make sure your data doesn't get washed away…. a discussion of remote access

46
Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access Kerry Moskol Quarles & Brady LLP

Upload: pello

Post on 19-Jan-2016

24 views

Category:

Documents


0 download

DESCRIPTION

Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access. Kerry Moskol Quarles & Brady LLP. What you should take away:. CMS is starting to focus on compliance with the Security Rule - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Make Sure Your Data Doesn't Get Washed Away….

A Discussion of Remote Access

Kerry MoskolQuarles & Brady LLP

Page 2: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

What you should take away:

CMS is starting to focus on compliance with the Security Rule

If your Security Rule policies and procedures do not address remote access and portable devices, it is time to update your policies!

Page 3: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Why the sudden focus on security and remote access?

• Reluctant compliance with the Security Rule

• Increased (and encouraged) use of EMRs

• Concerns over security breaches - many of which involve remote devices

Page 4: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

So…..What do we need to look out for?

• Security Rule Audits/Onsite Compliance Reviews

• Security Breach Notification Laws

• National Identity Theft Laws (Red Flag Regulations)

• CMS Guidance Regarding Remote Access

Page 5: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

OIG's first "audit" of a provider's

compliance with the Security Rule:

• March 5, 2007: Piedmont Hospital in Atlanta, Georgia

• Reviewed the hospital's administrative, physical and technical safeguards

Page 6: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Interesting aspects of the audit:

• Patient complaint did not trigger the audit

• Audit was performed by OIG not CMS – Some suspect purpose was to check whether CMS is

doing its job regarding Security Rule oversight and enforcement

• Presented list of 42 items - 24 were security related

Page 7: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

CMS - Onsite Investigations and Compliance Reviews

• CMS Office of E-Health Standards and Services is conducting onsite investigations and compliance reviews related to potential Security Rule violations

• Contracted with PwC to assist with the reviews

Page 8: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

CMS - Onsite Investigations and Compliance Review (cont'd)

• Who is targeted?– Onsite investigations - may arise from filed

complaint – Onsite compliance reviews – may arise from

self-report, media reports, etc.

• What are they looking for?– Assessment of security measures– Special attention to remote access

Page 9: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

CMS - Onsite Investigations and Compliance Review (cont'd)

• Guidance from CMS - Interview and Document Request for HIPAA Security Onsite Investigations and Compliance reviews– Identifies documents that may be requested and

personnel to be interviewed– Not a complete list – but use as guidance– http://www.cms.hhs.gov/Enforcement/Downloads/

InformationRequestforComplianceReviews.pdf

Page 10: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

And so it goes….The first HIPAA Resolution Agreement

• Seattle-based provider lost unencrypted laptop computers, disks and tapes

• $100,000 settlement with government

• Three years of monitoring by HHS

• Corrective Action Plan - focused on physical and technical safeguards for off-site transportation and storage of EPHI and remote media 

Page 11: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

The New Frontier: Security Breach Notification Laws

• Security Breach Notification laws require entities to notify individuals if there is an unauthorized acquisition or disclosure of their “personal information”

• “Personal Information”– Social security, address, date of birth, financial

account numbers, medical information, other identifiers

– Exception for encrypted information

Page 12: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Security Breach Notification Laws (cont’d)

• Applies to all types of entities

• Not limited to the health care context

• Does not have to relate to medical information – focus is the identifiers

Page 13: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Security Breach Notification Laws (cont'd)

• Some states, like Wisconsin, exclude “covered entities” from notification requirements

• So why do we care????

Page 14: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Security Breach Notification Laws (cont’d)

• Can still apply to hospital employee information

• Hospital policies may require notification as part of HIPAA mitigation requirements

• Out of state patients – not all state laws exclude covered entities (state of residency matters here)

• Proposed federal legislation may revise Security Rule requirements to require patient notification of security breach (might take a while)

Page 15: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

And on a related note…Identity Theft Red Flag Regulations• Regulations likely apply to hospitals – not much

guidance out there yet– Effective November 1, 2008

• Entities must create policies and procedures to:– Identify activities (red flags) that signal possible ID

theft and incorporate red flags into ID theft program– Detect red flags– Respond appropriately to prevent/mitigate ID theft– Ensure the program is updated

Page 16: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Which leads us to….

