SlideShare a Scribd company logo
1 of 40
Welcome to our
Webinar on
Meaningful Use
Risk Analysis!
We will be starting in a moment …
Visit us at www.ehr20.com
Meaningful Use Risk
Analysis
Webinar Objective

Understand and Perform Meaningful Use
Risk Analysis that satisfies CMS
incentive and attestation requirement.

E-mail: info@ehr20.com




                                         3
Who are we …
EHR 2.0 Mission: To assist healthcare
organizations develop and implement
practices to secure IT systems and comply
with HIPAA/HITECH regulations.
 Education(Training, Webinar & Workshops)

 Consulting Services

 Toolkit(Tools, Best Practices & Checklist)


Goal: To make compliance an enjoyable and painless
experience, while building capability and confidence.
Glossary

1.   HHS, CMS:

2. NIST:

3. Findings:

4. Risk Analysis:

5. HITECH:

6. MU:
                    5
Why now?




           6
HITECH Modifications to HIPAA

   Creating incentives for developing a meaningful use
    of electronic health records
   Changing the liability and responsibilities of Business
    Associates
   Redefining what a breach is
   Creating stricter notification standards
   Tightening enforcement
   Raising the penalties for a violation
   Creating new code and transaction sets (HIPAA 5010,
    ICD10)
                                                              7
CMS Meaningful Use Incentives




For Eligible Professionals      8
MU Risk Analysis




                           9

  http://www.oregon.gov/
For Eligible Professionals




                             10
For Eligible Hospital & CAH




                              11
Attestation Overview

   Attestation is to legally state that you have
    demonstrated and met the core objective.
   Potential audit by CMS and State
   All relevant supporting documentation (paper or
    electronic)
   Six- Years

Certified EHR system doesn’t mean that you need
            not perform security analysis
                                                      12
HIPAA Titles - Overview




                          13
HIPAA Security Rule




164.308(a)(1)



                        14
HIPAA Security Management(164.308)
                          (A) Risk analysis (Required)
                              Conduct an accurate and thorough assessment of the
                              potential risks and vulnerabilities to the confidentiality,
                              integrity, and availability of electronic protected health
a(1) Security                 information held by the covered entity.
                          (B) Risk management (Required)
Management                    Implement security measures sufficient to reduce risks
                              and vulnerabilities to a reasonable and appropriate level
Process                       to comply with §164.306(a).
 Implement policies and   (C) Sanction policy (Required)
 procedures to prevent,       Apply appropriate sanctions against workforce members
 detect, contain, and         who fail to comply with the security policies and
 correct security             procedures of the covered entity.
 violations.
                          (D) Information system activity review (Required)
                              Implement procedures to regularly review records of
                              information system activity, such as audit logs, access
                              reports, and security incident tracking reports.
                                                                                       15
Information Security Model

                   Confidentiality
                   Limiting information access and
                   disclosure to authorized users (the right
                   people)

                   Integrity
                   Trustworthiness of information
                   resources (no inappropriate changes)

                   Availability
                   Availability of information resources (at
                   the right time)

                                                        16
PHI


         Health
      Information



      Individually
      Identifiable
         Health
      Information




          PHI



                     17
ePHI – 18 Elements
                 Elements                                             Examples
Name                                           Max Bialystock
                                                1355 Seasonal Lane
Address                                         (all geographic subdivisions smaller than state,
                                               including street address, city, county, or ZIP code)
Dates related to an individual                 Birth, death, admission, discharge
                                               212 555 1234, home, office, mobile etc.,
Telephone numbers
                                               212 555 1234
Fax number
Email address                                  LeonT@Hotmail.com, personal, official
Social Security number                         239-68-9807
Medical record number                          189-88876
Health plan beneficiary number                 123-ir-2222-98
Account number                                 333389
Certificate/license number                     3908763 NY
Any vehicle or other device serial number      SZV4016
Device identifiers or serial numbers           Unique Medical Devices
Web URL                                        www.rickymartin.com
Internet Protocol (IP) address numbers         19.180.240.15
Finger or voice prints                          finger.jpg
Photographic images                             mypicture.jpg
Any other characteristic that could uniquely                                                          18
identify the individual
Healthcare Infrastructure
                              Computers
                              Storage Devices
                              Networking devices (Routers,
                               Switches & Wireless)
                              Medical Devices
                              Scanners, fax and
Any device that                photocopiers
electronically stores or      VoIP
transmits information         Smart-phones, Tablets (ipad,
using a software
                                PDAs)
program                                                 19
                              Cloud-based services
Trends in Healthcare IT


