SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
White Paper




Built-in Protection in Laptop PCs
Improves Compliance with New
Healthcare Rules
Absolute Software1 and Intel deliver a powerful solution for complying with the security requirements
of government rules and regulations for the healthcare industry. Computrace,* a leading IT asset-
management and data-protection solution from Absolute Software, is taking advantage of Intel®
Anti-Theft Technology (Intel® AT),2 which is designed into the system hardware. The combination of
Computrace and Intel AT delivers intelligent, automated, policy-based protection against loss or theft
for laptops helping to protect patient data and minimize risk for hospitals who must comply with new
rules and regulations. If a laptop is reported lost or stolen, IT can remotely delete data or instruct the
system to lock itself down to prevent any OS from booting – from any boot device. If the laptop is
off the network, information technology (IT) administrators can be confident of a lockdown – via a
local timer that can expire and disable the machine if it doesn’t check in with the Absolute Software
server in the specified time. Either way, the laptop “bricks” itself. Best of all, even if the hard drive
is reformatted or replaced, the built-in, anti-theft security measures remain in place. Getting the
system operational again is easy – authorized users can quickly restore the system with a one-
time reactivation passphrase provided by IT. IT now has a more reliable, robust approach to securing
confidential data, improving compliance, and minimizing financial and/or legal risk from data and
system breaches from lost or stolen laptops.
Table of Contents                                                                              Executive Summary
Executive Summary ................................................................2            In the healthcare industry, keeping patient data secure is not
Client-side protection helps defend                                                            just a challenge, it is a legal necessity. Loss and theft of laptops
healthcare data against breaches ..........................................3                   makes sensitive data vulnerable. Worse, an unauthorized
Challenges in defending healthcare data ....................................3                  user might use a lost or stolen laptop to access the hospital’s
Keeping sensitive healthcare data out of the wrong hands ...........4                          computer systems. Healthcare organizations must also comply
Rapid lock-down, rapid recovery ................................................5              with increasingly stringent regulations, such as HIPPA and
Timer expiry provides intelligent local response ...........................5                  HITECH, to protect patient data and privacy. Compounding the
Data protection during lock-down – rapid and easy recovery .......6
                                                                                               problem is that with more mobile workers, healthcare organi-
                                                                                               zations also need to be able to secure confidential data even
Key advantage – Compliance with
health data breach notification rule ............................................7             when systems are off-site and/or not connected to a network.
Easy deployment .......................................................................8       Enter Absolute Software’s Computrace,*,1 with Intel® Anti-Theft
Protecting patient data and defending                                                          Technology (Intel® AT).2 An industry leader in security solutions,
against unauthorized access to hospital systems ........................8                      Computrace delivers a robust solution for tracking assets,
                                                                                               performing remote data wipes after a theft, and recovering
                                                                                               stolen assets. Intel AT enhances Computrace with timers and
                                                                                               poison pills that allow IT to use automated policies to lock down
                                                                                               a PC – whether the laptop is on or off the hospital network,
                                                                                               and even if the OS is re-imaged, the hard drive is replaced,
                                                                                               or the boot order is changed to a different device (such as a
                                                                                               USB key, CD, DVD, or another hard drive). When activated, the
                                                                                               anti-theft responses block the boot process regardless of the
                                                                                               boot device, and render the laptop a “brick” without destroying
                                                                                               the data. This protects the system while retaining the data.
                                                                                               To reactivate a system that was locked down, the user simply
                                                                                               enters a strong, one-time passphrase in the preboot reactiva-
                                                                                               tion screen, and the system is returned to its normal working
                                                                                               state. Rapid response and recovery is a key advantage for
                                                                                               healthcare professionals who might need to quickly continue
                                                                                               work once a laptop is recovered. It also allows hospitals to
                                                                                               act rapidly to protect patient records, while gaining the time
                                                                                               needed to conduct a thorough investigation into the extent
                                                                                               of a potential breach.
                                                                                               Computrace with Intel AT can help hospitals maintain the trust
                                                                                               clients have in them in terms of managing confidential data. In
                                                                                               turn, this can help hospitals retain patients who might other-
                                                                                               wise seek out providers with a better track record of protecting
                                                                                               data. With Computrace and Intel AT, IT can better protect
                                                                                               assets and sensitive data, improve compliance with govern-
                                                                                               ment and industry rules and regulations, and help reduce
                                                                                               losses and business risk.




                                                                                           2
Client-side protection helps                                                Confidential data remains vulnerable
                                                                            Unfortunately, many hospitals are struggling to comply with the
defend healthcare data                                                      new legislation. For example, one of the four main goals of compli-

against breaches                                                            ance with HITECH is to help hospitals shift from paper-based record
                                                                            keeping to electronic data management. Another goal is to protect
Absolute Software and Intel deliver an integrated solution that             identifiable health information from misuse through electronic access.
helps protect healthcare IT assets and confidential data for                However, as hospitals continue to shift to electronic databases,
hospitals, clinics, and mobile healthcare workers.                          more data becomes vulnerable to electronic attacks. According to
                                                                            one industry study, approximately 52% of large hospitals, 33% of
Challenges in defending                                                     medium hospitals, and 25% of small hospitals had at least one data
                                                                            breach in 2009.3 Other industry research, including the Ponemon
healthcare data                                                             study, has revealed other critical security issues, such as business
The healthcare industry faces significant challenges in complying           risk and consequences of data breaches:
with the security aspects of government and industry regulations
and rules. For example, for an information technology (IT)                  •   The average cost of a data breach in 2009 was $6.75M, with
administrator at a hospital, the problem of protecting patient                  the most expensive breach costing $31M to resolve, and the
                                                                                least expensive costing $750,000.4
data is complex. Confidential patient data must be shared
between departments, from patient intake to nurse’s stations,               •   92% of IT security professionals reported laptop theft or loss in
from emergency rooms to ICU, and from radiology to therapy.                     their organization.5
In addition, many medical workers are mobile, including nurse               •   Lost or stolen laptops result in a data breach 71% of the time.5
practitioners, midwives, physical therapists, physicians who make
                                                                            •   Healthcare organizations were responsible for 20.5% of
rounds at small clinics, and medical researchers at other facilities.
                                                                                exposed records in 2008 – the second highest percentage,
Such workers must also have access to patient data in order to                  behind only the government/military sector, in data breaches.6
provide high-quality care.
Compounding the security challenge is the need to share patient
                                                                            The rate at which customers “jump ship”
information with non-employee medical personnel, such as                    is higher for healthcare organizations
non-hospital physicians, visiting specialists, therapists at remote         Hospitals are concerned with protecting patient data, but must also
clinics, and technicians at off-site labs. One of the most critical         be concerned with their reputation. According to the Ponemon
concerns is that a stolen laptop could be used, not only to gain            study, healthcare organizations and financial services firms were
access to patient data stored on the system, but to gain access to          more likely than other types of organizations to lose customers
hospital systems themselves. IT needs a robust, comprehensive               after a data breach. And, healthcare organizations experienced a
solution to protect patient data, regardless of a laptop’s location.        6% customer attrition rate (churn rate) after a data-loss incident,
                                                                            as compared to a 5% churn rate for financial services firms, and
New laws, stricter compliance                                               a 2% churn rate for other industries, such as technology and
Besides the Health Insurance Portability and Accountability Act             retail, and 1% or less for manufacturing, energy, and media.4
(HIPAA), hospitals and other healthcare organizations must also
comply with the health data breach notification rule, as well as the        Costs are higher for the healthcare industry
Health Information Technology for Economic and Clinical Health              The cost of a data breach is not only significant, but climbing,
Act (HITECH). The latter two acts went into effect in 2009.                 especially for healthcare organizations. The Ponemon study shows
                                                                            that 36% of all data breaches in the study involved a lost or stolen
The new rules changed the regulations for privacy and security of           laptop (or other mobile data-bearing device).4 The cost of redress
HIPAA. One of the consequences is stiffer penalties, along with             and victim-communication activities are also rising, including an
requirements that healthcare organizations notify the public when           the increase in legal defense costs against class action lawsuits
a data breach occurs that violates the privacy regulations. Compli-         that result from customer, consumer, or employee data loss.4
ance with these and other government and industry regulations
                                                                            •   The average cost of a data breach for a healthcare organization
requires that IT administrators have a robust solution to data loss
                                                                                was $294 per customer record – about 10% to 20% more
and theft, as well as the ability to track the response and recovery
                                                                                than almost all other industries.4
efforts taken to protect patient data.
                                                                            •   Lost business makes up nearly 50% of the cost of a data breach.4




