SlideShare a Scribd company logo
1 of 15
Small actions with big consequences
Data Encryption a must do for medical
Practices
© CureMD Healthcare
Data Encryption
• Would you ever buy an SUV without locks? Or leave
the keys in the ignition while you’re grocery
shopping?
• Would you be happy to deposit your hard earned
money in a bank, with no security protocol, so that
anybody can walk in and get away with all the money
stored inside?
• The likely answer to all three questions is no
• Why do we have such checks in place?
• They’re there to prevent the Jesse James’ and John
Dillingers’ of modern times from trying to steal what
isn’t theirs.
Data Encryption
• Your practice is the bank, personal health
information (PHI) is the deposits, and data
encryption is what must be done to ensure that the
deposits are safe
• Organized criminal groups are aware of the potential
value of PHIs, which include your patient’s insurance
information, social security and credit card numbers
• That is why they are devising more and more ways to
access this information
Data Encryption
• However, recent data on PHI theft suggests that most
breaches are not caused because of someone
hacking into practices but because of physician or
practice negligence
• The scenario generally arises when someone at a
practice copies EMR date on a portable device
(usually not encrypted), intending to work from
home and then the device gets stolen
• Or in certain cases, data stored on an on premise-
server or an in-house computer with the decryption
key saved on the same computer can land up into
wrong hands
Data Encryption
• A late 2011 HIMSS survey of 329 healthcare
organizations revealed only 44 percent of
respondents encrypt their mobile devices
• Only 29 percent said that all of their data on laptops
is encrypted, while 42 percent said none of their
desktop data is encrypted
• About one out of four respondents (23 percent) said
none of their e-mails is encrypted
• Such negligence on a practice’s part can be extremely
harmful for the patients concerned and the financial
system as a whole
Data Encryption
• Even for the practice such a breach not only causes
reputational damages, but also makes you liable for
heavy fines and penalties by the government
• Ready to take encryption and data protection
seriously? Here’s how to beef up security and stay
HIPAA compliant:
Encryption 101
• Encryption is the conversion of data into a form,
often called ciphertext, which cannot be understood
by another party — man or machine — without
being decrypted first
• There are many types of encryption available that
offer different levels of protection
• With public key encryption, all of your staff members
with access to a specific key code will be able to
decrypt the information
• Additionally, the provider and everyone else with
access of the key will be able to identify the recipient
Encryption 101
• However, if you want the information to remain
more exclusive and desire only specific users to
access it
• For example only physicians, physician assistants and
nurses, you can choose private key encryption
• With encryption, even if someone has gained access
to sensitive information stored at your practice, they
cannot make sense of the information unless it has
been decrypted using the respective keys
• However, you will need an encryption specialist to
implement such a system at your practice
Dealing with portable devices
• With checks present in most Electronic Medical
Records (EMRs) systems, the breach of information
usually takes place when someone from the practice
copies the data onto portable USB devices, an e-mail
attachment and other avenues that generally lack
encryption
• If such a device is misplaced or gets stolen, the level
of vulnerability increase
• A possible solution for such problems is ensuring a
central control of all portable medical devices
possessing information regarding your practice
Dealing with portable devices
• A possible solution for such problems is ensuring a
central control of all portable medical devices
possessing information regarding your practice
• Using such a system, the encryption status of all
these devices could be monitored in addition to
acting as a medium for data safety verification (if any
of the devices were stolen)
• Another recommendation while handling portable
devices is that of built-in remote wiping functionality
• Using such a system, you would be able to erase all
the content from the devices of specific users
Sending E-mails
• Regular E-mails should not be used as a medium to
transfer PHIs, as many practices have been grilled for
sending unencrypted e-mails with sensitive patient
information
• When interacting with patients or other parties,
make sure that the mails are encrypted. Start using
patient portals they are the safest mode of
transferring PHI
Monitoring Audit Trails
• Audit trails in your EHR are not only a way of keeping
track of a patient’s clinical encounter but also to
monitor your staff’s behavior
• You can view who has accessed a patient’s
information at what time
• Any abnormal activity can easily be detected and the
concerned person be taken to task to ensure that
your staff takes PHI safety seriously
The best policy?
• If you’re not sure on a certain security-related
situation, contact your firewall or encryption vendor
to help you readily solve the problem
• Do not risk exposing yourself due to lack of
information or understanding about a
communication medium
• Also be aware that HIPAA security compliance is like
a clinical encounter: If it’s not documented, then it
didn’t happen
• Therefore, document everything and make it part of
a security manual
Read more on blog.curemd.com
• To read more on this topic, visit:
• http://blog.curemd.com/small-actions-with-big-
consequences-data-encryption-a-must-do-for-
medical-practices/
CureMD Healthcare
55 Broad Street, New York, NY 10004
Ph: 212.509.6200
www.curemd.com
Thank you!

