DATA PRIVACY SAFEGUARD PROGRAM INFORMATION SECURITY AND PRIVACY BEST PRACTICES Information Security and Privacy Best Practices for organizations with access to personally identifiable information (PII) Information Security and Privacy are broad industry fields spanning all aspects of data protection. The industry best practices for these fields are numerous. The National Institute for Standards and Technology (NIST) has developed documents to provide guidance to Federal agencies on how to protect their data. This document is meant to serve as an educational material for healthcare research organizations using personally identifiable information (PII), and specifically the subset of PII that is protected health information (PHI), that will provide key information security and privacy best practices an easily-digestible form. These best practices were compiled using NIST’s “Common IT and Privacy Security Practices” as listed in its Special Publication 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems1, Security Controls for Federal Information Systems and Organizations (NIST Special Publication 800-53, Revision 3)2, NIST Special Publication 800-53 DRAFT APPENDIX J Security and Privacy Controls for Federal Information Systems and Organizations 3, and the Privacy Best Practices from the Privacy Rights Clearinghouse’s Checklist of Responsible Information-Handling Practices.4 In addition, they are structured to closely relate to the areas that the questions asked on CMS’ Data Management Plan address. What is a best practice? A best practice is a method or technique that can be implemented by multiple organizations that has consistently, over time, proven to produce results or accomplish given goals or tasks more effectively than other methods or techniques. Best practices are used often when no specific formal method or technique is established, or when the existing method or technique is not adequate to produce the desired results or accomplish the desired goal. Best practices also arise to fill in gaps where legislation or requirements may not cover every aspect of a business process or need. As such, best practices are not required by law, but are considered an extra step in achieving high quality standards for a business process or need. Additionally, best practices are everevolving as better improvements are discovered or when legislation, technology and/or industry-specific advancements prompt a change. Organizations desiring to be industry leaders implement the best practices associated with their industry. Best practices are not mutually exclusive with legislation and requirements. In fact, many legal requirements were first considered best practices before they were enacted into law. Hierarchy of Requirements and Best Practices Federal legislation requirements Requirements legally mandated by Federal law that an organization must comply with in order to avoid legal repercussions. 1 http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf 3 http://csrc.nist.gov/publications/drafts/800-53-Appdendix-J/IPDraft_800-53-privacy-appendix-J.pdf 4 https://www.privacyrights.org/fs/fs12-infohandling.htm 2 1 Rev. No: 01.14.13 Hierarchy of Requirements and Best Practices State legislation requirements Agency-specific requirements Best practices Requirements legally mandated by state law that an organization must comply with in order to avoid legal repercussions. These requirements do not supersede Federal requirements. Requirements developed by an organization with which the organization is expected to comply. These requirements do not supersede Federal or state requirements. A method or technique, not legally required of an organization that is proven to produce results and accomplish goals more effectively than other techniques. Key areas in information security and privacy • Policies • Standard Operating Procedures (SOPs) • Program Management • Risk Management • Data Protection Planning • Physical and Environmental Security and Privacy • Data and Network Security and Privacy • Contractual Agreements Among Business Partners & Associates • Education, Awareness and Training • Users Access • Authorization • Information Sharing and Transmission • Data Retention and Disposal Key best practices for information security and privacy5 For ease of cross-reference, each best practice section detailed below will contain a reference to the relevant section(s) on the Data Management Plan (DMP)6. The cross-reference will be denoted via the question number on the DMP. Policies (Relevant sections on the DMP: 1.7, 2.1, 2.3, 4.1, 4.2, 4.3, 4.4) Policies are written documents that serve as guidance for an organization. Information security and privacy policies are the internal guidance for an organization to properly protect data. • • • • • • Policies should be developed, disseminated, and implemented at both the organization-level and the group/team-level Once policies and procedures are developed, the organization should also develop a privacy plan for the implementation of the policies, procedures, and applicable privacy controls Policies and procedures should be in written form and easily accessible to employees at an organization Policies are most effective when employees are trained and educated about an organization’s policies Policies should contain roles and responsibilities within them All policies should be consistent with one another and not in conflict with any others 5 This list of best practices is not meant to be comprehensive, but rather serve as a guide for several best practices in the key areas of information security and privacy. 