DRAFT Version 5: 12/20/2007 Based on Final Security Rules HIPAA COW SECURITY NETWORKING GROUP PORTABLE MEDIA WHITE PAPER Disclaimer This Portable Media White Paper is Copyright 2007 by the HIPAA Collaborative of Wisconsin (“HIPAA COW”). It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or used in commercial documents without the written permission of the copyright holder. This document is provided “as is” without any express or implied warranty. This document is for educational purposes only and does not constitute legal advice. If you require legal advice, you should consult with an attorney. HIPAA COW has not yet addressed all state pre-emption issues related to this Portable Media White Paper. Therefore, this form may need to be modified in order to comply with Wisconsin law. Table of Contents I. Introduction ............................................................................................................................ 2 What is Portable Media? ..................................................................................................... 2 Why Develop a Portable Media Protocol/Policy? .............................................................. 2 Objectives of Establishing a Protocol for Securing Portable Media................................... 5 Applicable HIPAA Security Rule Standards ...................................................................... 5 II. Definitions.............................................................................................................................. 5 III. What Needs to be Included in a Portable Media Security Plan ............................................. 6 A. Identification of Portable Media ......................................................................................... 6 B. Source and Security of Portable Media .............................................................................. 8 C. Portable Media Loss ......................................................................................................... 11 D. Portable Media Loss Contact Process and Information .................................................... 11 E. Media/Public Relations ..................................................................................................... 12 F. Related Organizational Policies ........................................................................................ 12 G. Securing/Encrypting/Password Protection........................................................................ 13 H. Law Enforcement/Government Agency Contact Information .......................................... 13 References and Resources......................................................................................................... 14 APPENDIX I ................................................................................................................................ 15 PORTABLE MEDIA INVENTORY ........................................................................................... 15 APPENDIX II ............................................................................................................................... 16 PORTABLE MEDIA LOSS REPORTING FORM ..................................................................... 16 APPENDIX III .............................................................................................................................. 18 SAMPLE PROCEDURE FOR DOCUMENT PASSWORD PROTECTION ............................. 18 A. B. C. D. Note: This information has been developed to address information systems (IS) portable media use and management as a separate issue. It is important that the organization’s IS portable media processes can be carried out as an integrated element of ongoing security for organizational data, and as a component of organizational operations. _____________________________________________________________________________ Copyright 2007 HIPAA COW 1 DRAFT Version 5: 12/20/2007 Based on Final Security Rules I. Introduction A. What is Portable Media? Portable Media, for the purposes of this paper, is defined to include any device or media which are easily portable or transported from place to place by an individual. Examples include but are not limited to: Computer laptops, tablets and other portable computers Personal Digital Assistant(s) (PDA) (e.g. Palm OS®, Windows CE ® based devices) Flash, Universal Serial Bus (USB) or “thumb” drives MP3 players (e.g. iPod®) BlackBerry ® and similar devices Cell phones, mobile phones, pagers and similar devices used for or capable of sending/receiving text messages and/or e-mail messages Portable hard disk drives Zip disks, CDs, DVDs, Optical Disks, Diskettes, Magnetic Tape and similar media Portable dictation devices, whether digital or analog Digital cameras, whether still or video, Cell phones, BlackBerry ® and similar devices capable of taking and/or storing digital images, whether still or motion, Analog cameras and film contained therein. Note: Each organization will be responsible for establishing separate policies for creation, maintenance, use, storage and overall management of images acquired through these devices. This whitepaper is not the venue for these policies. Use of data on such portable