SlideShare uma empresa Scribd logo
1 de 89
Keep Your Healthcare Databases
Secure and Compliant
Kim Brushaber, Senior Product Manager, IDERA
Stan Geiger, Director, Product Management, Multi-Platform Tools, IDERA
Agenda
▪ Overview
▪ What is HIPAA?
▪ HIPAA Violations
▪ Data Breaches
▪ Data Compliance
▪ Demo
▪ Questions
Overview
▪ Healthcare Regulations
– The Social Security Act governs funding and requirements for
Medicare, Medicaid, CHIP, and more.
– HIPAA and the HITECH Act protect patient privacy, requiring
healthcare organizations to implement measures to keep
patient records secure.
– Federal Information Security Management Act (FISMA)
– The False Claims Act makes it illegal to file a false claim for
funds from a federal program.
– The Patient Protection and Affordable Care Act implemented
new requirements for insurance, Medicaid, and more.
HIPAA
▪ The Privacy Rule establishes a set of standards that
address how patient information can be used and
disclosed.
▪ Applies to three entity types:
– Health care providers
– Health plans
– Health care clearinghouses
HIPAA
▪ Health care providers
– Any provider that electronically transmits patient
information in connection with claims, eligibility
requests, referral authorizations, or similar
transactions
– Applicable transaction types are specified in the
HIPAA Transactions Rule
HIPAA
▪ Health plans
– Individual and group plans that provide or pay
the cost of medical care
– Entities
• Health maintenance organizations (HMOs)
• Medicare
• Medicaid
• Health or dental insurers
• Employer-sponsored group health plans
HIPAA
▪ Health care clearinghouses
– Entities that process patient data on behalf of
health plans or health care providers
– Transforms the data in some way from a
nonstandard format to a standard format
– Included organizations:
• Billing services
• Community health management information
services.
HIPAA
▪ Privacy Rule
– Protects all individually identifiable health
information
– Identifiable information
• The patient’s past, preset, or future physical or mental
health
• Any health care services that the patient has received
• Any payment information related to the patient’s care
that can be used to identify the patient
Penalties
▪ Penalties
– Fines of $100 to $50,000 or more per violation
– Calendar cap of $1.5 million
– Individuals can also face criminal penalties up
to $250,000 and 10 years imprisonment
HIPAA
▪ Electronic PHI
– Ensure the integrity, confidentiality, and availability of all e-
PHI data in their possession.
– Identify and protect against anticipated threats to the e-PHI
data.
– Protect against anticipated non-permitted uses or
disclosures.
– Ensure that e-PHI data is not available to or disclosed to
non-authorized individuals in the workforce.
HIPAA
▪ Electronic PHI security
– Protection standards
• Administrative protections
• Physical protections
• Technical protections
HIPAA and the DBA
▪ Ensure the confidentiality, integrity, and
availability of all electronic PHI data
▪ Prevent unauthorized individuals from
viewing, altering, or destroying the data,
while providing authorized users access
▪ Identify and protect against anticipated
threats as well as impermissible uses or
disclosures
HIPAA and the DBA
▪ Training
– Covered entity must train all workforce members on the
policies and procedures with respect to protecting PHI data.
– Covered entity should apply sanctions against workforce
members who fail to comply with the policies and
procedures.
– DBAs will participate in the process of writing policies and
procedures and training workforce members depending on
the organization and their circumstance.
– DBAs should fully understand the risks associated with
violating HIPAA regulations and what steps to take if they
discover a violation.
HIPAA and the DBA
▪ Securing environment
– Covered entity must assess the potential risks and
vulnerabilities to the electronic PHI and then implement
security measures to reduce those risks.
– Implement procedures for guarding against malicious
software as well as for managing and protecting passwords.
– Implement mechanisms for limiting and controlling physical
access to systems and facilities that house PHI data, while
providing for disaster recovery and emergency access.
– Implement safeguards that protect workstations accessing
PHI data, along with any other hardware or electronic media
used for sensitive data.
– Responsible for the proper disposition of PHI data from any
hardware or media on which it has resided.
HIPAA and the DBA
▪ Controlling access
– Ensure that workforce members have “appropriate access”
to electronic PHI, based on their roles in the organization.
– Implement procedures for authorizing workforce members,
supervising their access to data, determining whether that
access is appropriate, and terminating that access when
required.
– Assign a unique ID to each user for identifying and tracking
that user’s activities.
– Implement procedures for obtaining PHI data during an
emergency, terminating electronic sessions after a
predetermined time of inactivity, and encrypting and
decrypting PHI data.
HIPAA and the DBA
▪ Auditing and monitoring systems
– Implement procedures for monitoring log-in attempts and
reporting discrepancies.
– Implement “hardware, software, and/or procedural
mechanisms that record and examine activity in information
systems that contain or use electronic protected health
information.
– Implement electronic mechanisms to verify that the PHI data
has not been “altered or destroyed in an unauthorized
manner.”
HIPAA and the DBA
▪ Prepare for security incidents
– Provide individuals with a process for making complaints
about the organization’s policies and procedures or about its
compliance with those policies and procedures.
– You cannot retaliate against individuals who exercise their
rights, as provided by the Privacy Rule.
– Take the steps necessary to mitigate any harmful effects
that result from PHI data being compromised.
– Identify and respond to “suspected or known security
incidents; mitigate, to the extent practicable security
incidents that are known and document security incidents
and their outcomes.”
HIPAA and the DBA
▪ Document, document, document
– Sanctions against workforce members must be
documented, as well as all policies and procedures.
– Documentation must be retained for six years from the
creation date or when it was last in effect, whichever is later.
– Maintain a “record of the movements of hardware and
electronic media and any person responsible therefore.”
– Documentation should be updated as needed in response to
environmental or operational changes.
Head spinning yet?
Notable HIPAA Violations
Fired Surgeon Sentenced to Prison
• Huping Zhou, former cardiothoracic surgeon, was fired
from his job as a researcher at the UCLA School of
Medicine
Fired Surgeon Sentenced to Prison
• Huping Zhou, former cardiothoracic surgeon, was fired
from his job as a researcher at the UCLA School of
Medicine
• After being fired, he illegally accessed the UCLA Medical
Records over 300 times
Fired Surgeon Sentenced to Prison
• Huping Zhou, former cardiothoracic surgeon, was fired
from his job as a researcher at the UCLA School of
Medicine
• After being fired, he illegally accessed the UCLA Medical
Records over 300 times
• He viewed records on his immediate supervisor, his
coworkers, and several celebrities (including Arnold
Schwarzenegger, Drew Barrymore, Leonardo DiCaprio,
and Tom Hanks)
Fired Surgeon Sentenced to Prison
• Huping Zhou, former cardiothoracic surgeon, was fired
from his job as a researcher at the UCLA School of
Medicine
• After being fired, he illegally accessed the UCLA Medical
Records over 300 times