6 A copy of the Data Management Plan is included in the CMS Data Request Executive Summary, which can be located on ResDAC’s website. Please click here to access the Data Management Plan. 2 Rev. No: 01.14.13 • • Policies should govern the appropriate privacy and security controls for programs, information systems, or technologies involving PII The privacy plan, policies, and procedures should be regularly reviewed and updated Program Management (Relevant sections on the DMP: 1.1, 1.2, 1.3, 1.4, 1.8, 2.6, 3.1, 3.2, 4.3) Management comprises the planning, organizing, staffing, leading, and controlling of an organization to achieve desired results. Strong management within an organization will typically lead to a stronger data protection program (among other programs) within that organization. • • • • • Designation of a Senior Official for Privacy and Security Management should take place at an executive (organization-wide) level and a front-line (group/team) level Mission statements for an organization help to drive the goals and purpose of management within an organization. Information security and privacy often cuts across several disciplines and offices/groups within an organization, so it is important for the management of these varied offices/groups to work together and have formal liaisons Information security and privacy requires management at each step of the process and management should be involved from the beginning planning phase to the later implementation and continuous operation phases Risk Management (Relevant sections on the DMP: 1.3, 1.6, 1.9, 2.5, 3.1, 3.2, 3.3, 3.4, 4.2) Risk is the likelihood or possibility of something occurring with an adverse result. Assessing the likelihood of these events occurring and taking actions to reduce or limit the adverse results is the process known as risk management. • • • • • All projects contain risks and it is important to collect, review and analyze the nature of a project to determine potential risks Once potential risks are identified, the likelihood of that risk occurring should be estimated The level of a risk is determined by the likelihood as well as the potential adverse impact (low likelihood and low impact is low risk; high likelihood and high impact is high risk) and the high risk items should be prioritized for mitigation action When risks are identified, actions should be taken or plans put in place to minimize the risk and mitigate potential adverse impact Information security and privacy safeguards are a great way to implement items that can reduce risk that later may result in costly remediation activities vice a substantially smaller investment upfront Data Protection Planning (Relevant sections on the DMP: 1.6, 1.9, 2.5, 3.1, 3.2, 4.1, 4.2, 4.4) Information privacy and security is not a one-time action. It must be planned and implemented throughout all phases of a data or system life cycle, which is typically described by five phases: initiation, development/acquisition, implementation, operation, and disposal. 3 Rev. No: 01.14.13 • • • All projects should have a security plan before they are implemented, including data protections from when data is first received Security and privacy controls and safeguards should be tested in advance of a project kickoff, to determine effectiveness in protection and appropriateness for the level of sensitive data that will be used Destruction and disposal policies and procedures should be planned in advance of reaching the disposal phase of a project Physical and Environmental Security and Privacy (Relevant sections on the DMP: 1.6, 1.7, 1.9, 2.1, 2.3, 2.5, 2.7, 4.1, 4.4) Physical and environmental security and privacy are the first line of defense in information protection. These protections include the physical facilities housing the information, the system resources themselves, and the facilities used to support operation. • • • • • Physical access controls should be implemented to restrict and monitor the entry and exit into physical facilities housing information. These facilities include the locations housing the data itself as well as the locations that provide virtual access to the data. Data should be safeguarded against environmental factors such as fire, flood, earthquake or other potential for destruction of hardware and hardcopy data. Data should also be protected against service disruption, due to power outage or power surge, failures of heating and/or air conditioning systems, or any other potential occurrence that could damage hardware and/or software. Organizations should protect against interception of data, which can occur via any of the three methods: direct observation, interception of data transmission, or electromagnetic interception. Special precautions should be taken when information is stored on mobile or portable devices, and could include