                                                                        3
Traditional         Computrace* with                Benefits of Computrace                                              System architecture
 solutions           Intel® AT                       and Intel AT
                                                                                                 Software applications
 SW-based            HW/BIOS/SW-based                •   Tamper-resistant                                                               Absolute Computrace* Agent:
                                                                                                                                        IT policies and poison pill settings
                                                         hardware-based
 No PC disable       Local/remote PC disable
                                                         capabilities
 Relies on network   Works with and without          •   Reduces corporate risk
 connectivity        network connectivity                                                        Operating system
                                                     •   Addresses compliance
 Typically relies    PC Disable (via timer expiry)       through flexible IT policies
 on OS and/or        remains active even if OS       •   Allows rapid response
 hard drive          is missing or reinstalled,          to loss or theft, even
                                                         without a network                       BIOS
                     hard drive is reimaged                                                                                             Computrace Agent and
                     or replaced, or BIOS is             connection                                                                     reactivation screen
                     reflashed                       •   Allows a controlled, intelli-
                                                         gent, client-side response
                                                         to loss or theft, regardless            Hardware and firmware
                                                         of the state of the OS,                                                        Intel® AT-p timer, PC-disable,
                                                                                                                                        other capabilities
                                                         BIOS, or hard drive


Table 1. Advantages of client-side intelligence                                              Figure 1. Architecture for Absolute’s Computrace,* as enabled
in theft management                                                                          by Intel® Anti-Theft Technology – PC Protection


In addition, with recent legislation and its stiffer penalties, viola-                       •     Flag systems that are or might be lost or stolen.
tions of state and federal laws can increase those costs with risk                           •     Send a data-destruct command to erase confidential data,
of additional legal action. For example, the state of Connecticut                                  by file, file location, or file type, or by erasing the entire
recently filed a lawsuit against one of the nation’s largest health-                               contents of the hard disk.
care companies for allegedly failing to secure confidential medical
                                                                                             •     Recover stolen laptops, with help from the Absolute Theft
records of over 440,000 patients – and waiting six months before
                                                                                                   Recovery Team, and create an audit log that reports which files
informing consumers and authorities about the breach.7                                             were accessed after the theft.
With hackers using sophisticated malware, and 12,000 laptops                                 •     Disable a laptop that doesn’t check in within an IT-defined
stolen every week from airports alone, hospitals are asking for                                    period of time.
help.5 If they can track the laptop, they can be more confident
                                                                                             •     Send a poison-pill to lock down the laptop (turn it into an
that it is in their control. If a hospital can’t track a laptop, or if
                                                                                                   unusable “brick”) and prevent any OS from booting.
IT suspects that a machine is lost or stolen, a rapid response
can make the difference between protecting patient data and                                  •     Unlock a notebook once security is reestablished.
retaining clients, or exposing data and losing more than 6%
                                                                                             Complementing other security measures
of the organization’s customers.4
                                                                                             Computrace with Intel AT complements encryption layers and
                                                                                             other security measures that might be required by government
Keeping sensitive healthcare data
                                                                                             rules and other regulations. For example, Computrace with Intel
out of the wrong hands                                                                       AT allows IT to establish policies for security responses that
Absolute and Intel have collaborated closely to deliver intelligent                          range from rapid, client-side, lock-down to full data destruction
client-side protection for healthcare data stored on laptops. Compu-                         and the physical recovery of stolen computers. The new security
trace has traditionally allowed IT administrators to remotely delete                         capabilities can integrate with existing encryption solution preboot
data from a laptop to help protect it from unauthorized access.                              authentication modules.
Enabled by Intel AT, Computrace now delivers new capabilities (see
Table 1) that let IT rapidly lock-down a laptop if the system is lost or                     Tamper-resistant technology
stolen to prevent the system from booting. IT can then rapidly reacti-                       Because Intel AT is designed into the laptop’s hardware (see Figure
vate the system once it is back in the hands of an authorized user.                          1), the anti-theft capabilities are more protected from tampering.
Computrace with Intel AT delivers a powerful and comprehensive                               The capabilities include timer expiry and PC disable, and do not
set of options to respond to loss, theft, or suspicious circumstances:
                                                                                             depend on the OS. This means they can work even if the laptop is
                                                                                             not connected to the network, the OS or BIOS is reinstalled, or the




                                                                                         4
 
Figure 2. IT can specify different theft responses, as appropriate. For example, a poison-pill lock-down as been requested
for user 4, as well as a timer-expiry lock-down.

hard drive is reformatted or replaced. Also, because the Compu-              As is typical, the thief does not wait long to power up the laptop
trace Agent is embedded in the BIOS firmware of most PCs, it                 and connect to the Internet to find out if the system is working
can survive hard drive reformats and replacements.8                          and what kind of data is on it. However, protected by Computrace
                                                                             with Intel AT, the laptop begins its check-in with the Computrace
In addition, PC Disable, once activated, also works regardless
                                                                             Monitoring Center. As soon as the laptop checks in, it receives the
of boot device – hard drive, USB key, CD, DVD, and so on. For
                                                                             poison pill set in the server by IT. The laptop then disables itself to
example, a thief cannot simply change the boot order to a USB
                                                                             prevent a reboot. To the thief, the rendezvous (check-in) process
key and access the system. The laptop will not boot until the
                                                                             is invisible. All the thief sees is that when the system reboots, it is
strong recovery passphrase is entered.
                                                                             inoperable – it won’t load the OS.

Rapid lock-down, rapid recovery                                              PC disable – a preboot capability
When a laptop is lost or stolen, it is critical that IT respond              The PC disable capability is triggered before the system boots.
rapidly to a data breach. The priority is to protect patient data            Because the capability is designed into the laptop’s hardware and
and mitigate liabilities and losses, until the laptop can be recov-          activated preboot, it works even if the OS or BIOS is reinstalled,
ered. For example, if an organization discovers a loss or theft              other security solutions have been removed, or the hard drive has
the same day it happens, the average cost of a lost laptop drops             been reformatted or replaced. Because the capability is activated
to about $9,000.3 However, if it takes more than a week to find              preboot, even if a thief tries to boot from another device (hard
out about the loss, the average cost of that laptop increases to             drive, USB key, CD, DVD, etc.), the poison pill remains in effect,
$115,000.3 Having several options for managing lost systems                  blocking the boot process itself. This is why a laptop can remain
gives IT the flexibility to respond as necessary.                            locked down even if another boot device is installed.

