SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
1 EC-Council
Information Security and Legal
Compliance
Module 12
Simplifying Security.
WatchdogReports: Security Catalysts?
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
May 19,2011
Thetiming of two newwatchdog reports that highlight the needto
protect the security of electronic health records could help build
momentum for action, some observerssay.
This week's reports from the Department of Health and Human
Services' Office of the Inspector General call for a ramping up of
enforcementof the HIPAASecurity Rule and the inclusionof more
security requirements in the HITECHAct electronic health record
incentive program (see:WatchdogHits HHS on RecordsSecurity.)
The HHS Office for Civil Rights, which enforces HIPAA, recently
requesteda 13.5percent increase in its fiscal 2012 budget for,
among other things, enforcement of the HIPAA Security Rule and
compliance reviews of smaller breach incidents (see:More HIPAA
Enforcement Funding Sought). "So it's timely to raise the issue of
HIPAA enforcement in the middle of the budget discussions," says
Dan Rode, vicepresidentof policyand governmentrelations at the
AmericanHealth Information ManagementAssociation.
http://www.govinfosecurity.com
Monday, May23, 2011
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
Business Workshop: HITECHUshers in Era ofHigher
Penalties UnderHIPAA
Tworecent cases suggest we have entered a new era of more stringent enforcement of HIPAA's privacy
and securitystandards.
Forthe first time, the Office for Civil Rights (OCR) at the Department of Health and Human Services,
which is charged with enforcing HIPAA's privacy and security standards, has imposed a civil money
penalty under HIPAA, or the Health Insurance Portability and AccountabilityAct.
In a pressreleasefrom February,OCR announced that Cignet Health of Maryland was fined a totalof
4.3$millionfor ignoring requests for medicalrecords
from 41individuals and for failing to cooperatewith
OCR's investigation of 27relatedcomplaints.
Twodays later,OCR announced a $1million settlement
with Massachusetts General Hospital after an employee left documents containing patients' health
information on the subway. OCR's investigation indicated that the hospital "failed to implement
reasonable, appropriate safeguards to protect the privacy of protected healthinformation".
http://www.post‐gazette.com
Module Objectives
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
HIPPA(Health InsurancePortability
and AccountabilityAct)
HIPPAChecklist
FERPA(Family Educational Rightsand
PrivacyAct)
FERPAChecklist
PCI DSS (PaymentCard IndustryData
Security Standard)
PCI DSS Checklist
Module
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
Flow
Health Insurance
Portability and
AccountabilityAct
(HIPPA)
Family Educational
Rights and Privacy
Act (FERPA)
Payment Card
Industry Data
Security Standard
(PCI DSS)
and
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
HIPAA(Health Insurance Portability
Accountability Act)
HIPPAis a security standard to provide physical, technical, and administrative safeguards to protect
the integrity, availability, and confidentiality of health information
The purpose of this security standard is to prevent the inappropriate use and disclosure of
individuals’health information
It imposes restrictions on organizations to protect health information and the systems that store,
transmit, and process it
Objectives of HIPPA
It allows for portability and continuity of health
insurance and places limits on pre‐existing
exclusion provisions
Group and Individual InsuranceReform
It reducesthe potential for waste, fraud,and
abuse
New penalties and sanctions will be imposed
It requires the application of uniform standardsto
electronic data transactions in a confidential and
secureenvironment
Its goal is to improve the effectivenessand
efficiency of the health care system
HIPAA Checklist
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
File cabinets or drawers storing
patient records should be
securely locked, or if possible,
the room itself
Restrict access to computer
terminals to only authorized
personnel and set up passcodes
for electronic files
Be alert to security lapses that
might allow illegitimate usersto
access the records
FileSecurity Education andSanctions
Professional workforce should be
trained with HIPPA requirements,
both on and off the job
Ensure that the employees know
about the endorsements they can
expect for violating HIPAA
restrictions
Violators of HIPPAare punished
to send a message to other
employees that HIPAAis
considered seriously within the
organization
AuthorizationProcedures
Ensure that onlyauthorized
personnel have access to
the HIPAAprotected
information
Review the file logs or
computer records regularly
to know how the
authorization is used to
ensure that itis not abused
FERPA (Family Educational Rights
and Privacy Act)
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
