Principles and Practice of Information Security

advertisement
The HIPAA Security Rule:
Implications for Researchers
and IRBs
Daniel Masys, M.D.
Director of Biomedical Informatics
Director, Human Research Protections Program
Professor of Medicine
UCSD School of Medicine
dmasys@ucsd.edu
Topics
• Information security principles
• HIPAA basics: Definitions
• Relationship of Privacy and Security
Rules
• Security Rule elements
• Implications for Research
• Impact on IRBs
“Universal”
Information Security Elements
• Authentication -a person or system is who they
purport to be (preceded by Identification)
• Access Control - only authorized persons, for
authorized uses
• Integrity - Information content not alterable
except under authorized circumstances
• Attribution/non-repudiation - actions taken are
reliably traceable
HIPAA, not HIPPA :-)
“Misspelling is not a violation of the Rule”
Director, US Office of Civil Rights
Speaking at UCSD, 2/5/03
HIPAA Definitions
• Health information means any information,
whether oral or recorded in any form or
medium, that:
1) Is created or received by a health care
provider…, and;
2) Relates to past, present, or future physical
or mental health or condition of an
individual…or provision of health care..or
payment for provision of health care.
HIPAA definitions
• “Covered entity” - organization responsible for
HIPAA compliance.
• Protected Health Information (PHI) information generated in the course of
providing healthcare that can be uniquely
linked to them
• Information “use” = use within organization
• Information “disclosure” = release outside of
organization
Security Rule: Basic Concepts
• Applies security principles well established in
other industries
• Like Privacy Rule, affects Covered Entities that
create, store, use or disclose Protected Health
Information (PHI)
• Unlike the Privacy Rule, affects only PHI in
electronic format (not oral or paper-based)
• Like the Privacy Rule, written for health care;
research not the principal focus
• Scalable: burden relative to size and complexity
of organization
Two types of Rule elements
1. Required standards
2. “Addressable” standards
– CE must decide whether the standard is
reasonable and appropriate to the local
setting, and cost to implement
– Can either
1. Implement the standard as published
2. Implement some alternative (and document
why)
3. Not implement the standard at all (and
document why)
Three Categories of Standards
• Administrative safeguards
– Policies and procedures to prevent, detect, contain
and correct information security violations
• Physical Safeguards
– IT equipment and media protections
• Technical Safeguards
– Controls (mostly software) for access, information
integrity, audit trails
Administrative Safeguards
•
Required
1.
2.
3.
4.
5.
6.
7.
8.
9.
Risk Analysis
Risk Management Plan
Sanctions Policy
Information System Activity Review (audits)
Security Incident Response & Reporting
Data Backup Plan
Disaster Recovery Plan
Emergency Mode Operations
Periodic Evaluations of Standards Compliance
Administrative Safeguards
•
Addressable
1.
2.
3.
4.
5.
6.
7.
8.
9.
Workforce security authorizations
Workforce clearance procedure
Information access authorization procedures
Procedures for establishing and modifying access
privileges
Security training
Log-in management
Password management
Virus protection
Security reminders
Physical Safeguards
•
Required
1. Workstation Use Analysis
2. Workstation Security
3. Disposal of media
– deletion of PHI prior to disposal, or
– Secure disposal so data nonrecoverable
4. Media Reuse
– Deletion of PHI prior to re-use
Physical Safeguards
• Addressable
1.
2.
3.
4.
5.
Facility access contingency plans
Facility security plan
Physical access control and validation
Accountability for physical access
Data Backup and Storage
Technical Safeguards
•
Required
1. Unique User Identification
– No shared logins
2. Emergency access procedures
3. Audit controls
– Logs of who created, edited or viewed PHI
4. Person and/or Entity Authentication
– No systems without access control
Technical Safeguards
• Addressable
1. Automatic logoff
2. Encryption
3. Authentication of the integrity of stored and
transmitted PHI
Implications for Research
• Avoid HIPAA Security Rule entanglements
if possible by:
– Thoughtful definition of Covered Entity with
respect to research activities
• E.g., University of California is Hybrid Covered
Entity; research not a covered function except for
research that uses or creates medical records
– Use of de-identified data and/or Limited Data
Sets wherever possible
– Not storing PHI in electronic format in
research settings
Excerpt from Text of HIPAA Security Rule
8338 Federal Register / Vol. 68, No. 34 / Thursday, February 20, 2003 / Rules and Regu
The term ‘‘covered entity’’ is defined at § 160.103 as one of
the following: (1) A health plan; (2) a health care
clearinghouse; (3) a health care provider who transmits
any health information in electronic form in connection with
a
…transaction
Researchers who are members of a covered entity’s work
force may be covered by the security standards as part of
the covered entity. See the definition of ‘‘workforce’’ at 45
CFR 160.103. Note, however, that a covered entity could,
under appropriate circumstances, exclude a researcher or
research division from its health care component or
components (see § 164.105(a)). Researchers who are not
part of the covered entity’s workforce and are not
themselves covered entities are not subject to the
standards.
If a research project maintains
e-PHI…
• Responsible group must designate a Security
Officer who has responsibility for implementing
HIPAA-compliant policies and procedures for
research use of e-PHI
• Must do and document a risk analysis
• Must create risk management plan based on the
risk analysis
• Must create and keep current a HIPAA Security
Rule compliance document that includes
description of how 17 Required elements are met,
and decisions regarding Addressable elements
HIPAA Risk Analysis Elements
1. Inventory of all sources of e-PHI
2. Listing of who has access, when and
where (including home)
3. Outline flow of e-PHI
4. Listing of storage locations and capcities
5. Listing of current security measures
6. Analysis of potential confidentiality
breaches
Widespread current research
practices that don’t meet the
standard
• Research workgroups that create or use PHI in
electronic format but have no written security
procedures, policies or training
• Workstations with no login security (e.g.,
Windows98)
• Data management and analysis applications
used to store PHI that have no ability to
generate audit trails
– E.g., Excel spreadsheets with PHI in them
Implications for IRBs
• Include separate research plan element entitled
“Data Management Procedures” in IRB research
plan submission, that addresses
– Whether project includes PHI, and if so whether it is
kept as e-PHI
– Whether PI and staff are aware of HIPAA Security
Rule and agree to comply with it
– Whether physical and technical safeguards for
person-identifiable research data appear reasonable
and adequate
Implications for IRBs
• Committee educational programs needed on
– General principles of information security
– Specific Requirements of HIPAA Security Rule
effective April, 2005
• Possible use of ad hoc IT security
consultants for review of projects with high
information management complexity or high
IT security risk
Conclusions
• Compared to the Privacy Rule, the Security Rule
is potentially far more disruptive and costly for
clinical researchers
• Decisions made for the Privacy Rule regarding
Covered Entity definition and covered functions
have profound impacts on Security Rule
implementation
• IRBs will need to begin education for committee
members and investigators soon in order to
reduce instances of noncompliance by April 2005
For More Information on the
HIPAA Security Rule
• HHS HIPAA website:
aspe.hhs.gov/admnsimp
• Centers for Medicare & Medicaid
Services (CMS) HIPAA website:
www.cms.hhs.gov/hipaa
• Phoenix Health Systems HIPAA Advisory
Site:
http://www.hipaadvisory.com/action/models.htm
This PowerPoint presentation is available online at:
http://irb.ucsd.edu/operations.shtml
Download