Use case: Laptop stolen at an airport                                        Timer expiry provides
In this case, a neurology specialist (Dr. Bartlett) is traveling to an       intelligent local response
international conference, and her laptop is stolen at the airport.
                                                                             One of the key problems with laptop security is that anti-theft
Dr. Bartlett immediately calls IT, and the administrator flags the
                                                                             software-only products can be installed and uninstalled relatively
laptop in the central database (see Figure 2).
                                                                             easily. Software-only approaches also require that the OS is
                                                                             loaded and working properly, which means that the anti-theft




                                                                         5
Time expiry              Poison pill           Reactivation             server communication is disabled via port blocking, or the agent
                                                                                                is prevented from running. The timer can continue to work even if
     Network       No                      Yes                       No
    Required?                                                                                   the OS is reinstalled, the BIOS is reflashed, other security solutions
   Mechanism       Local, hardware-        Poison pill flag is set   One-time recovery          have been removed, or the hard drive has been reformatted or
                   based timer expires     in central server.        token is entered           replaced. Even if a thief tries to boot from a secondary device,
                   if not reset by         Poison pill is then       in the reactivation
                   central server at       automatically deliv-      (pre-boot) screen.
                                                                                                the boot process won’t work. For example, since the timer
                   specified interval.     ered to laptop when       Timer is reset;            disables the laptop’s boot process, replacing the hard drive
                                           laptop connects to        system can boot to         does not circumvent the blocked boot.
                                           Internet.                 its normal working
                                                                     state.
                                                                                                Use case: Undetected theft, but missed
      Effect       PC boot process is      PC boot process is        N/A
                   blocked.                blocked.                                             check-in locks down laptop
 Data destroyed?   No                      No                        N/A                        In this case, a physician (Dr. Andrews) is leading a pilot study for a
    Recovery       Full system             Full system               Full system                new cardiovascular medical device. When Dr. Andrews leaves to
                   recovery via            recovery via              recovery via               speak at a medical conference, he forgets to lock his office, and his
                   strong reactivation     strong reactivation       strong reactivation
                   passphrase.             passphrase.               passphrase.                laptop is stolen from his desk. The thief does not immediately power
     Benefits      Fully automated,        Rapid, flexible,          Easy, fast recovery.       up the laptop, but hides it in a safe, temporary place until it can be
                   policy-based            policy-based                                         moved to a better location. Since Dr. Andrews will be gone for
                   response – no IT        response.
                                                                                                several more days, the theft is not immediately noticed.
                   interaction required,
                   no network required.                                                         In this example, IT policy is that the laptop must check in with the
                                                                                                Absolute Software Monitoring Center each day to upload its asset
Table 2. Intel® Anti-Theft Technology (Intel® AT) features
                                                                                                information. After being stolen, the daily check-in was missed. The
                                                                                                next time the laptop powers up, it enters “theft mode.” The laptop
software fails if the OS is compromised or inoperable. In addition,                             then disables itself. Even if the thief tries to power up the system
if a laptop has a software-only agent, a thief can often circumvent                             later, the OS will not boot, so use of the laptop is thwarted.
the agent by reformatting or replacing the hard drive to make the
laptop usable again. Or the thief can remove the hard drive to                                  Data protection during lock-down –
another system to access the data on that disk. The result is that                              rapid and easy recovery
IT cannot be confident that patient data on a laptop is secure if the                           Computrace has traditionally provided IT with powerful mecha-
laptop is not controlled by the authorized user.                                                nisms to remotely erase sensitive data if a laptop is lost or stolen.
Enabled by Intel AT, Computrace provides a local, intelligent and                               Although erasing a single file can be done quickly, erasing all files
automated response to suspicious circumstances through the use                                  of a particular type or destructively overwriting the hard disk can
of hardware-based Intel AT timers. When the timer expires, the                                  take some time. The longer the system remains active, the more
laptop becomes inoperable.                                                                      time an unauthorized user has to try to access patient data – and
                                                                                                the more costly the data breach.
How does it work?
                                                                                                In addition, there are many cases in which a laptop might not be in
Intel AT timers establish rendezvous requirements for laptops.                                  the control of the authorized user, but it is not stolen, only “missing.”
A rendezvous is an authorized check-in via the Internet with the                                For example, a nurse might accidentally leave a laptop behind at
theft-management server, such as the Computrace Monitoring                                      a clinic and return for it the next day, or a specialist might forget
Center. This check-in must occur within the IT-defined time period.                             a laptop after a consult and have it delivered to him later. In such
If the timer expires, Intel AT identifies a suspicious circumstance                             cases, the indicators for a destructive data erase might be a false
and blocks the machine’s boot process. When locked down, the                                    positive – not fully warranted. Worse, a destructive response could
laptop cannot boot any OS from any boot device, including hard                                  require a lot of time for restore tasks – rebuilding the OS, restoring
drive, USB key, CD, DVD, or other device.                                                       user files (if there were back-ups available), restoring user settings,
Because the expiry timer is built into the laptop hardware, it works                            and so on.
even if the laptop does not connect to the network to receive other                             Enabled by Intel AT, Computrace allows IT to lock down a
instructions from IT. For example, the timer can work if central                                potentially missing system without a destructive data wipe.