Therights given to students byFERPA
regarding the educational records include:
Right to access educational recordskept by
the school
Right to demandthateducationalrecords be
disclosed only with studentpermission
Right to amend educationalrecords
Right to file complaints against the school for
disclosing educational records in violation of
FERPA
Right to know about the purpose, content,
and location of informationkeptas a partof
their educationalrecords
Individualstaffor faculty’sprivatenotes, campus
police records, medical records, and statistical
datacompilations thatdo not contain personally
identifiable student information are not
considered as educational records underFERPA
The Family Education Rights and PrivacyAct
(FERPA)of 1974 also known as the Buckley
Amendment, is a federal law that is meant
to protect the accuracy and privacyof
student education records
This law is applicable to all institutions that
are recipients of federal service directed by
the Secretary of Education
FERPAgives certain rights to parents with
respect to their children’s educational
records. Rights transfer to the studentwhen
he/she reaches the age of 18 or a school
beyond the high school level
FERPA Checklist
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
Do not discuss the progressofany student with
anyone other than the student (including
parents/guardians) without the consent of the
student
Do not provide anyone with lists ofstudents
enrolledin classes forany commercialpurpose
Institutions must have writtenpermissionfromthe
student to release any information from the
student’s educationalrecord
Only student directory information can be disclosed
by the institutions without the student’s permission
but not non‐directoryinformation
Students should be notifiedabouttheirrightsunder
FERPAby institutions through annual publications
Postthe grades using securetechnology
Ensure that the confidential, non‐directory, and
sensitive student personal information is
encryptedwhereeverit is storedsuch as laptops
and thumbdrives
Do not use social security numbers for any
purposeunless necessary.Replace them with UINs
(Universal IdentificationNumber)
Do not leave graded tests or papers in a stack for
students to pickup by sorting through the tests or
papers of allstudents
Do not provide anyone with studentschedulesor
assist anyone other than professional university
employeesin finding a student on campus
Do not link the name of a student with that
student’s social security number or universal
identificationnumber(UIN) in any public manner
PCI DSS (Payment Card Industry Data
Security Standard )
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
Payment Card Industry Data Security Standard (PCI DSS) is a set of guidelines, measures, and controls
that were established to assist merchants implement strong security precautions to ensure safe credit
cardusage and secureinformation storage
Businesses with merchant identification that takes credit card payments—whether online, over the
phone, or using credit card machines or paper forms—need to comply with these standards,even if
they use a payment service provider
Objectivesof PCI DSS include thefollowing:
Maintain an Information SecurityPolicy Build and Maintain a SecureNetwork
Regularly Monitor andTest
Networks
Protect Cardholder Data
Implement StrongAccess Control
Measures
Maintain a Vulnerability Management
Program
PCI DSS Checklist
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
Install and maintain afirewall
configuration to protect cardholderdata
Protect storedcardholderdata
Do not use vendor‐supplied defaultsfor
system passwords and other security
parameters
Encrypt transmission of cardholderdata
across open, public networks
Use and regularly updateanti‐virus
software
Develop and maintain securesystems
and applications
Restrict access to cardholder databy
business need‐to‐know
Assign a unique ID toeach person with
computeraccess
Restrict physical access tocardholder
data
Trackand monitor all access tonetwork
resources and cardholderdata
Regularly test security systemsand
processes
Maintain a policy thataddresses
information security
Module Summary
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is StrictlyProhibited.
HIPPAis a security standard to provide physical, technical, and administrative
safeguards to protect the integrity,availability,and confidentiality of health information
 The purpose of HIPPAis to prevent the inappropriate use and disclosure of individuals’
health information
 FERPAis a federal law that is meant to protect the accuracy and privacy of student
education records
 PCI DSS is a set of guidelines, measures, and controls that were established to assist
merchants implement strong security precautions to ensure safe credit card usageand
secure information storage
Businesses with merchant identification that takes credit card payments—whether
online, over the phone, or using credit cardmachines or paper forms—need to comply
with PCI DSS standards

