Downloading - Columbia University Medical Center

advertisement
HIPAA
Privacy and Security
Update
Karen Pagliaro-Meyer
Soumitra Sengupta
Privacy Officer
Information Security Officer
kpagliaro@columbia.edu
sen@columbia.edu
(212) 305-7315
(212) 305-7035
June 2009
1
HIPAA Privacy and Security Update
1. In the News - Privacy and Security Problems
2. Recent theft of electronic devices at CUMC
3. New Regulations - Privacy and Security
4. What you need to know about Patient Privacy
5. What you need to know about Information Security
2
Consequences of Privacy or Security Failure
 Disruption of Patient Care
 Increased cost to the institution
 Legal liability and lawsuits
 Negative Publicity
 Negative Patient perception
 Identity theft (monetary loss, credit fraud)
 Disciplinary action
3
In the News: Providence Health System
 Lost 365,000 patient records when 10 backup tapes/disks were
stolen from an employee’s minivan in 2006
 Agreed to pay $100,000 in fines to the DOJ and implement a
detailed Corrective Action Plan to safeguard electronic patient
information
 Providence reports they have spent over $7 million to respond to the
breach including:
 Free credit monitoring for patients
 Hiring an independent forensic firm to investigate and make
recommendations to improve the security of electronically stored
patient information
 Negative media attention very damaging to their reputation
4
In the News: NewYork-Presbyterian
 A NYP employee (patient admissions representative) was charged
with stealing almost 50,000 patient files and selling some of them.
 The files stolen probably contained little or no medical information,
but did include patient names, phone numbers and social security
numbers--fertile ground for identity theft.
 McPherson told investigators that a Brooklyn man offered him
money in exchange for personal information on male patients born
between 1950 and 1970.
 McPherson then sold the man 1,000 files for $750.
In the News: NewYork-Presbyterian
 NYP sent letters and offered free 2 year credit monitoring to all
patients
50,000 * $15 = $750,000 +++
 NYP senior management were summoned by District Attorney’s
office for explanation and steps to improve
 An Information Security Enhancement Task Force led by the COO
was established, and a consultant was engaged to evaluate NYP
security posture
 NYP is currently implementing measures to improve information
security
Recent theft of electronic devices at CUMC
 A large fire in a NYP/CUMC building with immediate
evacuation of the entire building
 An outside firm was hired to assist with the clean-up and
repair of the building
 When staff returned it was discovered that laptops, USB drives
(thumb drives) and digital cameras had been stolen
 Lesson learned – All equipment must be password protected.
Portable equipment that includes patient information must also
be encrypted.
 Consider installing software like PC phone home that may
assist in locating stolen portable devices
7
New Regulations: HITECH Act (ARRA)
(Health Information Technology for Economic and Clinical Health)

New Federal Breach Notification Law – Effective
Sept 2009






Applies to all electronic “unsecured PHI”
Requires immediate notification to the Federal Government if
more than 500 individuals effected
Requires notification to a major media outlet
Will be listed on a public website
Requires individual notification to patients
Criminal penalties apply to individual or employee of a
covered entity
8
New Regulations: HITECH Act (ARRA)

Business Associates
 Standards apply directly to Business Associates
 Statutory obligation to comply with restrictions on use and
disclosure of PHI
 New HITECH Privacy provisions must be incorporated into BAA

