SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Confidentiality& Privacy
HIPAA
• The Health Insurance Portability and Accountability Act
  (HIPAA) was enacted by the U.S. Congress in 1996
• From this legislation a set of security standards was
  developed to keep electronic protected health information
  (ePHI) safe
• These standards were outlined and described in the HIPAA
  Security Final Rule published on February 20, 2003
Recommended Security Strategies
 for Video-Enabled Telemedicine

    Administrative Recommendations
    Physical Recommendations
    Technical Recommendations
Administrative Recommendations
1. Perform a risk assessment
2. Consider purchasing and distributing asset management
   software to keep track of equipment licenses
3. Register for security release notices from the hardware
   and software manufacturers used for televideo
4. Disable unnecessary ports on televideo hardware and
   follow any device “hardening” procedures recommended
   by the hardware and software manufacturers to prevent
   hacking
Administrative Recommendations cont.
5. Ensure unique user identification by enacting a strong
   password policy for televideo devices, including PC-based
   video systems
6. Assign a security person and train remote site IT staff to
   take on security responsibilities
7. Establish a schedule for re-evaluations: Elapsed time and
   changes to the televideo environment will dictate this
   schedule
8. Create a televideo acceptable use policy (AUP) and make
   available to remote sites for use
Physical Recommendations
1. Place televideo equipment in a private location that can
   be secured for a clinical visit. Doors to the room should
   be closed during a consultation.
2. Video monitors should not be visible through any
   windows. Audio should be set so that it is not heard
   outside of the exam room.
3. Telemedicine providers should use the camera functions
   to scan the patient room prior to a consultation to ensure
   that only authorized persons are present during the visit.
Technical Recommendations
1. Video equipment used for telemedicine should be
   networked behind the data firewall when placed on a
   facility network
2. An H.323-protocol firewall can be used as a “video”
   firewall for televideo that manages and protects the
   consultation separate from the organization’s data
   firewall
3. The IP connection between facilities in a televideo
   network should ideally be a dedicated local area network
   (LAN) connection, wide area network (WAN)
   connection, or a virtual private network (VPN) connection
Technical Recommendations cont.
4. When available, utilize private, statewide networks that
   have been developed for health care purposes and that
   offer robust, secure network connections
5. Video equipment should offer encryption capability and
   the encryption should be turned to the “on” position.
   Encryption should always be used, but especially in the
   absence of a LAN, WAN, VPN or state networks
6. The auto answer function of the televideo equipment
   should be set at the “off” position so that video calls
   cannot unintentionally be received during a telemedicine
   consultation
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Video IQ in a Nutshell
Video IQ in a NutshellVideo IQ in a Nutshell
Video IQ in a Nutshell
Pieter Cloete
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
Kislaychd
 
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
garciathomasbic
 
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
Sntc April 2:  Decrease Network Risk with Alert Management Draft v2Sntc April 2:  Decrease Network Risk with Alert Management Draft v2
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
B2BContact
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
gruzabb
 
Gen4 Raptor Flyer
Gen4 Raptor FlyerGen4 Raptor Flyer
Gen4 Raptor Flyer
Tyler Rack
 

Was ist angesagt? (20)

Video IQ in a Nutshell
Video IQ in a NutshellVideo IQ in a Nutshell
Video IQ in a Nutshell
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstations
 
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
 
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
Sntc April 2:  Decrease Network Risk with Alert Management Draft v2Sntc April 2:  Decrease Network Risk with Alert Management Draft v2
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businesses
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
The Bug Sweepers TSCM Guide
The Bug Sweepers TSCM GuideThe Bug Sweepers TSCM Guide
The Bug Sweepers TSCM Guide
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Security domains
Security domainsSecurity domains
Security domains
 
Gen4 Raptor Flyer
Gen4 Raptor FlyerGen4 Raptor Flyer
Gen4 Raptor Flyer
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Firewall
FirewallFirewall
Firewall
 

Ähnlich wie Confidentiality& Privacy

1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
info382133
 
STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology Guideline
Videoguy
 
Vigor2930 user guide v1.2
Vigor2930 user guide v1.2Vigor2930 user guide v1.2
Vigor2930 user guide v1.2
navancnx200
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of Defense
Videoguy
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of Defense
Videoguy
 

Ähnlich wie Confidentiality& Privacy (20)