• He viewed records on his immediate supervisor, his
coworkers, and several celebrities (including Arnold
Schwarzenegger, Drew Barrymore, Leonardo DiCaprio,
and Tom Hanks)
• OUTCOME: He was sentenced to 4 months in jail and a
$2000 fine
Billing Gone Wrong
• Dr. Barry Helfmann, president-elect of the American
Group Psychotherapy Association
Billing Gone Wrong
• Dr. Barry Helfmann, president-elect of the American
Group Psychotherapy Association
• His employees regularly forwarded past due patient bills
to collections firms
Billing Gone Wrong
• Dr. Barry Helfmann, president-elect of the American
Group Psychotherapy Association
• His employees regularly forwarded past due patient bills
to collections firms
• The bills contained protected info like CPT codes which
can reveal patient diagnoses
Billing Gone Wrong
• Dr. Barry Helfmann, president-elect of the American
Group Psychotherapy Association
• His employees regularly forwarded past due patient bills
to collections firms
• The bills contained protected info like CPT codes which
can reveal patient diagnoses
• OUTCOME: The State of New Jersey sought to suspend
and revoke Helfmann’s license
Sorry, Wrong Number
• In 2013, an HIV-positive patient asked an office manager
to fax his medical records to his new urologist
Sorry, Wrong Number
• In 2013, an HIV-positive patient asked an office manager
to fax his medical records to his new urologist
• The very busy office manager accidentally faxed them to
the man’s new employer
Sorry, Wrong Number
• In 2013, an HIV-positive patient asked an office manager
to fax his medical records to his new urologist
• The very busy office manager accidentally faxed them to
the man’s new employer
• OUTCOME: Luckily, the result was only a sternly worded
warning and a mandate for regular HIPAA training for all
employees
Caught Red-Handed
• A Virginia clinic caught 14 employees who had
improperly viewed the medical files of a high profile
patient without a legitimate need
Caught Red-Handed
• A Virginia clinic caught 14 employees who had
improperly viewed the medical files of a high profile
patient without a legitimate need
• The clinic caught the employees thanks to a logging
system on the backend of their IT systems which tracked
all access to files containing personal health information
Caught Red-Handed
• A Virginia clinic caught 14 employees who had
improperly viewed the medical files of a high profile
patient without a legitimate need
• The clinic caught the employees thanks to a logging
system on the backend of their IT systems which tracked
all access to files containing personal health information
• OUTCOME: The 14 employees were dismissed from
their jobs
Oops, I Did It Again
• In 2008, six doctors and thirteen employees at UCLA
Medical Center viewed Britney Spears’ medical records
after her 2008 psychiatric hospitalization
Oops, I Did It Again
• In 2008, six doctors and thirteen employees at UCLA
Medical Center viewed Britney Spears’ medical records
after her 2008 psychiatric hospitalization
• Many of the employees were non-medical support staff
and none of them had a legitimate medical need to view
the health records
Oops, I Did It Again
• In 2008, six doctors and thirteen employees at UCLA
Medical Center viewed Britney Spears’ medical records
after her 2008 psychiatric hospitalization
• Many of the employees were non-medical support staff
and none of them had a legitimate medical need to view
the health records
• This was the 2nd breach involving Britney Spears – in
2005, staff at another UCLA hospital were caught
peeking at her records after her son was born
Oops, I Did It Again
• In 2008, six doctors and thirteen employees at UCLA
Medical Center viewed Britney Spears’ medical records
after her 2008 psychiatric hospitalization
• Many of the employees were non-medical support staff
and none of them had a legitimate medical need to view
the health records
• This was the 2nd breach involving Britney Spears – in
2005, staff at another UCLA hospital were caught
peeking at her records after her son was born
• OUTCOME: The 13 employees were fired and the 6
doctors were suspended
Reality TV Ain’t What It Used to Be
• In 2013, an ABC reality TV show called NY Med filmed
two hospital patients at New York–Presbyterian Hospital
without their consent
Reality TV Ain’t What It Used to Be
• In 2013, an ABC reality TV show called NY Med filmed
two hospital patients at New York–Presbyterian Hospital
without their consent
• During the filming, one of the patients died in the
emergency room
Reality TV Ain’t What It Used to Be
• In 2013, an ABC reality TV show called NY Med filmed
two hospital patients at New York–Presbyterian Hospital
without their consent
• During the filming, one of the patients died in the
emergency room
• The hospital gave ABC unfettered access, creating a
situation where the protection of personal health
information was not possible
Reality TV Ain’t What It Used to Be
• In 2013, an ABC reality TV show called NY Med filmed
two hospital patients at New York–Presbyterian Hospital
without their consent
• During the filming, one of the patients died in the
emergency room
• The hospital gave ABC unfettered access, creating a
situation where the protection of personal health
information was not possible
• OUTCOME: The hospital paid a $2.2 million settlement
2018 Violations and Fines
HIPAA Violations – 2018
In October, Anthem, Inc. (a licensee of BCBS) agreed to
pay a record breaking $16 million after the largest health
data breach in US history affected almost 79 million people.
https://www.hhs.gov/about/news/2018/10/15/anthem-pays-ocr-16-million-record-hipaa-settlement-following-largest-health-data-breach-history.html
4
4
In September, three healthcare institutions were collectively
fined $999,000 after allowing ABC to film a medical
documentary TV series without first obtaining authorization
from the patients.
https://www.hhs.gov/about/news/2018/09/20/unauthorized-disclosure-patients-protected-health-information-during-abc-filming.html
4
5
HIPAA Violations – 2018
In September, three healthcare institutions were collectively
fined $999,000 after allowing ABC to film a medical
documentary TV series without first obtaining authorization
from the patients.
ABC didn’t learn from 2013
https://www.hhs.gov/about/news/2018/09/20/unauthorized-disclosure-patients-protected-health-information-during-abc-filming.html
4
6
HIPAA Violations – 2018
In June, UT’s MD Anderson Cancer Center was fined $4.3
million due to the theft of an unencrypted laptop and the
loss of two unencrypted USB drives. The hardware
contained details on 33,500 individuals.
https://www.hhs.gov/about/news/2018/06/18/judge-rules-in-favor-of-ocr-and-requires-texas-cancer-center-to-pay-4.3-million-in-penalties-for-hipaa-violations.html
4
7
HIPAA Violations – 2018
In February, FMCNA who provided products and services
to 170,000 patients with chronic kidney disease agreed to
pay a $3.5 million fine for a settlement that covered 5
different data breaches.
https://www.hhs.gov/about/news/2018/02/01/five-breaches-add-millions-settlement-costs-entity-failed-heed-hipaa-s-risk-analysis-and-risk.html
4
8
HIPAA Violations – 2018
Let’s Talk A Little About Data Breach
In February of 2019, there were a total of 101 data
breaches which exposed over 2M sensitive records and
417M non-sensitive records.
96% of the sensitive records exposed were through
breaches in the Medical/Healthcare sector.
https://www.idtheftcenter.org/2019-data-breaches/
Almost 15 Billion Records have been lost or stolen since
2013. Only 4% were secure breaches where encryption
was used and the stolen data was useless.
BreachLevelIndex.com