The importance of security for remote access and portable devices!

Page 17: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

CMS Guidance For Remote Access and Portable Devices:

• CMS issued guidance on security requirements for remote access in December, 2006

• Proposed rule regarding remote access standards was anticipated to come out in July, 2007--however, it is currently on hold (maybe permanently)

Page 18: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Purpose of guidance:

• Reduce security incidents related to remote access and use of portable devices/media

• Reinforce the ways covered entities protect EPHI when accessed or used offsite or remotely

Page 19: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Guidance applies to:

• Laptops and home-based personal computers• PDAs and Smart Phones• Hotel, library or other public workstations and

Wireless Access Points (WAPs)• USB Flash Drives and Memory Cards• Floppy disks, CDs, and DVDs• Backup media• Email• Remote Access Devices (including security

hardware)

Page 20: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Remote access to EPHI is appropriate only

after the entity's risk analysis concludes:

• There is a business need for remote access; and

• The entity's workforce training, policies, and procedures are effective and compliant with the Security Rule

(Remember to document this determination!)

Page 21: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Examples of appropriate use of remote access:

• Home health nurse accesses patient data via a laptop during home visit

• Physician refills patient's Rx via e-prescribing application on PDA

• Health plan employee transports enrollee data on a media storage device to an offsite facility

Page 22: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Emphasis should be placed on:

• Risk analysis and risk management strategies - make sure your risk analysis includes remote media!

• Policies and procedures for safeguarding remote access to EPHI

• Security awareness and training

Page 23: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Factors to consider when deciding which security measures to implement:

• Entity's size, complexity, and capabilities

• Entity's technical infrastructure, hardware, and software security

• Cost of security measures

• Potential risks to EPHI

Page 24: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Risks associated with remote access fall into

three areas:

• Access

• Storage

• Transmission

Page 25: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Access:

• Remote access is granted only to authorized users based on their role within the organization and need for access to EPHI

• Safeguards required for office workstations must also apply to offsite workstations

Page 26: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Storage:

• Security policies and procedures must address media and devices that store EPHI and may be removed from the facility

• Examples: laptops, hard drives, backup media, USB flash drives, and other storage media

Page 27: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Transmission:

• Entity must ensure the integrity and security of EPHI sent over networks

• Entity must address remote access to applications hosted by the entity, such as e-prescribing systems, web mail, etc

Page 28: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

CMS guidance identifies a series of risks

and possible risk management strategies:

• Guidance sets forth the minimum compliance expectations

• Entities urged to comply with the identified strategies

Page 29: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Access – Risks and Possible Management Strategies:

• Risk: Stolen password results in potential unauthorized disclosure

• Strategy: – Implement two-factor authentication process to grant

remote access to systems containing EPHI • First step is username/password• Second step requires person to answer a security question

– Implement technical process for authentication and creating unique user name (e.g., use Remote Authentication Dial-In User Service or similar tool)

Page 30: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Access - Risks and Possible Management Strategies:

• Risk: Employee accesses EPHI remotely when not authorized to do so while working offsite

• Strategy: – Establish role-based access for remote users

(different remote users may require different levels of access)

– Develop clearance procedures and verify training before granting remote access

– Ensure sanction policies address unauthorized remote access

Page 31: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Access - Risks and Possible Management Strategies:

• Risk: Offsite workstation left unattended

• Strategy: Establish procedures for session termination (time-out) on inactive portable or remote devices

Page 32: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Storage - Risks and Possible Management Strategies:

• Risk: Laptop or other portable device is stolen

• Strategy:– Identify hardware/media that must be tracked and develop

inventory control systems– Maintain records of media/device movement– Require lock-down mechanism for unattended laptops– Back up all EPHI entered into the remote system– Password protect files and devices that store EPHI– Use encryption technology – Ensure technology updates are deployed to portable devices– Use biometrics to access portable device– Use tracking devices in portable devices

