Скачать презентацию HIPAA SECURITY How not to get lost in Скачать презентацию HIPAA SECURITY How not to get lost in

fe26ac1d1f8247ccbf53337973bfc46b.ppt

  • Количество слайдов: 30

HIPAA SECURITY How not to get lost in the Big Ocean of Portable Electronic HIPAA SECURITY How not to get lost in the Big Ocean of Portable Electronic Health Records: Riding the Wave of Digital Health Information Spring Conference April 4, 2008 Gary Beatty President EC Integrity, Inc Vice-Chair ASC X 12

Influencing the move to e. Healthcare Need to reduce the cost of health care Influencing the move to e. Healthcare Need to reduce the cost of health care Increase quality of health care Consumer driven health care Online health records Payer support for community health records Transparency in health care Pay for performance programs Governmental

Terminology HR EMR EHR CCR PHR Acronyms Hybrids PHI Terminology HR EMR EHR CCR PHR Acronyms Hybrids PHI

Terminology Health Records (AHIMA) The legal business record for a healthcare organization. Individually identifiable Terminology Health Records (AHIMA) The legal business record for a healthcare organization. Individually identifiable information Any medium Collected, processed, stored, displayed

Terminology Health Records contain Diagnosis Medications Procedures Problems Clinical Notes Diagnostic Results Images Graphs Terminology Health Records contain Diagnosis Medications Procedures Problems Clinical Notes Diagnostic Results Images Graphs Other items deemed necessary

Terminology Health Records Support continuity of care Planning patient care Provides planning information Resource Terminology Health Records Support continuity of care Planning patient care Provides planning information Resource allocation Trend analysis Forecasting Workload management Justification for billing information

Terminology Electronic Medical Record (EMR) (HIMSS) An application environment composed of: Clinical Data Repository Terminology Electronic Medical Record (EMR) (HIMSS) An application environment composed of: Clinical Data Repository (CDR) Clinical Decision Support (CDS) Controlled medical terminology Order entry Computerized provider order entry Pharmacy Clinical document applications Enterprise support Inpatient and Outpatient Use to document, monitor and manage delivery of health care Electronic Medical Record (EMR) (HIMSS) The EMR is the legal record Owned by the Care Delivery Organization (CDO)

Terminology Electronic Health Record (EHR) (HIMSS) Longitutal electronic medical record across encounters in any Terminology Electronic Health Record (EHR) (HIMSS) Longitutal electronic medical record across encounters in any care delivery setting. Resource for clinicians Secure Real-time Point-of-care Patient centric information source Aids collection of data for other uses Billing Quality management Outcomes reporting Resource planning Public health disease surveillance Reporting

Terminology Electronic Health Record (EHR) (HIMSS) Includes: Patient demographics Progress notes Problems Medications Vital Terminology Electronic Health Record (EHR) (HIMSS) Includes: Patient demographics Progress notes Problems Medications Vital signs Past medical history Immunizations Laboratory data Radiology reports

Terminology Electronic Health Record (EHR) (HIMSS) Automates / streamlines clinicians workflow Complete record of Terminology Electronic Health Record (EHR) (HIMSS) Automates / streamlines clinicians workflow Complete record of clinical encounter Supports other care-related activities Evidence-based decision support Quality management Outcome reporting

Terminology Personal Health Record (PHR) Created by the individual Summarizes health and medical history Terminology Personal Health Record (PHR) Created by the individual Summarizes health and medical history Gathered from many sources Format of PHR Paper Personal computer Internet based Portable storage

Terminology Continuity of Care Record (CCR) Patient Health Summary Standard ASTM / MMS / Terminology Continuity of Care Record (CCR) Patient Health Summary Standard ASTM / MMS / HIMSS / AAFP / AAP codevelopment Core health care components Sent from one provider to another Includes Patient demographics Insurance information Diagnosis and problem Medications Allergies Care plan

Terminology Hybrid Health Record Both Paper health records Electronic health records Terminology Hybrid Health Record Both Paper health records Electronic health records

Terminology Protected Health Information (PHI) Any health care information linked to a person Health Terminology Protected Health Information (PHI) Any health care information linked to a person Health Status Provision of Health Care Payment of Health Care Includes • Names • Geographic subdivision smaller than a state • Dates related to an individual • Phone Numbers • Fax Numbers • Email Addresses • SSN • Medical Record Numbers • Beneficiary Numbers • Account Numbers • Certificate/license numbers; • Vehicle identifiers and serial numbers • license plate numbers • Device identifiers and serial numbers • Web Universal Resource Locators (URLs) • Internet Protocol (IP) address numbers • Biometric identifiers • Finger • voice prints • Full face photographic images and any comparable images • Any other unique identifying number, characteristic, or code

Security Concerns Privacy Authentication Did it arrive exactly as sent? Non-repudiation of receipt How Security Concerns Privacy Authentication Did it arrive exactly as sent? Non-repudiation of receipt How do I know who sent it? Data Integrity Can anyone else read it? Can the receiver deny receipt? How do I know it got there? How do I track these activities?

