SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Security and Privacy in
SharePoint 2010: Healthcare
Marie-Michelle Strah, PhD
Richmond SharePoint User Group
August 31, 2011
http://lifeincapslock.com

http://www.sswug.org/usercenter/profile.aspx?id=563806
          www.broadpoint.net

                 http://www.meetup.com/fedspug-wspdc
Objectives
• ARRA/HITECH: INFOSEC and
  connected health information
• Reference models: security, enterprise
  architecture and compliance for
  healthcare
• Overview of privacy and security in
  SharePoint Server 2010
Planning for Security and the “Black Swan”
Privacy
• Data (opt in/out)
• PHI
• PII

“Black Swans”

• Consumer
  Engagement
• Business
  Associates
������           ������
 ������ = (������ ∗ ������ )
Information Security (Collaborative Model)
Equals
People (all actors and agents)
Times
Architecture (technical, physical and
administrative)
From HIPAA to HITECH…
• Health Insurance Portability and
  Accountability Act of 1996 (HIPAA) (Pub L
  104–191, 110 Stat 1936)
• The Health Information Technology for
  Economic and Clinical Health Act (HITECH
  Act), enacted on February 17, 2009
• American Recovery and Reinvestment Act
  of 2009 (ARRA) (Pub L 111-5, 123 Stat 115)
������        ������
������ = (������ ∗ ������ ) do the HITECH math…
                          Application of HIPAA Security
                          Standards to Business
“Business Associates”:    Associates
• Legal                   42 USC §17931
• Accounting
• Administrative          New Security Breach
• Claims Processing       Requirements
• Data Analysis           42 USC §17932(j)
• QA
• Billing                 Electronic Access Mandatory for
45 CFR §160.103           Patients 42 USC 17935(e)

Consumer Engagement       Prohibited Sale of PHI without
                          Patient Authorization 42 USC
                          §17935(d)
ONC (Office of the
National Coordinator for
Healthcare IT)

• Health Information
  Exchange (HIE)
• Accountable Care
  Organizations (ACO)
• “Meaningful Use”

• Interoperability
• Service Oriented
  Architecture (SOA)
  Models for Healthcare
  Information Technology

• Certification (ANSI) June
  2011
• Conformance Testing
  (NIST)
Microsoft Connected Health Framework Business and Technical
Framework (Joint Architecture)
Electronic Healthcare = Complexity
Increases Opportunity for “Black Swans” (Security and Privacy
Risk)
SOA “Hub” Model reduces complexity and variability while maintaining
                collaboration and interoperability
Codeplex: Health Connection
          Engine
 http://hce.codeplex.com/
 • SOA
 • “Plug and Play”
 • Message represent clinical events, not data
   items
 • EHR data federated
 • Connection to existing messaging
   infrastructures
SharePoint 2010 as part of a
Connected Health Framework

• NOT a standalone solution
• Technical barriers
• Data barriers
• Staffing barriers
 Office Business Applications (Office and
    SharePoint) as part of healthcare
         information architecture
Security Architecture – SPS2010

                                 UPM




                                                                                                Hardware
Authorization




                                                                  Services
                                                      Business Connectivity
                Authentication         Permissions                            Data Level                   Endpoint
                Federated ID           Security                               Security                     Security
                Classic/Claims         Groups                                 LOB Integration              Mobile
                IIS/STS                                                                                    Remote




                                                     ������                                         ������
  ������ = (������ ∗ ������ )
Behavioral Factors:
Security Architecture – SPS2010
             • #hcsm
             • User population
               challenges
                -healthcare/providers
                -business associates
             • “Prurient interest”


                ������               ������
������ = (������ ∗ ������ )
Why data security and privacy should matter to
    your SharePoint Administrator…

