SlideShare a Scribd company logo
1 of 42
#rightscale
HIPAA in Public Cloud
The Rules Have Been Set
Watch the video of this presentation
#rightscale
#2
Your Panel Today
Presenting
• Phil Cox, Director of Security and Compliance, RightScale
Q&A
• Ryan Geyer, Cloud Solutions Engineer, RightScale
• Michael Curry, Account Manager, RightScale
Please use the “Questions” window
to ask questions any time!
#rightscale
#3
Introduction
• On January 25, 2013, HHS released the Omnibus Rule which
finalized all the former HIPAA/HITECH interim rules
• Most of this session will be about HIPAA/HITECH and not
necessarily cloud (if you don‟t understand the former, you‟ll have
no clue how to applies it to the latter)
#rightscale
#4
#rightscalecompute
My Core Message for Today:
HIPAA compliance in
public cloud is about
governance
#rightscale
#5
Can Using RightScale Help?
• RightScale‟s management features can be helpful as companies
work to comply with HIPAA:
• Monitoring
• Access control
• Audit trails
• ServerTemplate
• Advanced monitoring and auditing capabilities are best practices
that will help you comply with HIPAA regulations
• Gives visibility into system access and configurations when
performing a risk assessment after an allegation of a breach
#rightscale
#6
Healthcare in the Cloud with RightScale
• Developed self-service lab
environments
• Reduced provisioning time from
25 days to 30 minutes
• Measures costs in cents per hour
for compute and storage
• Integrated public and private
clouds
• Satisfied regulatory and audit
requirements
• Automated provisioning for
Windows environments
#rightscale
#7
Agenda
• Quick HIPAA level set
• Key Rules
• Wrap-up
#rightscale
#8
Important Terms
• Covered Entity:
• A health plan, A health care clearinghouse, A health care provider who
transmits any health information in electronic form in connection with a
transaction
• Business Associate: Operates on behalf of a CE
• Think: function or activity involving the use or disclosure of individually
identifiable health information: claims processing or administration, data
analysis, processing or administration, utilization review, quality
assurance, billing, benefit management, etc.
• Protected Healthcare Information
• Think Individually identifiable health information:
• Any demographic information related to the condition, provision or
payment of health care to an individual
• Identifies the individual
#rightscale
#9
More Term Definition
• HHS – US Department of Health and Human Services. Basically
the ones that make the rules 
• Secretary – Runs HHS
• NIST – National Institute of Standards and Technology (US). The
US federal technology agency that, for our purposes, works with
industry to develop technology standards and guidance.
• US Federal government defers to NIST tech publications and standards
for just about everything.
#rightscale
#10
About HIPAA
• HIPAA is the Health Insurance Portability and Accountability Act
of 1996
• Title II: Preventing Health Care Fraud and Abuse; Administrative
Simplification; Medical Liability Reform
• Defines policies, procedures and guidelines for maintaining the privacy
and security of individually identifiable health
• 3 Main “Rules” from the Administrative Simplification Rules
• Privacy Rule
• Security Rule
• Breach Notification Rule
• More about these later …
#rightscale
#11
About HITECH
• HITECH Act, part of the American Recovery and Reinvestment
Act of 2009
• Made law February 17, 2009 (13 years after HIPAA)
• Is the “enforcement” rule that gave HIPAA teeth
#rightscale
#12
Back to HIPAA: The “3 Main Rules”
• They apply to covered entities and business associates
• Privacy: Impose controls around preventing unauthorized
disclosure of protected healthcare information in any form
• Security: Purpose is to prevent unauthorized electronic access
to protected healthcare information
• Breach Notification: Purpose is to ensure timely notification of
affected parties in event of a failure in the above 2 controls
#rightscale
#13
Privacy Rule Primer
• Requires appropriate safeguards to protect the privacy of
personal health information
• Sets limits and conditions on the uses and disclosures that
may be made of such information without patient authorization
• All about authorized disclosure
#rightscale
#14
Security Rule Primer
• Maintain reasonable and appropriate administrative, technical,
and physical safeguards for protecting e-PHI
• Specifically:
• Ensure the confidentiality, integrity, and availability of all e-PHI they
create, receive, maintain or transmit;
• Identify and protect against reasonably anticipated threats to the security
or integrity of the information;
• Protect against reasonably anticipated, impermissible uses or disclosures;
and
• Ensure compliance by their workforce
• Required and Addressable Implementation Specifications
• “Required" implementation specifications must be implemented
• “Addressable" permits entities to adopt an alternative measure that
achieves the purpose of the standard
#rightscale
#15
Breach Notification Primer
• Notification required if breach involved unsecured protected
health information
• Unsecured is PHI that has not been rendered unusable, unreadable, or
indecipherable to unauthorized individuals
• Covered entities must notify
• Affected individuals
• Prominent media outlets serving the State or jurisdiction if >500 residents
• Notify HHS within 60 days (if <500 can do annually)
• Business Associate must notify the covered entity (w/in 60 days)
• Burden of proof
• All required notifications have been provided –OR–
• Disclosure did not constitute a breach
#rightscale
#16
Key Issues When Dealing with “Cloud”
• Per the recent NIST conference:
• Location
• Where is PHI? – geo location
• Providers need to give assurance and warrants
• Breach
• What does the provider do to prevent breaches of PHI?
• If there is a breach, what is the response capability?
• Access
• Proper controls to limit access
• Monitoring – Can provider give the following
• Not only modifications, but read/print too?
• Any access?
#rightscale
#17
Agenda
• Quick HIPAA level set
• Key Rules
• Wrap-up
#rightscale
#18
Changes Affecting HIPAA & Public Cloud
• Business Associates
• Breach notification
• State law preemption
• Use of PHI in Marketing
• Application of HIPAA to hybrid entities
#rightscale
#19
Business Associate
• By law, the HIPAA Privacy Rule applied only to covered entities
• The Privacy Rule allows covered providers and health plans to
disclose protected health information to these “business
associates” if the providers or plans obtain satisfactory
assurances that the business associate will use the information
only for the purposes for which it was engaged by the covered
entity, will safeguard the information from misuse, and will help
the covered entity comply with some of the covered entity‟s
duties under the Privacy Rule.
#rightscale
#20
Who Is a Business Associate?
• Those who will create, receive, maintain, or transmit protected
health information for a covered entity
• Generally a person who performs functions or activities on behalf of, or
certain services for, a covered entity that involve the use or disclosure of
protected health information.
• New: Specific call out for
• Patient Safety Organizations
• Health Information Organizations (HIO), E-Prescribing Gateways, and
Other Persons That Facilitate Data Transmission; as Well as Vendors of
Personal Health Records
• Subcontractors {recursive}
#rightscale
#21
There are Exceptions
• Incidental Access: With persons or organizations (e.g.,
janitorial service or electrician) whose functions or services do
not involve the use or disclosure of protected health information,
and where any access to protected health information by such
persons would be incidental, if at all.
• Conduit: With a person or organization that acts merely as a
conduit for protected health information, for example, the US
Postal Service, certain private couriers, and their electronic
equivalents…
#rightscale
#22
Conduit Exception Clarification
• ... We note that the conduit exception is limited to
