• No results found

Overview of Medical Devices and HIPAA Security Compliance

N/A
N/A
Protected

Academic year: 2021

Share "Overview of Medical Devices and HIPAA Security Compliance"

Copied!
38
0
0

Loading.... (view fulltext now)

Full text

(1)

Overview of

Overview of

Medical Devices and

Medical Devices and

HIPAA Security Compliance

HIPAA Security Compliance

Wednesday, March 9, 2005

Technology in Medicine

Conference on Medical Device Security

Conference on Medical Device Security

Wednesday, March 9, 2005

Stephen L. Grimes, FACCE

Stephen L. Grimes, FACCE

Chair, Medical Device Security Workgroup

Chair, Medical Device Security Workgroup Healthcare Information and

Healthcare Information andManagement Systems Society (HIMSS)Management Systems Society (HIMSS)

Chair, HIPAA Task Force

Chair, HIPAA Task Force American College of Clinical Engineering (ACCE)

American College of Clinical Engineering (ACCE)

Senior Consultant & Analyst

(2)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 22

Medical Device Security:

Medical Device Security:

Is this just a HIPAA issue?

Is this just a HIPAA issue?

NO!

NO!

. Even if HIPAA were thrown out,

. Even if HIPAA were thrown out,

Medical Device Security is a necessity

Medical Device Security is a necessity

not just a regulation

not just a regulation

Medical device security

Medical device security

particularly data

particularly data

integrity

integrity

& data

& data

availability

availability

is critical to

is critical to

healthcare quality, timeliness, and cost

healthcare quality, timeliness, and cost

-

-effectiveness

effectiveness

Today, a reasonable

Today, a reasonable

standard of care

standard of care

cannot be maintained without an effective

cannot be maintained without an effective

an Information Security Management

an Information Security Management

Program in place that includes

Program in place that includes

biomedical

biomedical

technology

(3)

HIPAA

HIPAA

s Security Rule

s Security Rule

Implications for Biomedical

Implications for Biomedical

Devices & Systems

(4)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 44

Security Risks to Healthcare Technology

Security Risks to Healthcare Technology

Risks to Biomedical Devices & Systems Risks to Healthcare IT Systems

Make sure you are

Make sure you are

addressing more than

addressing more than

the tip of the risk!

the tip of the risk!

The inventory of

The inventory of

biomedical devices &

biomedical devices &

systems in a typical

systems in a typical

hospital is 3

hospital is 3

-

-

4 times larger

4 times larger

than the IT inventory

than the IT inventory

(5)

Significant Medical Device Industry Trends

Significant Medical Device Industry Trends

Medical devices and systems are being

Medical devices and systems are being

designed and operated as special

designed and operated as special

purpose computers

purpose computers

more features are

more features are

being automated, increasing amounts of

being automated, increasing amounts of

medical data are being collected,

medical data are being collected,

analyzed and stored in these devices

analyzed and stored in these devices

There has been a rapidly growing

There has been a rapidly growing

integration and interconnection of

integration and interconnection of

disparate medical (and information)

disparate medical (and information)

technology devices and systems

technology devices and systems

where medical data is being

(6)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 66

Information Technology Systems

Information Technology Systems

Mission Critical

Mission Critical

Activities, processing, etc., that are

Activities, processing, etc., that are

deemed vital to the organization's

deemed vital to the organization's

business success or existence. If a

business success or existence. If a

Mission Critical

Mission Critical

application fails,

application fails,

crashes, or is otherwise unavailable to

crashes, or is otherwise unavailable to

the organization, it will have a significant

the organization, it will have a significant

negative impact upon the business.

negative impact upon the business.

Examples of

Examples of

Mission Critical

Mission Critical

applications include accounts/billing,

applications include accounts/billing,

customer balances, ADT processes, JIT

customer balances, ADT processes, JIT

ordering, and delivery scheduling.