    Unfortunately, security and governance are absent
    in many cases

    Jay Simcox: Proactive vs. reactive approach




•   https://www.nothingbutsharepoint.com/sites/eusp/Pages/sharepoint-data-
    security-and-privacy-information-why-should-it-matter-to-you.aspx
Security Planning and SharePoint 2010
• Encryption
• Data at rest/data in motion
• Perimeter topologies
• Segmentation and compartmentalization
  of PHI/PII (logical and physical)
• Wireless (RFID/Bluetooth)
• Business Continuity
• Backup and Recovery
Security Planning and SharePoint 2010
 • Plan permission levels and groups (least
   privileges) – providers and business
   associates
 • Plan site permissions
 • Fine-grained permissions (item-level)
 • Security groups (custom)
 • Contribute permissions
Additional Security Planning
Considerations (SharePoint 2010)
 • Content types (PHI/PII)
 • ECM/OCR
 • Business Connectivity Services and Visio Services
   (external data sources)
    – Excel, lists, SQL, custom data providers
    – Integrated Windows with constrained
      Kerberos
 • Metadata and tagging (PHI/PII)
 • Blogs and wikis (PHI)
SharePoint 2010: Identity and Access
Management in Healthcare
• SharePoint as enabler for healthcare:
   – Access tracking and audits
   – Access controls
• Recommend: third party tools (ControlPoint, AvePoint,
  etc.)
• Recommend: IAM Solutions
   – Mobility
   – Workstations/Proximity
Best Practices - Prevention
• Involve HIPAA specialists early in the planning process.
  (This is NOT an IT problem)
• Consider removing PHI from the equation.
  (Compartmentalization and segregation)
• Evaluate the outsourcing option. (Example: FPWeb)
• Look to experts to help with existing implementations.
  (Domain expertise in healthcare and clinical workflow as
  well as HIPAA/HITECH privacy and security)
• Use connected health framework reference model and
  other HC specific applications (Dynamics CRM for Patient
  Relationship Management/Case Management,
  HealthVault, Amalga, IAM)
Adapting the Joint Commission
Continuous Process Improvement Model…

       Plan

       • Technical, Physical, Administrative Safeguards

       Document

       • Joint Commission, Policies, Procedures, IT Governance

       Train

       • Clinical, Administrative and Business Associates

       Track

       • Training, Compliance, Incidents, Access…. everything

       Review

       • Flexibility, Agility, Architect for Change
Case Studies
• SharePoint 2007 Upgrade – Behavioral
  Health
• SharePoint 2010 and Clinical Trial Data
  – Research (Biotech and Pharma)
• Patient Relationship Management
  (Consumer Engagement) – SharePoint
  2010 and CRM
Questions?
http://lifeincapslock.com

http://www.sswug.org/usercenter/profile.aspx?id=563806
          www.broadpoint.net

                 http://www.meetup.com/fedspug-wspdc

Weitere ähnliche Inhalte

Was ist angesagt?

CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityHaluk Demirkan
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
EDW Webinar: Designing Master Data Services for Application Integration
EDW Webinar: Designing Master Data Services for Application IntegrationEDW Webinar: Designing Master Data Services for Application Integration
EDW Webinar: Designing Master Data Services for Application IntegrationDATAVERSITY
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthroughsiddarthc
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 

Was ist angesagt? (20)

CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
EDW Webinar: Designing Master Data Services for Application Integration
EDW Webinar: Designing Master Data Services for Application IntegrationEDW Webinar: Designing Master Data Services for Application Integration
EDW Webinar: Designing Master Data Services for Application Integration
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 

Andere mochten auch

Twitter ppt18.12.2010
Twitter ppt18.12.2010Twitter ppt18.12.2010
Twitter ppt18.12.2010dianabhathena
 
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4Neil Horowitz
 
Sundance Vacations and Travel Advantage Network Case Study
Sundance Vacations and Travel Advantage Network Case StudySundance Vacations and Travel Advantage Network Case Study
Sundance Vacations and Travel Advantage Network Case Studysoapbox
 
My hoilday picture album
My hoilday picture albumMy hoilday picture album
My hoilday picture albumandrewtanrui
 
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
5 Charitable Gifts You Can Buy for the Price of an iPhone 5SMashable
 
Suco de Clorofila do Programa Terrapia
Suco de Clorofila do Programa TerrapiaSuco de Clorofila do Programa Terrapia
Suco de Clorofila do Programa Terrapiafss77
 
The Global Goals for Sustainable Development: The world's most important bran...
The Global Goals for Sustainable Development: The world's most important bran...The Global Goals for Sustainable Development: The world's most important bran...
The Global Goals for Sustainable Development: The world's most important bran...Brandwatch
 
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielleGreenLabCenter
 
Newsworks E.ON effectiveness
Newsworks E.ON effectivenessNewsworks E.ON effectiveness
Newsworks E.ON effectivenessNewsworks
 