transmission services (whether digital or hard copy)… In
contrast, an entity that maintains protected health information on
behalf of a covered entity is a business associate and not a
conduit, even if the entity does not actually view the protected
health information…the difference between the two situations is
the transient versus persistent nature of that opportunity.
For example, a data storage company that has access to
protected health information (whether digital or hard copy)
qualifies as a business associate, even if the entity does not
view the information or only does so on a random or infrequent
basis. (emphasis added)
#rightscale
#23
Why BA Focus?
• 1/3 of all breaches related to 3rd parties
• 55% of people affected related to 3rd parties
• So a 3rd party disclosure has a larger impact than a non-3rd party
#rightscale
#24
HHS Theme with BA
• Persistency of data, not degree of access is the key driver
• Focus on:
• Security rule: Tech, Admin, Physical
• Privacy rule: Use and disclosure
• Direct liability
• Criminal & Civil
• Flows to sub-contractors
• Does encryption remove you from BA?
• At this time, as I understand it, NO.
• More on this in a bit …
#rightscale
#25
What HHS Is Pushing
• Trend is more towards risk
• Beef up contracts WRT security
• Represent and warrant that they meet the controls that are specified in the appendix of the
contract/agreement
• Pre-contract assessment (quick hit)
• Post contract audit
• Risk Assessment
• Short form
• What PHI
• Where is it
• Use that to assess risk and identify specific controls for a given BA
#rightscale
#26
Direct Liability & Sub-Contractors
• Modified to implement the HITECH Act‟s provisions extending
direct liability for compliance to business associates
• Now directly liable for civil money penalties
• A subcontractor that creates, receives, maintains, or transmits
protected health information on behalf of a business associate,
including with respect to personal health record functions, is a
HIPAA business associate
• BA must have a BAA with subcontractors (just another BA). This is
recursive.
#rightscale
#27
BAA: Is It Optional?
• Per Page 5591
• Comment: One commenter suggested that business associate
agreements should be an „„addressable‟‟ requirement under the
Security Rule.
• Response: The HITECH Act does not remove the requirements
for business associate agreements under the HIPAA Rules.
Therefore, we decline to make the execution of business
associate agreements an „„addressable‟‟ requirement under the
Security Rule.
• If you decide to forego the BAA, make an informed decision …
#rightscale
#28
Changes to Breach Notification Rule
• Clarified the term “Breach”
• Basically guilty until proven innocent
• Changed “risk of harm” to “low probability PHI compromised”
• Means you have to do a risk assessment. Can you? (next slide)
• Changed „„unauthorized individuals‟‟ to „„unauthorized persons.‟‟
• How does the BNR affect you?
• You need to be watching (if not, maybe “willful neglect”?)
• Review is important
• Need to have a mechanism for notification
• Business Associates need to notify Covered Entities
#rightscale
#29
Risk Assessment Considerations
1. Nature and extent of PHI involved
• Types of identifiers and likelihood of re-identification
2. Who accessed/used the information
3. If the PHI was actually acquired/viewed
4. Extent to which the risk to PHI has been mitigated
-OR-
Notify!
#rightscale
#30
What about Encryption?
• If Protected health information (PHI) is rendered unusable,
unreadable, or indecipherable to unauthorized individuals – then
no Breach Notification
• Encryption must be consistent with NIST guidelines:
• NIST Special Publication 800-111 (storage)
• NIST Special Publications 800-52, 800-77 (transit)
• NIST Special Publication 800-88 (destruction)
• Federal Information Processing Standards (FIPS) 140-2 (validated crypto)
• It does not remove you from being a BA, but does limit Breach
notification
• NIST conference seemed to indicate HHS is looking at this.
#rightscale
#31
Preemption of State Law
• HIPAA privacy requirements supersede only contrary provisions
of State law UNLESS State law provides more stringent privacy
protections than the HIPAA Privacy Rule
#rightscale
#32
Marketing & Other Use of PHI
• Marketing communications that involve financial remuneration
• In reality anything other than billing that involves financial remuneration
• Covered entity must obtain a valid authorization from the
individual before using or disclosing
• Authorization must disclose the fact that the covered entity is
receiving financial remuneration from a third party
#rightscale
#33
Hybrid Entities
• Covered entity itself, and not merely the health care
component (HCC)
• If you share PHI with the non HCC part of your org, could be
considered a breach
• Responsible for business associate arrangements and
other organizational requirements
• Hybrid entities may need to execute legal contracts and
conduct other organizational matters at the level of the
legal entity rather than at the level of the health care
component
#rightscale
#34
Consequences
• Fines
• Caps on types, not totals
Violation Category Each Violation Annual cap on
identical violations
Did not know $100-$50,000 $1.5m
Reasonable Cause $1,000-$50,000 $1.5m
Willful Neglect - Corrected $10,000-$50,000 $1.5m
Willful Neglect – Not Corrected $50,000 $1.5m
#rightscale
#35
Real World Example
• Idaho State University (ISU): 17,500 patients at ISU's Pocatello
Family Medicine Clinic.
• The breach was blamed on the disabling of firewall protections, and failure
of ISU to notice the change or the lack of protection.
• Consequences
• $400,000 fine (>$20/account) + internal costs ($200K)
• 2 year Corrective Action Plan, defining enhanced security procedures and
increased reporting to HHS – Likely 1 FTE ($400K over 2 years)
• Proactive:
• A firewall management tool- $40K procurement, $15K second year
maintenance costs and .1 FTE.
• Punch Line: If they had spent $75K could have saved $1M
#rightscale
#36
Timeframes
• Passed January 25th, 2013
• In effect March 26, 2013
• Compliance date is September 23, 2013
• 180 days: “In addition, to make clear to the industry our expectation that
going forward we will provide a 180-day compliance date for future
modifications to the HIPAA Rules …”
#rightscale
#37
Conclusion
• Rules are set, you should read the Omnibus Rule
• Managing your Business Associates are critical
• If you are a Business Associate, you now have direct liability
• You are responsible for your subcontractors and they for their
subcontractors
• Good security, as always, will cover most of what you need.
#rightscale
#38
Can Using RightScale Help?
• RightScale‟s management features can be helpful as companies
work to comply with HIPAA:
• Monitoring
• Access control
• Audit trails
• ServerTemplate
• Advanced monitoring and auditing capabilities are best practices
that will help you comply with HIPAA regulations
• Gives visibility into system access and configurations when
performing a risk assessment after an allegation of a breach
#rightscale
#39
Status on Our Cloud Providers and BAA
• The good news is that several of our cloud providers will sign a
BAA.
• Azure: Will sign a BAA
• Datapipe: On a case-by-case basis
• AWS: No public statement
• We have heard from at least one customer that they were able to get AWS
to sign a BAA
• GCE: Not at this time
• Rackspace: Not at this time
• Softlayer: Not at this time
#rightscale
#40
RightScale and BAA
• We do not “create, receive, maintain, or transmit” PHI
• We do not have access to PHI
• If we are invited to an account, we may have “incidental” access
• RightLink runs on the instance, it does not interact with the
electronic personal health information (ePHI) as part of its
normal operations
• You are not required to sign a BAA with your AV vendor
• Our understanding is that RightScale is not a Business
Associate
#rightscale
#41
Questions?
#rightscale
#42
My Contact Info
• Email: phil@rightscale.com
• Twitter: sec_prof
• Google+: phil@rightscale.com