Over 6.5 million data records are lost or stolen
every day.
http://breachlevelindex.com/
2018 Cost per Data Breach
2018 Cost per Data Breach
• The average cost for each lost or stolen record
containing sensitive and confidential information was
$148 (a 4.8% increase from the year before)
https://www.ibm.com/security/data-breach
2018 Cost per Data Breach
• The average cost for each lost or stolen record
containing sensitive and confidential information was
$148 (a 4.8% increase from the year before)
• The average size of a data breach was 26,000 records
https://www.ibm.com/security/data-breach
2018 Cost per Data Breach
• The average cost for each lost or stolen record
containing sensitive and confidential information was
$148 (a 4.8% increase from the year before)
• The average size of a data breach was 26,000 records
• $148 x 26,000 ~ $3.86 M (increased 6.4% over 2017)
https://www.ibm.com/security/data-breach
Shocking, Right??
Focusing in on the Data
Aspects of Regulations
Why We Have Regulations
• Improved Security
– Establishing a baseline keeps security levels relatively consistent across
companies and industries
Why We Have Regulations
• Improved Security
– Establishing a baseline keeps security levels relatively consistent across
companies and industries
• Minimize Loss
– Good practices in place prevents data breaches
Why We Have Regulations
• Improved Security
– Establishing a baseline keeps security levels relatively consistent across
companies and industries
• Minimize Loss
– Good practices in place prevents data breaches
• Increase Internal Control
– Reduce employee mistakes and insider theft
Why We Have Regulations
• Improved Security
– Establishing a baseline keeps security levels relatively consistent across
companies and industries
• Minimize Loss
– Good practices in place prevents data breaches
• Increase Internal Control
– Reduce employee mistakes and insider theft
• Maintain Trust
– Customers trust people who follow set standards
Why We Have Regulations
• Improved Security
– Establishing a baseline keeps security levels relatively consistent across
companies and industries
• Minimize Loss
– Good practices in place prevents data breaches
• Increase Internal Control
– Reduce employee mistakes and insider theft
• Maintain Trust
– Customers trust people who follow set standards
• Reporting Consistency
– Consistent reports allow audits to go more smoothly
Data Standards vs Security Standards
• Data Standards: “WHAT”
– What information needs to be protected/audited
– What you should do if your data is breached
• Security Standards: “HOW”
– How you should configure your network
– How you should configure your systems (i.e. SQL
Server, Oracle)
What the Regulations Look For
• Reporting (and Maintaining) Audit Data
What the Regulations Look For
• Reporting (and Maintaining) Audit Data
• Tracking User Access
What the Regulations Look For
• Reporting (and Maintaining) Audit Data
• Tracking User Access
• Protecting the Data from the Bad Guys (and Watch for
Data Breaches)
What the Regulations Look For
• Reporting (and Maintaining) Audit Data
• Tracking User Access
• Protecting the Data from the Bad Guys (and Watch for
Data Breaches)
• Planning and Having Good Processes and Response
Plans
What the Regulations Look For
• Reporting (and Maintaining) Audit Data
• Tracking User Access
• Protecting the Data from the Bad Guys (and Watch for
Data Breaches)
• Planning and Having Good Processes and Response
Plans
• Assessing Your Risks
HIPAA
• Tracking
– Monitor log-in attempts
HIPAA
• Tracking
– Monitor log-in attempts
• Protecting
– Protect, detect, contain, and correct security violations
– Detect breaches and notify impacted individuals
HIPAA
• Tracking
– Monitor log-in attempts
• Protecting
– Protect, detect, contain, and correct security violations
– Detect breaches and notify impacted individuals
• Planning
– Implement security measures to reduce risks and vulnerabilities
– Implement procedures to regularly review audit logs, access reports,
and security incidents
– Implement procedures to terminate access
SQL Server Features for Compliance
• Reporting
– SQL Server Audit
– Temporal Tables
SQL Server Features for Compliance
• Reporting
– SQL Server Audit
– Temporal Tables
• Tracking
– Object Level Permissions
– Role-Based Security
SQL Server Features for Compliance
• Reporting
– SQL Server Audit
– Temporal Tables
• Tracking
– Object Level Permissions
– Role-Based Security
• Protection
– Authentication Protocols
– Firewalls
– Dynamic Data Masking
– Transport Level Security (TLS)
– Encryption Protocols (TDE, Always Encrypted, Always On)
Oracle Features for Compliance
• Reporting
– Auditing
Oracle Features for Compliance
• Reporting
– Auditing
• Tracking
– Access Control
– Separation of Duties
Oracle Features for Compliance
• Reporting
– Auditing
• Tracking
– Access Control
– Separation of Duties
• Protection
– Encryption
– Security Monitoring and Alerting
– Data Masking and Data Redaction
Oracle Features for Compliance
• Reporting
– Auditing
• Tracking
– Access Control
– Separation of Duties
• Protection
– Encryption
– Security Monitoring and Alerting
– Data Masking and Data Redaction
• Assessing
– Risk Assessments
• Reporting
– Capture Activity On Database (DDL And DML)
– Track The Behavior Of Privileged Users
– Track Who Is Accessing Your Sensitive Data
– Track Who Has Changed Your Data And What Has It Changed To
– Track Security And Administrative Changes
– Track User-Defined Events
– Audit Systems Tables, Stored Procedures, Views, Indexes, Etc.
What Can Tools Like SQL
Compliance Manager Do?
• Reporting
– Capture Activity On Database (DDL And DML)
– Track The Behavior Of Privileged Users
– Track Who Is Accessing Your Sensitive Data
– Track Who Has Changed Your Data And What Has It Changed To
– Track Security And Administrative Changes
– Track User-Defined Events
– Audit Systems Tables, Stored Procedures, Views, Indexes, Etc.
• Tracking
– Capture Logins, Logouts, Failed Logins
What Can Tools Like SQL
Compliance Manager Do?
What Can Tools Like SQL
Compliance Manager Do?
• Reporting
– Capture Activity On Database (DDL And DML)
– Track The Behavior Of Privileged Users
– Track Who Is Accessing Your Sensitive Data
– Track Who Has Changed Your Data And What Has It Changed To
– Track Security And Administrative Changes
– Track User-Defined Events
– Audit Systems Tables, Stored Procedures, Views, Indexes, Etc.
• Tracking
– Capture Logins, Logouts, Failed Logins
• Protecting
– Determine How Much Data Was Accessed In A Breach
IDERA Products Can Help You
With:
• Reporting (and Maintaining) Audit Data
– SQL Compliance Manager
• Tracking User Access
– SQL Compliance Manager
• Protecting the Data from the Bad Guys (and Watch for Data Breaches)
– SQL Compliance Manager
– SQL Secure
• Planning and Having Good Processes and Response Plans
– SQL Compliance Manager
– SQL Secure
– ER/Studio Business Architect
• Assessing Your Risks
– SQL Compliance Manager
– SQL Secure
In Conclusion
▪ Data breach continues to be a growing problem
In Conclusion
▪ Data breach continues to be a growing problem
▪ Regulations require organizations to:
– Report audit data
– Track user access
– Protect data from the bad guys
– Have good processes and response plans
– Understand what your risks are
In Conclusion
▪ Data breach continues to be a growing problem
▪ Regulations require organizations to:
– Report audit data
– Track user access
– Protect data from the bad guys
– Have good processes and response plans
– Understand what your risks are
▪ The right tools can help to simplify and automate the
auditing process
Demo
Questions
Try any of our tools for free!
Email: stan.geiger@idera.com
kim.brushaber@idera.com
www.idera.com

Mais conteúdo relacionado

Mais procurados

2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian PresentationCityAge
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideFelipe Prado
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility moderobint2125
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...Skoda Minotti
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 

Mais procurados (20)

HIPAA
HIPAAHIPAA
HIPAA
 
Hipaa ppt june 6 2014
Hipaa ppt june 6 2014Hipaa ppt june 6 2014
Hipaa ppt june 6 2014
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian Presentation
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
2016-04-21 HIPAA
2016-04-21 HIPAA2016-04-21 HIPAA
2016-04-21 HIPAA
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 

Semelhante a Geek Sync | Keep your Healthcare Databases Secure and Compliant

MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare ConfidentialityMercywilliam2
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare ConfidentialityMercywilliam2
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYDenise Masella
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationfalane
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2martykoepke
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare systempfor2012
 
HIPAA week1
HIPAA week1HIPAA week1
HIPAA week1wbryant1
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersJason Karn
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 

Semelhante a Geek Sync | Keep your Healthcare Databases Secure and Compliant (20)

MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Phi masella
Phi masellaPhi masella
Phi masella
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
 
HIPAA week1
HIPAA week1HIPAA week1
HIPAA week1
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for Researchers
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
How good we are in adhering HIPAA rules
How good we are in adhering HIPAA rulesHow good we are in adhering HIPAA rules
How good we are in adhering HIPAA rules
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 

Mais de IDERA Software

The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...IDERA Software
 
Problems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloudProblems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloudIDERA Software
 
Public cloud uses and limitations
Public cloud uses and limitationsPublic cloud uses and limitations
Public cloud uses and limitationsIDERA Software
 
Optimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptxOptimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptxIDERA Software
 
Monitor cloud database with SQL Diagnostic Manager for SQL Server
Monitor cloud database with SQL Diagnostic Manager for SQL ServerMonitor cloud database with SQL Diagnostic Manager for SQL Server
Monitor cloud database with SQL Diagnostic Manager for SQL ServerIDERA Software
 
Database administrators (dbas) face increasing pressure to monitor databases
Database administrators (dbas) face increasing pressure to monitor databasesDatabase administrators (dbas) face increasing pressure to monitor databases
Database administrators (dbas) face increasing pressure to monitor databasesIDERA Software
 
