1 / 11

Seclarity, Inc. 11705 Lightfall Court Columbia, MD 21044

HIPAA Strategies. Gary Christoph, Ph.D. Sr. VP Government and Healthcare gchristoph@seclarity.com 410-884-1313 April 8, 2005. A Blumberg Capital, Valley Ventures and Intel Capital Funded Security Company. Seclarity, Inc. 11705 Lightfall Court Columbia, MD 21044. The Issue.

rosajoseph
Download Presentation

Seclarity, Inc. 11705 Lightfall Court Columbia, MD 21044

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HIPAA Strategies Gary Christoph, Ph.D. Sr. VP Government and Healthcare gchristoph@seclarity.com 410-884-1313 April 8, 2005 A Blumberg Capital, Valley Ventures and Intel Capital Funded Security Company Seclarity, Inc. 11705 Lightfall Court Columbia, MD 21044

  2. The Issue • Recent Compliance Mandates (HIPAA, GLBA, SarbOx, etc.) are (unfortunately) strong security drivers • Network Security is Hard and Expensive • Use a “Common Sense” approach

  3. HIPAA Title II Administrative Simplification Transaction Standards Standard Code Sets Unique Health Identifiers Security Privacy Limitations Administrative Procedures Covers Protected Health Information (PHI) transmitted or Covers Protected Health Information (PHI) transmitted or Technical Security Services stored, in any medium (electronic, paper, oral) Chain of Trust Agreement Certification, Access Controls Authorization Access Controls Authorization Internal Audit, Training, Written Policies & Procedures, etc. Internal Audit, Training, Written Policies & Procedures, etc. Data Authentication General Rules Entity Authentication Entity Authentication PHI data elements defined Notice of Privacy Practices mandated Physical Safeguards Technical Security Mechanisms • Secure Workstation • Physical Access Controls, Media Controls, etc. • Security Awareness Minimum necessary disclosure/use of data Minimum necessary disclosure/use of data Basic Network Safeguards Integrity and Protection Basic Network Safeguards Integrity and Protection Consent required for routine use Authorization required for non-routine use Business associate contracts required Designated Privacy Officer Training Training Electronic Signature Not currently required

  4. What Does HIPAA Really Require? YOU MUST: • Think about the risks you face • Develop coherent, enforceable policy • Write it down • Implement/operate whatever controls this requires • Train/educate staff • Periodically test & document

  5. Compliance Issues: • Policy is not written down • Written policy is not followed • Implementations are not “fire and forget” • Consultants aim to make money, not fix the problem

  6. Hard NW Security/Privacy Issues: • People are involved • People are neither repeatable nor logical • People on the job make inappropriate assumptions • Technical Solutions are too complex • Point products do not tile the floor • Management of many solutions is not easy or cheap • Pace of technological change adds new vulnerabilities (e.g., wireless) • Administrative Solutions that are not • Processes get in the way of work • Controls violated without your knowledge or without consequence

  7. A Simple Strategy: • Decide what is important to protect • Find a simple way to protect it • Document it

  8. The Regs were written to be scalable and technology neutral. Why? • Rules have to cover everything from a one-person Dentist’s office in Podunk, Missouri, to Johns Hopkins Hospital • It economically makes no sense to require everyone to have the same controls • Technology evolves Therefore: The solution must fit the need

  9. Technical Solution Target • Want transparency • Easy for users to comply • Easy for admins to enforce • Want universality • Everywhere same policy enforced the same • Use technology to reduce administrative controls • Want simplicity • Complexity is the enemy • Easy to manage • Want verifiability • Documentable • Want cheap • Do not want to go out of business

  10. A Simplified View of a Contemporary“Secured” Network: Wireless Unencrypted Traffic Remote users With Software VPN agents Firewall Unencrypted Traffic Internet VPN IDS Proxy Encrypted Traffic

  11. A Simple view of an Endpoint-Secured Network: Wireless Encrypted Traffic Encrypted Traffic Firewall Remote user Internet Encrypted Traffic

More Related