data managers interest group institute of clinical and
play

Data Managers Interest Group Institute of Clinical and Translational - PowerPoint PPT Presentation

Data Managers Interest Group Institute of Clinical and Translational Institute of Clinical and Translational Research April 17, 2012 Privacy & Security Contacts Privacy & Security Contacts hipaa@jhmi edu hipaa@jhmi.edu


  1. Data Managers Interest Group Institute of Clinical and Translational Institute of Clinical and Translational Research April 17, 2012

  2. Privacy & Security Contacts Privacy & Security Contacts • hipaa@jhmi edu hipaa@jhmi.edu • network.security@jhmi.edu • IT Help Desk – 410.735.4357 l k 0 3 3 • Or you can call me – Darren Lacey – Chief Information Security Officer – dll@jhu.edu – 410.735.4477

  3. Let’s start with some numbers Let s start with some numbers

  4. HIPAA Breaches >500 since 2009 HIPAA Breaches >500 since 2009 Breach Types Number % Hacking/IT Incident H ki /IT I id t 44 44 14 14 Improper Disposal (Paper) 73 23 Lost /Stolen Computer/Server 41 13 Lost/stolen media or portable electronic devices 47 15 Lost/Stolen Laptops 77 25 Unauthorized access Unauthorized access 8 8 3 3 Email 6 2 Other 18 6 TOTAL 314 100 http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotification rule/postedbreaches.html l / db h h l

  5. Ways to think about the numbers Ways to think about the numbers • Hacking incidents make up slightly more than Hacking incidents make up slightly more than half of large incidents related to higher education education • Across all industries hacking makes up ¼ of incidents incidents • There are many more incidents related unauthorized access but these involve fewer h i d b h i l f than 500 patients

  6. HITECH Act Changes in HIPAA HITECH Act Changes in HIPAA • Notification required for any breach not just Notification required for any breach not just SSN or financial information • Increased fines and penalties • Increased fines and penalties • 150 audits annually of covered entities starting next year i • Meaningful use requires security risk assessment

  7. Things the HIPAA Cops Hate Things the HIPAA Cops Hate • WEP – Wireless networks WEP Wireless networks • Unencrypted email and insecure transmissions • Lack of monitoring of business associates k f i i f b i i • Failure to monitor unauthorized access to patient records • Lack of accurate inventory of devices, y , applications and services • Inadequate training and awareness Inadequate training and awareness

  8. Risk areas at Hopkins Risk areas at Hopkins • Application complexity Application complexity • Disclosure and use accounting • Downstream data sets • Downstream data sets • Personally owned devices • Collaborative multi ‐ site projects C ll b ti lti it j t • Kudzu ‐ like web presence • Network proximity to defense ‐ oriented research

  9. What can researchers do? What can researchers do?

  10. Encrypt your laptop, including the one you bring from home!!! It’s cheap, usually easy

  11. Laptop Encryption Options Laptop Encryption Options • Mac’s Mac s – Lion: use FileVault2, whole disk encryption – Pre ‐ Lion: use FileVault or TrueCrypt folder Pre Lion: use FileVault or TrueCrypt folder encryption • Windows XP – Checkpoint encryption through • Windows XP Checkpoint encryption through Hopkins (often pre ‐ installed) or TrueCrypt FDE • Windows7 – (Enterprise or Ultimate) MS Wi d 7 (E i Ul i ) MS Bitlocker or TrueCrypt FDE

  12. Do you have a project Web site? Do you have a project Web site? No, good. Yes, prepare to do some work and Yes, prepare to do some work and lots of maintenance

  13. Web Security Threats Web Security Threats • Check your server for sensitive files C ec you se e o se s t e es • Database access controls and monitoring • Watch your forms and URL’s for potential attacks Watch your forms and URLs for potential attacks – SQL Injection – Cross ‐ site scripting • Validate all input • Test your error screens y • Monitor any platform vulnerabilities (e.g. PHP) • Sound server management practicess g p

  14. Write up a short data management and sharing plan For data security and quality. Think of it as version control

  15. Parts of the plan Parts of the plan • Documented data extractions Documented data extractions • De ‐ identification and anonymization • Downstream data use agreements d • Dynamic access control lists • Data sharing approaches – lowest common denominator • Disposal and life cycle management

  16. Tools you can use Tools you can use • Jshare for file sharing (internal and external) Jshare for file sharing (internal and external) • Sharepoint for internal file sharing and version control (don’t recommend large PHI datasets) control (don t recommend large PHI datasets) • Winzip/7zip – encrypted folders • JIRA – for collaboration, but it should be authenticated through SM (don’t recommend large PHI datasets)

  17. General security controls General security controls • Access control for administrative access Access control for administrative access • Log management and monitoring of servers • Symantec or Forefront Endpoint protection • Symantec or Forefront Endpoint protection • Be circumspect about cloud services – but these are improving rapidly these are improving rapidly • Policies against insecure storage – – USB s not only get stolen but are malware USB’s not only get stolen but are malware magnets – Home machines are generally not to be trusted Home machines are generally not to be trusted

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend