance
45 CFR 164.306
General Requirements
Security Standards:
Encryption and Integrity of ePHI Transmissions
TIP: Treat Addressable Standards as Required
HIPAA’s Technical Safeguards don’t
define specific solutions…
But they do require CEs and BAs
“reasonably and appropriately”
implement security measures.
13
The HIPAA Standard:
2 secure-Transmission Requirements:
Encryption and Integrity
ePHI Encryption:
The covered entity must:
“Implement a mechanism to
encrypt and decrypt electronic
protected health information.”
ePHI Integrity:
The covered entity must:
“Implement security measures
to ensure that electronically
transmitted electronic
protected health information is
not improperly modified
without detection until
disposed of.”
14
Compliance Pitfalls to Avoid
Failing to implement and
document data-security and
privacy policies and
procedures
Exposing ePHI to non-
authorized personnel (verbally,
exposing screen to others,
etc.)
Losing electronic devices
(or having them stolen)
without protections installed or
remote wipe capability
Failing to conduct security risk
assessment (SRA) on staff
devices for rogue apps or
vulnerabilities to jail-breaking
Ineffective BYOD policies —
the big risk for any CE or BA.
(40% of firms say
mismanaging mobile devices
has resulted in HIPAA
noncompliance and/or
regulatory violations.)
15
The HIPAA Solution for Faxing ePHI
The “Cloud Fax” Model
Virtually No
IT administration,
maintenance and
troubleshooting
Your staff can fax anywhere
Deploys in minutes
Easy to use
Requires no training
Highly secure
Compliant
Provides clear audit trails
Cost-effective
16
The Hosted, Cloud-Fax Model
Inbound /
Outbound
Faxes
Hosted Fax Service
Encrypted Fax Storage
via eFax Secure
(optional)
Email, Secure Browser,
Mobile App & eFax
Messenger User
Interfaces
Encrypted in
Transit with
TLS
PSTN Telco
Service
17
eFax Corporate®
The world’s #1 online fax
company – and the
industry’s most experienced
hosted
fax service
The most widely deployed
online fax service for the
Fortune 500
Trusted by more major
healthcare, legal,
financial and other highly-
regulated firms trust than
any other online fax
provider to transmit
sensitive documents
Inbound /
Outbound
Faxes
Hosted Fax Service
Encrypted Fax Storage
via eFax Secure
(optional)
Email, Secure Browser,
Mobile App & eFax
Messenger User
Interfaces
Encrypted in
Transit with
TLS
PSTN Telco
Service
18
NIST’s encryption guidelines for
ePHI in motion.
(Transport Layer Security)
HHS Report: Security 101 for
Covered Entities
Ponemon.org Survey: 40% of
HIPAA Noncompliance from
Ineffective BYOD
The American Bar Association’s
Interpretation of the HIPAA
Security Rule and Protecting ePHI
on BYOD Devices
HIPAA Privacy Rule
The HIPAA Security Rule Toolkit
NIST’s encryption guidelines for
ePHI in storage.
(Advanced Encryption Standard)
Helpful Resources
Q&A
enterprise.efax.com
U.S. Sales
(888) 532-9265
UK Sales
+44 (0) 8707113811

More Related Content

What's hot

A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5umphreym
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsSherWeb
 
Hortonworks help customers building a HIPAA compliant Data Lake
Hortonworks help customers building a HIPAA compliant Data Lake Hortonworks help customers building a HIPAA compliant Data Lake
Hortonworks help customers building a HIPAA compliant Data Lake Vitor Lundberg
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigmpparam02
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 

What's hot (20)

Data Security
Data SecurityData Security
Data Security
 
Network security
Network securityNetwork security
Network security
 
Data Security
Data SecurityData Security
Data Security
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulations
 
Hortonworks help customers building a HIPAA compliant Data Lake
Hortonworks help customers building a HIPAA compliant Data Lake Hortonworks help customers building a HIPAA compliant Data Lake
Hortonworks help customers building a HIPAA compliant Data Lake
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
IoT
IoTIoT
IoT
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Ch01
Ch01Ch01
Ch01
 
Information security
Information securityInformation security
Information security
 