Six tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costsSix tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costsIDERA Software
 
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021:  The Power of Abstraction by Steve HobermanIdera live 2021:  The Power of Abstraction by Steve Hoberman
Idera live 2021: The Power of Abstraction by Steve HobermanIDERA Software
 
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian FlugIdera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian Flug
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian FlugIDERA Software
 
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...IDERA Software
 
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021:  Managing Digital Transformation on a Budget by Bert ScalzoIdera live 2021:  Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Digital Transformation on a Budget by Bert ScalzoIDERA Software
 
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...IDERA Software
 
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...IDERA Software
 
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...IDERA Software
 
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021:  Performance Tuning Azure SQL Database by Monica RathbunIdera live 2021:  Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021: Performance Tuning Azure SQL Database by Monica RathbunIDERA Software
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAGeek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAIDERA Software
 
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...IDERA Software
 
Benefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERABenefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERAIDERA Software
 
Achieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERAAchieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERAIDERA Software
 
Benefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERABenefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERAIDERA Software
 

Mais de IDERA Software (20)

The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
 
Problems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloudProblems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloud
 
Public cloud uses and limitations
Public cloud uses and limitationsPublic cloud uses and limitations
Public cloud uses and limitations
 
Optimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptxOptimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptx
 
Monitor cloud database with SQL Diagnostic Manager for SQL Server
Monitor cloud database with SQL Diagnostic Manager for SQL ServerMonitor cloud database with SQL Diagnostic Manager for SQL Server
Monitor cloud database with SQL Diagnostic Manager for SQL Server
 
Database administrators (dbas) face increasing pressure to monitor databases
Database administrators (dbas) face increasing pressure to monitor databasesDatabase administrators (dbas) face increasing pressure to monitor databases
Database administrators (dbas) face increasing pressure to monitor databases
 
Six tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costsSix tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costs
 
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021:  The Power of Abstraction by Steve HobermanIdera live 2021:  The Power of Abstraction by Steve Hoberman
Idera live 2021: The Power of Abstraction by Steve Hoberman
 
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian FlugIdera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian Flug
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
 
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
 
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021:  Managing Digital Transformation on a Budget by Bert ScalzoIdera live 2021:  Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
 
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
 
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
 
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...Idera live 2021:  Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
 
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021:  Performance Tuning Azure SQL Database by Monica RathbunIdera live 2021:  Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAGeek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
 
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
 
Benefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERABenefits of Third Party Tools for MySQL | IDERA
Benefits of Third Party Tools for MySQL | IDERA
 
Achieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERAAchieve More with Less Resources | IDERA
Achieve More with Less Resources | IDERA
 
Benefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERABenefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERA
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Geek Sync | Keep your Healthcare Databases Secure and Compliant

