Information Protection Policies Training for MGH/MGPO Protecting Our Patients’ Privacy is EVERYONE’S responsibility Massachusetts General Hospital Slide 1 Why Training is Important • All MGH/MGPO workers need to know if they handle patient information or confidential data. • If you do, you need to protect it according to MGH/MGPO policy. Slide 2 This training covers policies for: Physical Removal and Transport of Protected Health Information (PHI) Personal Information (PI) Encryption of Laptops and USB drives Please read policies before continuing: http://www2.massgeneral.org/jobs/NewHireWeb/infoprotectionpolicies.pdf Slide 3 Note: If your department has specific policies for protecting data, the information and policies in this training are in addition to, and do not replace, department policies and practices. Slide 4 So, What are PHI and PI? Protected Health Information (PHI) defined by HIPAA Information we create or receive that identifies OR can be used to identify a person AND relates to their health, healthcare or payments Personal Information (PI) defined by Massachusetts law A person’s name along with information like Social Security Number (SSN) or credit card number Everyone’s PI – patients, employees, visitors - must be protected Slide 5 Examples of PHI and PI • • • • Name Address Email address Dates (birth date, admission date, discharge date, etc.) • Full face photograph • Biometric identifiers Other Numbers: • Phone • Social Security (SSN) • Credit Card • Certificate/license (including retinal, finger and voice prints) • Medical device identifiers & serial # • Any unique characteristic • Medical Record # (MRN) (such as family member names, identifying scars) • Health Insurance # Slide 6 Examples of Where PHI is Found • • • • • • • Registration Records Medical Records Billing Records Patient Lists Appointment Schedules E-mails Hand-written notes Slide 7 Physical Removal and Transport of Protected Health Information (PHI) & Personal Information (PI) Slide 8 Physical Removal & Transport of PHI & PI Policy Take reasonable precautions to safeguard and secure PHI & PI at all times. In most cases, you must have the approval of your Supervisor or Principal Investigator before removing PHI or PI from MGH/MGPO. Purpose of Policy To reduce the loss, theft, or unauthorized access of PHI and PI when it is being physically moved within or from MGH/MPGO. Slide 9 Transport vs. Removal? • “Transport” refers to any time data is being physically moved within or between MGH/MGPO sites or to an non-MGH/MGPO site • “Removal” refers just to data being moved to a non-MGH/MGPO site (for example: your home, a conference). Slide 10 Ask yourself … When do I handle PHI or PI? ? do I print things with PHI or PI ? do I carry PHI when I transport patients ? do I work with computer systems with PHI or PI ? do I file papers with PHI or PI ? do I hear/see PHI when I clean a room If you are not sure you handle PHI or PI: talk with your Supervisor or call the Privacy Office (617) 726-1098 Slide 11 Policy Requirements for Transporting PHI & PI • Only transport (move) PHI & PI if it is part of your job and follow any department specific procedures • Carry the least amount of information needed • Take precautions to safeguard and secure the information at all times For example: Cover it so it can’t be seen (e.g., locked bag) Do not take it out in public view Do not leave it publicly unattended or unsecured at anytime (e.g., cafeteria table, a public printer) Slide 12 Policy Requirements for the Removal of PHI & PI • PHI or PI in paper form (original or copy) may not be removed, unless: - You have approval from your Supervisor or Principal Investigator OR - You require access to PHI or PI offsite to provide patient care • If PHI or PI is stored on laptops, netbooks, tablets or portable USB drives, those devices must be encrypted • Original paper medical records may never be removed from MGH/MGPO Slide 13 If You are a Supervisor or Principle Investigator: Before approving a request to remove PHI or PI, you must make sure that the individual making the request will do what is necessary to protect the information from unauthorized access, use, loss, theft or disclosure. The process for approving a request may be as simple as a phone conversation that includes - the business need for removal the safeguards that will be taken At your discretion, the approval process may include other steps, such as written confirmation. Slide 14 Policy Violation If you do not follow this policy, you will be subject to corrective action up to and including termination from employment. Also, if the PHI or PI is removed without appropriate safeguards, and you are the Supervisor or Principal Investigator who authorized removal, you may be subject to corrective action, up to and including termination. Slide 15 What This Means for You • Be sure information doesn’t fall out of your scrubs, pockets, bags, hands, etc. If you have any questions, talk to your Supervisor or Principal Investigator. • Take all your papers when leaving a meeting • Check your pockets and bags before leaving work so you don’t accidentally remove PHI or PI • Avoid printing information that is available online; if you print, pick it up immediately Slide 16 Protecting Data with Encryption • Includes encrypting: – Laptops, tablets, netbooks – Portable USB drives • Even if you don’t use a laptop, tablet, netbook or portable USB drive for business now, you must be aware of these policies. Remember, if you start to use one for business, it must be encrypted. Slide 17 So, what is encryption? Encryption is a security process that scrambles information. It changes information from a readable form into something that can not be read unless you have the key. This: Encryption changes data into an unreadable format Becomes something like this: Rmvtu[yopm dhqht3w 3qtq isem ze mrxephlebl oermzq …so ONLY the person with the decryption key or password can read the information Slide 18 Encryption vs. Passwords Having a password does not necessarily mean something is encrypted. Passwords by themselves do not scramble the information. If something is only “password protected”, it is not enough protection - someone could bypass the password and read the information. Slide 19 Why is encryption important? Laptops and USB devices can be easily lost or stolen Encryption protects MGH/MGPO confidential information and helps keep it private! Slide 20 Protect your Encryption Password • Do not share it with anyone • Do not write it down • If someone sees you type your password, change it promptly Slide 21 Encryption applies to ANY confidential data Examples of confidential data: • Protected Health Information (PHI) • Personal Information (PI) • Personally Identifiable Information (PII) • MGH/Partners business confidential information When in doubt, handle it like confidential data! Slide 22 Laptop Encryption Policy IF you use a laptop, tablet or netbook for any MGH/MGPO or Partners business purposes THEN that device must be encrypted, even if it’s your personal device! Failure to properly encrypt your laptop, tablet or netbook may result in corrective action Slide 23 “Business Purposes” Examples • Checking or sending Partners email • Accessing the Partners Network • Storing patient or research data • Logging on to Peoplesoft for any purpose (except for viewing your own personal information) If you never use a LAPTOP for MGH business you may skip ahead to slide 31 Slide 24 How do I encrypt a device? To get started, contact the IS Help Desk: (617) 726-5085 Before buying a new device, please check http://helpdeskselfservice.partners.org/applications/encryption.aspx • Partners-supported encryption does not work on all laptop models • Some netbooks and tablets may require a different approach Do not recycle or discard an old device you’ve used for business purposes – see slide 14 for information about proper disposal Slide 25 If IS encrypts your Partners’ or personal laptop… THEN • you have full support if you have questions • you can recover your encryption password, if you forget it • they will check for additional safeguards (such as required password protected screen saver) Slide 26 Other Encryption Installation If you install Partners-supported encryption yourself: You are responsible for doing it correctly and following the additional requirements If you install/activate other encryption: The product must meet the specific technical standards listed on the next slide If you forget your encryption password, you may not be able to recover it and may need to rebuild your laptop IS Help Desk will not be able to provide support Slide 27 Minimum Encryption Standards Check with the vendor or store where your device was purchased to see if the encryption has: • 256-bit key strength; • Advanced Encryption Standard (AES) algorithm or other FIPS 140-2 validated algorithm; • Full disk encryption (the entire disk must be a private partition) • Support for strong password enforcement Slide 28 Additional Laptop Safeguards Depending on your device, one or more of these safeguards may also be required: – – – – Password protected screen saver Updated/patched operating system Current anti-virus protection Laptop cable For details, click here: http://helpdeskselfservice.partners.org/applications/encryption.aspx Slide 29 Old or Unencryptable Device? For laptops, netbooks, or tablets that cannot be encrypted: • Move data you need to a secure environment - Contact IS Help Desk for disposal OR - Use a secure delete program to wipe your device (reformatting is not enough) Slide 30 USB Drive Encryption Policy IF you are using a portable USB drive to store any Confidential Data* THEN you must use an ENCRYPTED USB drive that meets specific technical standards. Failure to use an encrypted USB may result in corrective action * See slide 22 for definition of Confidential Data Slide 31 Portable USB Drives …have many names: jump drives flash drives memory sticks thumb drives ..and can store many things: files pictures music videos Slide 32 Portable USB Drives … are removable storage devices that plug into a “USB port” on a computer. NOTE: Most USBs do not have encryption If you never use USB drives for MGH business, you may skip ahead to slide 38 Slide 33 Where to buy an encrypted USB drive Encrypted USB drives that meet policy standards can be purchased through • The Ergonomics Group (“Ergonomics”) • EBUY (Staples) • The MGH General Store Slide 34 If you buy a USB drive outside of MGH, be sure it is encrypted and meets these minimal technical standards: – 256-bit key strength; – Use of the Advanced Encryption