Similar to Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax Corporate®

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!3Lions Publishing, Inc.
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinalFeisal Nanji
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Centers
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacyappriver
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
HIPAA BYOD webinar-v6 - Final
HIPAA BYOD webinar-v6 - FinalHIPAA BYOD webinar-v6 - Final
HIPAA BYOD webinar-v6 - FinalMichael Flavin
 
Information Security
Information SecurityInformation Security
Information Securityvadapav123
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...eFax Corporate®
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAAAlert Logic
 

Similar to Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax Corporate® (20)

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
 
ENCYPHR_Brochure_V2
ENCYPHR_Brochure_V2ENCYPHR_Brochure_V2
ENCYPHR_Brochure_V2
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinal
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacy
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
HIPAA BYOD webinar-v6 - Final
HIPAA BYOD webinar-v6 - FinalHIPAA BYOD webinar-v6 - Final
HIPAA BYOD webinar-v6 - Final
 
Information Security
Information SecurityInformation Security
Information Security
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAA
 

More from eFax Corporate®

Integrating Multifunction Printers with Cloud Fax: Part 1
Integrating Multifunction Printers with Cloud Fax: Part 1Integrating Multifunction Printers with Cloud Fax: Part 1
Integrating Multifunction Printers with Cloud Fax: Part 1eFax Corporate®
 
eFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online DatasheeteFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online DatasheeteFax Corporate®
 
eFax Corporate Multifunction Printer Fax Direct Datasheet
eFax Corporate Multifunction Printer Fax Direct DatasheeteFax Corporate Multifunction Printer Fax Direct Datasheet
eFax Corporate Multifunction Printer Fax Direct DatasheeteFax Corporate®
 
GLBA, SOX & Finance Datasheet - eFax Corporate Secure Faxing
GLBA, SOX & Finance Datasheet - eFax Corporate Secure FaxingGLBA, SOX & Finance Datasheet - eFax Corporate Secure Faxing
GLBA, SOX & Finance Datasheet - eFax Corporate Secure FaxingeFax Corporate®
 
Survival Guide for the Fax Apocalypse
Survival Guide for the Fax ApocalypseSurvival Guide for the Fax Apocalypse
Survival Guide for the Fax ApocalypseeFax Corporate®
 
Hipaa Compliant Faxing in a BYOD World
Hipaa Compliant Faxing in a BYOD WorldHipaa Compliant Faxing in a BYOD World
Hipaa Compliant Faxing in a BYOD WorldeFax Corporate®
 
How Businesses are Navigating the Transition to Cloud Computing - eFax Corporate
How Businesses are Navigating the Transition to Cloud Computing - eFax CorporateHow Businesses are Navigating the Transition to Cloud Computing - eFax Corporate
How Businesses are Navigating the Transition to Cloud Computing - eFax CorporateeFax Corporate®
 
The IT manager’s survival guide to outsourcing your fax infrastructure to the...
The IT manager’s survival guide to outsourcing your fax infrastructure to the...The IT manager’s survival guide to outsourcing your fax infrastructure to the...
The IT manager’s survival guide to outsourcing your fax infrastructure to the...eFax Corporate®
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015eFax Corporate®
 

More from eFax Corporate® (9)

Integrating Multifunction Printers with Cloud Fax: Part 1
Integrating Multifunction Printers with Cloud Fax: Part 1Integrating Multifunction Printers with Cloud Fax: Part 1
Integrating Multifunction Printers with Cloud Fax: Part 1
 
eFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online DatasheeteFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online Datasheet
 
eFax Corporate Multifunction Printer Fax Direct Datasheet
eFax Corporate Multifunction Printer Fax Direct DatasheeteFax Corporate Multifunction Printer Fax Direct Datasheet
eFax Corporate Multifunction Printer Fax Direct Datasheet
 
GLBA, SOX & Finance Datasheet - eFax Corporate Secure Faxing
GLBA, SOX & Finance Datasheet - eFax Corporate Secure FaxingGLBA, SOX & Finance Datasheet - eFax Corporate Secure Faxing
GLBA, SOX & Finance Datasheet - eFax Corporate Secure Faxing
 
