SlideShare a Scribd company logo
1 of 19
Download to read offline
www.acesummitandexpo.com
Facilities and Clinical Engineering Track:
Addressing Risk Management in Biomedical
Equipment
January 14, 2013
Bart Hubbs - Chief Information Security Officer, FMOL Health System
Bud DeGraff - GM, Diagnostic & Clinical Services, GE Healthcare
www.acesummitandexpo.com
Overview
• Biomedical devices have evolved from largely stand-
alone devices to more digitally integrated data collection
and delivery units.
• Device evolution has helped improve and streamline
patient monitoring and subsequent care by collecting
and delivering actionable patient data to the right
caregivers.
• The streamlined collection and delivery of patient data
has also increased risk in other areas.
• Making of a good “Partnership” – Identifying Impact and
Likelihood with a focus on controls and mitigation
tools/approaches.
www.acesummitandexpo.com
What is Risk?
• Risk can be viewed as the intersection of impact and
likelihood of negative occurrence.
(Risk = Impact x Likelihood)
• Impact can be experienced via loss of confidentiality,
integrity, and/or availability of data.
• Likelihood of loss is generally increased or decreased
when controls and/or weaknesses are enhanced or
reduced.
www.acesummitandexpo.com
What Risk Management?
• Risk management can be viewed simply as formulating
risk to a level that falls within organizational risk
tolerance.
• Management activities included adjusting likelihood
and/or impact.
• Risk management also includes compliance with federal,
state, and industry requirements (examples: HIPAA,
PCI-DSS, SOX, GLBA, FERPA, etc.).
www.acesummitandexpo.com
HIPAA and “Protected Health
Information”
• U.S. Federal Regulations
• PHI is generally defined as individually identifiable health
information created or received by a
– Health care provider, health plan, employer, health
care clearinghouse, business associate; and
• Relates to an individual's past, present or future physical
or mental health or condition, the provision of health care
to an individual, or payment for the provision of health
care to an individual.
www.acesummitandexpo.com
• When data is classified as PHI, made digital and in the
custody of or shared by an entity defined previously,
the HIPAA Security Rule is applied.
• The electronic PHI is often referred to as ePHI.
• Risk management activities are then structured based
on the HIPAA Security Rule.
• Risk management/mitigation actions are generally
focused on reducing likelihood.
• However, risk management/mitigation actions can be
focused on impact reduction via data de-identification.
Why is the term “PHI” important?
www.acesummitandexpo.com
• Does not identify nor provide a reasonable basis to
identify an individual.
• Not considered PHI
− There are no restrictions on the use or disclosure of
de-identified health information.
• Two ways to de-identify information:
− Remove certain specified identifiers; or
− Obtain a formal determination by a qualified
statistician.
De-Identified Health Information
www.acesummitandexpo.com
• HITECH enhanced the importance of ePHI protection
due to the breach notification requirements.
• HITECH was enacted as part of the The American
Recovery and Reinvestment Act.
• Millions can be spent on a breach.
• Reputation related costs can be significant.
• Mitigation is increasingly important with EHR adoption
in hospitals and increasing “systems of systems” with
ePHI.
ePHI Confidentiality Loss and Impact
www.acesummitandexpo.com
• HITECH also establishes that “business associates” are
directly required to comply with the HIPAA Security Rule.
• Previously, “business associate” compliance with the
HIPAA Security Rule was established via contract with the
covered entity.
Business Associates and HITECH
www.acesummitandexpo.com
• Covered Entities (“CE”) -- health plans, health care
clearinghouses and most health care providers.
• Business Associates -- Third party who performs or
assists a Covered Entity in performing a function or
activity.