MISSION

MISSION

CRITICAL

CRITICAL

(7)

Biomedical Technology Systems

Biomedical Technology Systems

Life Critical

Life Critical

Devices, systems and processes that

Devices, systems and processes that

are deemed vital to the patient

are deemed vital to the patient

s health

s health

and quality of care. If a

and quality of care. If a

Life Critical

Life Critical

system fails or is otherwise

system fails or is otherwise

compromised, it will have a significant

compromised, it will have a significant

negative impact on the patients health,

negative impact on the patients health,

quality of care or safety.

quality of care or safety.

Examples of

Examples of

Life Critical

Life Critical

systems

systems

include physiologic monitoring, imaging,

include physiologic monitoring, imaging,

radiation therapy, and clinical laboratory

radiation therapy, and clinical laboratory

systems.

LIFE

LIFE

CRITICAL

CRITICAL

systems.

(8)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 88

HIPAA Security requires Risk Analysis:

HIPAA Security requires Risk Analysis:

Risks Associated with IT

Risks Associated with IT

vs

vs

Biomedical Systems

Biomedical Systems

IT Systems

IT Systems

MISSION

MISSION

CRITICAL

CRITICAL

LIFE

LIFE

CRITICAL

CRITICAL

Medical Devices & Systems

(9)

HIPAA

HIPAA

s Security Rule

s Security Rule

Implications for Biomedical Technology

Implications for Biomedical Technology

Why is security an issue for biomedical technology?

Why is security an issue for biomedical technology?

Because compromise in

Because compromise in

ePHI

ePHI

can affect

can affect

Integrity

Integrity

or

or

Availability

Availability

can result in improper

can result in improper

diagnosis or therapy of patient resulting in harm

diagnosis or therapy of patient resulting in harm

(even death) because of delayed or inappropriate

(even death) because of delayed or inappropriate

treatment

treatment

Confidentiality

Confidentiality

can result in loss of patient

can result in loss of patient

privacy

privacy

and, as a consequence, may result in

and, as a consequence, may result in

financial loss to patient and/or provider organization

(10)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 1010

HIPAA

HIPAA

s Security Rule

s Security Rule

Implications for Biomedical Technology

Implications for Biomedical Technology

Standalone

Standalone

with ePHI

with ePHI

(11)

HIPAA

HIPAA

s Security Rule

s Security Rule

Implications for Biomedical Technology

Implications for Biomedical Technology

Standalone

Standalone

and

and

Networked Systems

Networked Systems

Both

Both

with ePHI

with ePHI

(12)

HIPAA

HIPAA

s Security Rule

s Security Rule

Overview of

Overview of

Compliance Process

(13)

HIPAA

HIPAA

s Security Rule

s Security Rule

Compliance Overview

Compliance Overview

Information

Security

Management

(ISM)

Program

Risk

Analysis &

Management

Plan

(RAMP)

(14)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 1414

HIPAA

HIPAA

s Security Rule

s Security Rule

Compliance Overview

Compliance Overview

Establish effective

Establish effective

Info Security Management

Info Security Management

(ISM) program:

(ISM) program:

1)

1)

Assign

Assign

security official

security official

&

&

establish

establish

information security committee

information security committee

2)

2)

Develop necessary

Develop necessary

policies

policies

as per security

as per security

standards

standards

3)

3)

Develop necessary

Develop necessary

procedures,

procedures,

physical/technical safeguards

physical/technical safeguards

as per

as per

implementation specifications

implementation specifications

4)

4)

Implement

Implement

Policies/procedures,

Policies/procedures,

Business associate agreements,

Business associate agreements,

Educate workforce &

Educate workforce &

Install/Configure security

Install/Configure security

tools

tools

5)

5)

Test

Test

implementation

implementation

6)

6)

Integrate

Integrate

security measures

security measures

into organization

into organization

-

-

wide program

Increasing

Increasing

Levels of

Levels of

Program

Program

Effectiveness

Effectiveness

Policies Implementation Testing Integration Procedures GOAL:

