• No results found

HIPAA Update: Keeping Compliant with the Latest Healthcare Security Regulations A Proofpoint White Paper

N/A
N/A
Protected

Academic year: 2021

Share "HIPAA Update: Keeping Compliant with the Latest Healthcare Security Regulations A Proofpoint White Paper"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

(1)

A Proofpoint White Paper

HIPAA Update:

(2)

CONTENTS

Introduction 2

Let’s Start with HIPAA 2

The EDI Rule 3

The Privacy Rule 3

The Security Rule 3

Penalties and Patterns of Enforcement 3

New HIPAA Regulations included in ARRA 4

Broadening the Scope of HIPAA Coverage 4

Data Breach Notifi cation Rules 4

New Data Access and Data Disclosure Rules 4

Penalties that Provide an Incentive for Enforcement 5

Milestones and Looming Deadlines 5

Other Data Breach Notifi cation Laws 6

The FTC’s Data Breach Notifi cation Law 6

Another HHS Data Breach Notifi cation Law 6

Other Relevant Data Privacy Laws 6

The FTC’s Data Breach Notifi cation Law 6

Another HHS Data Breach Notifi cation Law 6

Where Does This Leave Enterprises in the Healthcare Industry? 7

Requirement for Secure Email 7

Smart Detection of PHI 7

Standard and Custom Dictionaries for Private Data 8

Rigorous Encryption 8

Flexible Deployment Scenarios 8

Requirements Summary 9

Conclusion 9

(3)

INTRODUCTION

Social networks, blogs, and Twitter might be getting all the press these days, but email remains the most important communication channel for business. Even with the exploding number of mobile devices and cloud-based collaborative solutions, the vast majority of individuals and corporations continue to do busi-ness via email.1

Email is popular throughout the healthcare industry among providers, insurers, and others. Doctors, for example, are increasingly using email to send and receive test results and to communicate with patients. Email is convenient and effi cient, but it’s risky, too. Traveling over the Internet, an unencrypted email mes-sage is about as secure as words written on the back of a postcard. The mesmes-sage can be intercepted and read at any of its many hops across servers between sender and receiver. If the unencrypted message contains confi dential information, such as Social Security numbers or health records, the privacy of that information is in jeopardy and the sender of that message is out of compliance with industry regulations for data privacy .

Enterprises in all industries, including healthcare, know they need to do something about email security. They need to protect the good messages—including messages containing private data—while blocking the bad messages, such as spam, malware, and phishing attacks.

Healthcare organizations (HCOs) are well aware of government-mandated regulations for encrypting con-fi dential email. The best known regulations are those set forth in the Healthcare Information Portability and Accountability Act (HIPAA) of 1996, which established standards for exchanging healthcare informa-tion and ordered HCOs to encrypt email containing confi dential patient data.

What these executives and engineers might not know is that the stimulus bill in the early months of the Obama administration, the American Recovery and Reinvestment Act (ARRA) of 2009, includes new, stiffer regulations for protecting patient data in email. The new regulations also put HIPAA enforcement in the hands the Offi ce of Civil Rights (OCR). Together the OCR and the Federal Trade Commission (FTC) are increasing their scrutiny of HCOs and imposing penalties far stiffer than any imposed during the fi rst de-cade or so of HIPAA enforcement. In addition, states such as Nevada and Massachusetts have passed their own laws for data security and data breach notifi cations that affect any HCO with patients in those states. Other states are likely to follow suit, mandating more stringent protections for private data and penalizing organizations, even small businesses, that fail to adequately protect private data, including health records. Healthcare regulations for IT security are now broader than ever—covering not just HCOs but their busi-ness associates, as well. All kinds of companies, from Web hosting fi rms to accountants, are subject to HIPAA security regulations and other data privacy regulations if they have HCOs as customers or partners. Meanwhile, the penalties for mishandling data privacy and security issues and allowing a data breach to occur are increasingly onerous. Fines are bigger than ever, in some cases reaching millions of dollars, and enforcement organizations have been given new incentives for taking action against violators.