media may include but not be limited to: Transportation Transmission Backup/archiving Use at another location, off campus from the source Use on another workstation on or off campus Data capture and storage relative to patient care B. Why Develop a Portable Media Protocol/Policy? Healthcare and Business practices today are, to an ever expanding level, taking the employee outside of the realm of the “secure” organizational buildings and network. This raises the risks and stakes of potential loss or theft of PHI or other organizationally sensitive information. A variety of headlines in recent past have brought to our attention the challenges organizations have in relation to securing portable media, particularly laptops. Examples taken from the media around the time of authoring this white paper include the following. _____________________________________________________________________________ Copyright 2007 HIPAA COW 2 DRAFT Version 5: 12/20/2007 Based on Final Security Rules Particular note should be taken that security practices organizations have preached against for several years are not followed in many of these incidents. Austin, Texas, police are investigating after security cameras captured video of the thief carrying out a laptop and a projector from a Seton Family of Hospitals office. http://www.informationweek.com/showArticle.jhtml?articleID=197008711 Health Care Firm Recovers Stolen Laptop “The data on the Dell laptop was encrypted and password-protected, according to a statement from William Beaumont Hospital in Royal Oak. But the car theft, which occurred Aug. 5 in Detroit, caused particular concern among hospital officials, because the affected employee's ID access code and password were written on a piece of paper that was taped to the inside of the stolen PC.” http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId =9002765 HIPAA Compliance Strategies 2006's 10 Biggest Health Care Security Breaches Reprinted from the December 2006 issue of REPORT ON PATIENT PRIVACY, the industry's most practical source of news on HIPAA patient privacy provisions. A summary of 10 events from 2006 is summarized in the following link. These include misplaced CDs containing patient information and theft of a laptop from a Veteran’s Affairs employee’s home. http://www.aishealth.com/Compliance/Hipaa/RPP_2006_Security_Breaches.html Sick Kids doctor loses data on 3,300 patients “Six weeks after Ontario's privacy commissioner ordered the Hospital for Sick Children not to remove electronic health records from the hospital, a doctor lost an external hard drive containing such records at the country's busiest airport. The physician, who was traveling to a medical conference, packed the external hard drive so he could work while away. Though airport security was notified and a search conducted, it was never recovered.” _____________________________________________________________________________ Copyright 2007 HIPAA COW 3 DRAFT Version 5: 12/20/2007 Based on Final Security Rules Aug 31, 2007 04:30 AM MEGAN OGILVIE HEALTH REPORTER http://www.thestar.com/living/article/251904 Beyond laptops and compact disks (CD), portable media have become ubiquitous in the workplace, whether provided by the employer, or brought to the workplace by the employee. In the past 3 years, USB memory flash drives have fallen in price from approximately $100 for 128 kilobytes of storage to less than $20 for 2-4 gigabytes of storage. Such devices are frequently provided as “gifts” at conferences. Use of these devices is as easy as plugging them into an available USB port on any computer in the work setting and copying files and other data representations to this locally installed device. Organizations are typically reluctant to disable the USB ports, as they are commonly used for the installation of devices such as bar code readers, local printers and other devices. Additionally, these ports may be used during the course of conducting business, such as software installation and making backups. The corporate and personal prevalence of laptops, replacing traditional workstations in many cases is a growing trend. This is particularly seen with providers that have offices in multiple locations and require the convenience of portability. Further, staff, executives and consultants have come to depend on portable media in the daily performance of their responsibilities. Organizations need to establish a policy on Portable Media and educate their staff on the appropriate use of Portable Media. Part of this policy and education needs to be that personally provided Portable Media needs to follow the corporate standards for security and confidentiality, including the right of the organization to install security guards on all such media. Key references related to Portable Media include: 1. An Introductory Resource Guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, NIST Special Publication 800-66, http://csrc.nist.gov/publications/nistpubs/800-66/SP80066.pdf , accessed April 2007. 2. HIPAA Security Guidance, Department of Health and Human Services, USA, http://www.cms.hhs.gov/SecurityStandard/Downloads/SecurityGuidanceforRemo teUseFinal122806.pdf , accessed April 2007. 