HIPAA Compliance & an Effective Info Security Program

(15)

HIPAA

HIPAA

s Security Rule

s Security Rule

Compliance Overview

Compliance Overview

Information Security

Committee

Staff Education / Inservice Materials Management / Purchasing Information Security Official representatives of device users (i.e., clinical staff) Clinical Engineering Information Services / Information Technology Facilities Engineering Administra-tion Risk Management Human Resources Quality Assurance
(16)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 1616

HIPAA

HIPAA

s Security Rule

s Security Rule

Compliance Overview

Compliance Overview

Establish

Establish

Risk Analysis/Management Plan (RAMP)

Risk Analysis/Management Plan (RAMP)

:

:

1)

1)

Conduct inventory (identify sources of ePHI)

Conduct inventory (identify sources of ePHI)

and survey current security practices & resources

and survey current security practices & resources

2)

2)

Identify and Assess Security Risks

Identify and Assess Security Risks

3)

3)

Establish Priorities

Establish Priorities

4)

4)

Determine Security Gap (i.e., need for additional

Determine Security Gap (i.e., need for additional

safeguards) following

safeguards) following

best practices

best practices

and Security

and Security

Rule

Rule

s

s

Standards

Standards

and

and

Implementation Specifications

Implementation Specifications

5)

5)

Formulate/Implement Plan for Risk Mitigation

Formulate/Implement Plan for Risk Mitigation

Process incorporating Risk

Process incorporating Risk

-

-

based Priorities

based Priorities

6)

6)

Test & Measure Effectiveness of Risk Mitigation

Test & Measure Effectiveness of Risk Mitigation

Process (Improving as Necessary)

(17)

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

1)

1)

Conduct Inventory

Conduct Inventory

Identify biomedical devices & systems that

Identify biomedical devices & systems that

maintain and/or transmit

maintain and/or transmit

ePHI

ePHI

For each affected device/system, determine:

For each affected device/system, determine:

Types of

Types of

ePHI

ePHI

Who

Who

has

has

access & who

access & who

needs

needs

access

access

Description of any connections with other

Description of any connections with other

devices

devices

Types of security measures currently employed

(18)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 1818

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

1)

1)

and Survey current security practices &

and Survey current security practices &

resources

resources

to analyze existing processes

to analyze existing processes

Policies & procedures

Policies & procedures

Training programs

Training programs

Tools & security measures

(19)

PC

M

C

IA

56K

INSERT THIS END

Create/Input

Create/Input

ePHI

ePHI

PC MC IA 56K

INSERT THIS END

Maintain ePHI

Maintain ePHI

Transmit/Receive

Transmit/Receive

ePHI

ePHI

Keyboard Keyboard Disk Disk Scanning Scanning

--bar codebar code --magneticmagnetic --OCROCR Imaging Imaging --photophoto

--medical imagemedical image

Biometrics Biometrics Hard Disk Hard Disk Memory Memory (e.g., RAM) (e.g., RAM) Disk Disk Tape Tape Digital Digital Memory Card Memory Card Optical disk, Optical disk, Tape Tape Digital Digital Memory Card Memory Card Optical disk, Optical disk, CD CD--ROM,ROM, DVD DVD Wired Networks Wired Networks Private or Public, Private or Public, Leased or Dial Leased or Dial- -up lines, Internet up lines, Internet Wireless Wireless

Component,

Component,

Device, or

Device, or

System

System

(20)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 2020

Compliance Overview

Compliance Overview

Inventory of Devices/Systems

Inventory of Devices/Systems

Physiologic Monitor

Physiologic Monitor

where ePHI may consist of patient

where ePHI may consist of patient

identifying information and the

identifying information and the

following data:

following data:

ECG waveform

ECG waveform

Blood pressure

Blood pressure

Heart rate

Heart rate

Temp

Temp

O

O

22

Saturation

Saturation

Respiration

Respiration

Alarms

Alarms

(21)

Compliance Overview

Compliance Overview

Inventory of Devices/Systems

Inventory of Devices/Systems

Infusion pump

Infusion pump

where ePHI may consist of

where ePHI may consist of

patient identifying information

patient identifying information

and the following data:

and the following data:

Flow Rate

Flow Rate

Volume delivered

Volume delivered

(22)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 2222

Compliance Overview

Compliance Overview

Inventory of Devices/Systems

Inventory of Devices/Systems

Ventilator

Ventilator

where ePHI may consist of

where ePHI may consist of

patient identifying information

patient identifying information

and the following data:

and the following data:

Flow Rate

Flow Rate

Volume Delivered

Volume Delivered

Respiration

Respiration

(Breaths Per Minute)

(Breaths Per Minute)

O

O

22

Saturation

Saturation

(23)

Compliance Overview

Compliance Overview

Inventory of Devices/Systems

Inventory of Devices/Systems

Laboratory analyzer

Laboratory analyzer

where ePHI may consist of

where ePHI may consist of

patient identifying information and the

patient identifying information and the

following data :

following data :

Blood related

Blood related

--

Hemoglobin

Hemoglobin

--

Glucose

Glucose

--

Gas

Gas

--

pH

pH

--

Electrolyte

Electrolyte

Urine related

Urine related

--

Albumin

Albumin

--

Creatinine

Creatinine

--

Bilirubin

Bilirubin

(24)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 2424

Compliance Overview

Compliance Overview

Inventory of Devices/Systems

Inventory of Devices/Systems

MRI, CT Scanner, Diagnostic Ultrasound

MRI, CT Scanner, Diagnostic Ultrasound

where ePHI may consist of patient identifying information

where ePHI may consist of patient identifying information

and the following data :

and the following data :

(25)

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

2)

2)

Assess risk with respect

Assess risk with respect

to

to

confidentiality

confidentiality

,

,

integrity

integrity

,

,

availability

availability

:

:

Criticality

Criticality

Categorize level of risk/vulnerability (e.g.,

Categorize level of risk/vulnerability (e.g.,

high, medium, low) to CIA

high, medium, low) to CIA

Probability

Probability

Categorize the likelihood of risk (e.g.,

Categorize the likelihood of risk (e.g.,

frequent, occasional, rare) to CIA

frequent, occasional, rare) to CIA

Composite Score

Composite Score

for

for

Criticality/Probability

Criticality/Probability

High Medium Low Medical Device/System with electronic Protected Health Information

C o n fi d e n ti a lit y A v a ila b ili ty

(26)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 2626

Taking into account

Taking into account

Criticality

Criticality

:

:

Assess Risk associated with compromises to

Assess Risk associated with compromises to

Integrity

Integrity

of ePHI

of ePHI

Clinician with Clinician with Authorized Access Authorized Access Patient Patient

Central Station

Physiologic

Monitor

Data

Data

Actual

Actual

Maintained/

Maintained/

Transmitted

Transmitted

Patient ID

Patient ID

7813244

7813244

7813254

7813254

Heart Rate

Heart Rate

60

60

bpm

bpm

35

35

bpm

bpm

Blood Pressure

Blood Pressure

120/80 mmHg

120/80 mmHg

90

90

/

/

50

50

mmHg

mmHg

Temp

Temp

98.6º F

89

.