ObjectiveSelect the appropriate video multiplexer for a video su.docx
ObjectiveSelect the appropriate video multiplexer for a video su.docxObjectiveSelect the appropriate video multiplexer for a video su.docx
ObjectiveSelect the appropriate video multiplexer for a video su.docx
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
Video Surveillance Security Tips for Your Business
Video Surveillance Security Tips for Your BusinessVideo Surveillance Security Tips for Your Business
Video Surveillance Security Tips for Your Business
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
HIPAA and COVID19
HIPAA and COVID19HIPAA and COVID19
HIPAA and COVID19
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
ObjectiveDesign of a video motion detector for video surveillanc.docx
ObjectiveDesign of a video motion detector for video surveillanc.docxObjectiveDesign of a video motion detector for video surveillanc.docx
ObjectiveDesign of a video motion detector for video surveillanc.docx
 
STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology Guideline
 
Vigor2930 user guide v1.2
Vigor2930 user guide v1.2Vigor2930 user guide v1.2
Vigor2930 user guide v1.2
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of Defense
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of Defense
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Professional Security Camera Installation - www.indoteq.net
Professional Security Camera Installation - www.indoteq.netProfessional Security Camera Installation - www.indoteq.net
Professional Security Camera Installation - www.indoteq.net
 
Stryker Connectsuite solution-brochure
Stryker Connectsuite solution-brochureStryker Connectsuite solution-brochure
Stryker Connectsuite solution-brochure
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote Developers
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 

Mehr von kutelemedicine

Mehr von kutelemedicine (8)

Strategies
StrategiesStrategies
Strategies
 
Needs assessment
Needs assessmentNeeds assessment
Needs assessment
 
Equipment Usage
Equipment UsageEquipment Usage
Equipment Usage
 
Video Room Setup
Video Room SetupVideo Room Setup
Video Room Setup
 
Cultural Competence
Cultural CompetenceCultural Competence
Cultural Competence
 
Clinical Practice Principle
Clinical Practice PrincipleClinical Practice Principle
Clinical Practice Principle
 
Working With Children
Working With ChildrenWorking With Children
Working With Children
 
Scheduling
SchedulingScheduling
Scheduling
 

Kürzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Kürzlich hochgeladen (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Confidentiality& Privacy

  • 2. HIPAA • The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996 • From this legislation a set of security standards was developed to keep electronic protected health information (ePHI) safe • These standards were outlined and described in the HIPAA Security Final Rule published on February 20, 2003
  • 3. Recommended Security Strategies for Video-Enabled Telemedicine  Administrative Recommendations  Physical Recommendations  Technical Recommendations
  • 4. Administrative Recommendations 1. Perform a risk assessment 2. Consider purchasing and distributing asset management software to keep track of equipment licenses 3. Register for security release notices from the hardware and software manufacturers used for televideo 4. Disable unnecessary ports on televideo hardware and follow any device “hardening” procedures recommended by the hardware and software manufacturers to prevent hacking
  • 5. Administrative Recommendations cont. 5. Ensure unique user identification by enacting a strong password policy for televideo devices, including PC-based video systems 6. Assign a security person and train remote site IT staff to take on security responsibilities 7. Establish a schedule for re-evaluations: Elapsed time and changes to the televideo environment will dictate this schedule 8. Create a televideo acceptable use policy (AUP) and make available to remote sites for use
  • 6. Physical Recommendations 1. Place televideo equipment in a private location that can be secured for a clinical visit. Doors to the room should be closed during a consultation. 2. Video monitors should not be visible through any windows. Audio should be set so that it is not heard outside of the exam room. 3. Telemedicine providers should use the camera functions to scan the patient room prior to a consultation to ensure that only authorized persons are present during the visit.
  • 7. Technical Recommendations 1. Video equipment used for telemedicine should be networked behind the data firewall when placed on a facility network 2. An H.323-protocol firewall can be used as a “video” firewall for televideo that manages and protects the consultation separate from the organization’s data firewall 3. The IP connection between facilities in a televideo network should ideally be a dedicated local area network (LAN) connection, wide area network (WAN) connection, or a virtual private network (VPN) connection
  • 8. Technical Recommendations cont. 4. When available, utilize private, statewide networks that have been developed for health care purposes and that offer robust, secure network connections 5. Video equipment should offer encryption capability and the encryption should be turned to the “on” position. Encryption should always be used, but especially in the absence of a LAN, WAN, VPN or state networks 6. The auto answer function of the televideo equipment should be set at the “off” position so that video calls cannot unintentionally be received during a telemedicine consultation