3. Managing Sensitive Electronic Information (SEI), A Security Policy Template developed by the Mobile Memory Task Force of the NCHICA Privacy and Security Officials Workgroup on Portable Devices and Removable Media, August 6, 2007, http://www.nchica.org/HIPAAResources/Samples/Portal.asp , accessed October 15, 2007. _____________________________________________________________________________ Copyright 2007 HIPAA COW 4 DRAFT Version 5: 12/20/2007 Based on Final Security Rules C. Objectives of Establishing a Protocol for Securing Portable Media The objectives of securing Portable Media are driven from the basics of securing all media containing electronic protected health information (ePHI). The challenge afforded when addressing portable media in particular focuses on: i. Providing the organization with a framework within which portable media may be securely used in the workplace. ii. To minimize possible adverse outcomes from loss or theft of devices containing ePHI, or other protected information, particularly when such data is unsecured. iii. To establish within an organization, an understanding of the opportunity and responsibility of appropriate use of portable media and to establish the basis of education related to the use of such devices. iv. To outline for organizations options for and guidelines related to appropriately securing ePHI stored on portable media. v. To protect the public image and credibility of the organization, in relation to adverse effects of loss of ePHI on portable media. vi. Determine the organizational position related to portable media that is personally owned or otherwise not provided specifically by the organization for business purposes. Each organization will need to determine appropriate Portable Media guidelines and practices appropriate to its needs. D. Applicable HIPAA Security Rule Standards i. Health Insurance Reform Security Standards 68 FR 8334. ii. Preamble to the Security Standards: Final Rule, Federal Register, Vol. 68, No. 34, Thursday, February 20, 2003, p. 8361. iii. Organizations should establish and publish a disclaimer that all data and information contained on portable media are provided the same due diligence and protection as all protected health information, regardless of source. Information that is not PHI is afforded the appropriate level of protection as other organizationally sensitive or confidential data and information (e.g. financial). II. Definitions A. Portable Media – Please reference list on Page 2 of this document. B. Encryption of Data: The process of altering or obscuring, data to prevent its being viewed, through the use of keys. From: The Columbia Encyclopedia, Sixth Edition | Date: 2007 http://www.encyclopedia.com/doc/1E1-dataencr.html _____________________________________________________________________________ Copyright 2007 HIPAA COW 5 DRAFT Version 5: 12/20/2007 Based on Final Security Rules data encryption the process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. C. Password Protection of Data: Establishing a password assigned to a specific document or file, preventing read or write access without the password. Another approach to “securing” individual Microsoft documents (e.g. Word documents, Excel documents) is to apply the Microsoft provided “password” protection to these documents. These passwords may be applied at various levels, allowing some users to “read” but not “edit” documents. Users are cautioned in undertaking this approach, as the selection of document specific passwords is at the discretion of individual uses, may not comply with organizational policies on password standards and may be easily forgotten. Historically, forgetting a Microsoft document password effectively left the document permanently “secured”, there are now a variety of tools available that may be used to help reacquire the forgotten password. As with the above encryption discussion, listing of these various solutions is prohibited again due to the dynamic nature of the industry. D. ePHI: Electronic Protected Health Information E. Loss Incident: An event in which a portable media device is lost or stolen. F. Disclosure Incident: A loss incident during which ePHI or other protected or proprietary information that was not appropriately secured is released. III. What Needs to be Included in a Portable Media Security Plan When developing a Portable Media Security Plan/Policy, a recommended approach is to assess the various device types, various data classifications (e.g. audio, images, textual), various users of Portable Media Security Plan/Policy, as well as data types (e.g. clinical, financial) and structure the organizational policy around these defined elements. Attention should be made to the various portable media that are involved, based in part on the various working environments, staff involved, and other organization specific circumstances. Also identify which critical systems, if not all systems, are supported at alternate sites. Are there resources available to support all systems, or only critical ones? Test the sites to verify they support the systems (with backed-up data), should your main facilities be down on an ongoing basis. A. Identification of Portable Media This section will address business needs where portable media have become a natural and critical part