More Related Content

What's hot

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
The New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and ResponsibilituesThe New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and Responsibilituescomplianceexpert
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
Hipaa random audit
Hipaa random auditHipaa random audit
Hipaa random auditsupportc2go
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Patrick Doyle
 
HIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHostway|HOSTING
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
HSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information GovernanceHSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information GovernanceLGT_IG_Department
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 

What's hot (20)

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
The New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and ResponsibilituesThe New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and Responsibilitues
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Hipaa random audit
Hipaa random auditHipaa random audit
Hipaa random audit
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
 
HIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare Cloud
 
HIPAA Basic Healthcare Guide
HIPAA Basic Healthcare GuideHIPAA Basic Healthcare Guide
HIPAA Basic Healthcare Guide
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
HSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information GovernanceHSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information Governance
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Red7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data ProtectionRed7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data Protection
 
HNI U: HIPAA Essentials
HNI U: HIPAA EssentialsHNI U: HIPAA Essentials
HNI U: HIPAA Essentials
 

Viewers also liked

Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...
Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...
Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...RightScale
 
The Three Stages of Cloud Adoption - RightScale Compute 2013
The Three Stages of Cloud Adoption - RightScale Compute 2013The Three Stages of Cloud Adoption - RightScale Compute 2013
The Three Stages of Cloud Adoption - RightScale Compute 2013RightScale
 
Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013RightScale
 
Cloud Computing for the Enterprise
Cloud Computing for the EnterpriseCloud Computing for the Enterprise
Cloud Computing for the EnterpriseRightScale
 
Seth Gerson, CEO, AltEgo
Seth Gerson, CEO, AltEgoSeth Gerson, CEO, AltEgo
Seth Gerson, CEO, AltEgoRightScale
 
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...RightScale
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013RightScale
 
Windows Applications in the Cloud
Windows Applications in the CloudWindows Applications in the Cloud
Windows Applications in the CloudRightScale
 
The Business Case for Cloud Management - RightScale Compute 2013
The Business Case for Cloud Management - RightScale Compute 2013The Business Case for Cloud Management - RightScale Compute 2013
The Business Case for Cloud Management - RightScale Compute 2013RightScale
 
Rackspace: Unlock Your Cloud - RightScale Compute 2013
Rackspace: Unlock Your Cloud - RightScale Compute 2013Rackspace: Unlock Your Cloud - RightScale Compute 2013
Rackspace: Unlock Your Cloud - RightScale Compute 2013RightScale
 
DevOps Stories: Getting to Agile - RightScale Compute 2013
DevOps Stories: Getting to Agile - RightScale Compute 2013DevOps Stories: Getting to Agile - RightScale Compute 2013
DevOps Stories: Getting to Agile - RightScale Compute 2013RightScale
 
Benefits of Grid Computing in the Cloud
Benefits of Grid Computing in the CloudBenefits of Grid Computing in the Cloud
Benefits of Grid Computing in the CloudRightScale
 
Scaling SQL and NoSQL Databases in the Cloud
Scaling SQL and NoSQL Databases in the Cloud Scaling SQL and NoSQL Databases in the Cloud
Scaling SQL and NoSQL Databases in the Cloud RightScale
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...RightScale
 
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013RightScale
 

Viewers also liked (15)

Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...
Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...
Deployment Checkup: How to Regularly Tune Your Cloud Environment - RightScale...
 
The Three Stages of Cloud Adoption - RightScale Compute 2013
The Three Stages of Cloud Adoption - RightScale Compute 2013The Three Stages of Cloud Adoption - RightScale Compute 2013
The Three Stages of Cloud Adoption - RightScale Compute 2013
 
Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013
 
Cloud Computing for the Enterprise
Cloud Computing for the EnterpriseCloud Computing for the Enterprise
Cloud Computing for the Enterprise
 
Seth Gerson, CEO, AltEgo
Seth Gerson, CEO, AltEgoSeth Gerson, CEO, AltEgo
Seth Gerson, CEO, AltEgo
 
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
 
Windows Applications in the Cloud
Windows Applications in the CloudWindows Applications in the Cloud
Windows Applications in the Cloud
 
The Business Case for Cloud Management - RightScale Compute 2013
The Business Case for Cloud Management - RightScale Compute 2013The Business Case for Cloud Management - RightScale Compute 2013
The Business Case for Cloud Management - RightScale Compute 2013
 
Rackspace: Unlock Your Cloud - RightScale Compute 2013
Rackspace: Unlock Your Cloud - RightScale Compute 2013Rackspace: Unlock Your Cloud - RightScale Compute 2013
Rackspace: Unlock Your Cloud - RightScale Compute 2013
 
DevOps Stories: Getting to Agile - RightScale Compute 2013
DevOps Stories: Getting to Agile - RightScale Compute 2013DevOps Stories: Getting to Agile - RightScale Compute 2013
DevOps Stories: Getting to Agile - RightScale Compute 2013
 