What are “Covered Entities” and
“Business Associates”?
www.acesummitandexpo.com
• MDS2 -- Manufacturer Disclosure Statement for Medical
Device. Link:
www.himss.org/content/files/MDS2FormInstructions.pdf
• Vendor SMEs – Subject matter experts from the vendor
can provide enhanced understanding the information
stored or transmitted by the device.
• Vendor Manuals– Many are online and provide detailed
information about data, controls and configurations.
Understanding Risk – Information Sources
www.acesummitandexpo.com
Reducing Risk – Management Levers
Impact Likelihood
ePHI element reduction
(limited data‐set)
Administrative controls
‐Policies
‐Security Awareness
‐Incident Response Procedures
Data de‐identification Physical controls
‐Building and zone controls
‐Inventory management
‐Workstation/storage controls
‐Device Disposal
Technical controls
‐Access controls
‐Encryption
‐User management
www.acesummitandexpo.com
• Consider having a person actively manage PHI in
hospital whether Biomed, IT, or Risk Management.
• Define clearly what PHI is in new hire and ongoing
training.
• Tell how to de-Identify and what types of data must
not be shown.
• Service Procedures Manual wording:
“In the normal course of performing services for our Customers,
Employees may come into contact with protected health information
(PHI). PHI is specific information about an individual patient …. This
information is often encountered on display monitors, in storage
media such as hard drives. You must take every means possible to
secure this information. “
Employee Awareness Training
www.acesummitandexpo.com
• Today’s hospital is an internet of devices …
system of systems
• Networks can be at risk if not protected. Wireless
applications and allowing WIFI for patients/visitors are
potential risk areas.
•Real Time Tracking technology/solutions allows for
finding all equipment faster, better compliance tracking,
and faster incident response.
•Vendor Technologies such as phone home
functionality that allow service requests or proactive
service should be designed to anonymize data where
possible, in order to prevent unnecessary exposure to
PHI.
IT Specifics & Mitigation Tools
www.acesummitandexpo.com
PHI Threats/Areas of Concern
www.acesummitandexpo.com
• IT and Risk Management should both have data
breach plans.
• When you work with vendors ensure that Business
Associate agreements are included to ensure the
privacy of PHI. This includes legal indemnifications.
• Service Procedures Manual: “In the event that an
information system has been compromised in such a way that
unauthorized individuals, either at a customer’s site or at
business associate’s location, could access PHI you must
report the event immediately. Reports of events shall be made
via the Concern and Incident Reporting Portal at Security and
Crisis Management Center.”
Proactive Incident Response
www.acesummitandexpo.com
• Not having a “robust, living” Risk Management plan
for facility and vendor.
• Not having clearly drawn partnership lines between
hospital system and vendor responsibilities on what
are risk areas and how are they controlled/mitigated.
• Device security configurations undocumented and
inconsistent. All vendors are not created equal in
the security space.
• Lack of facility and vendor engagement in controls
development for biomed equipment.
Common Issue Areas
www.acesummitandexpo.com
• Human controls in industry now with each site
required based on HIPAA to manage.
• Software is being developed to automatically wipe
equipment clean of PHI.
• In the future, control of PHI will be a built-in pillar of
IT operations and default device configurations.
• Covered Entities & Business Associates will demand
risk mitigation due to enhanced fines and the on-
going cost of breach notification.
The Future of PHI
www.acesummitandexpo.com
Addressing Risk Management in Biomedical
Equipment
Questions
Bart Hubbs - Chief Information Security Officer, FMOL Health System
Bud DeGraff - GM, Diagnostic & Clinical Services, GE Healthcare