Enforcement
 Increased penalties for HIPAA Violations (tiered civil monetary
penalties)
 Increased enforcement and oversight activities
 State Attorneys General will have enforcement authority and
may sue for damages and injunctive relief.
9
New York State SSN/PII Laws
Social Security Number Protection Law
 Effective December 2007
 Recognizes SSN to be a primary identifier for identity theft
 It is Illegal to communicate this information to the general public
 Access cards, tags, etc. may not have SSN
 SSN may not be transmitted over Internet without encryption
 SSN may not be used as a password
 SSN may not be printed on envelopes with see-through windows
 SSN may not be requested unless required for a business
purpose
 Fines and Penalties
10
New York State SSN/PII Laws
Information Security Breach and Notification Act
 Effective December 2005
 IF… Breach of Personally Identifiable Information occurs
o SSN
o Credit Card
o Driver’s License
 THEN… Must notify
o patients / customers / employees
o NY State Attorney General
o Consumer reporting agencies
11
New Regulations – Red Flag rule
Red Flag – Identity Theft Prevention Program
 Requires healthcare organizations to establish written
program to identify, detect and respond to and correct reports
of potential identity theft
 Educate all staff how to identify Red Flags and report them
 Appoint program administrator & Report to leadership
 FTC law includes fines and penalties $2,500 per violation
 Business Associate Agreements will have to be revised to
inform CUMC of any Red Flags involving CUMC data
12
4. What you need to know about Patient Privacy
 Notice of Privacy Practices
 Business Associates
 Authorization to Release Medical Information
 Privacy Breaches
 HIPAA and Research
 HIPAA Education and Training
13
14
15
Who is a Business Associate?
Examples include:
 billing
 accounting
 claims processing or administration
 accreditation
 call service management
 administrative
 quality assurance
 data aggregation
 data processing or analysis
 consulting
 transcription services
 financial services
 utilization review
 management
 design or manage an electronic records system
16
Authorization to Release Medical Information
Written Authorization required to release
medical information
Physician may share information with
referring physician without an
authorization “patient in common”
All legal requests for release of
information should be forwarded to the
HIPAA Compliance Office for review
CUMC or NYP Authorization form
17
18
Privacy Breach
 Privacy Breaches do not usually involve high profile
patients
 Most Privacy Breaches involve staff accessing medical
information of friends, family members and co-workers
 Implementation of CROWN (electronic medical record)
will improve the availability of treatment information, but
it will also make patient information more available
 It is important that staff are aware that ANY access of
medical information WITHOUT a business purpose will
result in disciplinary action
19
HIPAA and Research
 In 2008 combined the Privacy Board and IRB review
process
 Improved communication between researchers, the IRB
and the HIPAA research during the review process
 Conducted several educational sessions with
researchers and research staff to inform them of the
review process and respond to questions
 RASCAL research training program updated to include
the HIPAA review process and respond to FAQ’s
20
Professional and Support Staff Education
Privacy and Security Education
 New Hire Welcome Program Staff Education
 On-line HIPAA Education (Professional Staff)
 HIPAA for Researchers (RASCAL)
 Email reminders / alerts
 Department specific – as requested
 HIPAA Web Site
 HIPAA training for all staff will be increased
21
What you need to know in Information Security
Ponemon Study on Data Breaches (Nov 2007)
Malicious code
4%
Hacked system
5%
Undisclosed
2%
Electronic backup
7%
Malicious insider
9%
Lost
laptop/Device
48%
Paper records
9%
Third
Party/Outsourcer
16%
22
Security Controls
Laptop and File Encryption
WinZip (password protect + encrypt)
7-zip (free, password protect + encrypt)
Truecrypt (free, complete folder encryption)
FileVault (folder encryption on Macintosh)
Encrypted USB Drives
Kingston Data Traveler
Iron Key (Fully encrypted)
23
Types of Security Failure
 Sharing Passwords
– You are responsible for your password. If you shared your
password, you will be disciplined even if other person does no
inappropriate access
 Not signing off systems
– You are responsible and will be disciplined if another person uses
your ‘not-signed-off’ system and application
 Downloading and executing unknown software
– If the software is malicious, you will lose your passwords and data.
If the machine misbehaves, your machine will be disconnected from
the network
24
Digital Piracy statistics for Top Universities
2007
Rank
Organization Name
Total
1
MIT
2,593
16
University of Washington
1,888
5
Boston University
1,408
2
Columbia University
985
6
University Of Pennsylvania
961
14
Vanderbilt University
886
10
University of Massachusetts
803
4
Purdue University
784
26
Iowa State University
719
BitTorrent & eDonkey are used the most !
-- BAY TSP 2008 Report
25
Types of Security Failure
 Sending EPHI outside the institution without encryption
– Under HITECH you may be personally liable for losing EPHI data
 Losing PDA and Laptop in transit with unencrypted PHI or
PII
– Under HITECH and NY State SSN Laws, you may be personally
liable, and you will be disciplined for loss of PHI or PII
 Not questioning, reporting, or challenging suspicious or
improper behavior
– You put the institution and areas under your supervision at risk
26
Types of Security Failure
 Not being extremely careful with Social
Security Numbers
 First avoid SSN (and Driver’s License, Credit Card Numbers)
REFUSE to take files or reports with SSN if you do not need
them. Tell the sender to take SSN out before you will accept file
or report.
 Do not store SSN long-term
DESTROY the file/report as soon as you are done with it.
Delete the file from your computer, delete the email that brought
the file, etc. Or, using an editor program, cut out SSN from the
file.
27
Types of Security Failure
 Not being extremely careful with Social
Security Numbers (contd.)
 Do not keep the complete SSN
ERASE first 5 digits of SSN.
 Encrypt SSN, and Obfuscate SSN
If you must keep it, keep SSN in an encrypted file or folder.
Do not show the SSN in an application, or show only the last 4
digits if that meets the needs. AUTHENTICATE again if
complete SSN is shown, and LOG who saw the SSN. Ask why
they must see the SSN.
28
Methods to Protect against Failures
 Do not abuse clinical access privilege, report if you
observe an abuse (if necessary, anonymously)
 Do not be responsible for another person’s abuse by
neglecting to sign off, this negligence may easily lead to
your suspension and termination
 Do not copy, duplicate, or move EPHI without a proper
authorization
 Do not email EPHI without encryption to addresses
outside the institution
29
31
PATIENT PRIVACY
At some point in our lives we will all be a
patient
Treat all information as though it was your own
32
Download