Benefits of Grid Computing in the Cloud
Benefits of Grid Computing in the CloudBenefits of Grid Computing in the Cloud
Benefits of Grid Computing in the Cloud
 
Scaling SQL and NoSQL Databases in the Cloud
Scaling SQL and NoSQL Databases in the Cloud Scaling SQL and NoSQL Databases in the Cloud
Scaling SQL and NoSQL Databases in the Cloud
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
 
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
 

Similar to Rightscale webinar-hipaa-public-cloud

HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit ImplementationValency Networks
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...Michigan Primary Care Association
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowShred-it
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and trainingLaDavia Day, MHA, BS
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleMichigan Primary Care Association
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docxCHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docxchristinemaritza
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratchTechugo
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...Skoda Minotti
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersLawgical
 
Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1Armor
 

Similar to Rightscale webinar-hipaa-public-cloud (20)

HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and training
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docxCHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
HIPAA Security 2019
HIPAA Security 2019HIPAA Security 2019
HIPAA Security 2019
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 
Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1
 

More from RightScale

10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT GovernanceRightScale
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsKubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsRightScale
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleRightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowPrepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowRightScale
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseRightScale
 
Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)RightScale
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMComparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMRightScale
 
How to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaHow to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaRightScale
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...RightScale
 
Using RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsUsing RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsRightScale
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreAutomating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreRightScale
 
The 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesThe 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesRightScale
 
9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage CostsRightScale
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMServerless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMRightScale
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessBest Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessRightScale
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMCloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMRightScale
 
2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud ReportRightScale
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsGot a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsRightScale
 
How to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaHow to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaRightScale
 

More from RightScale (20)

10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsKubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowPrepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMComparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
 
How to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaHow to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale Optima
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
 
Using RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsUsing RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider Tools
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreAutomating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
 
The 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesThe 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for Enterprises
 
9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMServerless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBM
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessBest Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMCloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
 
2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsGot a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP Helps
 
How to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaHow to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale Optima
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Rightscale webinar-hipaa-public-cloud