Mais conteúdo relacionado

Mais procurados

Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Quarles & Brady
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthTAOklahoma
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...Ryan Starkes
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowNetwork 1 Consulting
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations OnRamp
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containersAbhishek Sood
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act Kartheek Kein
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associatesgppcpa
 

Mais procurados (20)

Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealth
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 

Semelhante a Cscu module 12 information security and legal compliance

Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookElizabeth Dimit
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil LibertiesUpekha Vandebona
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
Insurance
InsuranceInsurance
InsuranceJLS10
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .ClinosolIndia
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratchTechugo
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MassEHealth
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 

Semelhante a Cscu module 12 information security and legal compliance (20)

Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Insurance
InsuranceInsurance
Insurance
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
HIPAA
HIPAAHIPAA
HIPAA
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
ClientAdvisoryNote - Obama's Privacy Action Plan
ClientAdvisoryNote - Obama's Privacy Action PlanClientAdvisoryNote - Obama's Privacy Action Plan
ClientAdvisoryNote - Obama's Privacy Action Plan
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 

Mais de Alireza Ghahrood

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Alireza Ghahrood
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceAlireza Ghahrood
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEAlireza Ghahrood
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...Alireza Ghahrood
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycleAlireza Ghahrood
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanismsAlireza Ghahrood
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...Alireza Ghahrood
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsAlireza Ghahrood
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connectionsAlireza Ghahrood
 

Mais de Alireza Ghahrood (20)

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
 
ANT Catalog
ANT CatalogANT Catalog
ANT Catalog
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
 
implement access controls
implement access controlsimplement access controls
implement access controls
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connections
 

Último

Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCRCall Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCRsafdarjungdelhi1
 
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts ServiceCall Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Servicemonikaservice1
 
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)ayushiverma1100
 
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts ServiceCall Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Servicemonikaservice1
 
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts ServiceFULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts ServiceCALLGIRLS DELHI
 
Call Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For Genuine
Call Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For GenuineCall Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For Genuine
Call Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For Genuinedelhincr993
 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCRthapariya601
 
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...gitathapa4
 
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)ayushiverma1100
 
Call Girls In Munirka,( Delhi — 9667422720 Escorts ) Service
Call Girls In Munirka,( Delhi — 9667422720 Escorts ) ServiceCall Girls In Munirka,( Delhi — 9667422720 Escorts ) Service
Call Girls In Munirka,( Delhi — 9667422720 Escorts ) ServiceLipikasharma29
 
9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncrthapariya601
 
9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCRthapariya601
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncrthapariya601
 
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCREscort Service
 
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)ayushiverma1100
 
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)thapagita
 
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsLipikasharma29
 
Justdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts Service
Justdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts ServiceJustdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts Service
Justdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts Servicemonikaservice1
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncrthapariya601
 
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)ayushiverma1100
 

Último (20)

Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCRCall Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
 
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts ServiceCall Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
 
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
 
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts ServiceCall Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
 
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts ServiceFULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
 
Call Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For Genuine
Call Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For GenuineCall Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For Genuine
Call Girls In Goa North Goa 9899855202 Direct Cash 0nline Payment For Genuine
 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
 
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
 
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
 
Call Girls In Munirka,( Delhi — 9667422720 Escorts ) Service
Call Girls In Munirka,( Delhi — 9667422720 Escorts ) ServiceCall Girls In Munirka,( Delhi — 9667422720 Escorts ) Service
Call Girls In Munirka,( Delhi — 9667422720 Escorts ) Service
 
9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Mahipalpur Delhi Ncr
 
9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Saket Metro Delhi NCR
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
 
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
 
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
 
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
 
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
 
Justdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts Service
Justdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts ServiceJustdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts Service
Justdial Call Girls In Vaishali, Ghaziabad 8800357707 Escorts Service
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
 