More Related Content

What's hot

Asset management due dilligence questionnaire
Asset management due dilligence questionnaireAsset management due dilligence questionnaire
Asset management due dilligence questionnaire
Brenda Nel
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 

What's hot (15)

Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Database Security
Database SecurityDatabase Security
Database Security
 
3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data
 
UPMC Identity Data Breach
UPMC Identity Data BreachUPMC Identity Data Breach
UPMC Identity Data Breach
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Database security
Database securityDatabase security
Database security
 
Cyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisCyber forensic investigation & Analysis
Cyber forensic investigation & Analysis
 
Asset management due dilligence questionnaire
Asset management due dilligence questionnaireAsset management due dilligence questionnaire
Asset management due dilligence questionnaire
 
Database security
Database securityDatabase security
Database security
 
In data security
In data securityIn data security
In data security
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
 
Internet of things
Internet of things Internet of things
Internet of things
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 

Similar to Small actions with big consequences Data Encryption a must do for Medical Practices

Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Conference Panel
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 

Similar to Small actions with big consequences Data Encryption a must do for Medical Practices (20)

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Training powerpoint mha
Training powerpoint mhaTraining powerpoint mha
Training powerpoint mha
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Hippa privacy
Hippa privacyHippa privacy
Hippa privacy
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
3 02
3 023 02
3 02
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Patient privacy and security
Patient privacy and securityPatient privacy and security
Patient privacy and security
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
telemedicineppt.pptx
telemedicineppt.pptxtelemedicineppt.pptx
telemedicineppt.pptx
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 

More from CureMD

More from CureMD (20)

money in escheatment
money in escheatmentmoney in escheatment
money in escheatment
 
Tips to transform coordination of benefits
Tips to transform coordination of benefitsTips to transform coordination of benefits
Tips to transform coordination of benefits
 
Be Appealing Revenue Cycle Management Series
Be Appealing Revenue Cycle Management SeriesBe Appealing Revenue Cycle Management Series
Be Appealing Revenue Cycle Management Series
 
Billing plugs That Pay Identify RCM Leaks
Billing plugs That Pay Identify RCM LeaksBilling plugs That Pay Identify RCM Leaks
Billing plugs That Pay Identify RCM Leaks
 
Marketing your practice on a shoestring
Marketing your practice on a shoestring Marketing your practice on a shoestring
Marketing your practice on a shoestring
 
Damn the Deductibles - CureMD Webinar
Damn the Deductibles - CureMD WebinarDamn the Deductibles - CureMD Webinar
Damn the Deductibles - CureMD Webinar
 
Smart tips to improve practice performance
Smart tips to improve practice performanceSmart tips to improve practice performance
Smart tips to improve practice performance
 
9 steps to successful ehr implementation
9 steps to successful ehr implementation9 steps to successful ehr implementation
9 steps to successful ehr implementation
 
Mastering MACRA: A Beginner’s Guide to New Reimbursement Models
Mastering MACRA: A Beginner’s Guide to New Reimbursement ModelsMastering MACRA: A Beginner’s Guide to New Reimbursement Models
Mastering MACRA: A Beginner’s Guide to New Reimbursement Models
 
Preparing for the Conclusion of ICD-10 Grace Period
Preparing for the Conclusion of ICD-10 Grace Period Preparing for the Conclusion of ICD-10 Grace Period
Preparing for the Conclusion of ICD-10 Grace Period
 
Connecting healthcare providers and public health departments
Connecting healthcare providers and public health departmentsConnecting healthcare providers and public health departments
Connecting healthcare providers and public health departments
 
How to Care for the Millennial Patient?
How to Care for the Millennial Patient?How to Care for the Millennial Patient?
How to Care for the Millennial Patient?
 