If you manage IT assets or operations for a U.S. healthcare organization or for the business partner of a U.S. healthcare organization, this paper provides a quick overview of what you need to know about the latest security and data breach regulations for the healthcare industry. It also outlines what to look for in a secure email solution for complying with the web of regulations that now apply to so many companies.

LET’S START WITH HIPAA

HIPAA was passed by the U.S. Congress and signed by President Clinton in 1996. One of the bill’s original goals was to make it easier for workers to continue their healthcare insurance coverage, even for pre-exist-ing conditions, when changpre-exist-ing jobs. To ensure uninterrupted coverage for patients, HCOs need to be able to pass patient records and other data back and forth. For this to happen effi ciently and reliably, healthcare records would need to become more portable (hence the ‘Portability’ in the act’s title), so the bill set forth new terminology and Electronic Data Interchange (EDI) code sets for transmitting data. Of course, trans-ferring confi dential health records is risky; private data might inadvertently be exposed to inappropriate or even malicious parties. So HIPAA legislators also set forth security mandates that came to address data security and privacy issues at large in healthcare.

From the point of view of IT executives and engineers, three parts of HIPAA merit special attention:

• The EDI Rule (162.1000), which establishes standard health information terminology and electronic code sets.

• The Security Rule (164.306), which establishes safeguards to protect the confi dentiality, integ-rity, and availability of electronic protected health information (PHI)

• The Privacy Rule (164.502), which orders HCOs to protect PHI and defi nes the allowable uses and disclosures of PHI, in contrast to “de-identifi ed” health information2

(4)

The EDI Rule

The EDI Rule defi nes classifi cation systems and other code sets that HCOs should use in healthcare re-cords. Standardizing healthcare terminology eliminates confusion among providers and insurers. It also helps IT departments detect information that could require special treatment to comply with the Security Rule or the Privacy Rule.

Until recently, the EDI Rule mandated that HCOs use the International Classifi cation of Diseases (ICD), 9th Edition, Clinical Modifi cation, Volumes 1 and 2, when describing diseases, injuries, impairments, and their causes. But in January 2009, the Department of Health and Human Services issued a rule requiring HCOs to adopt new versions of the ICD—ICD-10-CM and ICD-10-PCS (Procedural Coding System)—by Octo-ber 1, 2013. The new ICD offers more modern terminology and a greater numOcto-ber of codes for classifying diseases.3 To support the new ICD data, HCOs must upgrade their data interchange software to support HIPAA X12 5010, a data interchange format that replaces the current interchange format, X12 4010A1.4 To detect PHI with the greatest possible accuracy, any software used by HCOs will need to work with ICD-10-CM.

The Privacy Rule

The HIPAA Privacy Rule states that HCOs must protect the privacy of patient data. They must “reasonably safeguard” patient data from intentional or unintentional use or disclosure, except as necessary for legiti-mate medical or business reasons. HCOs must train employees on policies and procedures for protecting patient data or protected health information (PHI)5.

The Security Rule

The HIPAA Security Rule requires HCOs to protect the confi dentiality, integrity, and availability of the PHI they “create, receive, maintain, or transmit.” HCOs should protect against “any reasonably anticipated threats or hazards” to this data. To protect PHI, whether it’s being stored on a server or transmitted over a network, HCO’s must put in place security policies and practices related to:

• Access control

• Audit controls

• Authentication

• Transmission security

On the subject of Technical Safeguards, HIPAA requires HCOs to “implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.”

Penalties and Patterns of Enforcement

The penalties for violating HIPAA’s security rule are steep. An individual who discloses PHI may be fi ned up to $50,000 and be sentenced to 1 year in jail. If the individual committed the disclosure under false pre-tenses, the fi nes can reach up to $100,000 and the jail time can extend to 5 years. If the individual intended to sell or use the information for personal gain or malicious harm, the penalties become steeper yet: up to $500,000 in fi nes and up to 10 years in jail.