        Informatics   Collaboration




         Mobile           EHR
        Computing         HIE

                                      20
Handheld Usage in Healthcare

• 25% usage with providers

• Another 21% expected to use

• 38% physicians use medical
  apps

• 70% think it is a high priority

• 1/3 use hand-held for accessing EMR/EHR
                                            21

compTIA 2011 Survey
EMR and EHR systems




                      22
Health Information Exchange (HIE)




                                    23
Social Media
   How does your practice use it?

   Is there a way to safely use social media?

   Do you have policies?

   Have you trained your employees on social
    media best practices?
                                                 24
Cloud-based services
                                 Public Cloud
                                     EHR Applications
    HIPAA regulations                Private-label e-mail
    remain barriers to full
    cloud adoption
                                 Private Cloud
                                     Archiving of Images
                                     File Sharing
Cloud Computing is taking
all batch processing, and            On-line Backups
farming it out to a huge
central or virtualized
                                 Hybrid                     25

computers.
Informatics




              26
All risk analysis are not
created equal …
   Organizations Type
       Small Practices, Hospitals and Specialties


   Organization Size
       Employees, Locations, etc.,


   Complexity of Technology
       Mobile, Network, Hosted, Cloud, etc.,

                                                     27
Conducting Risk Analysis
1. Security Program        Roles & Responsibilities
                           External Parties
2. Security Policy         Policy and Procedures
3. Risk Management &
Compliance                 Risk Assessment and Legal Requirements
4. Training & Awareness    On-the-job Training
5. Personnel Security      Background Checks, T&C, Termination
6. Physical Security       Secure Area
7. Network Security        Access, Encryption, VA, Monitoring
8. Logical Access          Identify and Access Mgmt.
9. Operations Management AV, Security Monitoring, Media Handling,
                         Disposal, SOD
10. Incident Management  Process and Procedures
11. Business Continuity                                             28
Management               Backup and DRs
Risk Assessment Methodology
     Flowchart(NIST) – Large Organizations
                                             Step 3:                                     Step 5:                                      Step 7:               Step 8:
Step 1: System        Step 2: Threat                                Step 4:                                    Step 6:
                                          Vulnerability                                Likelihood                                      Risk                 Control
Characterization      Identification                            Control Analysis                            Impact Analysis
                                          Identification                              determination                                Determination        Recommendation

                                                                   Current controls
                                                                                                               Mission impact                              Recommended
                                             Reports from           and planned                                                       Likelihood of
      Hardware,                                                                                                analysis, asset                                controls
                                              previous risk            controls          Threat source                                     threat
       Software,                                                                                                  criticality
                                             assessments,                                  motivation,          assessment,            exploitation,
        System                                  any audit                               threat capacity,       data criticality,      magnitude of
   Interfaces, Data        History of          comments,                                   Nature of           data sensitivity           impact,
   and Information,      system attack,          security           List of current       vulnerability,                              adequacy of
      People and           Data from         requirements,          and planned         current controls                                planned or
   System mission         intelligence        security test            controls                                                      current controls
                            agencies             results

                                                                                                                Impact rating

                                                                                                                                        Risk and
                                            List of potential                           Likelihood rating                            Associated risk
        System                               vulnerabilities                                                                             levels
      boundary,
      functions,
    criticality and
      sensitivity
                             Threat
                           Statement
Risk Analysis - Example


     Risk Description
 Risk Description /Threat and       Probability Conse-   Risk    Risk
       Potential Loss               of Loss     quence   Score   Value
ePHI located on Desk top in an      4          4         16      High
employees office is not routinely
backed up.