6

º F

SpO2

92%

92%

92

92

%

%

In

te

g

ri

ty

(27)

Taking into account

Taking into account

Criticality

Criticality

:

:

Assess Risk associated with compromises to

Assess Risk associated with compromises to

Availability

Availability

of ePHI

of ePHI

Clinician with Clinician with Authorized Access Authorized Access Patient Patient

Central Station

Physiologic

Monitor

Data

Data

Actual

Actual

Maintained/

Maintained/

Transmitted

Transmitted

Patient ID

Patient ID

7813244

7813244

XXXXX

XXXXX

Heart Rate

Heart Rate

60

60

bpm

bpm

XX

XX

bpm

bpm

Blood Pressure

Blood Pressure

120/80 mmHg

120/80 mmHg

XXX

XXX

/

/

XX

XX

mmHg

mmHg

In

te

g

ri

ty

A

v

a

ila

b

ili

ty

(28)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 2828

Taking into account

Taking into account

Criticality

Criticality

:

:

Assess Risk associated with compromises to

Assess Risk associated with compromises to

Confidentiality

Confidentiality

of ePHI

of ePHI

Clinician with Clinician with Authorized Access Authorized Access Patient Patient

Central Station

Physiologic

Monitor

Unauthorized Unauthorized Access Access

Data

Data

Actual

Actual

Maintained/

Maintained/

Transmitted

Transmitted

Patient ID

Patient ID

7813244

7813244

7813244

7813244

Heart Rate

Heart Rate

60

60

bpm

bpm

60

60

bpm

bpm

Blood Pressure

Blood Pressure

120/80 mmHg

120/80 mmHg

120/80 mmHg

120/80 mmHg

Temp

Temp

98.6º F

98.6º F

SpO2

92%

92%

92%

92%

In

te

g

ri

ty

A

v

a

ila

b

ili

ty

Co

n

fi

d

e

n

ti

a

lit

y

(29)

Assessing

Assessing

Criticality

Criticality

of Risk Associated with

of Risk Associated with

Biomedical Devices/Systems with ePHI

Biomedical Devices/Systems with ePHI

Impact on Patient

Impact on Organization

RISK LEVEL

Potential degree to which health care would be adversely impacted by compromise of availability or integrityof ePHI Potential degree to which privacy would be adversely impacted by compromise of confidentialityof ePHI Potential degree to which interests would be adversely impacted by compromise of confidentiality, availabilityor integrityof ePHI Potential financial impact Potential legal penalties Likely corrective measures required

High Serious impact to

patient’s health (including loss of life) due to:

ƒmisdiagnosis,

ƒdelayed diagnosis or

ƒimproper, inadequate or delayed treatment

Could identify patient

and their diagnosis Extremely grave damage to organization’s interests

Major

$1,000K Imprisonment and/or large fines

Legal

Medium Minor impact to patient’s

health due to:

ƒmisdiagnosis,

ƒdelayed diagnosis or

ƒimproper, inadequate or

Could identify patient and their health information (but from which a diagnosis could not be derived)

Serious damage Moderate

(30)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 3030

Assessing

Assessing

Probability

Probability

of Risks Associated with

of Risks Associated with

Biomedical Devices/Systems with ePHI

Biomedical Devices/Systems with ePHI

Frequent

Frequent

Likely to occur (e.g., once a month)

Likely to occur (e.g., once a month)

Occasional

Occasional

Probably will occur (e.g., once a year)

Probably will occur (e.g., once a year)

Rare

Rare

Possible to occur (e.g., once every 5

(31)

Assessing

Assessing

Criticality

Criticality

&

&

Probability

Probability

of Risks associated

of Risks associated

with Biomedical Devices/Systems with ePHI

with Biomedical Devices/Systems with ePHI

Probability

Probability

Determining the

Determining the

Criticality/Probability

Criticality/Probability

Composite Score

Composite Score

Rare

Rare

Occasional

Occasional

Frequent

Frequent

High

High

3

3

6

6

9

9

Medium

Medium

2

2

4

4

6

6

Low

Low

1

1

2

2

3

3

Criticality

Criticality

(32)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 3232

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

3)

3)