                                                                                            6
Traditionally, Absolute has been able to recover 3 out of 4 stolen
   Allina Hospitals & Clinics
                                                                               laptops that call in to the Absolute Software Monitoring Center.8,9
   Headquartered in Minneapolis, Minnesota, Allina Hospitals                   This high rate of recovery is one of the advantages of Absolute
   & Clinics (Allina) is an organization of 11 hospitals. The                  security solutions. Adding customized lock-down screens makes
   organization employs 23,000 people to provide healthcare                    it even easier for users to return to work once a missing laptop
   services in Minnesota and Western Wisconsin.10                              is found.
   Allina has an extensive fleet of 3,800 mobile PCs. For the
   IT team however, the increase in mobile systems presents a                  Key advantage – Compliance with
   challenge in managing systems and protecting patient data,
                                                                               health data breach notification rule
   with critical ramifications.
                                                                               A key aspect of the data breach notification rule is that, if confi-
   Having experienced a sharp increase in laptop theft –                       dential data remains protected – if the loss of data does not pose
   including an incident that required public disclosure of                    a significant risk or cause significant harm, the organization is not
   breached health information, Allina looked to Computrace                    required to notify the public or other agencies of the breach. With
   with Intel AT for a high-tech solution for managing the                     the cost of a data breach so high – including the loss of patients –
   systems and protecting against data breaches.                               the rule provides even more incentive for hospitals to implement
                                                                               robust anti-theft technologies that help prevent unauthorized
  “Because of the sensitive nature of our patients’ information,
                                                                               access to patient data.
   we must have the highest level of protection against theft
   or data breaches,” says Brad Myrvold, Manager of Desktop                    However, moving too quickly in response of a breach – especially
   Technology at Allina. “If a computer is lost or stolen, Compu-              during the detection, escalation, and notification phases – can
   trace with Intel AT is a lifeline. If we are concerned about the            cause inefficiencies that actually increase costs.4 For example,
   information on a laptop, we use Computrace to remotely delete               the Ponemon study showed that healthcare companies who notify
   the data. Even if the machine is out of reach, we can still ‘brick’         patients too quickly of potential exposure of records paid 12%
   the system through a local timer. This is a very effective tool for         more than other companies.4
   protecting confidential data and reducing risk.”
                                                                               Computrace with Intel AT provides a robust method to comply with
                                                                               the new rules without incurring unnecessary costs. First, Compu-
                                                                               trace can delete confidential data and determine whether it has
Because data is not destroyed (just blocked) during a lockdown,
                                                                               been accessed by thieves. Computrace can also provide a record
recovery can be rapid and easy. The user simply enters a strong,
                                                                               of which data was deleted and the time of the deletion. Compu-
one-time passphrase in the reactivation screen – the only screen
available after a lock-down. Entering the passphrase resets the                trace with Intel AT can then “brick” the laptop to help protect the
local timer(s) and allows the system to boot to its normal working             system even after it is lost or stolen. Again, Computrace automati-
state. This provides IT with a simple, inexpensive way to restore              cally logs when a poison pill was successful and/or the expected
a laptop without compromising patient data or the laptop’s other               time the Intel AT timer will expire and lock down the PC. Finally,
security features, such as government-required encryption.                     after a laptop is recovered, Absolute Software’s forensic team can
                                                                               examine the PC to see if confidential files were actually accessed
For systems that are indeed stolen, IT can work with the Absolute              while the laptop was in unauthorized hands. This helps hospitals
Theft Recovery Team of law enforcement experts, investigate the
                                                                               minimize risk, avoid costly and premature notifications of unauthor-
theft, catch the thief, and recover the device. If theft recovery proves
                                                                               ized data access, and gain the time to respond appropriately with
difficult (for example, the laptop has been taken to another country),
                                                                               a thorough investigation of the breach.
IT can “brick” the system to make it inoperable.
                                                                               Use case: End-of-life disable while
Customizing the lock-down screen
                                                                               still protecting patient data
Computrace makes it easy to customize the pre-boot lockdown
                                                                               The Absolute Computrace solution is also effective at the end of
screen with a customized message that is downloaded with the
                                                                               a PC’s life cycle to protect sensitive data that might be left on a
poison pill. If the machine is returned to the user, and the user
                                                                               system that is being discarded.
tries to boot their own laptop, they might see a preboot reacti-
vation screen with a message such as, “This laptop has been
reported lost. Please call (phone number) to return the system.”




                                                                           7
IT simply uses Computrace to trigger a full system data-destruct.                                    Protecting patient data and
Once the data on the hard drive is erased, IT can further disable
                                                                                                     defending against unauthorized
the system using the poison pill feature enabled by Intel AT. Only
an authorized IT administrator can then unlock the PC for recon-                                     access to hospital systems
figuration or some other authorized use.                                                             With Computrace and Intel AT, healthcare IT administrators can
                                                                                                     protect patient data and hospital systems even after a critical laptop
                                                                                                     is lost or stolen. Laptops can also be secured even if the theft or loss
Easy deployment
                                                                                                     is not realized immediately, whether or not the system is connected
Computrace with Intel AT can be installed and activated locally,
                                                                                                     to the Internet or network, and regardless of the state of the OS,
before the PC is deployed to the user. Computrace with Intel AT
                                                                                                     BIOS, or hard drive. With Computrace and Intel AT, IT has a rapid,
can also be installed and activated remotely, like a typical patch
                                                                                                     inexpensive way to reactivate a “bricked” laptop and also return
or other software update via IT’s existing deployment application.
                                                                                                     it to its normal operating state. This enhanced protection extends
Select models of laptops will ship preconfigured, or “ready,” for
                                                                                                     IT’s security capabilities on and off the network to protect assets
Intel AT. IT administrators simply install and activate the Compu-
                                                                                                     and confidential data, improve compliance, and minimize business
trace Agent to manage the laptops as usual, before or after
                                                                                                     losses and risk.
deploying them to users.
                                                                                                     To learn more about Intel Anti-Theft technology, visit:
                                                                                                     www.intel.com/technology/anti-theft.
                                                                                                     For more information about Absolute Software products that
                                                                                                     support Intel AT, visit: www.absolute.com/intel.




1
   All information about Absolute Software was provided by Absolute Software.
2
   No computer system can provide absolute security under all conditions. Intel® Anti-Theft Technology (Intel® AT) for PC protection (also referred to as the ‘poison pill’ in some documents)
   requires the computer system to have an Intel AT-enabled chipset, BIOS, firmware release, software and an Intel AT-capable Service Provider/ISV application and service subscription. Intel
   AT (PC Protection) performs the encrypted data access disable by preventing access to or deleting cryptographic material (e.g. encryption keys) required to access previously encrypted
   data. ISV-provided Intel-AT-capable encryption software may store this cryptographic material in the PC’s chipset. In order to restore access to data when the system is recovered, this
   cryptographic material must be escrowed/backed up in advance in a separate device or server provided by the security ISV/service provider. The detection (triggers), response (actions),
   and recovery mechanisms only work after the Intel AT functionality has been activated and configured. The activation process requires an enrollment procedure in order to obtain a license
   from an authorized security vendor/service provider for each PC or batch of PCs. Activation also requires setup and configuration by the purchaser or service provider and may require
   scripting with the console. Certain functionality may not be offered by some ISVs or service providers. Certain functionality may not be available in all countries. Intel assumes no liability for
   lost or stolen data and/or systems or any other damages resulting thereof.
3
   Source: 2009 HIMSS Analytics Report: Evaluating HITECH’s Impact on Healthcare Privacy and Security sponsored by ID Experts, November 2009. http://www.himssanalytics.org/docs/
   ID_Experts_111509.pdf.
4
   Source: The Cost of a Data Breach, The Ponemon Institute, LLC, January 2010.
5
   Source: The Cost of a Lost Laptop, The Ponemon Institute, LLC. April 2009.
6
   Source: Identity Theft Resource Center 2008 Data Breach Stats, Identity Theft Resource Center (ITRC), January 2, 2009. http://www.idtheftcenter.org/artman2/uploads/1/ITRC_Breach_
   Stats_Report_2008_final.pdf.
7
   Source: Connecticut Sues Health Net For Data Breach Involving 446,000 Patients, All Headline News, January 19, 2010.
8
   For a list of PCs with Computrace embedded in the BIOS firmware, visit www.absolute.com/firmware.
9
   Source: The Absolute knowledge base.
10
   All information about Allina Hospitals & Clinics was provided by Allina Hospitals & Clinics.
   INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY
   RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL
   DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR
   PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
   Copyright © 2010 Intel Corporation. All rights reserved. Intel, the Intel logo, and vPro are trademarks of Intel Corporation in the U.S. and other countries.
   Absolute Software, the Absolute Software logo, and Computrace are trademarks or registered trademarks of Absolute Software Corporation in the U.S. and other countries.
 *Other names and brands may be claimed as the property of others.
   0210/WW/OCG/XX/PDF                                                                          Please Recycle                                                       Order Number: 323461-001US

Weitere ähnliche Inhalte

Was ist angesagt?