More Related Content

What's hot

HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliancePrince George
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTKimberly Simon MBA
 
The HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemThe HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemSecurityMetrics
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityKym Canty
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceThomas Bronack
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareCompTIA
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowPYA, P.C.
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management Medigate
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightScale
 
Infographic Security in Healthcare
Infographic Security in HealthcareInfographic Security in Healthcare
Infographic Security in HealthcarePhil Vickman
 

What's hot (19)

Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 
The HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemThe HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your Problem
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry compliance
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in Healthcare
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to Know
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
 
Infographic Security in Healthcare
Infographic Security in HealthcareInfographic Security in Healthcare
Infographic Security in Healthcare
 

Similar to Information Security Risk Management in Biomedical Equipment

Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxSALU18
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical DevicesSecurityMetrics
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems- Mark - Fullbright
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010DataMotion
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010DataMotion
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratchTechugo
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningBlack Duck by Synopsys
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Ronan Martin
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docxadampcarr67227
 
4. data security eb__1_
4. data security eb__1_4. data security eb__1_
4. data security eb__1_Appsian
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 

Similar to Information Security Risk Management in Biomedical Equipment (20)

Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability Scanning
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
4. data security eb__1_
4. data security eb__1_4. data security eb__1_
4. data security eb__1_
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 

Recently uploaded

VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMuzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availablegragmanisha42
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...russian goa call girl and escorts service
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Memriyagarg453
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Sheetaleventcompany
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapurgragmanisha42
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...indiancallgirl4rent
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Sheetaleventcompany
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetJalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Recently uploaded (20)

VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMuzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetJalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