Survival Guide for the Fax Apocalypse
Survival Guide for the Fax ApocalypseSurvival Guide for the Fax Apocalypse
Survival Guide for the Fax Apocalypse
 
Hipaa Compliant Faxing in a BYOD World
Hipaa Compliant Faxing in a BYOD WorldHipaa Compliant Faxing in a BYOD World
Hipaa Compliant Faxing in a BYOD World
 
How Businesses are Navigating the Transition to Cloud Computing - eFax Corporate
How Businesses are Navigating the Transition to Cloud Computing - eFax CorporateHow Businesses are Navigating the Transition to Cloud Computing - eFax Corporate
How Businesses are Navigating the Transition to Cloud Computing - eFax Corporate
 
The IT manager’s survival guide to outsourcing your fax infrastructure to the...
The IT manager’s survival guide to outsourcing your fax infrastructure to the...The IT manager’s survival guide to outsourcing your fax infrastructure to the...
The IT manager’s survival guide to outsourcing your fax infrastructure to the...
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
 

Recently uploaded

ASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptxAnushriSrivastav
 
What can we really do to give meaning and momentum to equality, diversity and...
What can we really do to give meaning and momentum to equality, diversity and...What can we really do to give meaning and momentum to equality, diversity and...
What can we really do to give meaning and momentum to equality, diversity and...Rick Body
 
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfDemystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfSasikiranMarri
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with TelemedicineIris Thiele Isip-Tan
 
Benefits of Dentulu's Salivary Testing.pptx
Benefits of Dentulu's Salivary Testing.pptxBenefits of Dentulu's Salivary Testing.pptx
Benefits of Dentulu's Salivary Testing.pptxDentulu Inc
 
Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyIris Thiele Isip-Tan
 
Immunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationImmunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationBeshedaWedajo
 
The History of Hypochlorous Acid.....pdf
The History of Hypochlorous Acid.....pdfThe History of Hypochlorous Acid.....pdf
The History of Hypochlorous Acid.....pdfSterlocOfficial
 
Advanced Gum Health prebiotic Mints.pptx
Advanced Gum Health prebiotic Mints.pptxAdvanced Gum Health prebiotic Mints.pptx
Advanced Gum Health prebiotic Mints.pptxDentulu Inc
 
CHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdf
CHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdfCHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdf
CHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdfSachin Sharma
 
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptxNose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptxDr. Rabia Inam Gandapore
 
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxAnushriSrivastav
 
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...saimasadaf14
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...ILC- UK
 
How many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfHow many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfpubrica101
 
Myopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptxMyopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptxRitonDeb1
 
Integrated Mother and Neonate Childwood Illness Health Care
Integrated Mother and Neonate Childwood Illness  Health CareIntegrated Mother and Neonate Childwood Illness  Health Care
Integrated Mother and Neonate Childwood Illness Health CareASKatoch1
 
Ayurveda hair cosmetlogy on Indralupta or Alopecia.pptx
Ayurveda hair cosmetlogy on Indralupta or Alopecia.pptxAyurveda hair cosmetlogy on Indralupta or Alopecia.pptx
Ayurveda hair cosmetlogy on Indralupta or Alopecia.pptxAyurgyan2077
 
Roti bank chennai PPT [Autosaved].pptx1
Roti bank  chennai PPT [Autosaved].pptx1Roti bank  chennai PPT [Autosaved].pptx1
Roti bank chennai PPT [Autosaved].pptx1roti bank
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...rajkumar669520
 

Recently uploaded (20)

ASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF BED PAN BY ANUSHRI SRIVASTAVA.pptx
 
What can we really do to give meaning and momentum to equality, diversity and...
What can we really do to give meaning and momentum to equality, diversity and...What can we really do to give meaning and momentum to equality, diversity and...
What can we really do to give meaning and momentum to equality, diversity and...
 
