annual hmis security training the institute for community alliances

17
ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

Upload: eliana-ida

Post on 15-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

ANNUAL HMIS SECURITY TRAINING

The Institute for Community Alliances

Page 2: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

TRAINING OVERVIEW

1. Training Purpose

2. User Responsibilities

3. Security and Privacy Essentials

4. WISP System Security Features

5. WISP Policies

6. Data Visibility Explained

Page 3: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

TRAINING PURPOSE 1. All users are required to attend annual security training to retain their WISP license (Page 7 of HMIS Policies and Procedures Manual updated 5/15/2014.)

2. Training is based on privacy and security standards set forth in the HUD Data Standards and by the Wisconsin HMIS Advisory Board.

3. Forthcoming changes from HUD will be incorporated in the near future.

Resources:

WI Policies:

http://www.icalliances.org/index.php/data-and-reports/pit/doc_download/559-hmis-policy-and-procedure-may-2014

HUD HMIS Data Standards/Data Dictionary:

https://www.onecpd.info/resources/documents/HMIS-Data-Dictionary.pdf

Page 4: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

USER RESPONSIBILITIESTake appropriate measures to prevent unauthorized data disclosure.

Report any security violations.

Comply with relevant policies and procedures.

Input required data fields in a current and timely manner.

Ensure a minimum standard of data quality by accurately answering all the HUD Universal Data Elements for every person entered into HMIS.

Inform clients about the agency’s use of HMIS.

Take responsibility for any actions undertaken with one’s username and password.

Complete required training.

Read the WISP News email newsletter.

Page 5: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

SECURITY AND PRIVACY ESSENTIALS

NEVER share your username and password with anyone.

NEVER share your password with HMIS System Administrators.

NEVER rely on Post-It Note security.

Do not set your internet browser to save your WISP password.

Do not access WISP client data on a public computer (i.e. library.)

Do not access WISP client data in a public setting (i.e. coffee shops.)

Do not access WISP client data over unsecured public wi fi (i.e. free city wi fi.)

Do not access WISP on computers that do not have locking screens.

Page 6: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP SYSTEM SECURITY FEATURES

User passwords are a minimum of 8 characters long, with a minimum of 2 numbers.

Strong passwords are important: https://howsecureismypassword.net

Passwords expire every 45 days.

Passwords can be alternated, meaning only two distinct passwords are necessary.

WISP System Admins do NOT know your passwords.

WISP is equipped with an audit trail tool that tracks all successful and unsuccessful log-in attempts, including user, IP Address, date and time, and client data access (adds, deletes, views.)

WISP is encrypted and secure:

Page 7: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP POLICIESWISP Privacy and Security standards are set forth in Section 3 (pages 16-21) of Wisconsin Statewide HMIS Policies and Procedures Manual.

Key Items (Not an Inclusive List:)

Client level data/personally identifiable information (PII) should be extracted from HMIS only in very limited and specific cases (3.1).

Hard copies of client data should be extremely rare and destroyed immediately after it has been used. Hard copies must never be left unattended or unsecured (3.1).

Electronic copies must be stored securely and accessible only via password protected means (3.1).

ICA does not generate ART reports with client names or SSNs and will not do so in the future (3.1, 3.2).

Page 8: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP POLICIES, CONTINUEDOnly de-identified aggregate data will be released by ICA, with limited exceptions (3.2).

Grantors and funders are not granted automatic access to WISP. Access by funders is only allowed when agreed upon in writing by both parties and must be a voluntary agreement. That is, funding must not be contingent upon access to client level WISP data (3.3).

All persons subject to data collection in WISP must be able to access the Baseline Privacy Policy upon request (3.4).

All persons subject to data collection in WISP have the right to inspect their data in the system for accuracy and request changes where evidence is provided that data are inaccurate or incomplete (3.4).

WISP users found in violation of any security protocols will be sanctioned after a review of the violation (3.7).

Page 9: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY EXPLAINED Access to client level data and information is determined by the structure of two primary system elements:

User Access LevelProvider Setup

Page 10: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY EXPLAINED - USERS

Your user access level will have an impact on what elements of the system you can see.

Page 11: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY EXPLAINED - PROVIDER

Page 12: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY EXPLAINED – PROVIDER

Page 13: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY RULES1. The user can always see the data the parent provider has entered (i.e. a

Level 3 provider can see data entered at the Level 2 provider.)

2. The user can always see their own provider’s data (including data entered while using Enter Data As function.)

3. An agency administrator can always see the provider data entered.

4. System Admin IIs (ICA staff) can see every provider’s data, even closed data.

5. Data visibility changes are not retroactive.

6. If the item has a lock icon attached, it has its own distinct security settings that can be set and adjusted.

7. Each data element has its own security setting, determined by its assessment security:

Page 14: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY – THE LOCKS

1. Open

Information is available/visible to all providers. Known also as “Global” sharing.

2. Open with Exceptions

Information is available/visible to all, EXCEPT those listed in the Deny Groups section of Provider Admin.

3. Closed with Exceptions

Information is not available/visible to anyone, EXCEPT those listed in the Visibility Groups section of Provider Admin.

4. Closed

Information is not available to anyone outside that specific provider.

Page 15: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY – CHANGING THE LOCKSClient data visibility can be changed on a client by client basis.

Changes can be made from the default to another desired setting.

Changes made at a client level do NOT alter or change the Provider visibility setting defaults.

Page 16: ANNUAL HMIS SECURITY TRAINING The Institute for Community Alliances

WISP DATA VISIBILITY – GREEN OR RED? Common* Green Lock/Open Items

Profile

Household

Demographics

Universal Data Elements

Shelter Stays

Services

Referrals

Program Entry/Exit**

Common* Red Lock/Closed Items

Case Notes

File attachments

Case Plans/Goals

Program/Agency Specific Data Elements

*Denotes the typical settings, will vary by agency and program type