Your Role in Information Security Center on Human Development and Disability January 2005 Rev12/08 Overview Information Security is not just about computers, it is how we go about our business here at UW & UW Medicine. We have a set of standards and policies that define our Information Security requirements Information Security is a responsibility of all the UW & UW Medicine Workforce* * Faculty, employees, trainees, volunteers, and other persons who perform work for UW Medicine UW Medicine Version: 20041105 2 Users Any individual using a computer connected to UW &/or UW Medicine networks or those who have been granted privileges and access to UW Medicine computing and network services, applications, resources, and information. Version: 20041105 3 UW Medicine User Responsibilities The customary ones: Comply with UW and UW Medicine policies, Comply with federal and state law , and Restrict use to authorized purposes. Version: 20041105 4 UW Medicine User Responsibilities continued… Directly related to information security: Report all suspected security and/or policy breaches to an appropriate authority Don’t Disable your firewall and/or antivirus; Protect access accounts, privileges, and associated passwords; Accept accountability for their individual user accounts; Maintain confidentiality. Version: 20041105 5 UW Medicine Information Security Training -- Dependent on Your Role Everyone: Privacy, Confidentiality, and Information Security Agreement If you access PHI: New Employee Orientation and/or HCCS on-line HIPAA Training If their system has PHI: System Owner and System Operator Training Version: 20041105 6 UW Medicine UW Medicine Clear Workspace Standard Reduce the risks of unauthorized access, loss of, and damage to information during and outside of normal working hours by putting away RESTRICTED and/or CONFIDENTIAL information in your workspace. Clear it or Secure it . . . Lock away protected health information or critical business information when not in use. Store paper and computer media containing RESTRICTED AND/OR CONFIDENTAIL information in suitable locked cabinets or desks when not in use or when unattended. Clear RESTRICTED AND/OR CONFIDENTAIL information or critical business information from printers immediately. Protect mail and fax machines from unauthorized access. Locked doors count Version: 20041105 8 UW Medicine Log off or secure your workstations when not in use or unattended Terminate active computing sessions when unattended, unless they can be secured by an appropriate locking mechanism, like a password protected screen saver (Ctrl+Alt+Delete) (Lock Computer) Log-off networked systems when the computing session is finished Version: 20041105 9 UW Medicine Workstation Requirements Screen saver activation Workstations with PHI in areas where patients or the public have access to a workstation require one minute activation After Hours AMC domain PCs are required to be logged off and powered on after hours Otherwise follow the direction of those responsible for your computer support Version: 20041105 10 UW Medicine Reusing electronic media Example: Surplus or redistribute a computer Media Intended for Reuse - Specific Processes Overwriting method Overwriting uses a software program to write (1s, 0s, or a combination) onto the media. Common practice is to overwrite the media three times. Four times is better. Degausing method magnetically erases data from magnetic media. Two types of degausser exist: strong, permanent magnet degaussers and electric degaussers. Version: 20041105 11 UW Medicine Physical Space Security Use appropriate measures – like locked doors Question individuals without badges Make sure that vendors check in and are escorted in your department Version: 20041105 12 UW Medicine Taking UW Medicine Equipment from the Premises Obtain authorization to take equipment offsite Log out the equipment When returned, log the equipment back in Be aware of department expectations about offsite use of that equipment Secure the information with controls comparable to those of equipment on-site Version: 20041105 13 UW Medicine Who can install software on my workstation? Only designated system administrators are to install software, and Only licensed and authorized* software is used. * Authorized means that the System Owner approves. Version: 20041105 14 UW Medicine Appropriate Password Management Where PHI is accessed, each user is issued a unique username and password. It is against UW & UW Medicine Policy to share userID and/or password (this includes logging in for others…) Version: 20041105 15 UW Medicine Comply with Copyright Law Unauthorized use of software, images, music, or files is regarded as a serious matter and any such use is without the consent of UW & UW Medicine If abuse of computer software, images, music, or files occurs, those responsible for such abuse may be held legally accountable as well as be held accountable for violation of UW & UW Medicine Policy It is against UW & UW Medicine for workforce members to copy or reproduce any licensed software except as expressly permitted by the software license. Version: 20041105 16 UW Medicine Use of Departmental Computers (RCW 42.52.360, WAC 292-110-010) In 1997, the State of Washington Executive Ethics Board defined permitted personal activities on State owned computers. This policy was amended in 2002 to permit limited Internet use. Aside from occasional and de minimus (e.g., of minimal cost to the State) use, the policy prohibits the personal use of computers, email and the Internet. This limitation is similar to permitted personal use of noncomputer resources, such as telephone calls. The State allows limited personal use of computer resources provided the use: Results in little or no cost to the State; Does not interfere with the employee’s official duties; Is brief in duration, occurs infrequently, and is the effective use of time and resources; Does not disrupt or distract from the conduct of State business due to volume or frequency; Does not compromise the security or integrity of State property, information or software; Does not disrupt other