of the work environment. In each case, organizations need to assess the _____________________________________________________________________________ Copyright 2007 HIPAA COW 6 DRAFT Version 5: 12/20/2007 Based on Final Security Rules impact of initial device cost, cost of securing and managing devices, risk of use/loss, cost of not providing and associated challenges of self provided portable media devices. i. Overview and Work Environments 1. Mobile Work Environment: Organizations, such as durable medical equipment sales and support, visiting nurse associations, providers functioning in on-call roles while traveling on business or personal time and home health agencies, frequently establish a mobile office for their staff, providing them with a cellular phone, BlackBerry ® or similar device, as well as a laptop. The combination of these devices is literally a portable office, removed from the relative security of an organization’s network. Additionally, executives and managers who frequently spend the majority of their business day in meetings frequently find it necessary to take work home. In all cases, various elements of PHI or organizationally sensitive data are part of the environment. Devices provided to enable this mobile work force need to be appropriately protected, including passwords and encryption of data. Additionally, it may be prudent to have all such devices returned to the corporate offices on a “regular basis” to ensure appropriate levels of security are maintained/refreshed, and where appropriate, having locally stored data “backed up” on the organizational network. 2. Executive Work Environment: A hybrid instance of the Mobile Work Environment exists with executives that have “home” offices, however are frequently traveling on business, whether locally (e.g. clinic to clinic, clinic to hospital) or nationally. This travel may include the presentation of papers at conferences, where the presentation is stored on the same device as the quality initiative spreadsheet currently being developed by this executive. Laptops and portable memory media used by these individuals, in the office one day and on the road the next, need to have an easily employed encryption methodology incorporated in them. Additionally, good business practice supports backing up the portable media on a regular basis. 3. Transportation/Storage of data on physical media: Data are frequently transported outside of the organizational internal security measures to support daily business operations and compliance with business recovery/continuance policies. Examples include disaster preparedness initiatives and delivery of data to third party organizations other than via the Internet. Such “transportation and storage” may be via laptops, USB memory drives and a large variety of media (e.g. tape, CD/DVDs, etc.) for storage of data. 4. Dynamic Media as Medical Record: At an ever increasing rate, various new types of “medical documentation” user interface devices are being adapted in both the ambulatory and inpatient settings. These include but are not limited to: a. Handheld devices for physician dictation or e-prescribing, leveraging portability of PDA devices _____________________________________________________________________________ Copyright 2007 HIPAA COW 7 DRAFT Version 5: 12/20/2007 Based on Final Security Rules b. Recording of visual images (still or motion) on cell phones and digital cameras, including the memory cards on which these images are stored, which may be removed from the camera to transport the images to another system. c. Expanding patient to provider communication via web based services and email which may occur across BlackBerry ® or similar devices or PDAs. These devices are typically structured to “synchronize” locally saved data with the organizational network. Care should be taken to ensure that, in addition to appropriate local encryption levels, these devices successfully “synchronize” PHI in a timely manner with local network services, making this data available to all those accessing the Electronic Health Record from other devices. 5. Maintaining/Updating Historical Data Storage Media: While somewhat outside the scope of portable media, it should be noted that there is an organizational exposure risk driven by the dynamics of data storage media evolution. In the time frame of 25 years, the IT industry has gone from reel tape through a variety of cartridge tapes, multiple sizes/density of diskettes and numerous optical (e.g. CD, DVD) storage media. Long term storage of data on these media may require transition of archives from media to media as technology changes and devices to “read” the media become unavailable. Additionally, the systems which may read these data stores may no longer be available or supported. Many of these media, contain PHI, which may need to be accessed in establishing offsite disaster recovery services. Organizational steps to establish such offsite storage of data in this manner, for purposes of business continuance or generalized “backup”, should include ensuring that the organization maintains the ability to read these media and that such media are secured and/or the contained data is encrypted. B. Source and Security of Portable Media The following