Information Security Risk Management in Biomedical Equipment

  • 1. www.acesummitandexpo.com Facilities and Clinical Engineering Track: Addressing Risk Management in Biomedical Equipment January 14, 2013 Bart Hubbs - Chief Information Security Officer, FMOL Health System Bud DeGraff - GM, Diagnostic & Clinical Services, GE Healthcare
  • 2. www.acesummitandexpo.com Overview • Biomedical devices have evolved from largely stand- alone devices to more digitally integrated data collection and delivery units. • Device evolution has helped improve and streamline patient monitoring and subsequent care by collecting and delivering actionable patient data to the right caregivers. • The streamlined collection and delivery of patient data has also increased risk in other areas. • Making of a good “Partnership” – Identifying Impact and Likelihood with a focus on controls and mitigation tools/approaches.
  • 3. www.acesummitandexpo.com What is Risk? • Risk can be viewed as the intersection of impact and likelihood of negative occurrence. (Risk = Impact x Likelihood) • Impact can be experienced via loss of confidentiality, integrity, and/or availability of data. • Likelihood of loss is generally increased or decreased when controls and/or weaknesses are enhanced or reduced.
  • 4. www.acesummitandexpo.com What Risk Management? • Risk management can be viewed simply as formulating risk to a level that falls within organizational risk tolerance. • Management activities included adjusting likelihood and/or impact. • Risk management also includes compliance with federal, state, and industry requirements (examples: HIPAA, PCI-DSS, SOX, GLBA, FERPA, etc.).
  • 5. www.acesummitandexpo.com HIPAA and “Protected Health Information” • U.S. Federal Regulations • PHI is generally defined as individually identifiable health information created or received by a – Health care provider, health plan, employer, health care clearinghouse, business associate; and • Relates to an individual's past, present or future physical or mental health or condition, the provision of health care to an individual, or payment for the provision of health care to an individual.
  • 6. www.acesummitandexpo.com • When data is classified as PHI, made digital and in the custody of or shared by an entity defined previously, the HIPAA Security Rule is applied. • The electronic PHI is often referred to as ePHI. • Risk management activities are then structured based on the HIPAA Security Rule. • Risk management/mitigation actions are generally focused on reducing likelihood. • However, risk management/mitigation actions can be focused on impact reduction via data de-identification. Why is the term “PHI” important?
  • 7. www.acesummitandexpo.com • Does not identify nor provide a reasonable basis to identify an individual. • Not considered PHI − There are no restrictions on the use or disclosure of de-identified health information. • Two ways to de-identify information: − Remove certain specified identifiers; or − Obtain a formal determination by a qualified statistician. De-Identified Health Information
  • 8. www.acesummitandexpo.com • HITECH enhanced the importance of ePHI protection due to the breach notification requirements. • HITECH was enacted as part of the The American Recovery and Reinvestment Act. • Millions can be spent on a breach. • Reputation related costs can be significant. • Mitigation is increasingly important with EHR adoption in hospitals and increasing “systems of systems” with ePHI. ePHI Confidentiality Loss and Impact
  • 9. www.acesummitandexpo.com • HITECH also establishes that “business associates” are directly required to comply with the HIPAA Security Rule. • Previously, “business associate” compliance with the HIPAA Security Rule was established via contract with the covered entity. Business Associates and HITECH
  • 10. www.acesummitandexpo.com • Covered Entities (“CE”) -- health plans, health care clearinghouses and most health care providers. • Business Associates -- Third party who performs or assists a Covered Entity in performing a function or activity. What are “Covered Entities” and “Business Associates”?
  • 11. www.acesummitandexpo.com • MDS2 -- Manufacturer Disclosure Statement for Medical Device. Link: www.himss.org/content/files/MDS2FormInstructions.pdf • Vendor SMEs – Subject matter experts from the vendor can provide enhanced understanding the information stored or transmitted by the device. • Vendor Manuals– Many are online and provide detailed information about data, controls and configurations. Understanding Risk – Information Sources
  • 12. www.acesummitandexpo.com Reducing Risk – Management Levers Impact Likelihood ePHI element reduction (limited data‐set) Administrative controls ‐Policies ‐Security Awareness ‐Incident Response Procedures Data de‐identification Physical controls ‐Building and zone controls ‐Inventory management ‐Workstation/storage controls ‐Device Disposal Technical controls ‐Access controls ‐Encryption ‐User management
  • 13. www.acesummitandexpo.com • Consider having a person actively manage PHI in hospital whether Biomed, IT, or Risk Management. • Define clearly what PHI is in new hire and ongoing training. • Tell how to de-Identify and what types of data must not be shown. • Service Procedures Manual wording: “In the normal course of performing services for our Customers, Employees may come into contact with protected health information (PHI). PHI is specific information about an individual patient …. This information is often encountered on display monitors, in storage media such as hard drives. You must take every means possible to secure this information. “ Employee Awareness Training
  • 14. www.acesummitandexpo.com • Today’s hospital is an internet of devices … system of systems • Networks can be at risk if not protected. Wireless applications and allowing WIFI for patients/visitors are potential risk areas. •Real Time Tracking technology/solutions allows for finding all equipment faster, better compliance tracking, and faster incident response. •Vendor Technologies such as phone home functionality that allow service requests or proactive service should be designed to anonymize data where possible, in order to prevent unnecessary exposure to PHI. IT Specifics & Mitigation Tools
  • 16. www.acesummitandexpo.com • IT and Risk Management should both have data breach plans. • When you work with vendors ensure that Business Associate agreements are included to ensure the privacy of PHI. This includes legal indemnifications. • Service Procedures Manual: “In the event that an information system has been compromised in such a way that unauthorized individuals, either at a customer’s site or at business associate’s location, could access PHI you must report the event immediately. Reports of events shall be made via the Concern and Incident Reporting Portal at Security and Crisis Management Center.” Proactive Incident Response
  • 17. www.acesummitandexpo.com • Not having a “robust, living” Risk Management plan for facility and vendor. • Not having clearly drawn partnership lines between hospital system and vendor responsibilities on what are risk areas and how are they controlled/mitigated. • Device security configurations undocumented and inconsistent. All vendors are not created equal in the security space. • Lack of facility and vendor engagement in controls development for biomed equipment. Common Issue Areas
  • 18. www.acesummitandexpo.com • Human controls in industry now with each site required based on HIPAA to manage. • Software is being developed to automatically wipe equipment clean of PHI. • In the future, control of PHI will be a built-in pillar of IT operations and default device configurations. • Covered Entities & Business Associates will demand risk mitigation due to enhanced fines and the on- going cost of breach notification. The Future of PHI
  • 19. www.acesummitandexpo.com Addressing Risk Management in Biomedical Equipment Questions Bart Hubbs - Chief Information Security Officer, FMOL Health System Bud DeGraff - GM, Diagnostic & Clinical Services, GE Healthcare