  • 1. #rightscale HIPAA in Public Cloud The Rules Have Been Set Watch the video of this presentation
  • 2. #rightscale #2 Your Panel Today Presenting • Phil Cox, Director of Security and Compliance, RightScale Q&A • Ryan Geyer, Cloud Solutions Engineer, RightScale • Michael Curry, Account Manager, RightScale Please use the “Questions” window to ask questions any time!
  • 3. #rightscale #3 Introduction • On January 25, 2013, HHS released the Omnibus Rule which finalized all the former HIPAA/HITECH interim rules • Most of this session will be about HIPAA/HITECH and not necessarily cloud (if you don‟t understand the former, you‟ll have no clue how to applies it to the latter)
  • 4. #rightscale #4 #rightscalecompute My Core Message for Today: HIPAA compliance in public cloud is about governance
  • 5. #rightscale #5 Can Using RightScale Help? • RightScale‟s management features can be helpful as companies work to comply with HIPAA: • Monitoring • Access control • Audit trails • ServerTemplate • Advanced monitoring and auditing capabilities are best practices that will help you comply with HIPAA regulations • Gives visibility into system access and configurations when performing a risk assessment after an allegation of a breach
  • 6. #rightscale #6 Healthcare in the Cloud with RightScale • Developed self-service lab environments • Reduced provisioning time from 25 days to 30 minutes • Measures costs in cents per hour for compute and storage • Integrated public and private clouds • Satisfied regulatory and audit requirements • Automated provisioning for Windows environments
  • 7. #rightscale #7 Agenda • Quick HIPAA level set • Key Rules • Wrap-up
  • 8. #rightscale #8 Important Terms • Covered Entity: • A health plan, A health care clearinghouse, A health care provider who transmits any health information in electronic form in connection with a transaction • Business Associate: Operates on behalf of a CE • Think: function or activity involving the use or disclosure of individually identifiable health information: claims processing or administration, data analysis, processing or administration, utilization review, quality assurance, billing, benefit management, etc. • Protected Healthcare Information • Think Individually identifiable health information: • Any demographic information related to the condition, provision or payment of health care to an individual • Identifies the individual
  • 9. #rightscale #9 More Term Definition • HHS – US Department of Health and Human Services. Basically the ones that make the rules  • Secretary – Runs HHS • NIST – National Institute of Standards and Technology (US). The US federal technology agency that, for our purposes, works with industry to develop technology standards and guidance. • US Federal government defers to NIST tech publications and standards for just about everything.
  • 10. #rightscale #10 About HIPAA • HIPAA is the Health Insurance Portability and Accountability Act of 1996 • Title II: Preventing Health Care Fraud and Abuse; Administrative Simplification; Medical Liability Reform • Defines policies, procedures and guidelines for maintaining the privacy and security of individually identifiable health • 3 Main “Rules” from the Administrative Simplification Rules • Privacy Rule • Security Rule • Breach Notification Rule • More about these later …
  • 11. #rightscale #11 About HITECH • HITECH Act, part of the American Recovery and Reinvestment Act of 2009 • Made law February 17, 2009 (13 years after HIPAA) • Is the “enforcement” rule that gave HIPAA teeth
  • 12. #rightscale #12 Back to HIPAA: The “3 Main Rules” • They apply to covered entities and business associates • Privacy: Impose controls around preventing unauthorized disclosure of protected healthcare information in any form • Security: Purpose is to prevent unauthorized electronic access to protected healthcare information • Breach Notification: Purpose is to ensure timely notification of affected parties in event of a failure in the above 2 controls
  • 13. #rightscale #13 Privacy Rule Primer • Requires appropriate safeguards to protect the privacy of personal health information • Sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization • All about authorized disclosure
  • 14. #rightscale #14 Security Rule Primer • Maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting e-PHI • Specifically: • Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit; • Identify and protect against reasonably anticipated threats to the security or integrity of the information; • Protect against reasonably anticipated, impermissible uses or disclosures; and • Ensure compliance by their workforce • Required and Addressable Implementation Specifications • “Required" implementation specifications must be implemented • “Addressable" permits entities to adopt an alternative measure that achieves the purpose of the standard
  • 15. #rightscale #15 Breach Notification Primer • Notification required if breach involved unsecured protected health information • Unsecured is PHI that has not been rendered unusable, unreadable, or indecipherable to unauthorized individuals • Covered entities must notify • Affected individuals • Prominent media outlets serving the State or jurisdiction if >500 residents • Notify HHS within 60 days (if <500 can do annually) • Business Associate must notify the covered entity (w/in 60 days) • Burden of proof • All required notifications have been provided –OR– • Disclosure did not constitute a breach
  • 16. #rightscale #16 Key Issues When Dealing with “Cloud” • Per the recent NIST conference: • Location • Where is PHI? – geo location • Providers need to give assurance and warrants • Breach • What does the provider do to prevent breaches of PHI? • If there is a breach, what is the response capability? • Access • Proper controls to limit access • Monitoring – Can provider give the following • Not only modifications, but read/print too? • Any access?
  • 17. #rightscale #17 Agenda • Quick HIPAA level set • Key Rules • Wrap-up
  • 18. #rightscale #18 Changes Affecting HIPAA & Public Cloud • Business Associates • Breach notification • State law preemption • Use of PHI in Marketing • Application of HIPAA to hybrid entities
  • 19. #rightscale #19 Business Associate • By law, the HIPAA Privacy Rule applied only to covered entities • The Privacy Rule allows covered providers and health plans to disclose protected health information to these “business associates” if the providers or plans obtain satisfactory assurances that the business associate will use the information only for the purposes for which it was engaged by the covered entity, will safeguard the information from misuse, and will help the covered entity comply with some of the covered entity‟s duties under the Privacy Rule.
  • 20. #rightscale #20 Who Is a Business Associate? • Those who will create, receive, maintain, or transmit protected health information for a covered entity • Generally a person who performs functions or activities on behalf of, or certain services for, a covered entity that involve the use or disclosure of protected health information. • New: Specific call out for • Patient Safety Organizations • Health Information Organizations (HIO), E-Prescribing Gateways, and Other Persons That Facilitate Data Transmission; as Well as Vendors of Personal Health Records • Subcontractors {recursive}
  • 21. #rightscale #21 There are Exceptions • Incidental Access: With persons or organizations (e.g., janitorial service or electrician) whose functions or services do not involve the use or disclosure of protected health information, and where any access to protected health information by such persons would be incidental, if at all. • Conduit: With a person or organization that acts merely as a conduit for protected health information, for example, the US Postal Service, certain private couriers, and their electronic equivalents…