Risk = Loss of PHI

(Identified in Gap Analysis)
Sample Risk Analysis Template
                                      Likelihood
                        High             Medium                 Low

          High      Unencrypted     Lack of auditing on    Missing security
                    laptop ePHI        EHR systems      patches on web server
                                                           hosting patient
                                                             information
Impact




         Medium      Unsecured       Outdated anti-virus External hard drives
                  wireless network       software        not being backed up
                  in doctor’s office



                  Sales presentation Web server backup   Weak password on
          Low       on USB thumb tape not stored in a    internal document
                         drive        secured location         server
                                                                                31
Risk Analysis for a Small Practice




                                     32
Top 5 Recommendations

 1. Ensure encryption or de-identification
 2. Mobile device security program.
 3. Awareness and training programs.
 4. Complete business associate due diligence
 5. Minimize sensitive data capture, storage and
 sharing.




                                                   33
Meaningful Use Stage 2 and Stage 3
Security Requirements

   Security risk analysis with encryption
    assessment
   Secure messaging for ambulatory practices




                                                34
Where do you start?

Identify ePHI systems, processes
and people involved

   Conduct Risk Assessment
   - Type, Size and Complexity

       Prioritize and Remediate
        - Risk Analysis template

          Assess and Improve
           - Monitor, Evaluate and adjust   35
Key Takeaways

   Risk Analysis is foundation for an effective
    security program

   ePHI elements drives risk analysis scope

   There is no silver bullet for risk management. It
    is a journey of continuous assessment and
    improvement

                                                        36
Additional Resources


   NIST - Risk Management Guide for Information
    Technology Systems SP800-30

   An Introductory Resource Guide for
    implementing the (HIPAA) Security Rule

   Small Practice Security Guide

                                                   37
Next Steps
   Training Package
       Risk assessment questionnaire
       Sample policies and procedures
       4-hour training/consulting
        ehr20.com/services

   Next Live Webinars:
     Business Associate Assessment (4/25/2012)

     HIPAA/HITECH Security Assessment(5/2/2012)

      Sign-up at ehr20.com/webinars
                                                   38
Questions?
E-mail: info@ehr20.com
  Call: 802-448-2255

                         39
Thank you!!


              40

More Related Content

Viewers also liked

A Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra SripadaA Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra Sripadamihinpr
 
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14mihinpr
 
MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15mihinpr
 
Risk analysis and control nhsiq 2014
Risk analysis and control nhsiq 2014Risk analysis and control nhsiq 2014
Risk analysis and control nhsiq 2014NHS Improving Quality
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Processtimmcguinness
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Mapa mental iso 27002
Mapa mental iso 27002Mapa mental iso 27002
Mapa mental iso 27002Alexis Jara
 
How Secure is your Business? Fraud Risk Analysis and Security Management
How Secure is your Business? Fraud Risk Analysis and Security ManagementHow Secure is your Business? Fraud Risk Analysis and Security Management
How Secure is your Business? Fraud Risk Analysis and Security Managementwhbrown5
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
COM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy BuildingCOM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy BuildingSteph Parker
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000Ramana K V
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016
Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016
Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016LinkedIn Talent Solutions
 
Employer branding 2.0: Where do we go from here? | Talent Connect 2016
Employer branding 2.0: Where do we go from here? | Talent Connect 2016Employer branding 2.0: Where do we go from here? | Talent Connect 2016
Employer branding 2.0: Where do we go from here? | Talent Connect 2016LinkedIn Talent Solutions
 
70+ Digital Transformation Statistics
70+ Digital Transformation Statistics 70+ Digital Transformation Statistics
70+ Digital Transformation Statistics SantokuPartners
 

Viewers also liked (16)

A Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra SripadaA Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra Sripada
 
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
 
MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15
 
Risk analysis and control nhsiq 2014
Risk analysis and control nhsiq 2014Risk analysis and control nhsiq 2014
Risk analysis and control nhsiq 2014
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Process
 
digital strategy & e-reputation
digital strategy & e-reputationdigital strategy & e-reputation
digital strategy & e-reputation
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Mapa mental iso 27002
Mapa mental iso 27002Mapa mental iso 27002
Mapa mental iso 27002
 
How Secure is your Business? Fraud Risk Analysis and Security Management
How Secure is your Business? Fraud Risk Analysis and Security ManagementHow Secure is your Business? Fraud Risk Analysis and Security Management
How Secure is your Business? Fraud Risk Analysis and Security Management
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
COM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy BuildingCOM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy Building
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016
Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016
Discovering the 10 (new) hidden gems in LinkedIn Recruiter | Talent Connect 2016
 
