improving data security and maintaining patient confidentiality in a time of evolving information...

35
Improving data security Improving data security and maintaining patient and maintaining patient confidentiality in a confidentiality in a time of evolving time of evolving information technology information technology (IT) and limited (IT) and limited resources resources

Upload: magnus-ward

Post on 27-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Improving data security and Improving data security and maintaining patient maintaining patient

confidentiality in a time of confidentiality in a time of evolving information evolving information

technology (IT) and limited technology (IT) and limited resources resources

J. Jackson-Thompson, MSPH, PhDJ. Jackson-Thompson, MSPH, PhDOperations Director, Missouri Cancer Operations Director, Missouri Cancer Registry and Research Associate Registry and Research Associate Professor, Health Management & Professor, Health Management & Informatics, University of Missouri- Informatics, University of Missouri- ColumbiaColumbia

[email protected] 882-7775

http://mcr.umh.edu

AcknowledgmentsAcknowledgments

• Co-author: Nancy Cole, BS, CTR, MCR Operations Manager ([email protected])

• MCR Staff– Saba Yemane, BA, BS, Database Manager

– Iris Zachary, CTR, MS (Informatics), Asst DBM

– Alena Headd, MSIT Systems Analyst

• University of Missouri IT Security Team

This project was supported in part by This project was supported in part by a cooperative agreement between the a cooperative agreement between the Centers for Disease Control and Centers for Disease Control and Prevention (CDC) and the Missouri Prevention (CDC) and the Missouri Department of Health and Senior Department of Health and Senior Services (DHSS) (U58/DP000820-02/3) Services (DHSS) (U58/DP000820-02/3) and a Surveillance contract between and a Surveillance contract between DHSS and the University of Missouri.DHSS and the University of Missouri.

No personal financial relationships with commercial interests relevant to this presentation existed during the past 12 months.

BackgroundBackground

• All U.S. states and Canadian provinces maintain a central cancer registry (CCR) that collects information on all (≥ 95%) new cases of cancer.

• All CCRs collect demographic, tumor & treatment data on each case, using

– text and standard codes

– standard data layout.

Background: Uses of CCR Background: Uses of CCR DataData

• Public health surveillance

– Cancer incidence/trends by race, gender, age group, specific site, stage at diagnosis, etc.;

• Program evaluation;

• Research

– QOL, patterns of care studies, etc.

CCRs are required to:CCRs are required to:

• Meet national standards for completeness, timeliness & quality

– e.g., NAACCR, CDC/NPCR, NCI/SEER

• Protect patient and provider confidentiality – Specific state & federal statutes/laws/regs

• Maintain data security– Some guidelines

MCR DataMCR Data

• Process > 50-60,000+ records/year – c. 29,000 MO incident cases

– Data exchange w/ 20 states

• Database >1 million records (1972-2009)– Population-based since 1985

– NPCR reference year 1996

MCR SoftwareMCR Software

• Registry Plus suite of products– Started w/ Abstract Plus, then Web Plus

& Link Plus

– Switched to CRS Plus in 2007

• Use other software as needed – SEERStat* and SAS for data analysis

– MoveIT for importing VA data

MCR Approach to Data MCR Approach to Data SecuritySecurity

• Similar to reporting of cancer cases: – Report not because of a law but so we can

work together for better patient outcomes.

• Be vigilant about data security not based on statutory & contractual obligations but because it is the right thing to do:– Reporting facilities & cancer patients trust

us.

MCR Concerns MCR Concerns

• Minimal IT input on MCR software, hardware or data flow since 2005;

• No strong passwords on Registry Plus products:

– Web +, CRS +, Abstract +, Prep +

• Strong passwords not on all laptops:

– Passwords taped to some laptops.

Purpose of PresentationPurpose of Presentation

• To describe steps taken by MCR to assess and improve the security of data, systems and processes.

MethodsMethods

• Reviewed MCR’s security processes and procedures.

• Identified and assessed data security measures already in place. Measures: – Designed to cover all data, electronic or

paper

– Included Policies and Procedures that were updated as needed

Examples of Data Policies and Examples of Data Policies and ProceduresProcedures

• No PHI on thumb drives

• No PHI in e-mails or attachments

• Lock file cabinets & offices• Only MCR staff have keys to MCR offices

• Send charts/records to PO Box or by FedEx

• Carry mail & data in locked bags

Data Security MeasuresData Security Measures

• Ongoing training for staff

• All MCR staff reminded annually by signing:–Confidentiality agreement;

–Acknowledgment of state and federal laws about penalties; and

–MCR laptop security policy.

• “The Security Mouse was here”

Weather alert changed MCR’s Weather alert changed MCR’s paper-handling policiespaper-handling policies

• Tornado drill – staff from another unit directed to MCR office

• Led to changes:– Change in drill location

– More locking cabinets

– Lock doors if leave

– No papers visible

– Cross-cut shredder

Actions re. electronic data Actions re. electronic data securitysecurity

• Requested that the University of Missouri’s (MU) IT security team audit our systems & business practices.