  • 22. #rightscale #22 Conduit Exception Clarification • ... We note that the conduit exception is limited to transmission services (whether digital or hard copy)… In contrast, an entity that maintains protected health information on behalf of a covered entity is a business associate and not a conduit, even if the entity does not actually view the protected health information…the difference between the two situations is the transient versus persistent nature of that opportunity. For example, a data storage company that has access to protected health information (whether digital or hard copy) qualifies as a business associate, even if the entity does not view the information or only does so on a random or infrequent basis. (emphasis added)
  • 23. #rightscale #23 Why BA Focus? • 1/3 of all breaches related to 3rd parties • 55% of people affected related to 3rd parties • So a 3rd party disclosure has a larger impact than a non-3rd party
  • 24. #rightscale #24 HHS Theme with BA • Persistency of data, not degree of access is the key driver • Focus on: • Security rule: Tech, Admin, Physical • Privacy rule: Use and disclosure • Direct liability • Criminal & Civil • Flows to sub-contractors • Does encryption remove you from BA? • At this time, as I understand it, NO. • More on this in a bit …
  • 25. #rightscale #25 What HHS Is Pushing • Trend is more towards risk • Beef up contracts WRT security • Represent and warrant that they meet the controls that are specified in the appendix of the contract/agreement • Pre-contract assessment (quick hit) • Post contract audit • Risk Assessment • Short form • What PHI • Where is it • Use that to assess risk and identify specific controls for a given BA
  • 26. #rightscale #26 Direct Liability & Sub-Contractors • Modified to implement the HITECH Act‟s provisions extending direct liability for compliance to business associates • Now directly liable for civil money penalties • A subcontractor that creates, receives, maintains, or transmits protected health information on behalf of a business associate, including with respect to personal health record functions, is a HIPAA business associate • BA must have a BAA with subcontractors (just another BA). This is recursive.
  • 27. #rightscale #27 BAA: Is It Optional? • Per Page 5591 • Comment: One commenter suggested that business associate agreements should be an „„addressable‟‟ requirement under the Security Rule. • Response: The HITECH Act does not remove the requirements for business associate agreements under the HIPAA Rules. Therefore, we decline to make the execution of business associate agreements an „„addressable‟‟ requirement under the Security Rule. • If you decide to forego the BAA, make an informed decision …
  • 28. #rightscale #28 Changes to Breach Notification Rule • Clarified the term “Breach” • Basically guilty until proven innocent • Changed “risk of harm” to “low probability PHI compromised” • Means you have to do a risk assessment. Can you? (next slide) • Changed „„unauthorized individuals‟‟ to „„unauthorized persons.‟‟ • How does the BNR affect you? • You need to be watching (if not, maybe “willful neglect”?) • Review is important • Need to have a mechanism for notification • Business Associates need to notify Covered Entities
  • 29. #rightscale #29 Risk Assessment Considerations 1. Nature and extent of PHI involved • Types of identifiers and likelihood of re-identification 2. Who accessed/used the information 3. If the PHI was actually acquired/viewed 4. Extent to which the risk to PHI has been mitigated -OR- Notify!
  • 30. #rightscale #30 What about Encryption? • If Protected health information (PHI) is rendered unusable, unreadable, or indecipherable to unauthorized individuals – then no Breach Notification • Encryption must be consistent with NIST guidelines: • NIST Special Publication 800-111 (storage) • NIST Special Publications 800-52, 800-77 (transit) • NIST Special Publication 800-88 (destruction) • Federal Information Processing Standards (FIPS) 140-2 (validated crypto) • It does not remove you from being a BA, but does limit Breach notification • NIST conference seemed to indicate HHS is looking at this.
  • 31. #rightscale #31 Preemption of State Law • HIPAA privacy requirements supersede only contrary provisions of State law UNLESS State law provides more stringent privacy protections than the HIPAA Privacy Rule
  • 32. #rightscale #32 Marketing & Other Use of PHI • Marketing communications that involve financial remuneration • In reality anything other than billing that involves financial remuneration • Covered entity must obtain a valid authorization from the individual before using or disclosing • Authorization must disclose the fact that the covered entity is receiving financial remuneration from a third party
  • 33. #rightscale #33 Hybrid Entities • Covered entity itself, and not merely the health care component (HCC) • If you share PHI with the non HCC part of your org, could be considered a breach • Responsible for business associate arrangements and other organizational requirements • Hybrid entities may need to execute legal contracts and conduct other organizational matters at the level of the legal entity rather than at the level of the health care component
  • 34. #rightscale #34 Consequences • Fines • Caps on types, not totals Violation Category Each Violation Annual cap on identical violations Did not know $100-$50,000 $1.5m Reasonable Cause $1,000-$50,000 $1.5m Willful Neglect - Corrected $10,000-$50,000 $1.5m Willful Neglect – Not Corrected $50,000 $1.5m
  • 35. #rightscale #35 Real World Example • Idaho State University (ISU): 17,500 patients at ISU's Pocatello Family Medicine Clinic. • The breach was blamed on the disabling of firewall protections, and failure of ISU to notice the change or the lack of protection. • Consequences • $400,000 fine (>$20/account) + internal costs ($200K) • 2 year Corrective Action Plan, defining enhanced security procedures and increased reporting to HHS – Likely 1 FTE ($400K over 2 years) • Proactive: • A firewall management tool- $40K procurement, $15K second year maintenance costs and .1 FTE. • Punch Line: If they had spent $75K could have saved $1M
  • 36. #rightscale #36 Timeframes • Passed January 25th, 2013 • In effect March 26, 2013 • Compliance date is September 23, 2013 • 180 days: “In addition, to make clear to the industry our expectation that going forward we will provide a 180-day compliance date for future modifications to the HIPAA Rules …”
  • 37. #rightscale #37 Conclusion • Rules are set, you should read the Omnibus Rule • Managing your Business Associates are critical • If you are a Business Associate, you now have direct liability • You are responsible for your subcontractors and they for their subcontractors • Good security, as always, will cover most of what you need.
  • 38. #rightscale #38 Can Using RightScale Help? • RightScale‟s management features can be helpful as companies work to comply with HIPAA: • Monitoring • Access control • Audit trails • ServerTemplate • Advanced monitoring and auditing capabilities are best practices that will help you comply with HIPAA regulations • Gives visibility into system access and configurations when performing a risk assessment after an allegation of a breach
  • 39. #rightscale #39 Status on Our Cloud Providers and BAA • The good news is that several of our cloud providers will sign a BAA. • Azure: Will sign a BAA • Datapipe: On a case-by-case basis • AWS: No public statement • We have heard from at least one customer that they were able to get AWS to sign a BAA • GCE: Not at this time • Rackspace: Not at this time • Softlayer: Not at this time
  • 40. #rightscale #40 RightScale and BAA • We do not “create, receive, maintain, or transmit” PHI • We do not have access to PHI • If we are invited to an account, we may have “incidental” access • RightLink runs on the instance, it does not interact with the electronic personal health information (ePHI) as part of its normal operations • You are not required to sign a BAA with your AV vendor • Our understanding is that RightScale is not a Business Associate
  • 42. #rightscale #42 My Contact Info • Email: phil@rightscale.com • Twitter: sec_prof • Google+: phil@rightscale.com