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
 

Cscu module 12 information security and legal compliance

  • 1. 1 EC-Council Information Security and Legal Compliance Module 12 Simplifying Security.
  • 2. WatchdogReports: Security Catalysts? 2 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. May 19,2011 Thetiming of two newwatchdog reports that highlight the needto protect the security of electronic health records could help build momentum for action, some observerssay. This week's reports from the Department of Health and Human Services' Office of the Inspector General call for a ramping up of enforcementof the HIPAASecurity Rule and the inclusionof more security requirements in the HITECHAct electronic health record incentive program (see:WatchdogHits HHS on RecordsSecurity.) The HHS Office for Civil Rights, which enforces HIPAA, recently requesteda 13.5percent increase in its fiscal 2012 budget for, among other things, enforcement of the HIPAA Security Rule and compliance reviews of smaller breach incidents (see:More HIPAA Enforcement Funding Sought). "So it's timely to raise the issue of HIPAA enforcement in the middle of the budget discussions," says Dan Rode, vicepresidentof policyand governmentrelations at the AmericanHealth Information ManagementAssociation. http://www.govinfosecurity.com
  • 3. Monday, May23, 2011 3 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. Business Workshop: HITECHUshers in Era ofHigher Penalties UnderHIPAA Tworecent cases suggest we have entered a new era of more stringent enforcement of HIPAA's privacy and securitystandards. Forthe first time, the Office for Civil Rights (OCR) at the Department of Health and Human Services, which is charged with enforcing HIPAA's privacy and security standards, has imposed a civil money penalty under HIPAA, or the Health Insurance Portability and AccountabilityAct. In a pressreleasefrom February,OCR announced that Cignet Health of Maryland was fined a totalof 4.3$millionfor ignoring requests for medicalrecords from 41individuals and for failing to cooperatewith OCR's investigation of 27relatedcomplaints. Twodays later,OCR announced a $1million settlement with Massachusetts General Hospital after an employee left documents containing patients' health information on the subway. OCR's investigation indicated that the hospital "failed to implement reasonable, appropriate safeguards to protect the privacy of protected healthinformation". http://www.post‐gazette.com
  • 4. Module Objectives 4 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. HIPPA(Health InsurancePortability and AccountabilityAct) HIPPAChecklist FERPA(Family Educational Rightsand PrivacyAct) FERPAChecklist PCI DSS (PaymentCard IndustryData Security Standard) PCI DSS Checklist
  • 5. Module 5 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. Flow Health Insurance Portability and AccountabilityAct (HIPPA) Family Educational Rights and Privacy Act (FERPA) Payment Card Industry Data Security Standard (PCI DSS)
  • 6. and 6 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. HIPAA(Health Insurance Portability Accountability Act) HIPPAis a security standard to provide physical, technical, and administrative safeguards to protect the integrity, availability, and confidentiality of health information The purpose of this security standard is to prevent the inappropriate use and disclosure of individuals’health information It imposes restrictions on organizations to protect health information and the systems that store, transmit, and process it Objectives of HIPPA It allows for portability and continuity of health insurance and places limits on pre‐existing exclusion provisions Group and Individual InsuranceReform It reducesthe potential for waste, fraud,and abuse New penalties and sanctions will be imposed It requires the application of uniform standardsto electronic data transactions in a confidential and secureenvironment Its goal is to improve the effectivenessand efficiency of the health care system
  • 7. HIPAA Checklist 7 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. File cabinets or drawers storing patient records should be securely locked, or if possible, the room itself Restrict access to computer terminals to only authorized personnel and set up passcodes for electronic files Be alert to security lapses that might allow illegitimate usersto access the records FileSecurity Education andSanctions Professional workforce should be trained with HIPPA requirements, both on and off the job Ensure that the employees know about the endorsements they can expect for violating HIPAA restrictions Violators of HIPPAare punished to send a message to other employees that HIPAAis considered seriously within the organization AuthorizationProcedures Ensure that onlyauthorized personnel have access to the HIPAAprotected information Review the file logs or computer records regularly to know how the authorization is used to ensure that itis not abused