Employer branding 2.0: Where do we go from here? | Talent Connect 2016
Employer branding 2.0: Where do we go from here? | Talent Connect 2016Employer branding 2.0: Where do we go from here? | Talent Connect 2016
Employer branding 2.0: Where do we go from here? | Talent Connect 2016
 
70+ Digital Transformation Statistics
70+ Digital Transformation Statistics 70+ Digital Transformation Statistics
70+ Digital Transformation Statistics
 

More from data brackets

Presence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRPresence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRdata brackets
 
Oregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA FinesOregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA Finesdata brackets
 
Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement data brackets
 
NYP RA and Cap april 2016
NYP RA and Cap april 2016 NYP RA and Cap april 2016
NYP RA and Cap april 2016 data brackets
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016 data brackets
 
Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016data brackets
 
HIPAA Violation Fines: North memorial Hospistal Settlement
 HIPAA Violation Fines: North memorial Hospistal Settlement  HIPAA Violation Fines: North memorial Hospistal Settlement
HIPAA Violation Fines: North memorial Hospistal Settlement data brackets
 
Prepayment Audit Suggested Documentation
Prepayment Audit Suggested DocumentationPrepayment Audit Suggested Documentation
Prepayment Audit Suggested Documentationdata brackets
 
Lincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgeLincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgedata brackets
 
Lincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediatedLincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediateddata brackets
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...data brackets
 
Office of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programOffice of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programdata brackets
 
Cancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement AgreementCancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement Agreementdata brackets
 
Parkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution AgreementParkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution Agreementdata brackets
 
HIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia UniverstiyHIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia Universtiydata brackets
 
Skagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSSkagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSdata brackets
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
Adult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action PlanAdult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action Plandata brackets
 

More from data brackets (20)

Presence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRPresence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCR
 
Oregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA FinesOregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA Fines
 
Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement
 
NYP RA and Cap april 2016
NYP RA and Cap april 2016 NYP RA and Cap april 2016
NYP RA and Cap april 2016
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016
 
Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016
 
HIPAA Violation Fines: North memorial Hospistal Settlement
 HIPAA Violation Fines: North memorial Hospistal Settlement  HIPAA Violation Fines: North memorial Hospistal Settlement
HIPAA Violation Fines: North memorial Hospistal Settlement
 
Prepayment Audit Suggested Documentation
Prepayment Audit Suggested DocumentationPrepayment Audit Suggested Documentation
Prepayment Audit Suggested Documentation
 
Lincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgeLincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judge
 
Lincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediatedLincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediated
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
 
Office of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programOffice of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit program
 
Cancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement AgreementCancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement Agreement
 
Parkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution AgreementParkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution Agreement
 
HIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia UniverstiyHIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia Universtiy
 
Qca agreement
Qca agreementQca agreement
Qca agreement
 
Concentra agreement
Concentra agreementConcentra agreement
Concentra agreement
 
Skagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSSkagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHS
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Adult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action PlanAdult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action Plan
 

Recently uploaded

High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...
High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...
High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...narwatsonia7
 
Call Girls Viman Nagar 7001305949 All Area Service COD available Any Time
Call Girls Viman Nagar 7001305949 All Area Service COD available Any TimeCall Girls Viman Nagar 7001305949 All Area Service COD available Any Time
Call Girls Viman Nagar 7001305949 All Area Service COD available Any Timevijaych2041
 
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...Nehru place Escorts
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...narwatsonia7
 
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original PhotosBook Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photosnarwatsonia7
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...narwatsonia7
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaPooja Gupta
 
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original PhotosCall Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photosnarwatsonia7
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowNehru place Escorts
 
Case Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxCase Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxNiranjan Chavan
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 
Glomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptxGlomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptxDr.Nusrat Tariq
 
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...narwatsonia7
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...narwatsonia7
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknownarwatsonia7
 
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...narwatsonia7
 

Recently uploaded (20)

High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...
High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...
High Profile Call Girls Kodigehalli - 7001305949 Escorts Service with Real Ph...
 