Testing/Manufacture/Izod Impact Tester For Metal Testing
Testing/Manufacture/Izod Impact Tester For Metal TestingTesting/Manufacture/Izod Impact Tester For Metal Testing
Testing/Manufacture/Izod Impact Tester For Metal Testingfec2020
 
Mind the Gap - State of the Browser 2015
Mind the Gap - State of the Browser 2015Mind the Gap - State of the Browser 2015
Mind the Gap - State of the Browser 2015Christian Heilmann
 
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...Iskander Business Partner GmbH
 
Flat design for a non flat world
Flat design for a non flat worldFlat design for a non flat world
Flat design for a non flat worldGregory Raiz
 
A avaliação deve orientar a aprendizagem
A avaliação deve orientar a aprendizagemA avaliação deve orientar a aprendizagem
A avaliação deve orientar a aprendizagemRoberto Costa
 
Posten Norge Achieves Economies of Scale through Efficient IT Transition
Posten Norge Achieves Economies of Scale through Efficient IT TransitionPosten Norge Achieves Economies of Scale through Efficient IT Transition
Posten Norge Achieves Economies of Scale through Efficient IT TransitionCapgemini
 

Andere mochten auch (19)

Twitter ppt18.12.2010
Twitter ppt18.12.2010Twitter ppt18.12.2010
Twitter ppt18.12.2010
 
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
 
Pourquoi MOI.4
Pourquoi MOI.4Pourquoi MOI.4
Pourquoi MOI.4
 
American Tales of Social Justice Engagement
American Tales of Social Justice EngagementAmerican Tales of Social Justice Engagement
American Tales of Social Justice Engagement
 
Sundance Vacations and Travel Advantage Network Case Study
Sundance Vacations and Travel Advantage Network Case StudySundance Vacations and Travel Advantage Network Case Study
Sundance Vacations and Travel Advantage Network Case Study
 
Edicto 2013
Edicto 2013Edicto 2013
Edicto 2013
 
My hoilday picture album
My hoilday picture albumMy hoilday picture album
My hoilday picture album
 
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
 
Suco de Clorofila do Programa Terrapia
Suco de Clorofila do Programa TerrapiaSuco de Clorofila do Programa Terrapia
Suco de Clorofila do Programa Terrapia
 
The Global Goals for Sustainable Development: The world's most important bran...
The Global Goals for Sustainable Development: The world's most important bran...The Global Goals for Sustainable Development: The world's most important bran...
The Global Goals for Sustainable Development: The world's most important bran...
 
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
 
Koshkin The ballads
Koshkin The balladsKoshkin The ballads
Koshkin The ballads
 
Newsworks E.ON effectiveness
Newsworks E.ON effectivenessNewsworks E.ON effectiveness
Newsworks E.ON effectiveness
 
Testing/Manufacture/Izod Impact Tester For Metal Testing
Testing/Manufacture/Izod Impact Tester For Metal TestingTesting/Manufacture/Izod Impact Tester For Metal Testing
Testing/Manufacture/Izod Impact Tester For Metal Testing
 
Mind the Gap - State of the Browser 2015
Mind the Gap - State of the Browser 2015Mind the Gap - State of the Browser 2015
Mind the Gap - State of the Browser 2015
 
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
 
Flat design for a non flat world
Flat design for a non flat worldFlat design for a non flat world
Flat design for a non flat world
 
A avaliação deve orientar a aprendizagem
A avaliação deve orientar a aprendizagemA avaliação deve orientar a aprendizagem
A avaliação deve orientar a aprendizagem
 
Posten Norge Achieves Economies of Scale through Efficient IT Transition
Posten Norge Achieves Economies of Scale through Efficient IT TransitionPosten Norge Achieves Economies of Scale through Efficient IT Transition
Posten Norge Achieves Economies of Scale through Efficient IT Transition
 

Ähnlich wie Security and Privacy in SharePoint 2010: Healthcare

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...DataWorks Summit
 
Consumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityConsumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityMarie-Michelle Strah, PhD
 
NHIN Privacy & Security
NHIN Privacy & SecurityNHIN Privacy & Security
NHIN Privacy & SecurityBrian Ahier
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
 
Connecting the Healthcare Ecosystem - An Architecture for Improved Health
Connecting the Healthcare Ecosystem - An Architecture for Improved HealthConnecting the Healthcare Ecosystem - An Architecture for Improved Health
Connecting the Healthcare Ecosystem - An Architecture for Improved HealthProlifics
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Privacy audittalkfinal
Privacy audittalkfinalPrivacy audittalkfinal
Privacy audittalkfinalAlan Hartman
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...Stichting ePortfolio Support
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Denodo
 
Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Denodo
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationDenodo
 

Ähnlich wie Security and Privacy in SharePoint 2010: Healthcare (20)

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...
 
Consumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityConsumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and Security
 
NHIN Privacy & Security
NHIN Privacy & SecurityNHIN Privacy & Security
NHIN Privacy & Security
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
Connecting the Healthcare Ecosystem - An Architecture for Improved Health
Connecting the Healthcare Ecosystem - An Architecture for Improved HealthConnecting the Healthcare Ecosystem - An Architecture for Improved Health
Connecting the Healthcare Ecosystem - An Architecture for Improved Health
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Privacy audittalkfinal
Privacy audittalkfinalPrivacy audittalkfinal
Privacy audittalkfinal
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
 
Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
 
Next_Gen_Overview
Next_Gen_OverviewNext_Gen_Overview
Next_Gen_Overview
 

Mehr von Marie-Michelle Strah, PhD

Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Marie-Michelle Strah, PhD
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...Marie-Michelle Strah, PhD
 
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...Marie-Michelle Strah, PhD
 
Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011Marie-Michelle Strah, PhD
 
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2Marie-Michelle Strah, PhD
 
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...Marie-Michelle Strah, PhD
 
Best Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePointBest Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePointMarie-Michelle Strah, PhD
 
Best Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical CommandBest Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical CommandMarie-Michelle Strah, PhD
 
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...Marie-Michelle Strah, PhD
 
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...Marie-Michelle Strah, PhD
 
Business Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare OutcomesBusiness Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare OutcomesMarie-Michelle Strah, PhD
 
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateTricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateMarie-Michelle Strah, PhD
 
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)Marie-Michelle Strah, PhD
 

Mehr von Marie-Michelle Strah, PhD (15)

Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
 
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
 
Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011
 
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
 
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
 
Best Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePointBest Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePoint
 
Best Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical CommandBest Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical Command
 
Case Study for a SharePoint SDLC
Case Study for a SharePoint SDLCCase Study for a SharePoint SDLC
Case Study for a SharePoint SDLC
 
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
 
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
 
Business Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare OutcomesBusiness Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare Outcomes
 
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateTricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
 
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Security and Privacy in SharePoint 2010: Healthcare