Editor's Notes

  1. Telcos built point-2-point networks for their customers
  2. On January 25, 2013, the US Department of Health and Human Services (HHS) released the final implementing regulations for many provisions of the HITECH Act (Health Insurance Technology for Economic and Clinical Health Act), often referred to as the Omnibus Rule. This talk will discuss the parts of the Omnibus rule that affect the cloud landscape, and how you can successfully deploy a HIPAA compliant application in the public cloud.MAIN MESSAGE: Know how the Omnibus Rule affects you!
  3. Today we will discuss three issues …
  4. Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs.Title II of HIPAA, includes regulations for the use and disclosure of Protected Health Information (PHI), such as medical records and payment history. This is the portion that requires companies to make sure that medical information isn’t improperly shared or disclosed -- which impacts companies that have PHI in the cloud.
  5. The Administrative Simplification provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA, Title II) required the Secretary of HHS to publish national standards for the security of electronic protected health information (e-PHI), electronic exchange, and the privacy and security of health information.HIPAA called on the Secretary to issue security regulations regarding measures for protecting the integrity, confidentiality, and availability of e-PHI that is held or transmitted by covered entities. HHS developed a proposed rule and released it for public comment on August 12, 1998. The Department received approximately 2,350 public comments. The final regulation, the Security Rule, was published February 20, 2003.2 The Rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality, integrity, and availability of e-PHI.The text of the final regulation can be found at 45 CFR Part 160 and Part 164, Subparts A and C.De-Identified Health Information. There are no restrictions on the use or disclosure of de-identified health information.14 De-identified health information neither identifies nor provides a reasonable basis to identify an individual.Security RuleDefines “Who” is Covered by the Security RuleHITECH expanded the responsibilities of business associatesDefines “What” information is protectedAll PHI a covered entity creates, receives, maintains or transmits in electronic form. (a.k.a., electronic protected health information (e-PHI)” – A subset of the Privacy RuleSecurity Rule does not apply to PHI transmitted orally or in writing
  6. The Privacy RuleThe HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically.  The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The Rule also gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections.The Privacy Rule is located at 45 CFR Part 160 and Subparts A and E of Part 164. Part 160 - GENERAL ADMINISTRATIVE REQUIREMENTS Subpart A - General Provisions Subpart B - Preemption of State Law Subpart C - Compliance and Investigations Subpart D - Imposition of Civil Money Penalties Subpart E - Procedures for Hearings Part 164 - SECURITY AND PRIVACY Subpart A - General Provisions Section 164.102 - Statutory basis. Section 164.103 - Definitions. Section 164.104 - Applicability. Section 164.105 - Organizational requirements. Section 164.106 - Relationship to other parts. Subpart E - Privacy of Individually Identifiable Health Information Section 164.500 - Applicability. Section 164.501 - Definitions. Section 164.502 - Uses and disclosures of protected health information: general rules. Section 164.504 - Uses and disclosures: Organizational requirements. Section 164.506 - Uses and disclosures to carry out treatment, payment, or health care operations. Section 164.508 - Uses and disclosures for which an authorization is required. Section 164.510 - Uses and disclosures requiring an opportunity for the individual to agree or to object. Section 164.512 - Uses and disclosures for which an authorization or opportunity to agree or object is not required. Section 164.514 - Other requirements relating to uses and disclosures of protected health information. Section 164.520 - Notice of privacy practices for protected health information. Section 164.522 - Rights to request privacy protection for protected health information. Section 164.524 - Access of individuals to protected health information. Section 164.526 - Amendment of protected health information. Section 164.528 - Accounting of disclosures of protected health information. Section 164.530 - Administrative requirements. Section 164.532 - Transition provisions. Section 164.534 - Compliance dates for initial implementation of the privacy standards.
  7. The Security Rule defines “confidentiality” to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule&apos;s confidentiality requirements support the Privacy Rule&apos;s prohibitions against improper uses and disclosures of PHI. The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI. Under the Security Rule, “integrity” means that e-PHI is not altered or destroyed in an unauthorized manner. “Availability” means that e-PHI is accessible and usable on demand by an authorized person.5Give examples of one of eachThe Security RuleThe HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. The Security Rule is located at 45 CFR Part 160 and Subparts A and C of Part 164.  http://www.access.gpo.gov/nara/cfr/waisidx_07/45cfr160_07.htmlPart 160 - GENERAL ADMINISTRATIVE REQUIREMENTS Subpart A - General Provisions Subpart B - Preemption of State Law Subpart C - Compliance and Investigations Subpart D - Imposition of Civil Money Penalties Subpart E - Procedures for Hearings Part 164 - SECURITY AND PRIVACY Subpart A - General Provisions Section 164.102 - Statutory basis. Section 164.103 - Definitions. Section 164.104 - Applicability. Section 164.105 - Organizational requirements. Section 164.106 - Relationship to other parts. Subpart C - Security Standards for the Protection of Electronic Protected Health Information Section 164.302 - Applicability. Section 164.304 - Definitions. Section 164.306 - Security standards: General rules. Section 164.308 - Administrative safeguards. Section 164.310 - Physical safeguards. Section 164.312 - Technical safeguards. Section 164.314 - Organizational requirements. Section 164.316 - Policies and procedures and documentation requirements. Section 164.318 - Compliance dates for the initial implementation of the security standards. Appendix A to Subpart C of Part 164 - Security Standards: Matrix Down and Dirty on Security RuleRisk analysis as part of their security management processesAdministrative Safeguards: Governance, Defined staff roles, access management, training and awareness, program reviewsPhysical Safeguards: Facility Access and Control, Workstation and Device SecurityTechnical Safeguards: Access control, monitoring of access, integrity controls, transmission securityOrganizational Requirements: Covered entities must manage business associatesPolicies and Procedures and Documentation Requirements: Must have them and keep them for 6 years &amp; need periodic reviews
  8. Definition of BreachA breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. There are three exceptions to the definition of “breach.”  The first exception applies to the unintentional acquisition, access, or use of protected health information by a workforce member acting under the authority of a covered entity or business associate.  The second exception applies to the inadvertent disclosure of protected health information from a person authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the covered entity or business associate.  In both cases, the information cannot be further used or disclosed in a manner not permitted by the Privacy Rule.  The final exception to breach applies if the covered entity or business associate has a good faith belief that the unauthorized individual, to whom the impermissible disclosure was made, would not have been able to retain the information.Unsecured Protected Health Information and GuidanceCovered entities and business associates must only provide the required notification if the breach involved unsecured protected health information.  Unsecured protected health information is protected health information that has not been rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in guidance. Breach Notification RequirementsFollowing a breach of unsecured protected health information covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media.  In addition, business associates must notify covered entities that a breach has occurred.Individual NoticeCovered entities must notify affected individuals following the discovery of a breach of unsecured protected health information.  Covered entities must provide this individual notice in written form by first-class mail, or alternatively, by e-mail if the affected individual has agreed to receive such notices electronically.  If the covered entity has insufficient or out-of-date contact information for 10 or more individuals, the covered entity must provide substitute individual notice by either posting the notice on the home page of its web site or by providing the notice in major print or broadcast media where the affected individuals likely reside.  If the covered entity has insufficient or out-of-date contact information for fewer than 10 individuals, the covered entity may provide substitute notice by an alternative form of written, telephone, or other means.   These individual notifications must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach and must include, to the extent possible, a description of the breach, a description of the types of information that were involved in the breach, the steps affected individuals should take to protect themselves from potential harm, a brief description of what the covered entity is doing to investigate the breach, mitigate the harm, and prevent further breaches, as well as contact information for the covered entity.  Additionally, for substitute notice provided via web posting or major print or broadcast media, the notification must include a toll-free number for individuals to contact the covered entity to determine if their protected health information was involved in the breach.Media NoticeCovered entities that experience a breach affecting more than 500 residents of a State or jurisdiction are, in addition to notifying the affected individuals, required to provide notice to prominent media outlets serving the State or jurisdiction.  Covered entities will likely provide this notification in the form of a press release to appropriate media outlets serving the affected area.  Like individual notice, this media notification must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach and must include the same information required for the individual notice.Notice to the SecretaryIn addition to notifying affected individuals and the media (where appropriate), covered entities must notify the Secretary of breaches of unsecured protected health information.  