Columbia University Medical Center
Download
Report
Transcript Columbia University Medical Center
HIPAA
Privacy and Security
Update
Karen Pagliaro-Meyer
Soumitra Sengupta
Privacy Officer
Information Security Officer
[email protected]
[email protected]
(212) 305-7315
(212) 305-7035
June 2009
1
HIPAA Privacy and Security Update
1. In the News - Privacy and Security Problems
2. Recent theft of electronic devices at CUMC
3. New Regulations - Privacy and Security
4. What you need to know about Patient Privacy
5. What you need to know about Information Security
2
Consequences of Privacy or Security Failure
Disruption of Patient Care
Increased cost to the institution
Legal liability and lawsuits
Negative Publicity
Negative Patient perception
Identity theft (monetary loss, credit fraud)
Disciplinary action
3
In the News: Providence Health System
Lost 365,000 patient records when 10 backup tapes/disks were
stolen from an employee’s minivan in 2006
Agreed to pay $100,000 in fines to the DOJ and implement a
detailed Corrective Action Plan to safeguard electronic patient
information
Providence reports they have spent over $7 million to respond to the
breach including:
Free credit monitoring for patients
Hiring an independent forensic firm to investigate and make
recommendations to improve the security of electronically stored
patient information
Negative media attention very damaging to their reputation
4
In the News: NewYork-Presbyterian
A NYP employee (patient admissions representative) was charged
with stealing almost 50,000 patient files and selling some of them.
The files stolen probably contained little or no medical information,
but did include patient names, phone numbers and social security
numbers--fertile ground for identity theft.
McPherson told investigators that a Brooklyn man offered him
money in exchange for personal information on male patients born
between 1950 and 1970.
McPherson then sold the man 1,000 files for $750.
In the News: NewYork-Presbyterian
NYP sent letters and offered free 2 year credit monitoring to all
patients
50,000 * $15 = $750,000 +++
NYP senior management were summoned by District Attorney’s
office for explanation and steps to improve
An Information Security Enhancement Task Force led by the COO
was established, and a consultant was engaged to evaluate NYP
security posture
NYP is currently implementing measures to improve information
security
Recent theft of electronic devices at CUMC
A large fire in a NYP/CUMC building with immediate
evacuation of the entire building
An outside firm was hired to assist with the clean-up and
repair of the building
When staff returned it was discovered that laptops, USB drives
(thumb drives) and digital cameras had been stolen
Lesson learned – All equipment must be password protected.
Portable equipment that includes patient information must also
be encrypted.
Consider installing software like PC phone home that may
assist in locating stolen portable devices
7
New Regulations: HITECH Act (ARRA)
(Health Information Technology for Economic and Clinical Health)
New Federal Breach Notification Law – Effective
Sept 2009
Applies to all electronic “unsecured PHI”
Requires immediate notification to the Federal Government if
more than 500 individuals effected
Requires notification to a major media outlet
Will be listed on a public website
Requires individual notification to patients
Criminal penalties apply to individual or employee of a
covered entity
8
New Regulations: HITECH Act (ARRA)
Business Associates
Standards apply directly to Business Associates
Statutory obligation to comply with restrictions on use and
disclosure of PHI
New HITECH Privacy provisions must be incorporated into BAA
Enforcement
Increased penalties for HIPAA Violations (tiered civil monetary
penalties)
Increased enforcement and oversight activities
State Attorneys General will have enforcement authority and
may sue for damages and injunctive relief.
9
New York State SSN/PII Laws
Social Security Number Protection Law
Effective December 2007
Recognizes SSN to be a primary identifier for identity theft
It is Illegal to communicate this information to the general public
Access cards, tags, etc. may not have SSN
SSN may not be transmitted over Internet without encryption
SSN may not be used as a password
SSN may not be printed on envelopes with see-through windows
SSN may not be requested unless required for a business
purpose
Fines and Penalties
10
New York State SSN/PII Laws
Information Security Breach and Notification Act
Effective December 2005
IF… Breach of Personally Identifiable Information occurs
o SSN
o Credit Card
o Driver’s License
THEN… Must notify
o patients / customers / employees
o NY State Attorney General
o Consumer reporting agencies
11
New Regulations – Red Flag rule
Red Flag – Identity Theft Prevention Program
Requires healthcare organizations to establish written
program to identify, detect and respond to and correct reports
of potential identity theft
Educate all staff how to identify Red Flags and report them
Appoint program administrator & Report to leadership
FTC law includes fines and penalties $2,500 per violation
Business Associate Agreements will have to be revised to
inform CUMC of any Red Flags involving CUMC data
12
4. What you need to know about Patient Privacy
Notice of Privacy Practices
Business Associates
Authorization to Release Medical Information
Privacy Breaches
HIPAA and Research
HIPAA Education and Training
13
14
15
Who is a Business Associate?