locking away mobile and portable devices, as well as encrypting data that is stored on mobile and portable devices. Data and Network Security and Privacy (Relevant sections on the DMP: 1.6, 1.8, 1.9, 2.1, 2.2, 2.3, 2.4, 2.5, 4.2, 4.3) Data should be protected in all forms, softcopy and hardcopy, and in all locations, whether stored on a network server or accessed remotely via a desktop. A breach of information can occur at any stage of data possession, including data in transit over a network system. • • • • • • • • • • Networks should be secured with industry standard technical protections Penalties should be in place for intentional or major breaches of network security Incident response plans and breach management procedures should be established Password guidelines (including frequent changing of passwords and password character requirements) should exist and password protections should be required for all access points to the network System penetration tests should be conducted regularly to ensure network security Virus protection policies and practices should be in place and reviewed regularly to check for necessary updates Procedures to prevent former employees from gaining access to a network should be established Physical security and privacy controls should exist for all physical locations that either house data or allow access to data on a network Data should be limited on a network to de-identified data or limited data sets when possible All data on a network should be inventoried and tracked 4 Rev. No: 01.14.13 Contractual Agreements (Relevant sections on the DMP: 1.3) Binding agreements, such as Data Use Agreements, Memoranda of Understanding, Confidentiality Agreements, and even Rules of Behavior and other documents, help to control the privacy and security of data by holding all individuals and organizations responsible for upholding the controls and policies and practices that they agree to by signature. • • • Organizations should require binding agreements (e.g. Data Use Agreement or other) to be entered into and signed for any project involving sensitive information and more than one organization Organizations should also require binding agreements to be used internally; for example, requiring all employees working on a project to sign a confidentiality agreement and Rules of Behavior These binding agreements should be updated regularly Education, Awareness and Training (Relevant sections on the DMP: 1.5) Policies, procedures and practices are important pieces of a privacy and security program, but they are useless unless the personnel know and understand them. This is why it is crucial to develop and implement awareness and training programs and initiatives in order to educate staff on how to protect the privacy and security of information. • • • • • Training modules should be developed for all staff as needed. This will include general awareness training modules as well as system-specific or role-based trainings that are more detailed and likely pertain only to a subset of the entire staff. It is important to consider appropriate methods of training as they pertain to the subjects of the training. For example, a webinar or slideshow format may be appropriate for general training but a hands-on, instructor-led training session may be appropriate for system manipulation or database security and privacy training. Training programs should be periodically evaluated for effectiveness. Training programs should also be evaluated regularly for currency, as technology and the privacy and security fields are constantly changing. An organization should educate and train its staff on the authorized uses and sharing of PII with third parties and ensure that such training occurs at the third-party organizations as well Data Users (Relevant sections on the DMP: 1.1, 1.3, 1.5, 1.8, 2.2, 2.4, 2.5, 2.6, 4.2, 4.3) There are many different types of personnel involved in projects that involve sensitive data. These users can include managers, programmers, system administrators, researchers, analysts, and more. Each user has a unique need to access sensitive data and the levels of access can vary greatly. • • • User roles and access privileges should be determined on a role-based or individual basis, and should align with their responsibilities Users should be assigned responsibilities and privileges based on the “least privilege” principle7 Users should receive role-based training associated with their job functions 7 Least privilege refers to the security objective of granting users only those accesses they need to perform their official duties. Data entry clerks, for example, may not have any need to run analysis reports of their database. http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf 5 Rev. No: 01.14.13 • User access should be terminated as soon as there is no longer a need to access data for business purposes Access (Relevant sections on the DMP: 1.1, 1.4, 1.8, 1.9, 2.2, 2.4, 2.5, 2.6, 2.7, 4.2, 4.3) Access is the availability to view or use data and can refer to both logical (system-based) access and physical access. Access must be restricted and controlled at all times to protect the security and privacy of data. • • • • • • • • Access