  • 8. FERPA (Family Educational Rights and Privacy Act) 8 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. Therights given to students byFERPA regarding the educational records include: Right to access educational recordskept by the school Right to demandthateducationalrecords be disclosed only with studentpermission Right to amend educationalrecords Right to file complaints against the school for disclosing educational records in violation of FERPA Right to know about the purpose, content, and location of informationkeptas a partof their educationalrecords Individualstaffor faculty’sprivatenotes, campus police records, medical records, and statistical datacompilations thatdo not contain personally identifiable student information are not considered as educational records underFERPA The Family Education Rights and PrivacyAct (FERPA)of 1974 also known as the Buckley Amendment, is a federal law that is meant to protect the accuracy and privacyof student education records This law is applicable to all institutions that are recipients of federal service directed by the Secretary of Education FERPAgives certain rights to parents with respect to their children’s educational records. Rights transfer to the studentwhen he/she reaches the age of 18 or a school beyond the high school level
  • 9. FERPA Checklist 9 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. Do not discuss the progressofany student with anyone other than the student (including parents/guardians) without the consent of the student Do not provide anyone with lists ofstudents enrolledin classes forany commercialpurpose Institutions must have writtenpermissionfromthe student to release any information from the student’s educationalrecord Only student directory information can be disclosed by the institutions without the student’s permission but not non‐directoryinformation Students should be notifiedabouttheirrightsunder FERPAby institutions through annual publications Postthe grades using securetechnology Ensure that the confidential, non‐directory, and sensitive student personal information is encryptedwhereeverit is storedsuch as laptops and thumbdrives Do not use social security numbers for any purposeunless necessary.Replace them with UINs (Universal IdentificationNumber) Do not leave graded tests or papers in a stack for students to pickup by sorting through the tests or papers of allstudents Do not provide anyone with studentschedulesor assist anyone other than professional university employeesin finding a student on campus Do not link the name of a student with that student’s social security number or universal identificationnumber(UIN) in any public manner
  • 10. PCI DSS (Payment Card Industry Data Security Standard ) 10 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. Payment Card Industry Data Security Standard (PCI DSS) is a set of guidelines, measures, and controls that were established to assist merchants implement strong security precautions to ensure safe credit cardusage and secureinformation storage Businesses with merchant identification that takes credit card payments—whether online, over the phone, or using credit card machines or paper forms—need to comply with these standards,even if they use a payment service provider Objectivesof PCI DSS include thefollowing: Maintain an Information SecurityPolicy Build and Maintain a SecureNetwork Regularly Monitor andTest Networks Protect Cardholder Data Implement StrongAccess Control Measures Maintain a Vulnerability Management Program
  • 11. PCI DSS Checklist 11 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. Install and maintain afirewall configuration to protect cardholderdata Protect storedcardholderdata Do not use vendor‐supplied defaultsfor system passwords and other security parameters Encrypt transmission of cardholderdata across open, public networks Use and regularly updateanti‐virus software Develop and maintain securesystems and applications Restrict access to cardholder databy business need‐to‐know Assign a unique ID toeach person with computeraccess Restrict physical access tocardholder data Trackand monitor all access tonetwork resources and cardholderdata Regularly test security systemsand processes Maintain a policy thataddresses information security
  • 12. Module Summary 12 Copyright © by EC-Council All Rights Reserved. Reproduction is StrictlyProhibited. HIPPAis a security standard to provide physical, technical, and administrative safeguards to protect the integrity,availability,and confidentiality of health information  The purpose of HIPPAis to prevent the inappropriate use and disclosure of individuals’ health information  FERPAis a federal law that is meant to protect the accuracy and privacy of student education records  PCI DSS is a set of guidelines, measures, and controls that were established to assist merchants implement strong security precautions to ensure safe credit card usageand secure information storage Businesses with merchant identification that takes credit card payments—whether online, over the phone, or using credit cardmachines or paper forms—need to comply with PCI DSS standards