State employees and does not obligate them to make personal use of State resources. Version: 20041105 17 UW Medicine Your Email is NOT Private Before you freely email any extremely personal thoughts or information, please consider unlike telephone conversations, email and its archives are subject to legal and public inspection and that many computers retain old emails in archives for years. Private watchdog groups, outside UW and Washington State, monitor email for abuse, and lawyers subpoena email as a part of evidence gathering. If you do not want to see your most sensitive and/or private email printed in newspapers, do not send it. Version: 20041105 18 UW Medicine More: Using Washington State Equipment Washington State law also prohibits the use of UW computers for personal business-related, commercial, campaign or political purposes, or to promote an outside business or group or to conduct illegal activities. Additionally, employees are prohibited from allowing any member of the public to make personal use of state computers and computing resources. Washington State specifically prohibits use of the computer for all political and commercial activities. The following items have been additionally called out in detail. Notices for selling of personal items on any State owned computer system. Notices for charity/fund raising events whether selling an item or raising money unless the activity is University sponsored. Version: 20041105 19 UW Medicine Many Internet Activities Expressly Prohibited Although de minimus personal Internet use is now allowable, many Internet activities are still prohibited. Downloading copyrighted files, such as MP3 music files, may violate copyright law, and subject UW and you to penalties and fines. Other examples of improper or excessive use are included in the Executive Ethics Board web site: http://www.wa.gov/ethics and the UW Administrative Policy web site http://www.washington.edu/admin/adminpro/APS/47.02.htm l Some examples of permitted activities may be prohibited in Lab Medicine because of their potential impacts. For example, extensive use of streaming video or streaming audio can overload the capacity of the network and interfere with the laboratory information system. Version: 20041105 20 UW Medicine Understanding Information Classification Information classification is designated by the System Owner or Data Custodian. Classification ensures the appropriate level of security is applied for information and information systems, based on the identified level of impact to confidentiality, integrity, and availability. Definitions of Confidentiality, Integrity, & Availability Confidentiality: ensuring that information is accessible only to those authorized to have access; Integrity: safeguarding the accuracy, completeness, and control of information and processing methods; Availability: ensuring that authorized users have access to information and associated assets when required. Version: 20041105 22 UW Medicine PUBLIC Information Information that is intended for, or can be viewed by, the public or for the University community. Information can be verbal, electronic, or printed materials. Access to this information is usually anticipated or planned. Examples include university web pages, course descriptions, faculty profiles, individual and departmental announcements, or other general information that can be viewed by the public. Version: 20041105 23 UW Medicine RESTRICTED Information Information used by the UW & UW Medicine workforce with an established need-to-know relationship. Unauthorized data disclosure could impede the ability of UW & UW Medicine employees to conduct business, but does not violate any federal, state or UW regulations (e.g. poor business practices). Examples include proprietary information, such as business plans, intellectual property, financial information or other sensitive materials that may affect workforce or organizational operations. Version: 20041105 24 UW Medicine CONFIDENTIAL Information Information that is very sensitive in nature, where access requires careful controls and protection. Unauthorized disclosure of this data could seriously and adversely impact UW & UW Medicine, the interests of employees, students, patients, or other individuals, and organizations associated with UW & UW Medicine. Examples include: personally identifiable, and protected health information (PHI), workforce records, sensitive student records, social security numbers, legally protected University records, and passwords. Version: 20041105 25 UW Medicine Follow Department Processes Dispose of RESTRICTED and/or CONFIDENTIAL information in a secure manner. All floppy disks, hard drives, CDs, etc. have to be wiped before retasked to another use. Contact your computer support person to help you. CHDD personnel can contacted at chddtech@u.washington.edu Autism Center – Susan Conarroe CTDS – Jeff Witzel Version: 20041105 26 UW Medicine Disposing of protected health information, proprietary documents, and confidential information in a secure and confidential manner When PHI and proprietary information are included: Paper Documentation – need to be shredded, pulped or otherwise obliterated in a manner that prevents reconstruction. Microfilm and Microfiche - must be pulverized [1] . Laser Disks - used in write onceread many (WORM) document imaging applications shall be pulverized. Floppy Disks - shall be pulverized. Compact Discs - shall be pulverized. Magnetic Tape & Video Tape preferred method for destroying computerized data is magnetic degaussing. If destruction is not achieved by degaussing, it must be executed in an alternative manner that assures that the information cannot be reconstructed. Version: 20041105 27 Hard Drives - To assure that computerized data is destroyed when equipment is decommissioned, use a three pass binary overwrite of the entire disk will reasonably assures that the information cannot be reconstructed. An alternative to this process is that the hard drive is removed from the device and pulverized. Carbon Rolls (from printers or fax machines) The method for destroying carbon