  • 1. Keep Your Healthcare Databases Secure and Compliant Kim Brushaber, Senior Product Manager, IDERA Stan Geiger, Director, Product Management, Multi-Platform Tools, IDERA
  • 2. Agenda ▪ Overview ▪ What is HIPAA? ▪ HIPAA Violations ▪ Data Breaches ▪ Data Compliance ▪ Demo ▪ Questions
  • 3. Overview ▪ Healthcare Regulations – The Social Security Act governs funding and requirements for Medicare, Medicaid, CHIP, and more. – HIPAA and the HITECH Act protect patient privacy, requiring healthcare organizations to implement measures to keep patient records secure. – Federal Information Security Management Act (FISMA) – The False Claims Act makes it illegal to file a false claim for funds from a federal program. – The Patient Protection and Affordable Care Act implemented new requirements for insurance, Medicaid, and more.
  • 4. HIPAA ▪ The Privacy Rule establishes a set of standards that address how patient information can be used and disclosed. ▪ Applies to three entity types: – Health care providers – Health plans – Health care clearinghouses
  • 5. HIPAA ▪ Health care providers – Any provider that electronically transmits patient information in connection with claims, eligibility requests, referral authorizations, or similar transactions – Applicable transaction types are specified in the HIPAA Transactions Rule
  • 6. HIPAA ▪ Health plans – Individual and group plans that provide or pay the cost of medical care – Entities • Health maintenance organizations (HMOs) • Medicare • Medicaid • Health or dental insurers • Employer-sponsored group health plans
  • 7. HIPAA ▪ Health care clearinghouses – Entities that process patient data on behalf of health plans or health care providers – Transforms the data in some way from a nonstandard format to a standard format – Included organizations: • Billing services • Community health management information services.
  • 8. HIPAA ▪ Privacy Rule – Protects all individually identifiable health information – Identifiable information • The patient’s past, preset, or future physical or mental health • Any health care services that the patient has received • Any payment information related to the patient’s care that can be used to identify the patient
  • 9. Penalties ▪ Penalties – Fines of $100 to $50,000 or more per violation – Calendar cap of $1.5 million – Individuals can also face criminal penalties up to $250,000 and 10 years imprisonment
  • 10. HIPAA ▪ Electronic PHI – Ensure the integrity, confidentiality, and availability of all e- PHI data in their possession. – Identify and protect against anticipated threats to the e-PHI data. – Protect against anticipated non-permitted uses or disclosures. – Ensure that e-PHI data is not available to or disclosed to non-authorized individuals in the workforce.
  • 11. HIPAA ▪ Electronic PHI security – Protection standards • Administrative protections • Physical protections • Technical protections
  • 12. HIPAA and the DBA ▪ Ensure the confidentiality, integrity, and availability of all electronic PHI data ▪ Prevent unauthorized individuals from viewing, altering, or destroying the data, while providing authorized users access ▪ Identify and protect against anticipated threats as well as impermissible uses or disclosures
  • 13. HIPAA and the DBA ▪ Training – Covered entity must train all workforce members on the policies and procedures with respect to protecting PHI data. – Covered entity should apply sanctions against workforce members who fail to comply with the policies and procedures. – DBAs will participate in the process of writing policies and procedures and training workforce members depending on the organization and their circumstance. – DBAs should fully understand the risks associated with violating HIPAA regulations and what steps to take if they discover a violation.
  • 14. HIPAA and the DBA ▪ Securing environment – Covered entity must assess the potential risks and vulnerabilities to the electronic PHI and then implement security measures to reduce those risks. – Implement procedures for guarding against malicious software as well as for managing and protecting passwords. – Implement mechanisms for limiting and controlling physical access to systems and facilities that house PHI data, while providing for disaster recovery and emergency access. – Implement safeguards that protect workstations accessing PHI data, along with any other hardware or electronic media used for sensitive data. – Responsible for the proper disposition of PHI data from any hardware or media on which it has resided.
  • 15. HIPAA and the DBA ▪ Controlling access – Ensure that workforce members have “appropriate access” to electronic PHI, based on their roles in the organization. – Implement procedures for authorizing workforce members, supervising their access to data, determining whether that access is appropriate, and terminating that access when required. – Assign a unique ID to each user for identifying and tracking that user’s activities. – Implement procedures for obtaining PHI data during an emergency, terminating electronic sessions after a predetermined time of inactivity, and encrypting and decrypting PHI data.
  • 16. HIPAA and the DBA ▪ Auditing and monitoring systems – Implement procedures for monitoring log-in attempts and reporting discrepancies. – Implement “hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. – Implement electronic mechanisms to verify that the PHI data has not been “altered or destroyed in an unauthorized manner.”
  • 17. HIPAA and the DBA ▪ Prepare for security incidents – Provide individuals with a process for making complaints about the organization’s policies and procedures or about its compliance with those policies and procedures. – You cannot retaliate against individuals who exercise their rights, as provided by the Privacy Rule. – Take the steps necessary to mitigate any harmful effects that result from PHI data being compromised. – Identify and respond to “suspected or known security incidents; mitigate, to the extent practicable security incidents that are known and document security incidents and their outcomes.”
  • 18. HIPAA and the DBA ▪ Document, document, document – Sanctions against workforce members must be documented, as well as all policies and procedures. – Documentation must be retained for six years from the creation date or when it was last in effect, whichever is later. – Maintain a “record of the movements of hardware and electronic media and any person responsible therefore.” – Documentation should be updated as needed in response to environmental or operational changes.
  • 21. Fired Surgeon Sentenced to Prison • Huping Zhou, former cardiothoracic surgeon, was fired from his job as a researcher at the UCLA School of Medicine
  • 22. Fired Surgeon Sentenced to Prison • Huping Zhou, former cardiothoracic surgeon, was fired from his job as a researcher at the UCLA School of Medicine • After being fired, he illegally accessed the UCLA Medical Records over 300 times
  • 23. Fired Surgeon Sentenced to Prison • Huping Zhou, former cardiothoracic surgeon, was fired from his job as a researcher at the UCLA School of Medicine • After being fired, he illegally accessed the UCLA Medical Records over 300 times • He viewed records on his immediate supervisor, his coworkers, and several celebrities (including Arnold Schwarzenegger, Drew Barrymore, Leonardo DiCaprio, and Tom Hanks)
  • 24. Fired Surgeon Sentenced to Prison • Huping Zhou, former cardiothoracic surgeon, was fired from his job as a researcher at the UCLA School of Medicine • After being fired, he illegally accessed the UCLA Medical Records over 300 times • He viewed records on his immediate supervisor, his coworkers, and several celebrities (including Arnold Schwarzenegger, Drew Barrymore, Leonardo DiCaprio, and Tom Hanks) • OUTCOME: He was sentenced to 4 months in jail and a $2000 fine