Covered entities will notify the Secretary by visiting the HHS web site and filling out and electronically submitting a breach report form.  If a breach affects 500 or more individuals, covered entities must notify the Secretary without unreasonable delay and in no case later than 60 days following a breach.  If, however, a breach affects fewer than 500 individuals, the covered entity may notify the Secretary of such breaches on an annual basis.  Reports of breaches affecting fewer than 500 individuals are due to the Secretary no later than 60 days after the end of the calendar year in which the breaches occurred.Notification by a Business AssociateIf a breach of unsecured protected health information occurs at or by a business associate, the business associate must notify the covered entity following the discovery of the breach.  A business associate must provide notice to the covered entity without unreasonable delay and no later than 60 days from the discovery of the breach.  To the extent possible, the business associate should provide the covered entity with the identification of each individual affected by the breach as well as any information required to be provided by the covered entity in its notification to affected individuals.  Burden of ProofCovered entities and business associates have the burden of proof to demonstrate that all required notifications have been provided or that a use or disclosure of unsecured protected health information did not constitute a breach.  This section also requires covered entities to comply with several other provisions of the Privacy Rule with respect to breach notification.  For example, covered entities must have in place written policies and procedures regarding breach notification, must train employees on these policies and procedures, and must develop and apply appropriate sanctions against workforce members who do not comply with these policies and procedures.Breaches Affecting 500 or More IndividualsIf a breach affects 500 or more individuals, a covered entity must provide the Secretary with notice of the breach without unreasonable delay and in no case later than 60 days from discovery of the breach.  This notice must be submitted electronically by following the link below and completing all information required on the breach notification form.  If a covered entity that has submitted a breach notification form to the Secretary discovers additional information to report, the covered entity may submit an additional form, checking the appropriate box to signal that it is an updated submission.  If, at the time of submission of the form, it is unclear how many individuals are affected by a breach, please provide an estimate of the number of individuals affected.  As this information becomes available, an additional breach report may be submitted as an addendum to the initial report.For questions regarding the completion and submission of this form, please e-mail OCRBreach@hhs.gov.reaches Affecting Fewer than 500 IndividualsFor breaches that affect fewer than 500 individuals, a covered entity must provide the Secretary with notice annually.  All notifications of breaches occurring in a calendar year must be submitted within 60 days of the end of the calendar year in which the breaches occurred.  Notifications of all breaches occurring after the effective date in 2009 must be submitted by March 1, 2010.  This notice must be submitted electronically by following the link below and completing all information required on the breach notification form.  A separate form must be completed for every breach that has occurred during the calendar year.  If a covered entity that has submitted a breach notification form to the Secretary discovers additional information to report, the covered entity may submit an additional form, checking the appropriate box to signal that it is an updated submission.  If, at the time of submission of the form, it is unclear how many individuals are affected by a breach, please provide an estimate of the number of individuals affected.  As this information becomes available, an additional breach report may be submitted as an addendum to the initial report.  For questions regarding the completion and submission of this form, please e-mail OCRBreach@hhs.gov.
  9. Today we will discuss three issues …
  10. Final regulations have now been released for the HITECH Act that have relevance to HIPAA data in the cloud.
  11. Covered entities may disclose protected health information to an entity in its role as a business associate only to help the covered entity carry out its health care functions – not for the business associate’s independent use or purposes, except as needed for the proper management and administration of the business associate.General Provision. The Privacy Rule requires that a covered entity obtain satisfactory assurances from its business associate that the business associate will appropriately safeguard the protected health information it receives or creates on behalf of the covered entity. The satisfactory assurances must be in writing, whether in the form of a contract or other agreement between the covered entity and the business associate.Business Associate Contracts. A covered entity’s contract or other written arrangement with its business associate must contain the elements specified at 45 CFR 164.504(e). For example, the contract must: Describe the permitted and required uses of protected health information by the business associate; Provide that the business associate will not use or further disclose the protected health information other than as permitted or required by the contract or as required by law; and Require the business associate to use appropriate safeguards to prevent a use or disclosure of the protected health information other than as provided for by the contract. Where a covered entity knows of a material breach or violation by the business associate of the contract or agreement, the covered entity is required to take reasonable steps to cure the breach or end the violation, and if such steps are unsuccessful, to terminate the contract or arrangement. If termination of the contract or agreement is not feasible, a covered entity is required to report the problem to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR).
  12. Incidental: JanitorsConduit: ISP
  13. clarify that a business associate includes an entity that ‘‘creates, receives, maintains, or transmits’’ protected health information on behalf of a covered entity. Page 8: The HIPAA Security Rule, 45 CFR Part 160 and Subparts A and C of Part 164, applies only to protected health information in electronic form and requires covered entities to implement certain administrative, physical, and technical safeguards to protect this electronic information. Like the Privacy Rule, covered entities must have contracts or other arrangements in place with their business associates that provide satisfactory assurances that the business associates will appropriately safeguard the electronic protected health information they create, receive, maintain, or transmit on behalf of the covered entities. (emphasis added)The Omnibus rule can be found at https://s3.amazonaws.com/public-inspection.federalregister.gov/2013-01073.pdf
  14. We adopt the modifications to the Security Rule as proposed to implement the HITECH Act’s provisions extending direct liability for compliance with the Security Rule to business associates. In response to the concerns raised regarding the costs of compliance, we note that the Security Rule currently requires a covered entity to establish a business associate agreement that requires business associates to implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that they create, receive, maintain, or transmit on behalf of the covered entity as required by the Security Rule; and to ensure that any agent, including a subcontractor, to whom they provide such information agrees to implement reasonable and appropriate safeguards to protect it. See § 164.314(a). BA Limits:The final rule adopts the proposed modifications to §§ 164.502(e) and 164.504(e). As we discussed above, while section 13404 of the HITECH Act provides that business associates are now directly liable for civil money penalties under the HIPAA Privacy Rule for impermissible uses and disclosures and for the additional HITECH requirements in Subtitle D that are made applicable to covered entities, it does not apply all of the requirements of the Privacy Rule to business associates and thus, the final rule does not. Therefore, business associates are not required to comply with other provisions of the Privacy Rule, such as providing a notice of privacy practices or designating a privacy official, unless the covered entity has chosen to delegate such a responsibility to the business associate, which would then make it a contractual requirement for which contractual liability would attach.
  15. First, we have added language to the definition of breach to clarify that an impermissible use or disclosure of protected health information is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised. clarified our position that breach notification is necessary in all situations except those in which the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised (or one of the other exceptions to the definition of breach applies). Thus, breach notification is not required under the final rule if a covered entity or business associate, as applicable, demonstrates through a risk assessment that there is a low probability that the protected health information has been compromised, rather than demonstrate that there is no significant risk of harm to the individual as was provided under
  16. We proposed to modify this section to re-designate § 164.105(a)(2)(iii)(C) as (D), and to include a new paragraph (C), which makes clear that, with respect to a hybrid entity, the covered entity itself, and not merely the health care component, remains responsible for complying with §§ 164.314 and 164.504 regarding business associate arrangements and other organizational requirements. Hybrid entities may need to execute legal contracts and conduct other organizational matters at the level of the legal entity rather than at the level of the health care component. The final rule adopts this change.
  17. 4) for a violation in which it is established that the violation was due to willful neglect and was not timely corrected Reasonable cause is currently defined at § 160.401 to mean: ‘‘circumstances that would make it unreasonable for the covered entity, despite the exercise of ordinary business care and prudence, to comply with the administrative simplification provision violated.’’ Talk about “Identical violations”
  18. http://www.sans.org/security-trends/2013/05/30/analyzing-the-cost-of-a-hipaa-related-breach-through-the-lens-of-the-critical-security-controls
  19. SoftLayer may change with IBM.Make sure to re-iterate that the Business Associate management is probably the most problematic part of HIPAA in public cloud