Data Security StructureData Security Structure

• MU– IT: dept, campus

and hospital

–Servers housed off-site in 24/7 IT facility

–Most reporting facilities use Web Plus (VA hospitals use MoveIT)

• DHSS/State Office of Administration– SFTP site folder

restrictions at DHSS

– BCCCP data

– Some path lab data (PHIN/MS)

MU Information Security MU Information Security ProgramProgram

• System initiative - all 4 campuses

• MCR & IT Security Team met to review issues:–Data classification systems

–General security procedures

• strong passwords, encryption, etc.

–Workplace security manual

–Audits

Steps for each phase of Steps for each phase of security inspection programsecurity inspection program

• Identification

• Coordination

• Inspection

• Evaluation

• Recommendation

• Repetition

What IT Audit IncludesWhat IT Audit Includes

• Hard drive security

• Data flow

• Applications

• Desktop risks

• Firewall issues with individual computers

• Hardening operating system

• Laptop & jump drive encryption

• Virtual servers

Audit priorities establishedAudit priorities established

• Start with Web Plus: – Considered MCR’s most vulnerable

area by Audit team

– Concern about text fields – places where hackers could include hazardous characters.

First phase: Applications – First phase: Applications – Web Plus AuditWeb Plus Audit

• Facility abstractor/uploader and central administrator/central abstractor/reviewer. – 52 hours of testing using an automated

vulnerability scanner and manual inspection of web pages.

• Results: 4 high-risk vulnerabilities, several moderate risks.

• Auditor comments:– “Went better than expected.”– “Web Plus is a good application.”

Web Plus Audit - Web Plus Audit - continuedcontinued

• Results sent to CDC–High-risk vulnerabilities & some moderate

risks fixed immediately

– Requested 2nd scan to test fixes

• Second scan results

– No high-risk vulnerabilities detected

– Fixes on moderate risks also worked

• Remaining moderate risks fixed.

Second Phase: Second Phase: Hardening operating systemsHardening operating systems

• Server audit issues related to:

– Configuration• Proper port use, etc.

– Management• Managing administrative infrastructure

• Controlled access to file system & resources

• Process is ongoing (virtual servers)

Next StepsNext Steps

• Increase security on mobile devices (Laptops, external hard drives, etc.):

– Identify & purchase encryption software

• Consider alternatives:– Remote access reduces need for

abstracting software (and PHI) on laptops.

Future StepsFuture Steps

• Research use of encryption software for desktop computers:

– TruCrypt (an open-source software)

– Other options

• Determine security level of networked drive.

Other Security ConcernsOther Security Concerns

• Physical space:

– MCR has P & Ps for off-site and commuting staff

– MCR developed P & Ps for paper containing PHI, locking office, etc.

– Audit of MCR’s space by MU Security requested 10/09

• Attempt to kick in door

RecommendationsRecommendations

• Start with your institution’s P&Ps:– CCR’s may need to be more restrictive.

• Use CDC/NPCR or other guidance.

• Annually, require that CCR staff sign:– Confidentiality agreement;

– Acknowledgments of state and federal laws about penalties; and

– CCR security policy.

Recommendations Recommendations continuedcontinued

• Look for opportunities to further employee awareness:– Items in the news, etc.

– Computer stolen from unsecured work station.

• Learn from other organizations’ practices and mistakes.

ConclusionsConclusions

• Frequent review of security processes and business practices is needed to maintain data security.

• Many improvements involve minimal cost; others require funding.

Causes of Data BreachesCauses of Data Breaches

• Private files available in public spaces.

• Unused files with personal information.

• Lost or stolen laptops.

• Old or unused equipment without updated security protection.

• Sending files/allowing file access to wrong (reporting) facility.

You think you are secure!You think you are secure!

• “…no matter how secure you are you fundamentally still are at risk.” –Howard, Schmidt, a former Bush cyber-security

adviser, now president of the Information Security Forum. February 23, 2009 – fcw.com

• “The only way to 100 percent protect yourself from attacks is to turn off your computers.” –Dan Chenok, chairman of the Information

Security and Privacy Advisory Board, an advisory panel to NIST. February 23, 2009 – fcw.com

ResourcesResources

• CDC/NPCR Data Security:http://www.cdc.gov/cancer/npcr/tools/security/

• For complete details about MU’s Information Security program:http://doit.missouri.edu/security/

• Federal Computer Week - Complimentary paper subscriptions, also available on-line. Variety of topics, including security:http://www.fcw.com

MU IT security teamMU IT security teamhttp://doit.missouri.edu/security/

• Manager - Brandon Hough

• Auditors -

–Tyler Hargis

–Michael Morrison

–Caine Henderson

–Sara Rohrs

• Audit coordinator - Becky Fowler

• Safety awareness - Kristy White

• Account management:

–Megan Hartz

–Joanne Boomer