are provided as discussions regarding the source of and security related to various portable media. Organizations should assess the need for establishing policies on the use of portable media based on position roles within the organization. Roles not so identified for use of portable media should require prior authorization for the use of such media from an individual within the organization such as the Information Security Officer. Such policy should apply to devices that are provided wither by the organization or personally. i. Organizationally Provided Portable Media: The previous section established the business need for the use of portable media. Each organization needs to assess these business needs individually and assess the need to provide portable media. With some media (e.g. laptop computers, backup data media sent off site), the ability to control or manage the media is relatively apparent. For example, purchases of _____________________________________________________________________________ Copyright 2007 HIPAA COW 8 DRAFT Version 5: 12/20/2007 Based on Final Security Rules laptops and related capital items may by policy and practice, require sign off by information services. Further, such devices assigned to staff may be required to be connected to the network to update security software and update network based data storage. Such activities may be monitored through the organizational network. Certainly with backup media, the creation of this media, particularly for large organization databases (e.g. electronic health record systems, laboratory information systems, and hospital information systems) Information Services, as creator of such system backups, serves as a control point. Additionally, extracts of such large scale databases for purposes of reporting and data warehousing, should be managed through authorized staff and procedures to safeguard and backup such extracts as appropriate. In some cases, such control and management is more difficult (e.g. locally stored budget documents, employee reviews, patient specific locally stored research databases, and data stored on PDAs and USB memory sticks). In these instances, policy should dictate audits and compliance. In all cases, as with other capital items, media classified as an asset should be tagged and monitored as such. It is the opinion of the authors of this paper that, particularly for smaller to medium sized organizations, it is not practical to “manage” use of USB memory devices, and other such personal items (e.g. cell phones) through IS based process. Rather these devices should be subject to policy based control supported by random audits. ii. Personally Provided Portable Media: The market space has literally become littered with inexpensive portable media. This includes but is not limited to CDs, DVDs, and portable hard disk drives (HDD), with many of these replacing the earlier magnetic media of diskettes and related devices. USB or “thumb drives” have reached a price point where they are literally being given away at various professional settings, and even laptops are approaching price points around $500. Recognizing that absolute control over these devices, particularly given ever constrained budget resources as well as staff time, the following are offered as guidelines on allowing, and managing these “personally provided” portable media in the work place. iii. Securing Portable Media: As part of an organizational policy related to appropriate use of portable media, whether personally or organizationally provided, the following is recommended as components to include: Users of such portable media (e.g. PDA, USB drives, etc. as described earlier) for the storage of PHI, or other sensitive information should: 1. Encrypt all such devices or at a minimum all such files that contain these types of sensitive information. Appendix III is provided as a sample procedure in applying document specific passwords. a. There are a variety of “standards” related to encryption, including Data Encryption Standard (DES), adopted by the United States, Secured Sockets Layer (SSL), a commonly employed encryption methodology associated with _____________________________________________________________________________ Copyright 2007 HIPAA COW 9 DRAFT Version 5: 12/20/2007 Based on Final Security Rules the Internet, and other commercially available solutions such as Pretty Good Privacy (PGP). This is not intended as a recommendation of these approaches, not as an inclusive list, but merely a brief introduction to some readily applied encryption approaches. Regardless of the tool used, encryption is fundamentally applying a known “key” to “scramble” the bits that make up data elements. This “scrambling” is held until access by an authorized recipient/user is undertaken by applying the appropriate “key” to “unscramble” the bits to their original order, revealing the original message. b. Many of the portable media addressed in this document employ their own methods of encrypting the data contained within the portable media. For example, many USB Flash Drives incorporate a “security” tool, allowing the user to “encrypt” the contents of the drive. Adoption of a standardized approach to data encryption within an organization is