Call Girls Viman Nagar 7001305949 All Area Service COD available Any Time
Call Girls Viman Nagar 7001305949 All Area Service COD available Any TimeCall Girls Viman Nagar 7001305949 All Area Service COD available Any Time
Call Girls Viman Nagar 7001305949 All Area Service COD available Any Time
 
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
 
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original PhotosBook Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
 
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
 
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original PhotosCall Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
 
Case Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxCase Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptx
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
 
Glomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptxGlomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptx
 
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
 
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
 

Meaningful Use Risk Analysis - How to conduct comprehensive security risk analysis?

  • 1. Welcome to our Webinar on Meaningful Use Risk Analysis! We will be starting in a moment … Visit us at www.ehr20.com
  • 3. Webinar Objective Understand and Perform Meaningful Use Risk Analysis that satisfies CMS incentive and attestation requirement. E-mail: info@ehr20.com 3
  • 4. Who are we … EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations.  Education(Training, Webinar & Workshops)  Consulting Services  Toolkit(Tools, Best Practices & Checklist) Goal: To make compliance an enjoyable and painless experience, while building capability and confidence.
  • 5. Glossary 1. HHS, CMS: 2. NIST: 3. Findings: 4. Risk Analysis: 5. HITECH: 6. MU: 5
  • 7. HITECH Modifications to HIPAA  Creating incentives for developing a meaningful use of electronic health records  Changing the liability and responsibilities of Business Associates  Redefining what a breach is  Creating stricter notification standards  Tightening enforcement  Raising the penalties for a violation  Creating new code and transaction sets (HIPAA 5010, ICD10) 7
  • 8. CMS Meaningful Use Incentives For Eligible Professionals 8
  • 9. MU Risk Analysis 9 http://www.oregon.gov/
  • 12. Attestation Overview  Attestation is to legally state that you have demonstrated and met the core objective.  Potential audit by CMS and State  All relevant supporting documentation (paper or electronic)  Six- Years Certified EHR system doesn’t mean that you need not perform security analysis 12
  • 13. HIPAA Titles - Overview 13
  • 15. HIPAA Security Management(164.308) (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health a(1) Security information held by the covered entity. (B) Risk management (Required) Management Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level Process to comply with §164.306(a). Implement policies and (C) Sanction policy (Required) procedures to prevent, Apply appropriate sanctions against workforce members detect, contain, and who fail to comply with the security policies and correct security procedures of the covered entity. violations. (D) Information system activity review (Required) Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. 15
  • 16. Information Security Model Confidentiality Limiting information access and disclosure to authorized users (the right people) Integrity Trustworthiness of information resources (no inappropriate changes) Availability Availability of information resources (at the right time) 16
  • 17. PHI Health Information Individually Identifiable Health Information PHI 17
  • 18. ePHI – 18 Elements Elements Examples Name Max Bialystock 1355 Seasonal Lane Address (all geographic subdivisions smaller than state, including street address, city, county, or ZIP code) Dates related to an individual Birth, death, admission, discharge 212 555 1234, home, office, mobile etc., Telephone numbers 212 555 1234 Fax number Email address LeonT@Hotmail.com, personal, official Social Security number 239-68-9807 Medical record number 189-88876 Health plan beneficiary number 123-ir-2222-98 Account number 333389 Certificate/license number 3908763 NY Any vehicle or other device serial number SZV4016 Device identifiers or serial numbers Unique Medical Devices Web URL www.rickymartin.com Internet Protocol (IP) address numbers 19.180.240.15 Finger or voice prints finger.jpg Photographic images mypicture.jpg Any other characteristic that could uniquely 18 identify the individual
  • 19. Healthcare Infrastructure  Computers  Storage Devices  Networking devices (Routers, Switches & Wireless)  Medical Devices  Scanners, fax and Any device that photocopiers electronically stores or  VoIP transmits information  Smart-phones, Tablets (ipad, using a software PDAs) program 19  Cloud-based services
  • 20. Trends in Healthcare IT Informatics Collaboration Mobile EHR Computing HIE 20