Between April 2003, when the fi rst mandates took effect, and January 2008, about 8,000 HIPAA viola-tion cases were closed without any signifi cant penalties being assessed. No company was penalized with a fi ne, and no company offi cial was jailed.6 Despite all the admonitory pronouncements of legislators, law fi rms, and analysts, it seemed as though HIPAA investigators were going to continue taking a friendly, even complacent approach toward working with HCOs about HIPAA violations.

Then an investigation by the Federal Trade Commission (FTC) determined that pharmaceutical giant CVS Caremark had violated HIPAA’s security and privacy rules. In 2006, CVS employees discarded pill bottles labeled with patient names, medication instruction sheets, and computerized prescription orders in open trash containers. The FTC deemed these actions a violation of HIPAA. In February 2009, the FTC levied a $2.25 million fi ne against CVS. (For its part, CVS denied any wrongdoing, but agreed to settle the case.)7 The CVS case marked a turning point in HIPAA enforcement. Through the multi-million dollar penalty lev-ied against CVS, the federal government seemed to be signaling to the industry that, after years of taking a primarily consultative approach, investigators were prepared to get tough about enforcing HIPAA privacy and security regulations.

(5)

As if the CVS example weren’t worrisome enough for healthcare IT workers, new HIPAA regulations in the new stimulus bill broaden the coverage of HIPAA and provide strong incentives for investigators to uncover violations and to assess heavy fi nes. An understanding of these new provisions is essential for any organi-zation hoping to achieve HIPAA compliance today.

NEW HIPAA REGULATIONS INCLUDED IN ARRA

Best known for its allocation of $787 million to stimulate the U.S. economy, the American Recovery and Reinvestment Act of 2009 includes new legislation that broadens the scope of HIPAA and gives HIPAA investigators direct, monetary incentive for pursuing violators. The HIPAA-specifi c parts of ARRA are found in the Health Information Technology for Economic and Clinical Health Act (HITECH), which Congress included in the overall ARRA legislation.

Broadening the Scope of HIPAA Coverage

HITECH broadens the scope of HIPAA to cover all business associates of HCOs. As of February 2010, any accounting fi rm, legal fi rm, IT consultancy, or other business partner of an HCO must comply with HIPAA security mandates to protect PHI. These organizations are now subject to the same civil and legal penalties that doctors, hospitals, and insurance companies face for violating the HIPAA Privacy Rule.

Data Breach Notifi cation Rules

The HITECH Act also includes new data breach notifi cation rules that apply to HCOs and business part-ners. If an employee discovers a PHI security breach, the employee’s organization has only 60 days in which to notify each individual whose privacy has been compromised. If the organization is unable to contact ten or more of the affected individuals, it must either report the security breach on its Web site or issue a press release about the breach to broadcast and print media. If the breach affects 500 or more individuals, the organization must additionally notify the Security of the HHS, along with major media outlets. TheHHS will then report the breach on its own Web site.8

How consumers react to an increasing amount of news about healthcare security breaches remains to be seen, but HCOs have reason to be nervous. A study by the Ponemon Institute found that, following a data breach, 31% of customers severed their relationship with the vendor. Even if customers don’t defect, most never trust the vendor the same way again. The Ponemon study found that 57% of customers had lost trust and confi dence in vendors who notifi ed them of breaches.9 Such a loss of reputation typically has long-lasting results, including decreased sales and increased marketing costs. Given the higher-than-average marketing and operational costs prevalent in healthcare, HCOs should be especially leery of anything that might cost them customers.