Improving patient care through smarter computing
Improving patient care through smarter  computingImproving patient care through smarter  computing
Improving patient care through smarter computingIBM India Smarter Computing
 
A Taxonomy of Data Prefetching Mechanisms
A Taxonomy of Data Prefetching MechanismsA Taxonomy of Data Prefetching Mechanisms
A Taxonomy of Data Prefetching Mechanismsijtsrd
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzyIJDKP
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudJohn Atchison
 
StruxureWare for data centers
StruxureWare for data centersStruxureWare for data centers
StruxureWare for data centersRogier den Boer
 

Was ist angesagt? (7)

Improving patient care through smarter computing
Improving patient care through smarter  computingImproving patient care through smarter  computing
Improving patient care through smarter computing
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
A Taxonomy of Data Prefetching Mechanisms
A Taxonomy of Data Prefetching MechanismsA Taxonomy of Data Prefetching Mechanisms
A Taxonomy of Data Prefetching Mechanisms
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
 
347 352
347 352347 352
347 352
 
StruxureWare for data centers
StruxureWare for data centersStruxureWare for data centers
StruxureWare for data centers
 

Andere mochten auch (9)

Alumni Programming Beyond the Cocktail Party
Alumni Programming Beyond the Cocktail PartyAlumni Programming Beyond the Cocktail Party
Alumni Programming Beyond the Cocktail Party
 
ZipComputers
ZipComputersZipComputers
ZipComputers
 
IRD Social Media Summit: Closing Remarks
IRD Social Media Summit: Closing RemarksIRD Social Media Summit: Closing Remarks
IRD Social Media Summit: Closing Remarks
 
External Widgets Performance
External Widgets PerformanceExternal Widgets Performance
External Widgets Performance
 
Модульные сетки в реальном мире - IQLab Frontend Fusion 2012
Модульные сетки в реальном мире - IQLab Frontend Fusion 2012Модульные сетки в реальном мире - IQLab Frontend Fusion 2012
Модульные сетки в реальном мире - IQLab Frontend Fusion 2012
 
Ali Lutz at IRD event at Emory University
Ali Lutz at IRD event at Emory UniversityAli Lutz at IRD event at Emory University
Ali Lutz at IRD event at Emory University
 
Reaching the Caribbean Market
Reaching the Caribbean MarketReaching the Caribbean Market
Reaching the Caribbean Market
 
Going Global
Going GlobalGoing Global
Going Global
 
Speed Up Your Website
Speed Up Your WebsiteSpeed Up Your Website
Speed Up Your Website
 

Ähnlich wie Healthcare intel it 449942 449942

Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
The difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoringThe difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoringBettyRManning
 
FOR SPQRWrite a 200- to 300-word short-answer response to the .docx
FOR SPQRWrite a 200- to 300-word short-answer response to the .docxFOR SPQRWrite a 200- to 300-word short-answer response to the .docx
FOR SPQRWrite a 200- to 300-word short-answer response to the .docxmecklenburgstrelitzh
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
I Stor School Backup Solutions Presentation Full
I Stor School Backup Solutions Presentation FullI Stor School Backup Solutions Presentation Full
I Stor School Backup Solutions Presentation Fullhejdavies
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing TechnologyBimpe Animashaun
 
Effective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniquesijtsrd
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsRick Vogel
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)videos
 

Ähnlich wie Healthcare intel it 449942 449942 (20)

Blue eyes seminar report
Blue eyes seminar reportBlue eyes seminar report
Blue eyes seminar report
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Ab1
Ab1Ab1
Ab1
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
The difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoringThe difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoring
 
Blue Eye
Blue EyeBlue Eye
Blue Eye
 
FOR SPQRWrite a 200- to 300-word short-answer response to the .docx
FOR SPQRWrite a 200- to 300-word short-answer response to the .docxFOR SPQRWrite a 200- to 300-word short-answer response to the .docx
FOR SPQRWrite a 200- to 300-word short-answer response to the .docx
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
I Stor School Backup Solutions Presentation Full
I Stor School Backup Solutions Presentation FullI Stor School Backup Solutions Presentation Full
I Stor School Backup Solutions Presentation Full
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
 
Effective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniques
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Closing case ups
Closing case upsClosing case ups
Closing case ups
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)
 

Mehr von Liberteks

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for DummiesLiberteks
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for DummiesLiberteks
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummiesLiberteks
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummiesLiberteks
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for DummiesLiberteks
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for DummiesLiberteks
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for DummiesLiberteks
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for DummiesLiberteks
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for DummiesLiberteks
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for DummiesLiberteks
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesLiberteks
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummiesLiberteks
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for DummiesLiberteks
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for DummiesLiberteks
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For DummiesLiberteks
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesLiberteks
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for DummiesLiberteks
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for DummiesLiberteks
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for DumiesLiberteks
 

Mehr von Liberteks (20)

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for Dummies
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummies
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 

Kürzlich hochgeladen

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Kürzlich hochgeladen (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Healthcare intel it 449942 449942