rollers removed from printers or fax machines is to send them to Environmental Services for destruction by autoclaving. [1] Pulverized: Reduced (as by crushing, beating, or grinding) to very small particles that can not be reconstructed or used in any combination to reconstruct the original. UW Medicine Report Events, Incidents and/or Malfunctions An occurrence or event that conflicts with or interrupts normal process. Contact your Supervisor, System Operator and CHDD Administrator, Christene James 206-221-5496 Version: 20041105 28 UW Medicine Priorities of Incident Response Protect human life and people's safety; human life always has precedence over all other considerations. Protect RESTRICTED and/or CONFIDENTIAL data. Prevent exploitation of RESTRICTED and/or CONFIDENTIAL systems, networks or sites. Inform affected RESTRICTED and/or CONFIDENTIAL systems, networks or sites about already occurred penetrations. Protect RESTRICTED and/or CONFIDENTIAL Information. 1. 2. 3. • Prevent exploitations of other systems, networks or sites and inform already affected systems, networks or sites about successful penetrations. Version: 20041105 29 UW Medicine Priorities - continued Prevent damage to systems (loss or alteration of system files, damage to disk drives). Damage to systems can result in costly down time and recovery. Minimize disruption of computing resources - including processes. 4. 5. • Version: 20041105 It is better in many cases to shut a system down or disconnect from a network than to risk damage to data or systems. 30 UW Medicine Protect Against Malicious Software Do not disable the anti-virus software Do not install or run unknown software Report virus incident to your Help Desk Version: 20041105 31 UW Medicine Protect Against Malicious Software (2) Use anti-virus software to scan all diskettes and files provided to you by others or after using them on another computer Do not open email attachments from unknown senders. Verify attachments from known senders and scan them before opening. If the user expects an attachment, make sure that the attachment's file type and sender are consistent with what was expected Follow this same process for Internet downloads. Version: 20041105 32 UW Medicine Sanctions The regulation requires that we apply appropriate sanctions against individuals if you fail to comply with the security policies and procedures that are based upon our security policies and the relative severity of the violation. UW has sanctions for the failure to follow policy and/or for a breach of patient confidentiality or information security. Version: 20041105 33 UW Medicine Five Levels/Categories of Actions and/or Sanctions After an investigation, a sanction level is applied [0] No Breach of Information Security Although someone reported a suspected breach, upon investigation it is realized that an exception was granted [1] Unable to Determine Whether a Breach Occurred A breach or potential breach was discovered after the system in question was redeployed and evidence of the breach has been mostly or completely destroyed. [2] Policy Violation with Mitigating Circumstances The workforce member attempted to implement or supplement security controls believing them to be in be in compliance or improving security. Version: 20041105 34 UW Medicine Five Levels/Categories continued…. [3] Policy Violation without Reasonable Appearance of Malicious Intent Unauthorized use of another employee's username and/or password. [4] Policy Violation with Reasonable Appearance of Malicious Intent 1. 2. Member of workforce intentionally alters or destroys data or equipment. Failure to implement standards after repeated notification. Version: 20041105 35 UW Medicine DEFINITIONS: System Owner & System Operator System Owners are individuals within the UW & UW Medicine community accountable for the management and use of one or more electronic information systems, electronic databases, or electronic applications that are associated with UW & UW Medicine or EPHI System Operators administer and/or manage the daily activities of one or more electronic information systems, electronic databases, or electronic applications Version: 20041105 36 UW Medicine Data Custodian & Department Administrator/Manager Data Custodians are the individuals who have been officially designated as accountable for protecting the confidentiality of specific data that is transmitted, used, and stored on a system or systems within a department, college, school, or administrative unit of UW Medicine Department Administrator/Manager individual who manages the users of UW Medicine systems Version: 20041105 37 UW Medicine The Life Cycle of User privileges Manager/Supervisor request user privileges Manager/Supervisor updates any information on user or privileges during workforce engagement Manager/Supervisor disables user privileges when workforce member is separated or transferred Version: 20041105 38 UW Medicine Minimum Information Security Requirements Approved Operating System that is patched in a timely manner Protection Against Malicious Software (i.e. anti-virus protection) Filtering or Firewall Protection Enabled Logging and Auditing Approved Network Media & Protocols Version: 20041105 39 UW Medicine Advanced Information Security Requirements Systems with RESTRICTED & CONFIDENTIAL Information must meet the Advanced Information Security Requirements Implementation of Minimum Information Security Requirements with additional controls Additional data protection required based on high risk analysis (higher level administration): Strict data access policies and procedures System access audit logs Physical Servers Version: 20041105 protection includes privacy mandates need certification 40 UW Medicine Questions? Please let Christene James know if you have any questions. 206-221-5496 or cajames@u.washington.edu Version: 20041105 41 UW Medicine UW Medicine Resource for Questions Richard Meeks HIPAA Compliance Officer HIPAA Program Office UW Medicine 206-543-0300 meeksr@u.washington.edu Reference Materials 1. UW Medicine Policies: https://security.uwmedicine.org/securitypolicies.asp