Page 33: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Storage - Risks and Possible Management Strategies:

• Risk: Data left on public computer at a hotel business center

• Strategy:– Prohibit downloading of EPHI on remote systems or

devices without justification– Minimize use of browser-cached data in web based

applications– Train workforce on policies that require users to

delete files saved to an external device

Page 34: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Storage - Risks and Possible Management Strategies:

• Risk: Theft of EPHI left on devices after inappropriate disposal

• Strategy:– Establish EPHI deletion policies and media

disposal procedures for remote media– At a minimum, this should include: complete

deletion (via specialized tools) of all disks and backup media prior to disposal

Page 35: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Transmission - Risks and Possible Management Strategies:

• Risk: Data intercepted and modified during transmission

• Strategy: – Prohibit transmission of EPHI via open networks (i.e.,

internet)– Prohibit use of offsite devices or wireless access points for

non-secure access to email– Use secure connections for email via SSL and message-

level standards such as S/MIME, SET, PEM, PGP, etc.– Use encryption for transmission of EPHI - SSL should be

the minimum requirement

Page 36: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Transmission - Risks and Possible Management Strategies:

• Risk: Emailing of faxing EPHI to the wrong recipient

• Strategy: – Confirm the fax number before sending– Confirm that the right document is attached and make

sure you have the right email address!– Verify receipt when possible– Comply with your organization's policies/procedures– Encrypt or password protect documents!

Page 37: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Transmission - Risks and Possible Management Strategies:

• Risk: System contamination by virus introduced by external device used to transmit EPHI

• Strategy: Install anti-virus software on portable devices that can be used to transmit EPHI

Page 38: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

How to make your policies on remote access effective?

• Training

• Defined security incident procedures

• Appropriate sanction policies

Page 39: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Training:

• Covered entities' workforce awareness and training program must specifically address risks and security provisions associated with remote access to EPHI

• Must be able to demonstrate remote access is part of training curriculum

Page 40: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Training on remote access policies and procedures should address:

• Instructions for accessing, storing, and transmitting EPHI remotely and/or using portable devices

• Password management procedures for remote/portable devices

• Prohibitions on leaving devices/media in unattended cars or public areas (big problem!)

• Prohibitions on transmitting EPHI over open networks or downloading EPHI to public/remote computers

• Appropriate remote workstation use

Page 41: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Security Incident Procedures:

• Security incident procedures must specify the actions workforce members must take to manage harmful effects of loss or theft of EPHI via portable media

Page 42: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Security incident procedures should include:

• Provision for the preservation evidence

• Managing harmful effects of improper disclosure

• Notice to affected parties

• Provision for ongoing risk management activities related to remote access

Page 43: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Sanction Policies:

• Sanction policies must address the consequences of failing to comply with the entity's policies and procedures related to remote access

• CMS recommends that covered entities require workforce members to sign a statement of adherence to such policies and procedures

Page 44: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Why is compliance important?

• Government is cracking down on security rule compliance

• Increased security incidents with remote access and portable devices

• Good practice

Page 45: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

What to do:

• Review your Security Rule policies and procedures to make sure they address remote access and portable devices

• Make sure your workforce is trained on remote access procedures

• If your policies, procedures, and training materials do not address remote access, it is time to UPDATE!

Page 46: Make Sure Your Data Doesn't Get Washed Away…. A Discussion of Remote Access

Useful Resources: • CMS Remote Security Guidance:

http://www.cms.hhs.gov/SecurityStandard/Downloads/SecurityGuidanceforRemoteUseFinal122806.pdf

• NIST Guidance (for a variety of remote access topics) http://csrc.nist.gov/publications/

• CMS Security Rule Educational Materials http://www.cms.hhs.gov/EducationMaterials/04_SecurityMaterials.asp