  • 25. Billing Gone Wrong • Dr. Barry Helfmann, president-elect of the American Group Psychotherapy Association
  • 26. Billing Gone Wrong • Dr. Barry Helfmann, president-elect of the American Group Psychotherapy Association • His employees regularly forwarded past due patient bills to collections firms
  • 27. Billing Gone Wrong • Dr. Barry Helfmann, president-elect of the American Group Psychotherapy Association • His employees regularly forwarded past due patient bills to collections firms • The bills contained protected info like CPT codes which can reveal patient diagnoses
  • 28. Billing Gone Wrong • Dr. Barry Helfmann, president-elect of the American Group Psychotherapy Association • His employees regularly forwarded past due patient bills to collections firms • The bills contained protected info like CPT codes which can reveal patient diagnoses • OUTCOME: The State of New Jersey sought to suspend and revoke Helfmann’s license
  • 29. Sorry, Wrong Number • In 2013, an HIV-positive patient asked an office manager to fax his medical records to his new urologist
  • 30. Sorry, Wrong Number • In 2013, an HIV-positive patient asked an office manager to fax his medical records to his new urologist • The very busy office manager accidentally faxed them to the man’s new employer
  • 31. Sorry, Wrong Number • In 2013, an HIV-positive patient asked an office manager to fax his medical records to his new urologist • The very busy office manager accidentally faxed them to the man’s new employer • OUTCOME: Luckily, the result was only a sternly worded warning and a mandate for regular HIPAA training for all employees
  • 32. Caught Red-Handed • A Virginia clinic caught 14 employees who had improperly viewed the medical files of a high profile patient without a legitimate need
  • 33. Caught Red-Handed • A Virginia clinic caught 14 employees who had improperly viewed the medical files of a high profile patient without a legitimate need • The clinic caught the employees thanks to a logging system on the backend of their IT systems which tracked all access to files containing personal health information
  • 34. Caught Red-Handed • A Virginia clinic caught 14 employees who had improperly viewed the medical files of a high profile patient without a legitimate need • The clinic caught the employees thanks to a logging system on the backend of their IT systems which tracked all access to files containing personal health information • OUTCOME: The 14 employees were dismissed from their jobs
  • 35. Oops, I Did It Again • In 2008, six doctors and thirteen employees at UCLA Medical Center viewed Britney Spears’ medical records after her 2008 psychiatric hospitalization
  • 36. Oops, I Did It Again • In 2008, six doctors and thirteen employees at UCLA Medical Center viewed Britney Spears’ medical records after her 2008 psychiatric hospitalization • Many of the employees were non-medical support staff and none of them had a legitimate medical need to view the health records
  • 37. Oops, I Did It Again • In 2008, six doctors and thirteen employees at UCLA Medical Center viewed Britney Spears’ medical records after her 2008 psychiatric hospitalization • Many of the employees were non-medical support staff and none of them had a legitimate medical need to view the health records • This was the 2nd breach involving Britney Spears – in 2005, staff at another UCLA hospital were caught peeking at her records after her son was born
  • 38. Oops, I Did It Again • In 2008, six doctors and thirteen employees at UCLA Medical Center viewed Britney Spears’ medical records after her 2008 psychiatric hospitalization • Many of the employees were non-medical support staff and none of them had a legitimate medical need to view the health records • This was the 2nd breach involving Britney Spears – in 2005, staff at another UCLA hospital were caught peeking at her records after her son was born • OUTCOME: The 13 employees were fired and the 6 doctors were suspended
  • 39. Reality TV Ain’t What It Used to Be • In 2013, an ABC reality TV show called NY Med filmed two hospital patients at New York–Presbyterian Hospital without their consent
  • 40. Reality TV Ain’t What It Used to Be • In 2013, an ABC reality TV show called NY Med filmed two hospital patients at New York–Presbyterian Hospital without their consent • During the filming, one of the patients died in the emergency room
  • 41. Reality TV Ain’t What It Used to Be • In 2013, an ABC reality TV show called NY Med filmed two hospital patients at New York–Presbyterian Hospital without their consent • During the filming, one of the patients died in the emergency room • The hospital gave ABC unfettered access, creating a situation where the protection of personal health information was not possible
  • 42. Reality TV Ain’t What It Used to Be • In 2013, an ABC reality TV show called NY Med filmed two hospital patients at New York–Presbyterian Hospital without their consent • During the filming, one of the patients died in the emergency room • The hospital gave ABC unfettered access, creating a situation where the protection of personal health information was not possible • OUTCOME: The hospital paid a $2.2 million settlement
  • 44. HIPAA Violations – 2018 In October, Anthem, Inc. (a licensee of BCBS) agreed to pay a record breaking $16 million after the largest health data breach in US history affected almost 79 million people. https://www.hhs.gov/about/news/2018/10/15/anthem-pays-ocr-16-million-record-hipaa-settlement-following-largest-health-data-breach-history.html 4 4
  • 45. In September, three healthcare institutions were collectively fined $999,000 after allowing ABC to film a medical documentary TV series without first obtaining authorization from the patients. https://www.hhs.gov/about/news/2018/09/20/unauthorized-disclosure-patients-protected-health-information-during-abc-filming.html 4 5 HIPAA Violations – 2018
  • 46. In September, three healthcare institutions were collectively fined $999,000 after allowing ABC to film a medical documentary TV series without first obtaining authorization from the patients. ABC didn’t learn from 2013 https://www.hhs.gov/about/news/2018/09/20/unauthorized-disclosure-patients-protected-health-information-during-abc-filming.html 4 6 HIPAA Violations – 2018
  • 47. In June, UT’s MD Anderson Cancer Center was fined $4.3 million due to the theft of an unencrypted laptop and the loss of two unencrypted USB drives. The hardware contained details on 33,500 individuals. https://www.hhs.gov/about/news/2018/06/18/judge-rules-in-favor-of-ocr-and-requires-texas-cancer-center-to-pay-4.3-million-in-penalties-for-hipaa-violations.html 4 7 HIPAA Violations – 2018
  • 48. In February, FMCNA who provided products and services to 170,000 patients with chronic kidney disease agreed to pay a $3.5 million fine for a settlement that covered 5 different data breaches. https://www.hhs.gov/about/news/2018/02/01/five-breaches-add-millions-settlement-costs-entity-failed-heed-hipaa-s-risk-analysis-and-risk.html 4 8 HIPAA Violations – 2018
  • 49. Let’s Talk A Little About Data Breach
  • 50. In February of 2019, there were a total of 101 data breaches which exposed over 2M sensitive records and 417M non-sensitive records. 96% of the sensitive records exposed were through breaches in the Medical/Healthcare sector. https://www.idtheftcenter.org/2019-data-breaches/
  • 51. Almost 15 Billion Records have been lost or stolen since 2013. Only 4% were secure breaches where encryption was used and the stolen data was useless. BreachLevelIndex.com
  • 52. Over 6.5 million data records are lost or stolen every day. http://breachlevelindex.com/