should be controlled by a reliable source of identity (e.g. UserID) to provide individual accountability for accessing or viewing data Access should be restricted and controlled based on a user’s role and responsibilities The location of access (whether logical or physical) should be controlled via technical safeguards and physical security measures Access should be restricted by service and capability (e.g. “Read” access versus “Read and Write” access) Access should be tracked and logged, and these tracking systems or logs should be available for review if needed Secure gateways and firewalls are standard technical safeguards implemented to control access to data Encryption is another standard technical safeguards implemented to control access to data The organization identifies the minimum PII elements that are relevant and necessary to accomplish the authorized purpose of access and use Information Sharing and Transmission (Relevant sections on the DMP: 2.1, 2.3, 2.7) Data is just as vulnerable in transmission as it is at rest. Data needs to be secured during both physical transmission and virtual transmission. • • • • • • • • Email policies and procedures should be established to help control virtual transmission of data via email Physical transmission controls (such as certified mail carrier services and secure packaging) should be established Sensitive data in transmission should be encrypted When sending sensitive data, the recipient should be notified in advance of the delivery and should also confirm receipt once the data arrives Sensitive data should only be physically delivered to secure locations (e.g. an access-controlled facilities building) Limited data sets and/or de-identified data (instead of raw sensitive data) should be used in transmission, when possible Shares PII with third parties, including other public and private sector entities, only for the authorized business purposes identified or in a manner compatible with those purposes When appropriate, the organization should enter into Memoranda of Understanding, Memoranda of Agreement, Letters of Intent, Computer Matching Agreements, or similar agreements, with third parties that specifically enumerate the purposes for which PII may be used and the data protections that should be upheld by all involved organizations 6 Rev. No: 01.14.13 Retention and Disposal (Relevant sections on the DMP: 1.1, 1.2, 2.2, 2.7, 4.1, 4.4) Data should not be retained longer than is necessary for the business purpose. The timelines for retention and destruction of data are important measures in ensuring the privacy and security of data. • • • • • • • • • The organization limits the retention of PII to the minimum elements identified for the purposes and for a specific and limited period of time The organization conducts an initial evaluation and performs periodic evaluations of its holdings of PII to ensure that only PII necessary and authorized for the business purpose is retained, and that the PII continues to be necessary to accomplish the authorized business purpose Data should be either returned or destroyed as soon as possible after it is no longer needed to complete a business purpose A records retention schedule should be developed for all data used for any project Organizations should complete a Certificate of Data Destruction for all instances of destroying sensitive data If data is lent to another organization and is not to be destroyed, then all of that data (and all copies of that data) should be returned to the organization maintaining ownership at the end of the loan period Destruction of data policies should be specific for all forms of data, whether it be hardcopy, laptop, disk files, thumb drives, servers, etc. The organization should systematically (by established and documented methods) destroy, erase, and/or anonymize the PII, regardless of the method of storage (e.g., electronic, optical media, or paper-based) in accordance with a record retention schedule and in a manner that prevents loss, theft, misuse, or unauthorized access Audits and appropriate technology should be employed to ensure secure deletion or destruction of PII (including originals, copies, off-site backup copies, and archived records) APPENDIX: REFERENCES • • • • • • Computer Security Resource Center: http://csrc.nist.gov/ NIST SP 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems http//csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf NIST SP 800-53 Recommended Security Controls for Federal Information Systems and Organization http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3final_updated-errata_05-01-2010.pdf NIST Special Publication 800-53 DRAFT APPENDIX J Security and Privacy Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/drafts/800-53Appdendix-J/IPDraft_800-53-privacy-appendix-J.pdf Privacy Rights Clearinghouse Checklist of Responsible Information-Handling Practices https://www.privacyrights.org/fs/fs12-infohandling.htm CMS Data Privacy Safeguards Program Data Management Plan Template (a copy of the Data Management Plan is included in the CMS Data Request Executive Summary, which can be located on ResDAC’s website. Please click here to access the Data Management Plan. 7 Rev. No: 01.14.13