  • 1. Security and Privacy in SharePoint 2010: Healthcare Marie-Michelle Strah, PhD Richmond SharePoint User Group August 31, 2011
  • 2. http://lifeincapslock.com http://www.sswug.org/usercenter/profile.aspx?id=563806 www.broadpoint.net http://www.meetup.com/fedspug-wspdc
  • 3. Objectives • ARRA/HITECH: INFOSEC and connected health information • Reference models: security, enterprise architecture and compliance for healthcare • Overview of privacy and security in SharePoint Server 2010
  • 4. Planning for Security and the “Black Swan”
  • 5. Privacy • Data (opt in/out) • PHI • PII “Black Swans” • Consumer Engagement • Business Associates
  • 6. ������ ������ ������ = (������ ∗ ������ ) Information Security (Collaborative Model) Equals People (all actors and agents) Times Architecture (technical, physical and administrative)
  • 7. From HIPAA to HITECH… • Health Insurance Portability and Accountability Act of 1996 (HIPAA) (Pub L 104–191, 110 Stat 1936) • The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted on February 17, 2009 • American Recovery and Reinvestment Act of 2009 (ARRA) (Pub L 111-5, 123 Stat 115)
  • 8. ������ ������ ������ = (������ ∗ ������ ) do the HITECH math… Application of HIPAA Security Standards to Business “Business Associates”: Associates • Legal 42 USC §17931 • Accounting • Administrative New Security Breach • Claims Processing Requirements • Data Analysis 42 USC §17932(j) • QA • Billing Electronic Access Mandatory for 45 CFR §160.103 Patients 42 USC 17935(e) Consumer Engagement Prohibited Sale of PHI without Patient Authorization 42 USC §17935(d)
  • 9. ONC (Office of the National Coordinator for Healthcare IT) • Health Information Exchange (HIE) • Accountable Care Organizations (ACO) • “Meaningful Use” • Interoperability • Service Oriented Architecture (SOA) Models for Healthcare Information Technology • Certification (ANSI) June 2011 • Conformance Testing (NIST)
  • 10. Microsoft Connected Health Framework Business and Technical Framework (Joint Architecture)
  • 11. Electronic Healthcare = Complexity Increases Opportunity for “Black Swans” (Security and Privacy Risk)
  • 12. SOA “Hub” Model reduces complexity and variability while maintaining collaboration and interoperability
  • 13. Codeplex: Health Connection Engine http://hce.codeplex.com/ • SOA • “Plug and Play” • Message represent clinical events, not data items • EHR data federated • Connection to existing messaging infrastructures
  • 14. SharePoint 2010 as part of a Connected Health Framework • NOT a standalone solution • Technical barriers • Data barriers • Staffing barriers Office Business Applications (Office and SharePoint) as part of healthcare information architecture
  • 15. Security Architecture – SPS2010 UPM Hardware Authorization Services Business Connectivity Authentication Permissions Data Level Endpoint Federated ID Security Security Security Classic/Claims Groups LOB Integration Mobile IIS/STS Remote ������ ������ ������ = (������ ∗ ������ )
  • 16. Behavioral Factors: Security Architecture – SPS2010 • #hcsm • User population challenges -healthcare/providers -business associates • “Prurient interest” ������ ������ ������ = (������ ∗ ������ )
  • 17. Why data security and privacy should matter to your SharePoint Administrator… Unfortunately, security and governance are absent in many cases Jay Simcox: Proactive vs. reactive approach • https://www.nothingbutsharepoint.com/sites/eusp/Pages/sharepoint-data- security-and-privacy-information-why-should-it-matter-to-you.aspx
  • 18. Security Planning and SharePoint 2010 • Encryption • Data at rest/data in motion • Perimeter topologies • Segmentation and compartmentalization of PHI/PII (logical and physical) • Wireless (RFID/Bluetooth) • Business Continuity • Backup and Recovery
  • 19. Security Planning and SharePoint 2010 • Plan permission levels and groups (least privileges) – providers and business associates • Plan site permissions • Fine-grained permissions (item-level) • Security groups (custom) • Contribute permissions
  • 20. Additional Security Planning Considerations (SharePoint 2010) • Content types (PHI/PII) • ECM/OCR • Business Connectivity Services and Visio Services (external data sources) – Excel, lists, SQL, custom data providers – Integrated Windows with constrained Kerberos • Metadata and tagging (PHI/PII) • Blogs and wikis (PHI)
  • 21. SharePoint 2010: Identity and Access Management in Healthcare • SharePoint as enabler for healthcare: – Access tracking and audits – Access controls • Recommend: third party tools (ControlPoint, AvePoint, etc.) • Recommend: IAM Solutions – Mobility – Workstations/Proximity
  • 22. Best Practices - Prevention • Involve HIPAA specialists early in the planning process. (This is NOT an IT problem) • Consider removing PHI from the equation. (Compartmentalization and segregation) • Evaluate the outsourcing option. (Example: FPWeb) • Look to experts to help with existing implementations. (Domain expertise in healthcare and clinical workflow as well as HIPAA/HITECH privacy and security) • Use connected health framework reference model and other HC specific applications (Dynamics CRM for Patient Relationship Management/Case Management, HealthVault, Amalga, IAM)
  • 23. Adapting the Joint Commission Continuous Process Improvement Model… Plan • Technical, Physical, Administrative Safeguards Document • Joint Commission, Policies, Procedures, IT Governance Train • Clinical, Administrative and Business Associates Track • Training, Compliance, Incidents, Access…. everything Review • Flexibility, Agility, Architect for Change
  • 24. Case Studies • SharePoint 2007 Upgrade – Behavioral Health • SharePoint 2010 and Clinical Trial Data – Research (Biotech and Pharma) • Patient Relationship Management (Consumer Engagement) – SharePoint 2010 and CRM
  • 26. http://lifeincapslock.com http://www.sswug.org/usercenter/profile.aspx?id=563806 www.broadpoint.net http://www.meetup.com/fedspug-wspdc