New Data Access and Data Disclosure Rules

In May 2011, HHS proposed to revise the HIPAA Privacy rule by dividing it into two separate rules for indi-viduals: “an individual’s right to an accounting of disclosures” of his or her PHI, and an “individual’s right to an access report, which would include electronic access by both workforce members and persons outside the covered entity.”10 Individuals would be able to request a record of who accessed their PHI and when. In addition, they would be able to learn whom their HCO had disclosed their PHI to. HCOs must comply with these requests within 30 days.

To provide this record, HCOs will need to implement a system, preferably automated, for tracking data access and disclosure. If data access or disclosure involved PHI being transmitted by email, HCOs will need to note the sender, recipient, timestamp, and content of those email messages. They will need to be able to search email to compile records of PHI access and disclosure. To search email promptly and effi ciently, many HCOs will likely turn to email archiving technology that HCOs and other enterprises have deployed over the past decade for purposes of legal eDiscovery and regulatory compliance.

The new, two-part Privacy Rule adds new requirements for email security systems. Not only must the secu-rity systems prevent the unauthorized disclosure of PHI, they must also track internal access and external disclosure of every individual’s PHI. The new regulations make data governance more important than ever for HCOs.

(6)

Penalties that Provide an Incentive for Enforcement

To encourage enforcement of the HIPAA regulations, HITECH calls for HIPAA civil penalties to be paid directly to the U.S. Department of Health and Human Services’ Offi ce of Civil Rights Enforcement. Now those responsible for enforcing HIPAA regulations benefi t directly from any fi nes they levy against viola-tors. This arrangement gives HHS investigators a strong motivation to make fi nes as large as possible, since the proceeds go directory into their own coffers

HITECH not only changes how fi nes will be levied, it also raises the upper limit on the fi nes that can be imposed. An HCO or business partner who violates HIPAA may have to pay fi nes reaching as high as $1.5 million per calendar year. In addition, private citizens and lawyers can now sue to collect fi nes for security breaches. Overall, HITECH considerably increases the potential fi nancial liability of any organization that mishandles the PHI that passes through its IT infrastructure.

The OCR has proven it’s willing to impose million-dollar penalties for HIPAA violations. In February 2011, it fi ned Cignet Health of Prince George’s County, Maryland $4.3 million, making Cignet Health the fi rst healthcare company ever fi ned for violating the HIPAA data privacy rule. The fi ne included a $1.3 million penalty for failing to provide 41 patients with access to their healthcare records within 60 days—and an additional $3 million penalty for failing to cooperate with the OCR and to remedy the lack of compliance in a timely fashion. That same week, the OCR announced that Massachusetts General Hospital and its physicians had entered into a $1 million settlement over the loss of patient records.11 As these cases dem-onstrate, the OCR is taking HIPAA security mandates and HIPAA penalty guidelines seriously.

Milestones and Looming Deadlines

Some HITECH measures, such as the direction of civil monetary penalties to the OCR, are effective im-mediately. Others will be phased in over time. The table below summarizes some important HITECH mile-stones and deadlines.

Date HITECH Provision

Effective upon passage of ARRA in 2009 The Offi ce of Civil Rights (OCR) can levy and receive fi nes. Civil monetary penalties are increased substantially. State Attorney Generals are authorized to take action on behalf of aggrieved persons, even if their states have not established statutes authorizing such action; statutory penalties and attorney fees are recoverable.

September 23, 2009 OCR data breach notifi cation rules took effect. September 24, 2009 FTC data breach notifi cation rules took effect. February 18, 2010 A new Limited Data Set standard requires covered

enti-ties to release only the “minimum necessary” data. HIPAA coverage extends to business associates of HCOs. “Courier” fi rms require business associate agreements. Employees of HCOs and their business partners may have independent criminal liability for HIPAA violations. February 18, 2011 New prohibitions against disclosing PHI for

remunera-tion went into effect.

The Secretary of the HHS can now impose mandatory civil monetary penalties for PHI violations involving “willful neglect.”

May 31, 2011 The OCR proposes modifi cations to the HIPAA Privacy Rule, requiring HCOs to track and report to patients all access to and disclosure of PHI included in electronic health records (EHR).