Examples include:
billing
accounting
claims processing or administration
accreditation
call service management
administrative
quality assurance
data aggregation
data processing or analysis
consulting
transcription services
financial services
utilization review
management
design or manage an electronic records system
16
Authorization to Release Medical Information
Written Authorization required to release
medical information
Physician may share information with
referring physician without an
authorization “patient in common”
All legal requests for release of
information should be forwarded to the
HIPAA Compliance Office for review
CUMC or NYP Authorization form
17
18
Privacy Breach
Privacy Breaches do not usually involve high profile
patients
Most Privacy Breaches involve staff accessing medical
information of friends, family members and co-workers
Implementation of CROWN (electronic medical record)
will improve the availability of treatment information, but
it will also make patient information more available
It is important that staff are aware that ANY access of
medical information WITHOUT a business purpose will
result in disciplinary action
19
HIPAA and Research
In 2008 combined the Privacy Board and IRB review
process
Improved communication between researchers, the IRB
and the HIPAA research during the review process
Conducted several educational sessions with
researchers and research staff to inform them of the
review process and respond to questions
RASCAL research training program updated to include
the HIPAA review process and respond to FAQ’s
20
Professional and Support Staff Education
Privacy and Security Education
New Hire Welcome Program Staff Education
On-line HIPAA Education (Professional Staff)
HIPAA for Researchers (RASCAL)
Email reminders / alerts
Department specific – as requested
HIPAA Web Site
HIPAA training for all staff will be increased
21
What you need to know in Information Security
Ponemon Study on Data Breaches (Nov 2007)
Malicious code
4%
Hacked system
5%
Undisclosed
2%
Electronic backup
7%
Malicious insider
9%
Lost
laptop/Device
48%
Paper records
9%
Third
Party/Outsourcer
16%
22
Security Controls
Laptop and File Encryption
WinZip (password protect + encrypt)
7-zip (free, password protect + encrypt)
Truecrypt (free, complete folder encryption)
FileVault (folder encryption on Macintosh)
Encrypted USB Drives
Kingston Data Traveler
Iron Key (Fully encrypted)
23
Types of Security Failure
Sharing Passwords
– You are responsible for your password. If you shared your
password, you will be disciplined even if other person does no
inappropriate access
Not signing off systems
– You are responsible and will be disciplined if another person uses
your ‘not-signed-off’ system and application
Downloading and executing unknown software
– If the software is malicious, you will lose your passwords and data.
If the machine misbehaves, your machine will be disconnected from
the network
24
Digital Piracy statistics for Top Universities
2007
Rank
Organization Name
Total
1
MIT
2,593
16
University of Washington
1,888
5
Boston University
1,408
2
Columbia University
985
6
University Of Pennsylvania
961
14
Vanderbilt University
886
10
University of Massachusetts
803
4
Purdue University
784
26
Iowa State University
719
BitTorrent & eDonkey are used the most !
-- BAY TSP 2008 Report
25
Types of Security Failure
Sending EPHI outside the institution without encryption
– Under HITECH you may be personally liable for losing EPHI data
Losing PDA and Laptop in transit with unencrypted PHI or
PII
– Under HITECH and NY State SSN Laws, you may be personally
liable, and you will be disciplined for loss of PHI or PII
Not questioning, reporting, or challenging suspicious or
improper behavior
– You put the institution and areas under your supervision at risk
26
Types of Security Failure
Not being extremely careful with Social
Security Numbers
First avoid SSN (and Driver’s License, Credit Card Numbers)
REFUSE to take files or reports with SSN if you do not need
them. Tell the sender to take SSN out before you will accept file
or report.
Do not store SSN long-term
DESTROY the file/report as soon as you are done with it.
Delete the file from your computer, delete the email that brought
the file, etc. Or, using an editor program, cut out SSN from the
file.
27
Types of Security Failure
Not being extremely careful with Social
Security Numbers (contd.)
Do not keep the complete SSN
ERASE first 5 digits of SSN.
Encrypt SSN, and Obfuscate SSN
If you must keep it, keep SSN in an encrypted file or folder.
Do not show the SSN in an application, or show only the last 4
digits if that meets the needs. AUTHENTICATE again if
complete SSN is shown, and LOG who saw the SSN. Ask why
they must see the SSN.
28
Methods to Protect against Failures
Do not abuse clinical access privilege, report if you
observe an abuse (if necessary, anonymously)
Do not be responsible for another person’s abuse by
neglecting to sign off, this negligence may easily lead to
your suspension and termination
Do not copy, duplicate, or move EPHI without a proper
authorization
Do not email EPHI without encryption to addresses
outside the institution
29
31
PATIENT PRIVACY
At some point in our lives we will all be a
patient
Treat all information as though it was your own
32