160 likes | 313 Views
Information Security Training for Management. Complying with the HIPAA Security Law. HIPAA Was a One-Two Punch. On March 14, 2003, we had to obey the United States’ HIPAA Privacy Rule On April 21, 2005 , we had to obey the HIPAA Security Rule
E N D
Information Security Training for Management Complying with the HIPAA Security Law
HIPAA Was a One-Two Punch • On March 14, 2003, we had to obey the United States’ HIPAA Privacy Rule • On April 21, 2005, we had to obey the HIPAA Security Rule • We have no choice – thesame severe penalties applyfor both Privacy and Security
Complying with HIPAA Security Means: • Information Security Policies and Procedures • A Security Awareness Program • A Risk Management Program • A Disaster Recovery and Business Continuity Management Team (DRBCMT) • A Security Incident Response Team (SIRT) • A Security Compliance Management Program
Information Security Policies and Procedures - Part 1 • Acceptable Use • Assigned Security Responsibility • Business Continuity and Disaster Recovery • Security Compliance Management • Data Classification, Inventory, and Control • Data Stewardship • Incident Management • Information Security Management • Information Systems Security Certification
Information Security Policies and Procedures - Part 2 • IS Authorization and Account Management • Logical Access Control • Network and Telecommunications Security • Personnel Security for Information Systems • Physical and Environmental Security • Risk Management • Security Training and Awareness • User Identification and Authentication
Security Awareness Training – Why? • Required by HIPAA, our Division, and DHHS • Management must believe in data security • Management must understand they will be held liable for not providing security • We will gain by preventatives • Consider the cost of our reputation • Think of information as our major product
Security Awareness Training – What? • Upper Management Training • Security Awareness Day • Security Awareness Training for all staff • Computer Users’ Supervisor Training • Initial General Security Training for all users • Ongoing General Security Training for all users • Security “Marketing” Efforts • Annual System-specific training • Professional Education Training
Security Awareness Training – Who? • The Information Security Official will provide the content of all training, the Upper Management training, the Ongoing General Security Training, the Professional Education Training for Computer Services staff, and Security Awareness Day training • The Staff Development Department will provide the Security Awareness Training and Initial General Security Training for all new employees, and the annual system-specific training • DHHS will provide Professional Education Training to the Information Security Official
Most Important of All! • Management must believe in data security!
Risk Management Program • Upper Management must dominate the Risk Management Committee • RM Committee reviews threats, Application Risk Analysis results, System Risk Analysis results, DHHS Penetration Testing results, and IS Policy and Procedure status report • RM Committee makes recommendations of cost-effective risk mitigation actions • RM effectiveness will be measured by the QA Director
Why Engage in Risk Management? • Why do cars have brakes? • So they can go fast! • Having a risk management program allows us to be able to take risks. In a competitive world, the organization that can take risks wins • After our people, our information is our most valuable asset. It needs to be protected
Disaster Recovery and Business Continuity Management Team • Primarily Computer Services staff • Updates the Disaster Recovery and Business Continuity Plan on February 1 each year • Body of plan has relatively static information • Appendix contains information valuable at disaster recovery time, such as network and hardware inventories, network diagrams, emergency mode operation plans, support agreements, and contact lists
Security Incident Response Team • Security incidents must be reported • The SIRT responds when necessary to security violations • Our Team is made up mostly of local Computer Services staff, plus the QA Director • Our Division is notified of all Level 2 and Level 3 Security violations
Information Security Compliance Management Program • We must have a Security Compliance Management program with three elements 1) Compliance Management (we must comply) 2) Compliance Monitoring (we must measure our compliance) 3) Compliance Auditing (our compliance must be measured independently)
Our Information Security Program! • New Information Security Policies and Procedures • A Security Awareness Program • A Risk Management Program • A Disaster Recovery and Business Continuity Management Team (DRBCMT) • A Security Incident Response Team (SIRT) • A Security Compliance Management Program
The HIPAA Security RuleBalancing Home Living with Secure Information The Work is Worth It!