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfDemystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
 
Benefits of Dentulu's Salivary Testing.pptx
Benefits of Dentulu's Salivary Testing.pptxBenefits of Dentulu's Salivary Testing.pptx
Benefits of Dentulu's Salivary Testing.pptx
 
Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
 
Immunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationImmunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentation
 
The History of Hypochlorous Acid.....pdf
The History of Hypochlorous Acid.....pdfThe History of Hypochlorous Acid.....pdf
The History of Hypochlorous Acid.....pdf
 
Advanced Gum Health prebiotic Mints.pptx
Advanced Gum Health prebiotic Mints.pptxAdvanced Gum Health prebiotic Mints.pptx
Advanced Gum Health prebiotic Mints.pptx
 
CHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdf
CHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdfCHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdf
CHAPTER- 1 SEMESTER V NATIONAL-POLICIES-AND-LEGISLATION.pdf
 
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptxNose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
 
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
 
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
 
How many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfHow many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdf
 
Myopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptxMyopia Management & Control Strategies.pptx
Myopia Management & Control Strategies.pptx
 
Integrated Mother and Neonate Childwood Illness Health Care
Integrated Mother and Neonate Childwood Illness  Health CareIntegrated Mother and Neonate Childwood Illness  Health Care
Integrated Mother and Neonate Childwood Illness Health Care
 
Ayurveda hair cosmetlogy on Indralupta or Alopecia.pptx
Ayurveda hair cosmetlogy on Indralupta or Alopecia.pptxAyurveda hair cosmetlogy on Indralupta or Alopecia.pptx
Ayurveda hair cosmetlogy on Indralupta or Alopecia.pptx
 
Roti bank chennai PPT [Autosaved].pptx1
Roti bank  chennai PPT [Autosaved].pptx1Roti bank  chennai PPT [Autosaved].pptx1
Roti bank chennai PPT [Autosaved].pptx1
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 

Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax Corporate®

  • 2. 2 Your Speaker Brad Spannbauer Senior Director Product Development HIPAA Privacy Officer eFax Corporate® , Part of j2 Cloud Services™.
  • 3. 3 Agenda 1 The Minimum Requirements for a “Secure Transmission” 2 Common Methods for Transmitting ePHI 3 Industry Misconceptions About Secure ePHI Transmissions 4 What the HITECH Act and Omnibus Rule Say About ePHI 5 The HIPAA Standard on Transmission Encryption and Integrity 6 How a Cloud Fax Model Can Enhance Compliance with HIPAA
  • 4. 4 HIPAA 101 Review: What Addresses the Security of ePHI? Security Standards: …Ensure the confidentiality, integrity and availability of all electronic protected health information…a CE or BA creates…or transmits. …with Specifications that are either “Required or Addressable”Security Rules of HIPAA: Address the Administrative, Physical and Technical Safeguards for protection of PHI in digital form (aka “ePHI”). 45 CFR S164.306 General Rules… The Final Rule requires Covered Entities (CEs) and Business Associates (BAs) to…
  • 5. 5 What’s our Responsibility? Covered Entity and Business Associate Considerations HIPAASecurity Rule: …must reasonably safeguard ePHI from any unintentional disclosure or use… to limit incidental uses or disclosures… TechnicalSafeguards Standard: Flexibility of Approach A CE or BA must “take reasonable and appropriate measures” taking into account: • Size, Complexity, Capabilities • Technical Infrastructure & Capabilities • Costs of the Security Measures • Probability & Risks to ePHI 45 CFR S164.306 General Rules Implementation Specification:
  • 6. 6 Technical Safeguards – Where is Encryption Addressed? Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf Access Control and Transmission Security: Section 4 of the Tech Standards Standard Implementation Spec. Required or Addressable? Access Control § 164.312(a)(1) User ID, Emergency Access, Auto Logoff, Encryption and Decryption (R), (R ) (A), (A) Audit Controls § 164.312(b) (A) Integrity § 164.312(c)(1) Mechanism to Authenticate ePHI (A) Person or Entity Authentication § 164.312(d) - Transmission Security § 164.312(e)(1) Integrity Controls and Encryption (A), (A)
  • 7. 7 So is Encryption Required? HIPAASecurity Rule: “Implement a mechanism to encrypt and decrypt electronic protected health information.” Technical Safeguards…Encryption • Access Control • Transmission Security (Integrity Controls and Encryption) 45 CFR § 164.312(a)(2)(iv) Required? No - but the Standard states that it’s an ‘Addressable’ issue… Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf
  • 8. 8 What is a “Secure” ePHI Transmission? TLS 1.2 encryption AES 256-bit encryption NIST encryption standards for ePHI in motion… NIST encryption standards for ePHI at rest… AES TLS
  • 9. 9 How Do Covered Entities Access and Disclose ePHI? Secure messaging apps (e.g., TigerText) Desktop Virtualization Roaming desktop/SSO Email (via corporate network or personal email client) EHRs (e.g., Cerner, Athena Health) Secure fax by email (with TLS encryption) BYOD (text, email, cloud fax) Paper Voice Health Information Exchange @
  • 10. 10 Secure ePHI Transmission Myths ”As long as a healthcare provider keeps their mobile device secure, it’s okay to text another co-worker info containing PHI.” “Email is secure as long as it goes only to the appropriate Covered Entity, Business Associate or authorized recipient.” “If our BA suffers a breach of our ePHI, they’re liable — not us.” “After a device that contained ePHI is disposed of, our organization is no longer liable for the ePHI on it.”
  • 11. 11 HITECH and Omnibus OMNIBUS Redefined Breach BA Subs must Comply (BAA) Notice of Privacy Practices HITECH BA’s Directly Liable Breach Notification
  • 12. 12 The HIPAA Standard: Security Standards: • May use any security measures that comply • Measures must reflect… • Company’s size and capabilities • Cost • Probability and criticality of risks 45 CFR 164.306 Flexibility of Approach • Ensure ePHI confidentiality • Protect from reasonably anticipated threats • Ensure workforce compliance 45 CFR 164.306 General Requirements Security Standards: Encryption and Integrity of ePHI Transmissions TIP: Treat Addressable Standards as Required HIPAA’s Technical Safeguards don’t define specific solutions… But they do require CEs and BAs “reasonably and appropriately” implement security measures.
  • 13. 13 The HIPAA Standard: 2 secure-Transmission Requirements: Encryption and Integrity ePHI Encryption: The covered entity must: “Implement a mechanism to encrypt and decrypt electronic protected health information.” ePHI Integrity: The covered entity must: “Implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.”
  • 14. 14 Compliance Pitfalls to Avoid Failing to implement and document data-security and privacy policies and procedures Exposing ePHI to non- authorized personnel (verbally, exposing screen to others, etc.) Losing electronic devices (or having them stolen) without protections installed or remote wipe capability Failing to conduct security risk assessment (SRA) on staff devices for rogue apps or vulnerabilities to jail-breaking Ineffective BYOD policies — the big risk for any CE or BA. (40% of firms say mismanaging mobile devices has resulted in HIPAA noncompliance and/or regulatory violations.)
  • 15. 15 The HIPAA Solution for Faxing ePHI The “Cloud Fax” Model Virtually No IT administration, maintenance and troubleshooting Your staff can fax anywhere Deploys in minutes Easy to use Requires no training Highly secure Compliant Provides clear audit trails Cost-effective
  • 16. 16 The Hosted, Cloud-Fax Model Inbound / Outbound Faxes Hosted Fax Service Encrypted Fax Storage via eFax Secure (optional) Email, Secure Browser, Mobile App & eFax Messenger User Interfaces Encrypted in Transit with TLS PSTN Telco Service
  • 17. 17 eFax Corporate® The world’s #1 online fax company – and the industry’s most experienced hosted fax service The most widely deployed online fax service for the Fortune 500 Trusted by more major healthcare, legal, financial and other highly- regulated firms trust than any other online fax provider to transmit sensitive documents Inbound / Outbound Faxes Hosted Fax Service Encrypted Fax Storage via eFax Secure (optional) Email, Secure Browser, Mobile App & eFax Messenger User Interfaces Encrypted in Transit with TLS PSTN Telco Service
  • 18. 18 NIST’s encryption guidelines for ePHI in motion. (Transport Layer Security) HHS Report: Security 101 for Covered Entities Ponemon.org Survey: 40% of HIPAA Noncompliance from Ineffective BYOD The American Bar Association’s Interpretation of the HIPAA Security Rule and Protecting ePHI on BYOD Devices HIPAA Privacy Rule The HIPAA Security Rule Toolkit NIST’s encryption guidelines for ePHI in storage. (Advanced Encryption Standard) Helpful Resources