The Bumpy Road Ahead New Challenges Facing Practices
The Bumpy Road Ahead New Challenges Facing PracticesThe Bumpy Road Ahead New Challenges Facing Practices
The Bumpy Road Ahead New Challenges Facing Practices
 
Meaningful Use in 2015: 6 things to do before the year’s end
Meaningful Use in 2015: 6 things to do before the year’s endMeaningful Use in 2015: 6 things to do before the year’s end
Meaningful Use in 2015: 6 things to do before the year’s end
 
ePrescribe Controlled Substances With Ease
ePrescribe Controlled Substances With EaseePrescribe Controlled Substances With Ease
ePrescribe Controlled Substances With Ease
 
Jumpstart your CureMD Application for ICD-10
Jumpstart your CureMD Application for ICD-10Jumpstart your CureMD Application for ICD-10
Jumpstart your CureMD Application for ICD-10
 
ICD-10 Training For Counseling, Psychology & Psychiatry.
ICD-10 Training For Counseling, Psychology & Psychiatry.ICD-10 Training For Counseling, Psychology & Psychiatry.
ICD-10 Training For Counseling, Psychology & Psychiatry.
 
ICD-10 Training For Oncology
ICD-10 Training For OncologyICD-10 Training For Oncology
ICD-10 Training For Oncology
 
ICD-10 training For Pain Management
ICD-10 training For Pain ManagementICD-10 training For Pain Management
ICD-10 training For Pain Management
 
ICD-10 Training for Internal Medicine Part 2
ICD-10 Training for Internal Medicine Part 2ICD-10 Training for Internal Medicine Part 2
ICD-10 Training for Internal Medicine Part 2
 

Recently uploaded

❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
daljeetkaur2026
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
dilpreetentertainmen
 
👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...
👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...
👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...
minkseocompany
 
❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...
❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...
❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...
chandigarhentertainm
 
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North CarolinaTIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
Mebane Rash
 

Recently uploaded (19)

Call Girls In Indore 💯Call Us 🔝 9987056364 🔝 💃 Independent Escort Service Ind...
Call Girls In Indore 💯Call Us 🔝 9987056364 🔝 💃 Independent Escort Service Ind...Call Girls In Indore 💯Call Us 🔝 9987056364 🔝 💃 Independent Escort Service Ind...
Call Girls In Indore 💯Call Us 🔝 9987056364 🔝 💃 Independent Escort Service Ind...
 
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
 
The Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramThe Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's Diagram
 
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
 
2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology
 
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
 
❤️Amritsar Escort Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ Amri...
❤️Amritsar Escort Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ Amri...❤️Amritsar Escort Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ Amri...
❤️Amritsar Escort Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ Amri...
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
 
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
 
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
 
❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...
❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...
❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...
 
👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...
👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...
👉Indore Call Girl Service👉📞 7718850664 👉📞 Just📲 Call Anuj Call Girls In Indor...
 
❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...
❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...
❤️ Escorts Service in Bangalore ☎️81279-924O8☎️ Call Girl service in Bangalor...
 
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
 
Making change happen: learning from "positive deviancts"
Making change happen: learning from "positive deviancts"Making change happen: learning from "positive deviancts"
Making change happen: learning from "positive deviancts"
 
👉Bangalore Call Girl Service👉📞 6378878445 👉📞 Just📲 Call Manisha Call Girls Se...
👉Bangalore Call Girl Service👉📞 6378878445 👉📞 Just📲 Call Manisha Call Girls Se...👉Bangalore Call Girl Service👉📞 6378878445 👉📞 Just📲 Call Manisha Call Girls Se...
👉Bangalore Call Girl Service👉📞 6378878445 👉📞 Just📲 Call Manisha Call Girls Se...
 
💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...
💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...
💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...
 
💸Cash Payment No Advance Call Girls Hyderabad 🧿 9332606886 🧿 High Class Call ...
💸Cash Payment No Advance Call Girls Hyderabad 🧿 9332606886 🧿 High Class Call ...💸Cash Payment No Advance Call Girls Hyderabad 🧿 9332606886 🧿 High Class Call ...
💸Cash Payment No Advance Call Girls Hyderabad 🧿 9332606886 🧿 High Class Call ...
 