  • 1. White Paper Built-in Protection in Laptop PCs Improves Compliance with New Healthcare Rules Absolute Software1 and Intel deliver a powerful solution for complying with the security requirements of government rules and regulations for the healthcare industry. Computrace,* a leading IT asset- management and data-protection solution from Absolute Software, is taking advantage of Intel® Anti-Theft Technology (Intel® AT),2 which is designed into the system hardware. The combination of Computrace and Intel AT delivers intelligent, automated, policy-based protection against loss or theft for laptops helping to protect patient data and minimize risk for hospitals who must comply with new rules and regulations. If a laptop is reported lost or stolen, IT can remotely delete data or instruct the system to lock itself down to prevent any OS from booting – from any boot device. If the laptop is off the network, information technology (IT) administrators can be confident of a lockdown – via a local timer that can expire and disable the machine if it doesn’t check in with the Absolute Software server in the specified time. Either way, the laptop “bricks” itself. Best of all, even if the hard drive is reformatted or replaced, the built-in, anti-theft security measures remain in place. Getting the system operational again is easy – authorized users can quickly restore the system with a one- time reactivation passphrase provided by IT. IT now has a more reliable, robust approach to securing confidential data, improving compliance, and minimizing financial and/or legal risk from data and system breaches from lost or stolen laptops.
  • 2. Table of Contents Executive Summary Executive Summary ................................................................2 In the healthcare industry, keeping patient data secure is not Client-side protection helps defend just a challenge, it is a legal necessity. Loss and theft of laptops healthcare data against breaches ..........................................3 makes sensitive data vulnerable. Worse, an unauthorized Challenges in defending healthcare data ....................................3 user might use a lost or stolen laptop to access the hospital’s Keeping sensitive healthcare data out of the wrong hands ...........4 computer systems. Healthcare organizations must also comply Rapid lock-down, rapid recovery ................................................5 with increasingly stringent regulations, such as HIPPA and Timer expiry provides intelligent local response ...........................5 HITECH, to protect patient data and privacy. Compounding the Data protection during lock-down – rapid and easy recovery .......6 problem is that with more mobile workers, healthcare organi- zations also need to be able to secure confidential data even Key advantage – Compliance with health data breach notification rule ............................................7 when systems are off-site and/or not connected to a network. Easy deployment .......................................................................8 Enter Absolute Software’s Computrace,*,1 with Intel® Anti-Theft Protecting patient data and defending Technology (Intel® AT).2 An industry leader in security solutions, against unauthorized access to hospital systems ........................8 Computrace delivers a robust solution for tracking assets, performing remote data wipes after a theft, and recovering stolen assets. Intel AT enhances Computrace with timers and poison pills that allow IT to use automated policies to lock down a PC – whether the laptop is on or off the hospital network, and even if the OS is re-imaged, the hard drive is replaced, or the boot order is changed to a different device (such as a USB key, CD, DVD, or another hard drive). When activated, the anti-theft responses block the boot process regardless of the boot device, and render the laptop a “brick” without destroying the data. This protects the system while retaining the data. To reactivate a system that was locked down, the user simply enters a strong, one-time passphrase in the preboot reactiva- tion screen, and the system is returned to its normal working state. Rapid response and recovery is a key advantage for healthcare professionals who might need to quickly continue work once a laptop is recovered. It also allows hospitals to act rapidly to protect patient records, while gaining the time needed to conduct a thorough investigation into the extent of a potential breach. Computrace with Intel AT can help hospitals maintain the trust clients have in them in terms of managing confidential data. In turn, this can help hospitals retain patients who might other- wise seek out providers with a better track record of protecting data. With Computrace and Intel AT, IT can better protect assets and sensitive data, improve compliance with govern- ment and industry rules and regulations, and help reduce losses and business risk. 2
  • 3. Client-side protection helps Confidential data remains vulnerable Unfortunately, many hospitals are struggling to comply with the defend healthcare data new legislation. For example, one of the four main goals of compli- against breaches ance with HITECH is to help hospitals shift from paper-based record keeping to electronic data management. Another goal is to protect Absolute Software and Intel deliver an integrated solution that identifiable health information from misuse through electronic access. helps protect healthcare IT assets and confidential data for However, as hospitals continue to shift to electronic databases, hospitals, clinics, and mobile healthcare workers. more data becomes vulnerable to electronic attacks. According to one industry study, approximately 52% of large hospitals, 33% of Challenges in defending medium hospitals, and 25% of small hospitals had at least one data breach in 2009.3 Other industry research, including the Ponemon healthcare data study, has revealed other critical security issues, such as business The healthcare industry faces significant challenges in complying risk and consequences of data breaches: with the security aspects of government and industry regulations and rules. For example, for an information technology (IT) • The average cost of a data breach in 2009 was $6.75M, with administrator at a hospital, the problem of protecting patient the most expensive breach costing $31M to resolve, and the least expensive costing $750,000.4 data is complex. Confidential patient data must be shared between departments, from patient intake to nurse’s stations, • 92% of IT security professionals reported laptop theft or loss in from emergency rooms to ICU, and from radiology to therapy. their organization.5 In addition, many medical workers are mobile, including nurse • Lost or stolen laptops result in a data breach 71% of the time.5 practitioners, midwives, physical therapists, physicians who make • Healthcare organizations were responsible for 20.5% of rounds at small clinics, and medical researchers at other facilities. exposed records in 2008 – the second highest percentage, Such workers must also have access to patient data in order to behind only the government/military sector, in data breaches.6 provide high-quality care. Compounding the security challenge is the need to share patient The rate at which customers “jump ship” information with non-employee medical personnel, such as is higher for healthcare organizations non-hospital physicians, visiting specialists, therapists at remote Hospitals are concerned with protecting patient data, but must also clinics, and technicians at off-site labs. One of the most critical be concerned with their reputation. According to the Ponemon concerns is that a stolen laptop could be used, not only to gain study, healthcare organizations and financial services firms were access to patient data stored on the system, but to gain access to more likely than other types of organizations to lose customers hospital systems themselves. IT needs a robust, comprehensive after a data breach. And, healthcare organizations experienced a solution to protect patient data, regardless of a laptop’s location. 6% customer attrition rate (churn rate) after a data-loss incident, as compared to a 5% churn rate for financial services firms, and New laws, stricter compliance a 2% churn rate for other industries, such as technology and Besides the Health Insurance Portability and Accountability Act retail, and 1% or less for manufacturing, energy, and media.4 (HIPAA), hospitals and other healthcare organizations must also comply with the health data breach notification rule, as well as the Costs are higher for the healthcare industry Health Information Technology for Economic and Clinical Health The cost of a data breach is not only significant, but climbing, Act (HITECH). The latter two acts went into effect in 2009. especially for healthcare organizations. The Ponemon study shows that 36% of all data breaches in the study involved a lost or stolen The new rules changed the regulations for privacy and security of laptop (or other mobile data-bearing device).4 The cost of redress HIPAA. One of the consequences is stiffer penalties, along with and victim-communication activities are also rising, including an requirements that healthcare organizations notify the public when the increase in legal defense costs against class action lawsuits a data breach occurs that violates the privacy regulations. Compli- that result from customer, consumer, or employee data loss.4 ance with these and other government and industry regulations • The average cost of a data breach for a healthcare organization requires that IT administrators have a robust solution to data loss was $294 per customer record – about 10% to 20% more and theft, as well as the ability to track the response and recovery than almost all other industries.4 efforts taken to protect patient data. • Lost business makes up nearly 50% of the cost of a data breach.4 3