  • 21. Handheld Usage in Healthcare • 25% usage with providers • Another 21% expected to use • 38% physicians use medical apps • 70% think it is a high priority • 1/3 use hand-held for accessing EMR/EHR 21 compTIA 2011 Survey
  • 22. EMR and EHR systems 22
  • 24. Social Media  How does your practice use it?  Is there a way to safely use social media?  Do you have policies?  Have you trained your employees on social media best practices? 24
  • 25. Cloud-based services  Public Cloud  EHR Applications HIPAA regulations  Private-label e-mail remain barriers to full cloud adoption  Private Cloud  Archiving of Images  File Sharing Cloud Computing is taking all batch processing, and  On-line Backups farming it out to a huge central or virtualized  Hybrid 25 computers.
  • 27. All risk analysis are not created equal …  Organizations Type  Small Practices, Hospitals and Specialties  Organization Size  Employees, Locations, etc.,  Complexity of Technology  Mobile, Network, Hosted, Cloud, etc., 27
  • 28. Conducting Risk Analysis 1. Security Program Roles & Responsibilities External Parties 2. Security Policy Policy and Procedures 3. Risk Management & Compliance Risk Assessment and Legal Requirements 4. Training & Awareness On-the-job Training 5. Personnel Security Background Checks, T&C, Termination 6. Physical Security Secure Area 7. Network Security Access, Encryption, VA, Monitoring 8. Logical Access Identify and Access Mgmt. 9. Operations Management AV, Security Monitoring, Media Handling, Disposal, SOD 10. Incident Management Process and Procedures 11. Business Continuity 28 Management Backup and DRs
  • 29. Risk Assessment Methodology Flowchart(NIST) – Large Organizations Step 3: Step 5: Step 7: Step 8: Step 1: System Step 2: Threat Step 4: Step 6: Vulnerability Likelihood Risk Control Characterization Identification Control Analysis Impact Analysis Identification determination Determination Recommendation Current controls Mission impact Recommended Reports from and planned Likelihood of Hardware, analysis, asset controls previous risk controls Threat source threat Software, criticality assessments, motivation, assessment, exploitation, System any audit threat capacity, data criticality, magnitude of Interfaces, Data History of comments, Nature of data sensitivity impact, and Information, system attack, security List of current vulnerability, adequacy of People and Data from requirements, and planned current controls planned or System mission intelligence security test controls current controls agencies results Impact rating Risk and List of potential Likelihood rating Associated risk System vulnerabilities levels boundary, functions, criticality and sensitivity Threat Statement
  • 30. Risk Analysis - Example Risk Description Risk Description /Threat and Probability Conse- Risk Risk Potential Loss of Loss quence Score Value ePHI located on Desk top in an 4 4 16 High employees office is not routinely backed up. Risk = Loss of PHI (Identified in Gap Analysis)
  • 31. Sample Risk Analysis Template Likelihood High Medium Low High Unencrypted Lack of auditing on Missing security laptop ePHI EHR systems patches on web server hosting patient information Impact Medium Unsecured Outdated anti-virus External hard drives wireless network software not being backed up in doctor’s office Sales presentation Web server backup Weak password on Low on USB thumb tape not stored in a internal document drive secured location server 31
  • 32. Risk Analysis for a Small Practice 32
  • 33. Top 5 Recommendations 1. Ensure encryption or de-identification 2. Mobile device security program. 3. Awareness and training programs. 4. Complete business associate due diligence 5. Minimize sensitive data capture, storage and sharing. 33
  • 34. Meaningful Use Stage 2 and Stage 3 Security Requirements  Security risk analysis with encryption assessment  Secure messaging for ambulatory practices 34
  • 35. Where do you start? Identify ePHI systems, processes and people involved Conduct Risk Assessment - Type, Size and Complexity Prioritize and Remediate - Risk Analysis template Assess and Improve - Monitor, Evaluate and adjust 35
  • 36. Key Takeaways  Risk Analysis is foundation for an effective security program  ePHI elements drives risk analysis scope  There is no silver bullet for risk management. It is a journey of continuous assessment and improvement 36
  • 37. Additional Resources  NIST - Risk Management Guide for Information Technology Systems SP800-30  An Introductory Resource Guide for implementing the (HIPAA) Security Rule  Small Practice Security Guide 37
  • 38. Next Steps  Training Package  Risk assessment questionnaire  Sample policies and procedures  4-hour training/consulting ehr20.com/services  Next Live Webinars:  Business Associate Assessment (4/25/2012)  HIPAA/HITECH Security Assessment(5/2/2012) Sign-up at ehr20.com/webinars 38
  • 39. Questions? E-mail: info@ehr20.com Call: 802-448-2255 39