Establish priorities

Establish priorities

Use

Use

Criticality/Probability composite score

Criticality/Probability composite score

to prioritize risk mitigation efforts

to prioritize risk mitigation efforts

Conduct mitigation process giving priority

Conduct mitigation process giving priority

to devices/systems with highest scores

to devices/systems with highest scores

(i.e., devices/systems that represent the

(i.e., devices/systems that represent the

most significant risks)

(33)

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

4)

4)

Determine security gap

Determine security gap

Determine what measures are necessary to

Determine what measures are necessary to

safeguard data

safeguard data

Compare list of necessary measures with existing

Compare list of necessary measures with existing

measures identified during biomedical

measures identified during biomedical

device/system inventory process

device/system inventory process

Prepare gap analysis for devices/systems

Prepare gap analysis for devices/systems

detailing additional security measures necessary

detailing additional security measures necessary

to mitigate recognized risks (addressing

to mitigate recognized risks (addressing

devices/systems according to priority)

(34)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 3434

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

5)

5)

Formulate & implement mitigation plan

Formulate & implement mitigation plan

Formulate written mitigation plan

Formulate written mitigation plan

incorporating

incorporating

additional security measures required

additional security measures required

(i.e., policies, procedures, technical &

(i.e., policies, procedures, technical &

physical safeguards)

physical safeguards)

priority assessment, and

priority assessment, and

schedule for implementation

schedule for implementation

Implement plan & document process

(35)

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

6)

6)

Monitor process

Monitor process

Establish on

Establish on

-

-

going monitoring system

going monitoring system

(including a security incident reporting

(including a security incident reporting

system) to insure mitigation efforts are

system) to insure mitigation efforts are

effective

effective

Document results of regular audits of

Document results of regular audits of

security processes

(36)

March 9, 2005

March 9, 2005 ©©HIMSS / ACCE / ECRI ~ HIMSS / ACCE / ECRI ~ 3636

Compliance Overview

Compliance Overview

Risk Analysis/Management

Risk Analysis/Management

Prepare a Risk Mitigation Worksheet

Prepare a Risk Mitigation Worksheet

1

Identify

ePHI

2

Identify & Assess Risks

3

Establish

Priorities

4

Determine

Gap

5

Formulate &

Implement Plan

6

(37)

HIPAA

HIPAA

s Security Rule

s Security Rule

Overview of Compliance Process

(38)

Questions?

Questions?

Stephen L. Grimes, FACCE

Stephen L. Grimes, FACCE

slgrimes@shcta.com

slgrimes@shcta.com

Strategic Health Care Technology Associates

Strategic Health Care Technology Associates

www.SHCTA.com

www.SHCTA.com

Health Information and Management Systems Society

Health Information and Management Systems Society

www.himms.org

www.himms.org

American College of Clinical Engineering (ACCE)

American College of Clinical Engineering (ACCE)

www.accenet.org

www.accenet.org

ECRI

ECRI

www.ecri.org

www.ecri.org

References

Related documents

ARCON | PAM offers a centralized user access policy framework wherein the IT security staff can manage, monitor and control role-based user access to electronic health

Prevention” Train Staff Information Security Governance Information Security Policies Compliance Management. Classify & Control

Security/Privacy regulation, and often leave many Security Rule regulations unfulfilled • Privacy Rule compliance doesn’t extend to.. Security

Though ITS will provide tools to assist the Covered Entity with auditing tasks for information stored in central ITS-provided file space, it is the responsibility of the

– Hold monthly Information Security Committee meetings and report to Corporate Compliance – Conduct an evaluation of compliance using the. OCR’s HIPAA Audit Program Protocol

NetIQ Security Manager, NetIQ Security Analyzer, Firewall Reporting Center, and the NetIQ administration products help with HIPAA compliance by comprehensively assessing

The HIPAA Security Rule Compliance Reporter™ (HSCR) deploys state of the art enterprise risk management technology to allow you to meet the HIPAA Security Rule requirements

transactions, use and disclosure of protected health information, written policies and procedures, written business associate agreements and employee/staff training.. The