encouraged as one means of protecting the contents of portable media. Individual users may also apply their own encryption schemes. While effectively securing a device, this independent approach effectively excludes the organizations’ IT services from assisting in recovering data encrypted and having the “key” lost or forgotten. c. The dynamics of this security/encryption industry prevent establishing a “preferred list” of possible solutions to the encryption challenge. The reader and organizations considering using encryption for portable media are encouraged to research and select a tool that best integrates with other security measures (e.g. laptops, e-mail) of the organization. d. It should be noted that, to the knowledge of the authors, devices such as digital cameras and digital video cameras do not inherently provide data encryption capabilities incorporated with the device. Data acquired through the use of these devices should be downloaded to a media where encryption capabilities are available and applied and the source data on the camera deleted in a timely manner to prevent unauthorized access. Procedural steps should be defined and implemented organizationally to either: i. Incorporate patient identifiers in each image or ii. Download images to patient chart if electronic or iii. Print for inclusion in paper chart after affixing appropriate patient identifier to image after images for each patient are acquired and then deleting all images from the camera, thereby eliminating the potential of intermixing images from multiple patients. 2. Ensure that a network based backup of all such data is completed on a regular basis to protect against the loss of data and to ensure an audit trail of data contained on these devices in the event of a loss. 3. Submit these devices on demand for the purposes of conducting audits of the security/encryption that is in place on these devices. _____________________________________________________________________________ Copyright 2007 HIPAA COW 10 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 4. In the event of termination, submit all such devices that are personally owned for removal of organizationally sensitive/protected data and return all organizationally provided devices and media. In the case of CD/DVD media that was personally provided, all such media should be returned to [Healthcare Organization]. 5. Ensure that all files. Or media (e.g. CD, DVD) containing PHI or other organizationally sensitive data be destroyed in compliance with [Healthcare Organization’s] policy on destruction of such data/media. iv. Portable Computer Inventory - The authors recommend the establishment and use of an inventory list to identify organizationally provided portable media for reference in the event of loss or theft of such devices, or termination of the employee to whom such devices were assigned. Appendix I is provided as an example of such an inventory list. C. Portable Media Loss In the event of the loss of a portable media device, the [Healthcare Organization] should take the following actions: i. Activate the [Healthcare Organization’s] loss disclosure process and associated paperwork. (Reference HIPAA Collaborative of Wisconsin Contingency Planning Policy http://hipaacow.org/Docs/SecurityGrid/DataManagement8.doc ) ii. “Externally” discovered disclosure report form sample report form (Reference HIPAA Collaborative of Wisconsin Security Incident Response Policy http://hipaacow.org/Docs/SecurityGrid/secincidentresponse807112005.doc ) iii. Assess the protected health information potential loss related to the reported media loss. Keep in mind that timely communication with those impacted, or believed to have been impacted, helps to maintain a strong relationship with these people. iv. Initiate patient and/or employee notification procedures. (Reference HIPAA Collaborative of Wisconsin Security Incident Response Policy http://www.hipaacow.org/Docs/SecurityGrid/secincidentresponse807112005.doc ). D. Portable Media Loss Contact Process and Information Members of the IS Solutions Center shall be contacted immediately once the loss of a portable device has occurred. The following information should be provided at the time of contact: i. A Brief Description of the loss, including device, device information content, status of security on the device ii. Location date and time of the loss. iii. Phone numbers for IS Support Team, Security Officer, Privacy Officer. 1. Identification of Immediate Support Requirements (e.g. for BlackBerry ® devices, these may be “disabled” through local network controls). (Reference _____________________________________________________________________________ Copyright 2007 HIPAA COW 11 DRAFT Version 5: 12/20/2007 Based on Final Security Rules HIPAA Collaborative of Wisconsin Security Incident Response Policy http://www.hipaacow.org/Docs/SecurityGrid/secincidentresponse807112005.doc ). A sample Portable Media Loss tracking sheet is provided in Appendix II. E. Media/Public Relations Organizations should refer to their own media relations/public relations protocols related to discovery and reporting of loss of portable media and possible disclosure of PHI. i. The organization’s designated media relations contact should serve as a liaison between the organization and the news media (or a single point of contact for the news media). This will eliminate the need to involve the Information Services and HIPAA Security Teams, allowing them to assess the scope of the loss or disclosure. The IS leader, Privacy Officer or Security Officer should be prepared to share information with the media relations contact. Key considerations when working with the media relations contact person or the news media include: 1. Ensuring that the contact has a clear understanding of the technical issues so that they may communicate effectively and accurately with the press. False or misleading information may ultimately cause more damage to the organization’s reputation. 