(7)

OTHER DATA BREACH NOTIFICATION LAWS

As extensive as the new HIPAA privacy and security regulations are, they are not the only government regu-lations calling for organizations to secure PHI and to notify the public of PHI security breaches.

One of the most important data breach notifi cation laws is a California law, the Security Breach Notifi ca-tion Act (SB 1386), which took effect in 2003. SB 1386 requires any business, regardless of its locaca-tion, to publicly disclose the compromise of the private information involving a California resident. The original focus of SB 1386 was on private data such as a resident’s name, driver’s license number, and credit card number. In 2007, California legislature passed AB 1298, which extends the scope of SB 1386 to cover medi-cal information and health insurance information as well.

While the new HITECH provisions in HIPAA require HCOs to disclose breaches affecting 10 or more in-dividuals whom they have been unable to contact, the California data breach notifi cation law requires disclosure of any breach affecting even a single California resident. Other states such as Illinois, whose data breach law took effect on January 1, 2006, similarly set the threshold for notifi cation at the level of a single affected resident. The Massachusetts Data Privacy Law, which took effect in 2010, similar enjoins HCOs and other business entities to protect private data and publicly disclose any breach affecting even a single resident of the state.

As the Illinois and Massachusetts examples show, SB 1386 has become the model for data breach noti-fi cation laws in other states and even other countries. As of the summer of 2009, forty-four U.S. states have enacted data breach notifi cation laws. Twenty-fi ve countries, including Canada and Japan, have also passed similar laws.

The FTC’s Data Breach Notifi cation Law

The FTC’s own security breach notifi cation law for electronic health information took effect on September 24, 2009.12 The law applies to vendors such as WebMD and Google that sell online services based on pa-tient health records; the law specifi cally does not apply to entities already covered by HIPAA. This law is intended to remain in force until Congress passes legislation effecting similar regulations.

Another HHS Data Breach Notifi cation Law

In 2009, the HHS crafted its own security breach notifi cation law, similar to the FTC’s breach notifi cation law, and independent of the breach notifi cation rules included in HIPAA.13 Covered entities do not need to follow the HHS’ guidance for protecting data, but if they do, they will gain safe harbor against the notifi ca-tion penalty. For example, if HCOs encrypt data, that data is not considered disclosed through a breach, because the data is unreadable. The law encourages HCOs and other covered entries to be reasonably dili-gent in following best security practices. It does not mandate specifi c technologies such as encryption, but it holds covered entities liable for achieving a level of data security commonly associated with encryption and other standard IT security technologies.

OTHER RELEVANT DATA PRIVACY LAWS

In addition to data breach notifi cation laws, data privacy laws compel organizations to protect the private data of citizens and consumers.

In Canada, Europe, and Asia, governments have passed legislation requiring organizations to protect con-sumers’ private information. Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) was passed in the late 1990’s. In 2001, the legislation applied only to government regulated industries, such as airlines and broadcasting. In 2002, however, PIPEDA’s coverage extended to the health-care industry. Four Canadian provinces have also passed privacy laws that are similar to PIPEDA,14 and in January 2012, Ontario’s Freedom of Information and Protection of Privacy Act (FIPPA) will be extended to hospitals, requiring them to protect confi dential data in email while servicing public requests for records. Many U.S. states are following California’s lead in mandating the protection of residents’ private data. The Massachusetts Data Privacy Law, for example, took effect on January 1, 2010, and requires that personal information about any Massachusetts resident be encrypted when stored or transmitted. It’s a sweeping law, affecting businesses of all sizes and in all industries.