  • 4. Traditional Computrace* with Benefits of Computrace System architecture solutions Intel® AT and Intel AT Software applications SW-based HW/BIOS/SW-based • Tamper-resistant Absolute Computrace* Agent: IT policies and poison pill settings hardware-based No PC disable Local/remote PC disable capabilities Relies on network Works with and without • Reduces corporate risk connectivity network connectivity Operating system • Addresses compliance Typically relies PC Disable (via timer expiry) through flexible IT policies on OS and/or remains active even if OS • Allows rapid response hard drive is missing or reinstalled, to loss or theft, even without a network BIOS hard drive is reimaged Computrace Agent and or replaced, or BIOS is connection reactivation screen reflashed • Allows a controlled, intelli- gent, client-side response to loss or theft, regardless Hardware and firmware of the state of the OS, Intel® AT-p timer, PC-disable, other capabilities BIOS, or hard drive Table 1. Advantages of client-side intelligence Figure 1. Architecture for Absolute’s Computrace,* as enabled in theft management by Intel® Anti-Theft Technology – PC Protection In addition, with recent legislation and its stiffer penalties, viola- • Flag systems that are or might be lost or stolen. tions of state and federal laws can increase those costs with risk • Send a data-destruct command to erase confidential data, of additional legal action. For example, the state of Connecticut by file, file location, or file type, or by erasing the entire recently filed a lawsuit against one of the nation’s largest health- contents of the hard disk. care companies for allegedly failing to secure confidential medical • Recover stolen laptops, with help from the Absolute Theft records of over 440,000 patients – and waiting six months before Recovery Team, and create an audit log that reports which files informing consumers and authorities about the breach.7 were accessed after the theft. With hackers using sophisticated malware, and 12,000 laptops • Disable a laptop that doesn’t check in within an IT-defined stolen every week from airports alone, hospitals are asking for period of time. help.5 If they can track the laptop, they can be more confident • Send a poison-pill to lock down the laptop (turn it into an that it is in their control. If a hospital can’t track a laptop, or if unusable “brick”) and prevent any OS from booting. IT suspects that a machine is lost or stolen, a rapid response can make the difference between protecting patient data and • Unlock a notebook once security is reestablished. retaining clients, or exposing data and losing more than 6% Complementing other security measures of the organization’s customers.4 Computrace with Intel AT complements encryption layers and other security measures that might be required by government Keeping sensitive healthcare data rules and other regulations. For example, Computrace with Intel out of the wrong hands AT allows IT to establish policies for security responses that Absolute and Intel have collaborated closely to deliver intelligent range from rapid, client-side, lock-down to full data destruction client-side protection for healthcare data stored on laptops. Compu- and the physical recovery of stolen computers. The new security trace has traditionally allowed IT administrators to remotely delete capabilities can integrate with existing encryption solution preboot data from a laptop to help protect it from unauthorized access. authentication modules. Enabled by Intel AT, Computrace now delivers new capabilities (see Table 1) that let IT rapidly lock-down a laptop if the system is lost or Tamper-resistant technology stolen to prevent the system from booting. IT can then rapidly reacti- Because Intel AT is designed into the laptop’s hardware (see Figure vate the system once it is back in the hands of an authorized user. 1), the anti-theft capabilities are more protected from tampering. Computrace with Intel AT delivers a powerful and comprehensive The capabilities include timer expiry and PC disable, and do not set of options to respond to loss, theft, or suspicious circumstances: depend on the OS. This means they can work even if the laptop is not connected to the network, the OS or BIOS is reinstalled, or the 4
  • 5.   Figure 2. IT can specify different theft responses, as appropriate. For example, a poison-pill lock-down as been requested for user 4, as well as a timer-expiry lock-down. hard drive is reformatted or replaced. Also, because the Compu- As is typical, the thief does not wait long to power up the laptop trace Agent is embedded in the BIOS firmware of most PCs, it and connect to the Internet to find out if the system is working can survive hard drive reformats and replacements.8 and what kind of data is on it. However, protected by Computrace with Intel AT, the laptop begins its check-in with the Computrace In addition, PC Disable, once activated, also works regardless Monitoring Center. As soon as the laptop checks in, it receives the of boot device – hard drive, USB key, CD, DVD, and so on. For poison pill set in the server by IT. The laptop then disables itself to example, a thief cannot simply change the boot order to a USB prevent a reboot. To the thief, the rendezvous (check-in) process key and access the system. The laptop will not boot until the is invisible. All the thief sees is that when the system reboots, it is strong recovery passphrase is entered. inoperable – it won’t load the OS. Rapid lock-down, rapid recovery PC disable – a preboot capability When a laptop is lost or stolen, it is critical that IT respond The PC disable capability is triggered before the system boots. rapidly to a data breach. The priority is to protect patient data Because the capability is designed into the laptop’s hardware and and mitigate liabilities and losses, until the laptop can be recov- activated preboot, it works even if the OS or BIOS is reinstalled, ered. For example, if an organization discovers a loss or theft other security solutions have been removed, or the hard drive has the same day it happens, the average cost of a lost laptop drops been reformatted or replaced. Because the capability is activated to about $9,000.3 However, if it takes more than a week to find preboot, even if a thief tries to boot from another device (hard out about the loss, the average cost of that laptop increases to drive, USB key, CD, DVD, etc.), the poison pill remains in effect, $115,000.3 Having several options for managing lost systems blocking the boot process itself. This is why a laptop can remain gives IT the flexibility to respond as necessary. locked down even if another boot device is installed. Use case: Laptop stolen at an airport Timer expiry provides In this case, a neurology specialist (Dr. Bartlett) is traveling to an intelligent local response international conference, and her laptop is stolen at the airport. One of the key problems with laptop security is that anti-theft Dr. Bartlett immediately calls IT, and the administrator flags the software-only products can be installed and uninstalled relatively laptop in the central database (see Figure 2). easily. Software-only approaches also require that the OS is loaded and working properly, which means that the anti-theft 5
  • 6. Time expiry Poison pill Reactivation server communication is disabled via port blocking, or the agent is prevented from running. The timer can continue to work even if Network No Yes No Required? the OS is reinstalled, the BIOS is reflashed, other security solutions Mechanism Local, hardware- Poison pill flag is set One-time recovery have been removed, or the hard drive has been reformatted or based timer expires in central server. token is entered replaced. Even if a thief tries to boot from a secondary device, if not reset by Poison pill is then in the reactivation central server at automatically deliv- (pre-boot) screen. the boot process won’t work. For example, since the timer specified interval. ered to laptop when Timer is reset; disables the laptop’s boot process, replacing the hard drive laptop connects to system can boot to does not circumvent the blocked boot. Internet. its normal working state. Use case: Undetected theft, but missed Effect PC boot process is PC boot process is N/A blocked. blocked. check-in locks down laptop Data destroyed? No No N/A In this case, a physician (Dr. Andrews) is leading a pilot study for a Recovery Full system Full system Full system new cardiovascular medical device. When Dr. Andrews leaves to recovery via recovery via recovery via speak at a medical conference, he forgets to lock his office, and his strong reactivation strong reactivation strong reactivation passphrase. passphrase. passphrase. laptop is stolen from his desk. The thief does not immediately power Benefits Fully automated, Rapid, flexible, Easy, fast recovery. up the laptop, but hides it in a safe, temporary place until it can be policy-based policy-based moved to a better location. Since Dr. Andrews will be gone for response – no IT response. several more days, the theft is not immediately noticed. interaction required, no network required. In this example, IT policy is that the laptop must check in with the Absolute Software Monitoring Center each day to upload its asset Table 2. Intel® Anti-Theft Technology (Intel® AT) features information. After being stolen, the daily check-in was missed. The next time the laptop powers up, it enters “theft mode.” The laptop software fails if the OS is compromised or inoperable. In addition, then disables itself. Even if the thief tries to power up the system if a laptop has a software-only agent, a thief can often circumvent later, the OS will not boot, so use of the laptop is thwarted. the agent by reformatting or replacing the hard drive to make the laptop usable again. Or the thief can remove the hard drive to Data protection during lock-down – another system to access the data on that disk. The result is that rapid and easy recovery IT cannot be confident that patient data on a laptop is secure if the Computrace has traditionally provided IT with powerful mecha- laptop is not controlled by the authorized user. nisms to remotely erase sensitive data if a laptop is lost or stolen. Enabled by Intel AT, Computrace provides a local, intelligent and Although erasing a single file can be done quickly, erasing all files automated response to suspicious circumstances through the use of a particular type or destructively overwriting the hard disk can of hardware-based Intel AT timers. When the timer expires, the take some time. The longer the system remains active, the more laptop becomes inoperable. time an unauthorized user has to try to access patient data – and the more costly the data breach. How does it work? In addition, there are many cases in which a laptop might not be in Intel AT timers establish rendezvous requirements for laptops. the control of the authorized user, but it is not stolen, only “missing.” A rendezvous is an authorized check-in via the Internet with the For example, a nurse might accidentally leave a laptop behind at theft-management server, such as the Computrace Monitoring a clinic and return for it the next day, or a specialist might forget Center. This check-in must occur within the IT-defined time period. a laptop after a consult and have it delivered to him later. In such If the timer expires, Intel AT identifies a suspicious circumstance cases, the indicators for a destructive data erase might be a false and blocks the machine’s boot process. When locked down, the positive – not fully warranted. Worse, a destructive response could laptop cannot boot any OS from any boot device, including hard require a lot of time for restore tasks – rebuilding the OS, restoring drive, USB key, CD, DVD, or other device. user files (if there were back-ups available), restoring user settings, Because the expiry timer is built into the laptop hardware, it works and so on. even if the laptop does not connect to the network to receive other Enabled by Intel AT, Computrace allows IT to lock down a instructions from IT. For example, the timer can work if central potentially missing system without a destructive data wipe. 6