Standard (AES) algorithm or other FIPS 140-2 validated algorithm; – Full disk encryption (entire disk must be a private partition); – Support for strong password enforcement Slide 35 If you forget your USB drive encryption password… …then you will not be able to access your data Note: USB drives should only be used for temporary storage of file copies. Original files should be on networked Partners systems where they will be backed up and you can recover them, not on local hard drives or USB drives. Slide 36 Existing USB Drives If you have an unencrypted USB drive with Confidential Data, then • Move data you need to a secure or encrypted environment - Contact Environmental Services for secure destruction of your USB drive OR - Follow instructions for securely deleting data on a USB (simply ‘deleting’ is not enough) Slide 37 Training Summary Slide 38 What to remember Policy: Physical Removal &Transport of PHI & PI Take reasonable precautions to safeguard and secure PHI and PI at all times. In most cases, you must have Supervisor or Principle Investigator approval before you remove PHI or PI. Policy: Laptop Encryption Encrypt laptops, notebooks and tablets used for any business purposes, even personally owned devices. Policy: Portable USB Drive Encryption Use encrypted USB drives if storing confidential data on USB drives. Slide 39 You are responsible for doing what these policies require If you have any questions about how these policies apply to you, please: • talk with your supervisor or • email the MGH Privacy Office at MGHPrivacyOffice@partners.org or • visit the MGH Privacy and Security Intranet Website http://intranet.massgeneral.org/hipaa/index.html Slide 40 Quiz Read the question, note your answer, and go ahead to the next page 1. During the day, I wrote down some notes about patients just for my reference. When I got home, I found them in my pocket so I threw them away in my regular trash. Was this ok? a. Yes b. No Slide 41 Answer • The correct answer is b – no, this was not ok. – Taking patient notes home is “physical removal of PHI”.and this is a violation of the policy • the notes were not needed at home for patient care • they weren’t secured during the trip home • you may not have had supervisory approval. – However, if this does happen, use a cross cut shredder, or tear the notes into small pieces; don’t just throw them away. Slide 42 2. Although I don’t have clinical responsibilities, I do access patient information in my job. In a meeting, my colleague gave me a report with medical record numbers. I don’t have time to return to my office before catching the train. What should I do? a. Ask my colleague to keep the report b. Take the report home in a sealed envelope in my backpack Slide 43 Answer • The correct answer is a - ask your colleague to keep the report. • Medical record numbers (MRNs) are PHI, so taking the report home would be considered “physical removal of PHI”. Since you do not need this information at home, you should not remove it. • If you did need to access this information offsite, you would need your supervisor or Principle Investigators’ approval before you removed the report. And to get such approval, you would need to demonstrate that you would take reasonable steps to protect the information (such as putting it in a sealed envelope so no one else could accidentally see the information). Slide 44 3. I just bought a new laptop and it is not yet encrypted. Is it ok to check my Partners email from home on my laptop? 1. Yes 2. Yes, if I log in over the VPN 3. No Slide 45 Answer • • • The correct answer is c, no, you may not check email with your unencrypted laptop. Email is considered a business purpose, and your laptop must be encrypted before you use it for MGH/MGPO business purposes, even if you are using MGH VPN, or Go To My PC. However, you may check your personal information in PeopleSoft (e.g. view your pay check) with an unencrypted laptop. Slide 46 4. I have a confidential file that is too big to send as an email attachment, so I want to use a USB drive to get the file to an MGH colleague. Do I need an encrypted USB drive? a. Yes b. No Slide 47 Answer • • • • The correct answer is a – yes, your USB drive must be encrypted Since your file has confidential information the USB drive must be encrypted, whether it is very temporary storage, or if you have password protected the file. Since you will be carrying the USB drive to your colleague, this also falls under the policy regarding physical removal and transport of PHI, which also requires the use of an encrypted USB drive. There are also other risks associated with using a USB drive, such as forgetting your encryption password. Wherever possible, give others access to the data by way of a secure network server. Slide 48 Congratulations! • You finished the Information Protection Policies @ MGH required training. • Please print and sign the Training Attestation (next page) and take with you to your interview Slide 49 I have received, read, and will abide by the policies: Physical Removal & Transport of PHI and PI Laptop Encryption Portable USB Encryption I certify that I have completed the required training. Name (Printed)____________________ Date ___________ Signature ____________________ Volunteer number______________ (filled in by Volunteer Office)