2. Contacting the organization’s legal counsel if unsure of legal issues. 3. Establishing a single point of contact (if no official media relations contact person exists) when working with the news media to ensure that all inquiries and statements are coordinated. 4. Keeping the level of technical detail low – do not provide attackers with information. 5. Being as accurate as possible. 6. Avoiding speculation. 7. Ensuring that any details about the incident that may be used as evidence are not disclosed without the approval of investigative agencies. 8. Contacting the Privacy Officer, Security Officer, Chief Information Officer and/or HIS Director should information released to media (need to) contain patient specific information to ensure required authorizations are in place prior to the release. F. Related Organizational Policies It is appropriate to note that any attempt to establish a policy related to control of portable media should be undertaken in conjunction with other organizational policies and procedures on the following topics. _____________________________________________________________________________ Copyright 2007 HIPAA COW 12 DRAFT Version 5: 12/20/2007 Based on Final Security Rules i. Appropriate use of electronic communications and related equipment, including language, either in this policy or a related document, that discusses sanctions for breech of appropriate use or other related IT or protected health information policies. ii. Destruction of media, including portable and back up media. iii. Operating System and related software patch management, virus protection updates, spyware detection and resolution updates. iv. Remote access, including impact of remote access as an alternative to use of portable media, or the use of portable media as an alternative to remote access. v. Authentication and/or password procedures, which may be addressed in electronic communications and access. G. Securing/Encrypting/Password Protection The dynamics of this industry prohibit effectively listing or maintaining possible commercial solutions. Readers and those who are preparing to establish policies for their organizations should perform an independent search and review of current vendors providing and supporting software encryption options for various portable media. The reader is again referred to a draft procedure on applying passwords to specific documents provided in Appendix III. (Reference HIPAA Collaborative of Wisconsin Security Incident Response Policy) H. Law Enforcement/Government Agency Contact Information In the event of the loss of any such media, organizations should consider contacting any or all of the following agencies to report loss of portable computers and or disclosure of ePHI. Agency Police Department Sheriff’s Department State Patrol State’s Department of Health and Family Services or equivalent state government office Office for Civil Rights Federal Bureau of Investigation U.S. Secret Service _____________________________________________________________________________ Copyright 2007 HIPAA COW 13 DRAFT Version 5: 12/20/2007 Based on Final Security Rules References and Resources An Introductory Resource Guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, NIST Special Publication 800-66, http://csrc.nist.gov/publications/nistpubs/800-66/SP800-66.pdf , accessed April 2007. HIPAA Security Guidance, Department of Health and Human Services, USA, http://www.cms.hhs.gov/SecurityStandard/Downloads/SecurityGuidanceforRemoteUseFi nal122806.pdf , accessed April 2007. Managing Sensitive Electronic Information (SEI), A Security Policy Template developed by the Mobile Memory Task Force of the NCHICA Privacy and Security Officials Workgroup on Portable Devices and Removable Media, August 6, 2007, http://www.nchica.org/HIPAAResources/Samples/Portal.asp , accessed October 15, 2007. Authored by: HIPAA COW Security Networking Group _____________________________________________________________________________ Copyright 2007 HIPAA COW 14 DRAFT Version 5: 12/20/2007 Based on Final Security Rules APPENDIX I PORTABLE MEDIA INVENTORY Device Asset Tag No. Device Serial No. Device Employee Description Name Employee ID Number Department Date Assigned Date Returned Dates of Audit It may be appropriate to access when these devices, depending on device type, were last scanned for virus/spy ware and/or connected to the organizational network for the purpose of scanning or upgrading such virus protection software in the case of