  • 7. Traditionally, Absolute has been able to recover 3 out of 4 stolen Allina Hospitals & Clinics laptops that call in to the Absolute Software Monitoring Center.8,9 Headquartered in Minneapolis, Minnesota, Allina Hospitals This high rate of recovery is one of the advantages of Absolute & Clinics (Allina) is an organization of 11 hospitals. The security solutions. Adding customized lock-down screens makes organization employs 23,000 people to provide healthcare it even easier for users to return to work once a missing laptop services in Minnesota and Western Wisconsin.10 is found. Allina has an extensive fleet of 3,800 mobile PCs. For the IT team however, the increase in mobile systems presents a Key advantage – Compliance with challenge in managing systems and protecting patient data, health data breach notification rule with critical ramifications. A key aspect of the data breach notification rule is that, if confi- Having experienced a sharp increase in laptop theft – dential data remains protected – if the loss of data does not pose including an incident that required public disclosure of a significant risk or cause significant harm, the organization is not breached health information, Allina looked to Computrace required to notify the public or other agencies of the breach. With with Intel AT for a high-tech solution for managing the the cost of a data breach so high – including the loss of patients – systems and protecting against data breaches. the rule provides even more incentive for hospitals to implement robust anti-theft technologies that help prevent unauthorized “Because of the sensitive nature of our patients’ information, access to patient data. we must have the highest level of protection against theft or data breaches,” says Brad Myrvold, Manager of Desktop However, moving too quickly in response of a breach – especially Technology at Allina. “If a computer is lost or stolen, Compu- during the detection, escalation, and notification phases – can trace with Intel AT is a lifeline. If we are concerned about the cause inefficiencies that actually increase costs.4 For example, information on a laptop, we use Computrace to remotely delete the Ponemon study showed that healthcare companies who notify the data. Even if the machine is out of reach, we can still ‘brick’ patients too quickly of potential exposure of records paid 12% the system through a local timer. This is a very effective tool for more than other companies.4 protecting confidential data and reducing risk.” Computrace with Intel AT provides a robust method to comply with the new rules without incurring unnecessary costs. First, Compu- trace can delete confidential data and determine whether it has Because data is not destroyed (just blocked) during a lockdown, been accessed by thieves. Computrace can also provide a record recovery can be rapid and easy. The user simply enters a strong, of which data was deleted and the time of the deletion. Compu- one-time passphrase in the reactivation screen – the only screen available after a lock-down. Entering the passphrase resets the trace with Intel AT can then “brick” the laptop to help protect the local timer(s) and allows the system to boot to its normal working system even after it is lost or stolen. Again, Computrace automati- state. This provides IT with a simple, inexpensive way to restore cally logs when a poison pill was successful and/or the expected a laptop without compromising patient data or the laptop’s other time the Intel AT timer will expire and lock down the PC. Finally, security features, such as government-required encryption. after a laptop is recovered, Absolute Software’s forensic team can examine the PC to see if confidential files were actually accessed For systems that are indeed stolen, IT can work with the Absolute while the laptop was in unauthorized hands. This helps hospitals Theft Recovery Team of law enforcement experts, investigate the minimize risk, avoid costly and premature notifications of unauthor- theft, catch the thief, and recover the device. If theft recovery proves ized data access, and gain the time to respond appropriately with difficult (for example, the laptop has been taken to another country), a thorough investigation of the breach. IT can “brick” the system to make it inoperable. Use case: End-of-life disable while Customizing the lock-down screen still protecting patient data Computrace makes it easy to customize the pre-boot lockdown The Absolute Computrace solution is also effective at the end of screen with a customized message that is downloaded with the a PC’s life cycle to protect sensitive data that might be left on a poison pill. If the machine is returned to the user, and the user system that is being discarded. tries to boot their own laptop, they might see a preboot reacti- vation screen with a message such as, “This laptop has been reported lost. Please call (phone number) to return the system.” 7
  • 8. IT simply uses Computrace to trigger a full system data-destruct. Protecting patient data and Once the data on the hard drive is erased, IT can further disable defending against unauthorized the system using the poison pill feature enabled by Intel AT. Only an authorized IT administrator can then unlock the PC for recon- access to hospital systems figuration or some other authorized use. With Computrace and Intel AT, healthcare IT administrators can protect patient data and hospital systems even after a critical laptop is lost or stolen. Laptops can also be secured even if the theft or loss Easy deployment is not realized immediately, whether or not the system is connected Computrace with Intel AT can be installed and activated locally, to the Internet or network, and regardless of the state of the OS, before the PC is deployed to the user. Computrace with Intel AT BIOS, or hard drive. With Computrace and Intel AT, IT has a rapid, can also be installed and activated remotely, like a typical patch inexpensive way to reactivate a “bricked” laptop and also return or other software update via IT’s existing deployment application. it to its normal operating state. This enhanced protection extends Select models of laptops will ship preconfigured, or “ready,” for IT’s security capabilities on and off the network to protect assets Intel AT. IT administrators simply install and activate the Compu- and confidential data, improve compliance, and minimize business trace Agent to manage the laptops as usual, before or after losses and risk. deploying them to users. To learn more about Intel Anti-Theft technology, visit: www.intel.com/technology/anti-theft. For more information about Absolute Software products that support Intel AT, visit: www.absolute.com/intel. 1 All information about Absolute Software was provided by Absolute Software. 2 No computer system can provide absolute security under all conditions. Intel® Anti-Theft Technology (Intel® AT) for PC protection (also referred to as the ‘poison pill’ in some documents) requires the computer system to have an Intel AT-enabled chipset, BIOS, firmware release, software and an Intel AT-capable Service Provider/ISV application and service subscription. Intel AT (PC Protection) performs the encrypted data access disable by preventing access to or deleting cryptographic material (e.g. encryption keys) required to access previously encrypted data. ISV-provided Intel-AT-capable encryption software may store this cryptographic material in the PC’s chipset. In order to restore access to data when the system is recovered, this cryptographic material must be escrowed/backed up in advance in a separate device or server provided by the security ISV/service provider. The detection (triggers), response (actions), and recovery mechanisms only work after the Intel AT functionality has been activated and configured. The activation process requires an enrollment procedure in order to obtain a license from an authorized security vendor/service provider for each PC or batch of PCs. Activation also requires setup and configuration by the purchaser or service provider and may require scripting with the console. Certain functionality may not be offered by some ISVs or service providers. Certain functionality may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. 3 Source: 2009 HIMSS Analytics Report: Evaluating HITECH’s Impact on Healthcare Privacy and Security sponsored by ID Experts, November 2009. http://www.himssanalytics.org/docs/ ID_Experts_111509.pdf. 4 Source: The Cost of a Data Breach, The Ponemon Institute, LLC, January 2010. 5 Source: The Cost of a Lost Laptop, The Ponemon Institute, LLC. April 2009. 6 Source: Identity Theft Resource Center 2008 Data Breach Stats, Identity Theft Resource Center (ITRC), January 2, 2009. http://www.idtheftcenter.org/artman2/uploads/1/ITRC_Breach_ Stats_Report_2008_final.pdf. 7 Source: Connecticut Sues Health Net For Data Breach Involving 446,000 Patients, All Headline News, January 19, 2010. 8 For a list of PCs with Computrace embedded in the BIOS firmware, visit www.absolute.com/firmware. 9 Source: The Absolute knowledge base. 10 All information about Allina Hospitals & Clinics was provided by Allina Hospitals & Clinics. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Copyright © 2010 Intel Corporation. All rights reserved. Intel, the Intel logo, and vPro are trademarks of Intel Corporation in the U.S. and other countries. Absolute Software, the Absolute Software logo, and Computrace are trademarks or registered trademarks of Absolute Software Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. 0210/WW/OCG/XX/PDF Please Recycle Order Number: 323461-001US