Nevada has passed a similar law (NRS 597.970) with regard to data transmission, requiring that any busi-ness in the state encrypt any private data it is transmitting electronically outside of the “secure system of the business.”15

(8)

When that law expired on January 1, 2010, a more sweeping data security law took effect. Nevada’s new security legislation requires all businesses storing or transmitting private data in the state to comply with the Payment Card Industry Data Security Standard (PCI DSS), a data security standard developed and adopted by the credit card industry. Nevada is the fi rst state to require that all businesses, even sole pro-prietorships, accepting credit card payments in the state comply with PCI DSS. Some industry analysts consider this law a “game-changer.”16 Until now, government agencies have developed their own lists of security practices when mandating data protection. But PCI DSS is defi ned and controlled by an industry consortium, not a government agency. The Nevada legislature seems to recognize PCI DSS as a rigorous standard offering ready guidelines for security best practices, even if these guidelines are offi cially beyond government control.

It’s possible that other states will copy Nevada’s example and compel all businesses accepting credit card payments to comply with PCI DSS. (Minnesota already requires partial compliance in some situations.) What’s clear from all these laws, both national and regional, is that government agencies are taking an increasingly active role in establishing regulations to protect the private data of their residents. This trend is likely to continue. HCOs should expected stricter regulations and more thorough oversight in the coming years.

WHERE DOES THIS LEAVE ENTERPRISES IN THE HEALTHCARE INDUSTRY?

The healthcare industry is witnessing some dramatic improvements brought about by technology, ranging from Wi-Fi tags for tracking the location of mobile patients to high speed networks for transmitting mas-sive imagery fi les at lightning speed. As part of this transformation, healthcare organizations are making better of use of email and the Internet. To reduce errors and to comply with new government regulations such as HIPAA, they’re making more use of EMRs.17 The future of healthcare looks to be increasingly net-worked, electronic, and effi cient.

Throughout this transformation, email will continue to be an essential application for communicating with patients, helping providers collaborate, and managing business processes such as billing. Whether for patient care or fi nancial operations, email will continue to be used for transmitting PHI. In fact, as medical records move from paper to digital form, email will end up transmitting growing volumes of PHI.

Accordingly, enterprises must ensure that email carrying PHI is always secure and in compliance with the growing body of increasingly strict privacy regulations. Faced with new laws such as HIPAA and SB 1386 mandating encryption and the prompt disclosure of any signifi cant security breach, enterprises cannot af-ford to tolerate any lapse at all in email security.

REQUIREMENTS FOR SECURE EMAIL

Enterprises need a secure mail solution that is automated and comprehensive. IT departments can’t afford to count on end users, in the daily rush of work, distinguishing sensitive data from insensitive data and tak-ing special steps to ensure that sensitive data is transmitted securely. It’s far safer to build the automated detection of PHI into the email infrastructure itself. Upon detecting confi dential information, such as diag-nostic codes or credit card numbers, the email infrastructure itself should encrypt the email automatically and deliver it to an authorized recipient. Improper email should either be blocked altogether or quarantined for review by IT security personnel.

The solution should be able to detect and protect confi dential information, whether it’s included in the body of an email message or in an attachment. Encryption, monitoring, and logging should accommodate treatment and business processes, providing a helpful service that interferes as little as possible with exist-ing operations.

Let’s examine these requirements in detail.

Smart Detection of PHI

A secure email solution should be able to detect only obvious confi dential data like social security numbers and driver’s license numbers but also healthcare-specifi c PHI such as admittance dates and diagnostic codes, including codes from ICD-10-CM and ICD-10-PCS. Being able to distinguish a random sequence of numbers from a meaningful series of numbers—such as the digits in a social security number or a di-agnostic code—is called smart identifi cation. A smart identifi er is technology that correlates instances of non-private data to detect the presence of PHI.

(9)

Smart identifi ers reduce the number of “false positives” by the encryption system. Encrypting non-PHI consumes computing resources and potentially creates operational overhead. By accurately distinguishing PHI from non-PHI, smart identifi ers ensure that the email security infrastructure is as effi cient as possible.

Standard and Custom Dictionaries for Private Data

Automated detection of PHI leads to another requirement: standard and custom dictionaries for private data.