laptops. _____________________________________________________________________________ Copyright 2007 HIPAA COW 15 DRAFT Version 5: 12/20/2007 Based on Final Security Rules APPENDIX II PORTABLE MEDIA LOSS REPORTING FORM Portable Media Loss Reporting Form1 Incident Detector’s Information: Name: Title: Phone/Contact Info: Date/Time Detected: Location: System/Application: INCIDENT SUMMARY Type of Incident Detected: Theft Loss Description of Incident: Unauthorized Use/Disclosure Other: TYPE OF DEVICE Laptop, Tablet and other portable computers PDA BlackBerry® USB or “Thumb Drive” Zip disks, CD, DVD, optical disks, magnetic tape and similar media MP3 Players (e.g. iPod®) Cell phones, mobile phones and alphanumeric pagers Portable Dictation Device Digital Camera Portable/removable Hard Disk Drives INCIDENT NOTIFICATION IS Leadership Security Incident Response Team Administration Law Enforcement Public Affairs Legal Counsel Other: ACTIONS (Include Start & Stop Times) Identification Measures (Incident Verified, Assessed, Options Evaluated): 1 This form has been developed as a working tool for assessment and improvement activities; it is intended for internal use only _____________________________________________________________________________ Copyright 2007 HIPAA COW 16 DRAFT Version 5: 12/20/2007 Based on Final Security Rules PORTABLE DEVICE CONTENT: SECURITY MEASURES EMPLOYED ON DEVICE: FOLLOW-UP Review By (Organization to Security Officer determine): Other: Recommended Actions Carried Out: IS Department/Team Initial Report Completed By: Follow-Up Completed By: _____________________________________________________________________________ Copyright 2007 HIPAA COW 17 DRAFT Version 5: 12/20/2007 Based on Final Security Rules APPENDIX III SAMPLE PROCEDURE FOR DOCUMENT PASSWORD PROTECTION PROCEDURE #: SUBJECT: PASSWORD PROTECTING FILES DOWNLOADED OR WRITTEN TO REMOVABLE MEDIA (USB Drive, or Optical Disk) PROFICIENCY: ALL [HEALTHCARE ORGANIZATION] PC USERS PROCEDURE: [HEALTHCARE ORGANIZATION] Password Protection Documentation Excel, Word, Access, & Powerpoint Files 1. Open the FILE that you wish to save onto portable media. 2. Attach your portable media to the computer, or load a CD/DVD into the appropriate drive. 3. Click on the word “FILE” in the upper left corner of the toolbar. Then select “SAVE AS”. The window seen below will open. 4. Select the appropriate drive letter for portable media drive as the Save In location. _____________________________________________________________________________ Copyright 2007 HIPAA COW 18 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 5. Type in the file name. 6. Click on the word “TOOLS” in the upper right corner of the Save As window. 7. Select “General Options”. _____________________________________________________________________________ Copyright 2007 HIPAA COW 19 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 7. Type a password in the “Password to open” box. Be sure that the password is at least 8 characters long. Click “OK”. 8. You may be prompted to re-enter the password. _____________________________________________________________________________ Copyright 2007 HIPAA COW 20 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 9. Click on Save. 10. When you, or anyone, tries to open the file you saved, they will be prompted for the password. The file cannot be opened without the Password. Do not share this password with anyone, unless they are authorized to access the file according to [ORGANIZATION’s] access policies. All Other Files (Using WinZip) 1. To password protect all other files, you need to use an application called WinZip. To run this program, click on your “START” button in the lower left corner of your screen. Select WinZip. _____________________________________________________________________________ Copyright 2007 HIPAA COW 21 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 2. The following window will open. 2. Click on the “NEW” button in the upper left corner of the window. A New Archive window will open. 3. Click on the down arrow by “SAVE IN” and select “3 ½ Floppy A” or appropriate drive letter for USB (removable ) drive. _____________________________________________________________________________ Copyright 2007 HIPAA COW 22 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 4. Name the file anything you wish. _____________________________________________________________________________ Copyright 2007 HIPAA COW 23 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 5. Click “OK” and the next window will open. 6. Click the “Encrypt added files” checkbox. You now need to browse to or find the file(s) that you want to put on the portable media. Then click the “ADD” button 7. The following caution box will appear. Click the “OK” button. _____________________________________________________________________________ Copyright 2007 HIPAA COW 24 DRAFT Version 5: 12/20/2007 Based on Final Security Rules 8. You will be prompted to enter the password. Be sure that it is at least 8 characters in length. 9. You will also need to re-enter the Password for confirmation. 10. Check the “Mask Password” box. Then click “OK”. 11. Select “File” and then “Close” _____________________________________________________________________________ Copyright 2007 HIPAA COW 25