  • 53. 2018 Cost per Data Breach
  • 54. 2018 Cost per Data Breach • The average cost for each lost or stolen record containing sensitive and confidential information was $148 (a 4.8% increase from the year before) https://www.ibm.com/security/data-breach
  • 55. 2018 Cost per Data Breach • The average cost for each lost or stolen record containing sensitive and confidential information was $148 (a 4.8% increase from the year before) • The average size of a data breach was 26,000 records https://www.ibm.com/security/data-breach
  • 56. 2018 Cost per Data Breach • The average cost for each lost or stolen record containing sensitive and confidential information was $148 (a 4.8% increase from the year before) • The average size of a data breach was 26,000 records • $148 x 26,000 ~ $3.86 M (increased 6.4% over 2017) https://www.ibm.com/security/data-breach
  • 58. Focusing in on the Data Aspects of Regulations
  • 59. Why We Have Regulations • Improved Security – Establishing a baseline keeps security levels relatively consistent across companies and industries
  • 60. Why We Have Regulations • Improved Security – Establishing a baseline keeps security levels relatively consistent across companies and industries • Minimize Loss – Good practices in place prevents data breaches
  • 61. Why We Have Regulations • Improved Security – Establishing a baseline keeps security levels relatively consistent across companies and industries • Minimize Loss – Good practices in place prevents data breaches • Increase Internal Control – Reduce employee mistakes and insider theft
  • 62. Why We Have Regulations • Improved Security – Establishing a baseline keeps security levels relatively consistent across companies and industries • Minimize Loss – Good practices in place prevents data breaches • Increase Internal Control – Reduce employee mistakes and insider theft • Maintain Trust – Customers trust people who follow set standards
  • 63. Why We Have Regulations • Improved Security – Establishing a baseline keeps security levels relatively consistent across companies and industries • Minimize Loss – Good practices in place prevents data breaches • Increase Internal Control – Reduce employee mistakes and insider theft • Maintain Trust – Customers trust people who follow set standards • Reporting Consistency – Consistent reports allow audits to go more smoothly
  • 64. Data Standards vs Security Standards • Data Standards: “WHAT” – What information needs to be protected/audited – What you should do if your data is breached • Security Standards: “HOW” – How you should configure your network – How you should configure your systems (i.e. SQL Server, Oracle)
  • 65. What the Regulations Look For • Reporting (and Maintaining) Audit Data
  • 66. What the Regulations Look For • Reporting (and Maintaining) Audit Data • Tracking User Access
  • 67. What the Regulations Look For • Reporting (and Maintaining) Audit Data • Tracking User Access • Protecting the Data from the Bad Guys (and Watch for Data Breaches)
  • 68. What the Regulations Look For • Reporting (and Maintaining) Audit Data • Tracking User Access • Protecting the Data from the Bad Guys (and Watch for Data Breaches) • Planning and Having Good Processes and Response Plans
  • 69. What the Regulations Look For • Reporting (and Maintaining) Audit Data • Tracking User Access • Protecting the Data from the Bad Guys (and Watch for Data Breaches) • Planning and Having Good Processes and Response Plans • Assessing Your Risks
  • 71. HIPAA • Tracking – Monitor log-in attempts • Protecting – Protect, detect, contain, and correct security violations – Detect breaches and notify impacted individuals
  • 72. HIPAA • Tracking – Monitor log-in attempts • Protecting – Protect, detect, contain, and correct security violations – Detect breaches and notify impacted individuals • Planning – Implement security measures to reduce risks and vulnerabilities – Implement procedures to regularly review audit logs, access reports, and security incidents – Implement procedures to terminate access
  • 73. SQL Server Features for Compliance • Reporting – SQL Server Audit – Temporal Tables
  • 74. SQL Server Features for Compliance • Reporting – SQL Server Audit – Temporal Tables • Tracking – Object Level Permissions – Role-Based Security
  • 75. SQL Server Features for Compliance • Reporting – SQL Server Audit – Temporal Tables • Tracking – Object Level Permissions – Role-Based Security • Protection – Authentication Protocols – Firewalls – Dynamic Data Masking – Transport Level Security (TLS) – Encryption Protocols (TDE, Always Encrypted, Always On)
  • 76. Oracle Features for Compliance • Reporting – Auditing
  • 77. Oracle Features for Compliance • Reporting – Auditing • Tracking – Access Control – Separation of Duties
  • 78. Oracle Features for Compliance • Reporting – Auditing • Tracking – Access Control – Separation of Duties • Protection – Encryption – Security Monitoring and Alerting – Data Masking and Data Redaction
  • 79. Oracle Features for Compliance • Reporting – Auditing • Tracking – Access Control – Separation of Duties • Protection – Encryption – Security Monitoring and Alerting – Data Masking and Data Redaction • Assessing – Risk Assessments
  • 80. • Reporting – Capture Activity On Database (DDL And DML) – Track The Behavior Of Privileged Users – Track Who Is Accessing Your Sensitive Data – Track Who Has Changed Your Data And What Has It Changed To – Track Security And Administrative Changes – Track User-Defined Events – Audit Systems Tables, Stored Procedures, Views, Indexes, Etc. What Can Tools Like SQL Compliance Manager Do?
  • 81. • Reporting – Capture Activity On Database (DDL And DML) – Track The Behavior Of Privileged Users – Track Who Is Accessing Your Sensitive Data – Track Who Has Changed Your Data And What Has It Changed To – Track Security And Administrative Changes – Track User-Defined Events – Audit Systems Tables, Stored Procedures, Views, Indexes, Etc. • Tracking – Capture Logins, Logouts, Failed Logins What Can Tools Like SQL Compliance Manager Do?
  • 82. What Can Tools Like SQL Compliance Manager Do? • Reporting – Capture Activity On Database (DDL And DML) – Track The Behavior Of Privileged Users – Track Who Is Accessing Your Sensitive Data – Track Who Has Changed Your Data And What Has It Changed To – Track Security And Administrative Changes – Track User-Defined Events – Audit Systems Tables, Stored Procedures, Views, Indexes, Etc. • Tracking – Capture Logins, Logouts, Failed Logins • Protecting – Determine How Much Data Was Accessed In A Breach
  • 83. IDERA Products Can Help You With: • Reporting (and Maintaining) Audit Data – SQL Compliance Manager • Tracking User Access – SQL Compliance Manager • Protecting the Data from the Bad Guys (and Watch for Data Breaches) – SQL Compliance Manager – SQL Secure • Planning and Having Good Processes and Response Plans – SQL Compliance Manager – SQL Secure – ER/Studio Business Architect • Assessing Your Risks – SQL Compliance Manager – SQL Secure
  • 84. In Conclusion ▪ Data breach continues to be a growing problem
  • 85. In Conclusion ▪ Data breach continues to be a growing problem ▪ Regulations require organizations to: – Report audit data – Track user access – Protect data from the bad guys – Have good processes and response plans – Understand what your risks are
  • 86. In Conclusion ▪ Data breach continues to be a growing problem ▪ Regulations require organizations to: – Report audit data – Track user access – Protect data from the bad guys – Have good processes and response plans – Understand what your risks are ▪ The right tools can help to simplify and automate the auditing process
  • 87. Demo
  • 89. Try any of our tools for free! Email: stan.geiger@idera.com kim.brushaber@idera.com www.idera.com