HPIAA法案介绍.pptx
- 【下载声明】
1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
3. 本页资料《HPIAA法案介绍.pptx》由用户(无敌的果实)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- HPIAA 法案 介绍
- 资源描述:
-
1、HIPAA法案介绍Homeland Former Vice President Dick Cheney came clean in an interview to CBS 60Minutes, revealing that when he had a device implanted to regulate his heartbeatin 2007, he had his doctors disable its wireless capabilities to prevent against apossible assassination attempt. The agency said in
2、 a statementthat there was no cause foralarm for the nearly 3 millionAmericans with pacemakers.Cyber Attacks and SecurityFBI Warns Health Care Sector Is More Vulnerable to Cyber attacks Anthem Cyber Attack: 80 Million Personal Records Burglarized,2015.2.4 Cyberattack exposes data of 11 million Preme
3、ra Blue Cross members 2015.3.18 Breaches Affecting 500 or More Individuals (10/21/2009,1562)https:/ocrportal.hhs.gov/ocr/breach/breach_report.jsf 在信息技术深入广泛应用环境下医疗卫生数据安全的政策研究 医疗机构临床数据安全管控框架研究Rise of Data Analytics HeightensNeed for PHI Security2013 significantly changed the context of the healthcare
4、security and privacyconversation. From the Snowden NSA revelations, to HIPAA Omnibus rule,changes in breach characteristics, to connected devices, mhealth, IoT andincreasing use of cloud and corporate BYOD policies, one thing is clear: securityby obscurity equals no security at all. The burden of pr
5、otecting PHI is now spreadacross all data holders, patients, providers and payers alike. Outlined below aresome of the unique security issues that will need addressing as healthcaretechnology moves into a data analytics mindset.Breach Characteristics: More than 7 million patient records were exposed
6、 in 2013alone, marking a perceived 138% increase from reported 2012 healthcare databreaches.Federal Laws,Regulations and Policiesin USA The Computer Security Act of 1987 (PL 100-235) The Privacy Act of 1974 (PL 93-579) The Freedom of Information Act (PL 90-23) The Computer Fraud and Abuse Act of 198
7、6 (PL 99-474) The Copyright Act of 1976 (PL 94-553) OMB Circular A-130, Appendix III, Revised Health Insurance Portability and Accountability Act of 1996 (PL 104-191) Presidential Decision Directive 63 Critical Infrastructure ProtectionThe ThreeHIPAA-HISTORYHIPAA of 1996 In August 1996, President Cl
8、inton signed into law the Public Law 104-91,Health Insurance Portability and Accountability Act (HIPAA). The Actincluded provisions for health insurance portability, fraud and abuse control, taxrelated provisions, group health plan requirements, revenue offset provisions,and administrative simplific
9、ation requirements. Purpose: To improve the portability of health insurance coverage; combatwaste, fraud and abuse; and simplify health care administration. The HIPAA Privacy Rule institutes business processes to protect the use anddisclosure of protected health information (PHI). The compliance dat
10、e for the HIPAA Privacy rule was April 14, 2003.HIPAA Titles OverviewHIPAA Titles OverviewARRA HITECH - MUFrom HIPAA to HIPAA Omnibus Rule The way we share and access information has changeddrastically since it was established in 1996. The recent changes are meant to STRENGTHEN the privacy andsecuri
11、ty protections mandated by HIPAA. The rule went into effect March 26, 2013 and has a MANDATORYcompliance date of Sept. 23, 2013.Major Changes Increased Business Associate liability Updates data security guidelines. Increases penalties for violators. Enhanced breach notification requirements.(Securit
12、y breaches must be reported to the Office for Civil Rights.) Extension of GINA to all plans subject to HIPAA (GI is HI)Enforcement Regulated by Health and Human Service (HHS),Office for CivilRights(OCR) Audits start September 23,2013 ASET(Administrative Simplification Enforcement Tool)Key Terms and
13、DefinitionsDefinition - Privacy The desire of a person to control the disclosure of personal health informationDefinition - Confidentiality The property that data or information is not made available or disclosed tounauthorized persons or processes.Must protect against unauthorized:-Access-Uses-Disc
14、losuresKey Terms and DefinitionsDefinition - Availability The property that data or information is accessible and usable upon demand by anauthorized person.-Must provide for ready availability to authorized personnel-Must guard against threats and hazards that may deny access to data or render theda
15、ta unavailable when needed.-Must provide appropriate backup in the event of a threat, hazard, or natural disaster-Must provide appropriate disaster recovery and business continuity plans fordepartmental operations involving ePHI.Key Terms and DefinitionsDefinition - Security Protection of privacy an
16、d confidentiality through policies, procedures andsafeguards.Definition Safety (Patient Safety)Patient safety is a new healthcare discipline that emphasizes the reporting,analysis, and prevention of medical error that often leads to adverse healthcareevents.Key Terms and DefinitionsDefinition - Vuln
17、erability Vulnerability is defined in NIST Special Publication (SP) 800-30 as “a flawor weakness in system security procedures, design, implementation, or internalcontrols that could be exercised (accidentally triggered or intentionallyexploited) and result in a security breach or a violation of the
18、 systemssecurity policy.” Vulnerabilities, whether accidentally triggered or intentionally exploited,could potentially result in a security incident, such as inappropriate accessto or disclosure of e- PHI. Vulnerabilities may be grouped into two generalcategories, technical and non- technical. Non-t
19、echnical vulnerabilities mayinclude ineffective or non-existent policies, procedures, standards orguidelines. Technical vulnerabilities may include: holes, flaws or weaknessesin the development of information systems; or incorrectly implemented and/orconfigured information systems.Key Terms and Defi
20、nitionsDefinition ThreatAn adapted definition of threat, from NIST SP 800-30, is “the potential for a person orthing to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.”There are several types of threats that may occur within an information system or operatingenviro
21、nment. Threats may be grouped into general categories such as natural, human, andenvironmental. Examples of common threats in each of these general categories include: Natural threats such as floods, earthquakes, tornadoes, and landslides. Human threats are enabled or caused by humans and may includ
22、e intentional (e.g., networkand computer based attacks, malicious software upload, and unauthorized access to e-PHI) orunintentional (e.g., inadvertent data entry or deletion and inaccurate data entry)actions. Environmental threats such as power failures, pollution, chemicals, and liquid leakage.Key
23、 Terms and DefinitionsDefinition RiskAn adapted definition of risk, from NIST SP 800-30, is:“The net mission impact considering (1) the probability that a particular threat will exercise(accidentally trigger or intentionally exploit) a particular vulnerability and (2) the resultingimpact if this sho
24、uld occur . . . . Risks arise from legal liability or mission loss due to1. Unauthorized (malicious or accidental) disclosure, modification, or destruction of information2. Unintentional errors and omissions3. IT disruptions due to natural or man- made disasters4. Failure to exercise due care and di
25、ligence in the implementation and operation of the IT system.”Risk can be understood as a function of 1) the likelihood of a given threat triggering or exploitinga particular vulnerability, and 2) the resulting impact on the organization. This means that risk isnot a single factor or event, but rath
展开阅读全文