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North CarolinaTIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
 

Small actions with big consequences Data Encryption a must do for Medical Practices

  • 1. Small actions with big consequences Data Encryption a must do for medical Practices © CureMD Healthcare
  • 2. Data Encryption • Would you ever buy an SUV without locks? Or leave the keys in the ignition while you’re grocery shopping? • Would you be happy to deposit your hard earned money in a bank, with no security protocol, so that anybody can walk in and get away with all the money stored inside? • The likely answer to all three questions is no • Why do we have such checks in place? • They’re there to prevent the Jesse James’ and John Dillingers’ of modern times from trying to steal what isn’t theirs.
  • 3. Data Encryption • Your practice is the bank, personal health information (PHI) is the deposits, and data encryption is what must be done to ensure that the deposits are safe • Organized criminal groups are aware of the potential value of PHIs, which include your patient’s insurance information, social security and credit card numbers • That is why they are devising more and more ways to access this information
  • 4. Data Encryption • However, recent data on PHI theft suggests that most breaches are not caused because of someone hacking into practices but because of physician or practice negligence • The scenario generally arises when someone at a practice copies EMR date on a portable device (usually not encrypted), intending to work from home and then the device gets stolen • Or in certain cases, data stored on an on premise- server or an in-house computer with the decryption key saved on the same computer can land up into wrong hands
  • 5. Data Encryption • A late 2011 HIMSS survey of 329 healthcare organizations revealed only 44 percent of respondents encrypt their mobile devices • Only 29 percent said that all of their data on laptops is encrypted, while 42 percent said none of their desktop data is encrypted • About one out of four respondents (23 percent) said none of their e-mails is encrypted • Such negligence on a practice’s part can be extremely harmful for the patients concerned and the financial system as a whole
  • 6. Data Encryption • Even for the practice such a breach not only causes reputational damages, but also makes you liable for heavy fines and penalties by the government • Ready to take encryption and data protection seriously? Here’s how to beef up security and stay HIPAA compliant:
  • 7. Encryption 101 • Encryption is the conversion of data into a form, often called ciphertext, which cannot be understood by another party — man or machine — without being decrypted first • There are many types of encryption available that offer different levels of protection • With public key encryption, all of your staff members with access to a specific key code will be able to decrypt the information • Additionally, the provider and everyone else with access of the key will be able to identify the recipient
  • 8. Encryption 101 • However, if you want the information to remain more exclusive and desire only specific users to access it • For example only physicians, physician assistants and nurses, you can choose private key encryption • With encryption, even if someone has gained access to sensitive information stored at your practice, they cannot make sense of the information unless it has been decrypted using the respective keys • However, you will need an encryption specialist to implement such a system at your practice
  • 9. Dealing with portable devices • With checks present in most Electronic Medical Records (EMRs) systems, the breach of information usually takes place when someone from the practice copies the data onto portable USB devices, an e-mail attachment and other avenues that generally lack encryption • If such a device is misplaced or gets stolen, the level of vulnerability increase • A possible solution for such problems is ensuring a central control of all portable medical devices possessing information regarding your practice
  • 10. Dealing with portable devices • A possible solution for such problems is ensuring a central control of all portable medical devices possessing information regarding your practice • Using such a system, the encryption status of all these devices could be monitored in addition to acting as a medium for data safety verification (if any of the devices were stolen) • Another recommendation while handling portable devices is that of built-in remote wiping functionality • Using such a system, you would be able to erase all the content from the devices of specific users
  • 11. Sending E-mails • Regular E-mails should not be used as a medium to transfer PHIs, as many practices have been grilled for sending unencrypted e-mails with sensitive patient information • When interacting with patients or other parties, make sure that the mails are encrypted. Start using patient portals they are the safest mode of transferring PHI
  • 12. Monitoring Audit Trails • Audit trails in your EHR are not only a way of keeping track of a patient’s clinical encounter but also to monitor your staff’s behavior • You can view who has accessed a patient’s information at what time • Any abnormal activity can easily be detected and the concerned person be taken to task to ensure that your staff takes PHI safety seriously
  • 13. The best policy? • If you’re not sure on a certain security-related situation, contact your firewall or encryption vendor to help you readily solve the problem • Do not risk exposing yourself due to lack of information or understanding about a communication medium • Also be aware that HIPAA security compliance is like a clinical encounter: If it’s not documented, then it didn’t happen • Therefore, document everything and make it part of a security manual
  • 14. Read more on blog.curemd.com • To read more on this topic, visit: • http://blog.curemd.com/small-actions-with-big- consequences-data-encryption-a-must-do-for- medical-practices/
  • 15. CureMD Healthcare 55 Broad Street, New York, NY 10004 Ph: 212.509.6200 www.curemd.com Thank you!