Modes of Communication Internet / Intranet Wired Wireless Wifi (802. 11 a, b, g, Modes of Communication Internet / Intranet Wired Wireless Wifi (802. 11 a, b, g, i, n) Bluetooth (Personal Area Network - PAN) Voi. P Dial-up Mobile Devices Smart Phones Mobile Standards (GSM, GPRS, etc. ) PDA Tablet PC’s Physical Media Magnetic, optical, flash (thumb drives), others

Wireless Security RC 4 (ARC 4 /ARCFOUR) – Stream Cypher (easily broken) Secure Sockets Wireless Security RC 4 (ARC 4 /ARCFOUR) – Stream Cypher (easily broken) Secure Sockets Layer (SSL) WEP Wire Equivalent Privacy WPA Wi. Fi Protected Access WPA 2 (based upon 802. 11 i) Data Encryption Standards (DES) Advanced Encryption Standards (AES) Government strength encryption

Internet Security Firewall machines IP address selection ID + Passwords Security techniques Encryption Digital Internet Security Firewall machines IP address selection ID + Passwords Security techniques Encryption Digital Signatures Data Integrity Verification Non-repudiation Trading Partner Agreements (TPA)

(Private) Symmetric Key CYPHERTEXT PLAINTEXT DOCUMENT ENCRYPT DECRYPT PROVIDER PLAINTEXT DOCUMENT PAYER PRIVATE KEY (Private) Symmetric Key CYPHERTEXT PLAINTEXT DOCUMENT ENCRYPT DECRYPT PROVIDER PLAINTEXT DOCUMENT PAYER PRIVATE KEY

(Private) Symmetric Key n * (n-1) / 2 keys to manage 100 users would (Private) Symmetric Key n * (n-1) / 2 keys to manage 100 users would require 4950 keys Key size 128 bits Generally considered fast Gary Alice Julie Karen Frank Erin Dale Mary

(Public/Private ) Asymmetric Keys PKI CYPHERTEXT PLAINTEXT DOCUMENT ENCRYPT DECRYPT PROVIDER PLAINTEXT DOCUMENT PAYER’S (Public/Private ) Asymmetric Keys PKI CYPHERTEXT PLAINTEXT DOCUMENT ENCRYPT DECRYPT PROVIDER PLAINTEXT DOCUMENT PAYER’S PUBLIC KEY PAYER’S PRIVATE KEY

(Public/Private) Asymmetric Keys n key pairs needed for n partners key size (128, 768, (Public/Private) Asymmetric Keys n key pairs needed for n partners key size (128, 768, 1024, 2048 bits) Generally considered slower What happens if you lose your key? Gary Alice Julie Public Key Directory Gary Alice Frank Erin Frank Mary Dale Karen Julie Erin E F G H Karen Dale Mary

Authentication Digitized vs. Digital Signature A digitized signature is a scanned image A digital Authentication Digitized vs. Digital Signature A digitized signature is a scanned image A digital signature is a numeric value that is created by performing a cryptographic transformation of the hash of the data using the “signer’s” private key. Ö m 25_ +¦_+_ò`_^5 w+A___enruƒ • ƒ½PÑ 7 » q*++ ¤Gß_¿_°; ·Ae¦_7¦? ââ-á+H¶¥÷ 90 Y å+£ú'¦Æ<§_8óX`p¡ì É_V+1^ª+ ¦%Gary A. Beatty

Data Integrity Part of the digital signature process A secure one way hashing algorithm Data Integrity Part of the digital signature process A secure one way hashing algorithm used to create a hash of the data PROVIDER A EHR Provider B PUBLIC KEY Encoded Provider B Cypher PROVIDER A PRIVATE KEY Cypher Encoded PROVIDER A PUBLIC KEY EHR Provider B PRIVATE KEY

Applicability Statement Standards EDIINT Workgroup of IETF AS 1 – Applicability Statement 1 Email Applicability Statement Standards EDIINT Workgroup of IETF AS 1 – Applicability Statement 1 Email exchange of electronic transactions S/MIME – Secure Multi-Purpose Internet Mail Extensions Uses SMTP (Simple Mail Transfer Protocol) Satisfies Security Requirements Encryption Authentication Integrity Non-repudiation What’s needed Email capability Electronic Transaction Digital Certificate

Applicability Statement Standards EDIINT Workgroup of IETF AS 2 – Applicability Statement 2 HTTP Applicability Statement Standards EDIINT Workgroup of IETF AS 2 – Applicability Statement 2 HTTP exchange of electronic transactions S/MIME – Secure Multi-Purpose Internet Mail Extensions Uses HTTPS Hypertext Transfer Protocol over Secure Socket Layer Allows for REAL TIME delivery Satisfies Security Requirements Encryption Authentication Integrity Non-repudiation What’s needed Web Server (static IP address) Electronic Transaction Digital Certificate

Applicability Statement Standards EDIINT Workgroup of IETF AS 3 – Applicability Statement 3 FTP Applicability Statement Standards EDIINT Workgroup of IETF AS 3 – Applicability Statement 3 FTP exchange of electronic transactions S/MIME – Secure Multi-Purpose Internet Mail Extensions Uses FTP – File Transfer Protocol Allows for REAL TIME delivery Satisfies Security Requirements Encryption Authentication Integrity Non-repudiation What’s needed FTP Server Electronic Transaction Digital Certificate

Digital Certificates Electronic Credit Card Issues by Credential Authority Establishes “Credentials” for electronic transactions Digital Certificates Electronic Credit Card Issues by Credential Authority Establishes “Credentials” for electronic transactions Name Serial Number Expiration Dates Certificate Holder’s Public Key Digital Certificate of Certification Authority Verified by Registration Authority X. 509 Standards Registry of Digital Certificates Access with HIPAA Identifiers

Security – Weak Links We can secure transmission of data! Weakest link – usually Security – Weak Links We can secure transmission of data! Weakest link – usually when data is AT REST! Paper On the screen Waste baskets Physical Security Building access Data Center access Electronic Security Screen Savers Auto Logoff

Thank you Spring Conference April 4, 2008 Gary Beatty President EC Integrity, Inc Vice-Chair Thank you Spring Conference April 4, 2008 Gary Beatty President EC Integrity, Inc Vice-Chair ASC X 12