While some data, such as credit card numbers and diagnostic codes, will require protection across the healthcare industry, other private data may assume forms that vary from company to company. A secure email solution should enable IT organizations to develop their own internal defi nitions of data requiring encryption or other special handling.

Rigorous Encryption

Any HIPAA-compliant email solution must apply rigorous encryption technologies to protect messages carrying sensitive data. Depending on where messages are fl owing—within an organization’s secure net-work, between two servers on a secure partner netnet-work, or across the public Internet—it might be most practical to encrypt at the server rather than at the desktop, eliminating the need for end users to take any special steps when sending or receiving messages. In other situations, desktop-level encryption may be most appropriate. It’s important that an email solution not force an organization to dramatically change its workfl ow in order to accommodate security needs. The more fl exible the solution is, the more likely it is to be adopted everywhere it’s needed.

To encrypt email messages, most email solutions rely on digital certifi cates. Alternatively, they might em-ploy other approaches, such as identity-based encryption, deriving encryption keys from unique identities such as email addresses and obviating the need for distributing and managing digital certifi cates. In the choice of encryption technologies, too, offering an enterprise a range of choices is the best way to ensure that security measures are comprehensively implemented.

Flexible Deployment Scenarios

Another requirement is support for fl exible deployment scenarios, accommodating both on-premise and cloud-based computing.

A growing number of enterprises are moving their inbound email fi ltering to Software-as-a-Service (SaaS) applications running in the “cloud” at data centers managed by third parties. By processing inbound mes-sages on remote servers, these enterprises reduce the in-house computing resources (such as network bandwidth and storage) that would otherwise be allocated for messages that will most likely be quaran-tined or discarded. SaaS-based email fi ltering also helps these enterprises minimize the risk of email-borne malware wreaking havoc on internal systems. SaaS-based email fi ltering also spares these enterprises the expense of having to archive thousands or even millions of unwanted messages simply to comply with industry regulations requiring organizations to archive all the email they receive.

Until recently, even if an enterprise fi ltered inbound messages in the cloud, it fi ltered outbound messages for regulatory compliance and data leak prevention in-house. By fi ltering outbound traffi c in-house, enter-prises hoped to ensure that no inappropriate content ever left the network perimeter.

But stringent data center security practices can make SaaS email fi ltering just as secure as in-house email fi ltering. Well-designed SaaS applications can be protected by rigorous security technologies such as Transport Layer Service (TLS) encryption, the use of the Sender Policy Framework IDs as an anti-forgery safeguard, and stringent physical security controls certifi ed by auditors to comply with best practices for SAS70 Type II.18 As a result, enterprises now have the option to fi lter both inbound and outbound email in the cloud, taking advantage of the scalability and low ownership costs associated with SaaS.

Another option for enterprises is a hybrid approach, using SaaS processing for inbound email, while using on-premises processing for outbound email. A hybrid model is often a practical solution for enterprises interested in making a phased transition to all-SaaS fi ltering.

In addition to supporting these various deployment models, an email solution should offer a modular, plug-in architecture, so that enterprises can add functionality and tailor their own email solutions without shutting email operations down and deploying entirely new products.

(10)

Requirements Summary

The table below summarizes the requirements for a regulatory-compliant secure email system for health-care.

Requirements Benefi ts Comprehensive detection of private data

• Pre-defi ned and custom dictionaries

• Smart identifi ers (reduces false positives)

• Support for scanning and encrypting attachments

Ensures that all private and sensitive data is identifi ed for secure treatment.

Rigorous encryption Protects PHI and other sensitive data from interception and corruption.

Policy-based controls Enables IT organizations to adapt the secure email solu-tion to their organizasolu-tion’s requirements and workfl ows.

Flexible remediation: ability to encrypt, redirect,

quarantine, block, add X-header, or annotate messages, as needed

Enables IT organizations to adapt the secure email solu-tion to their organizasolu-tion’s requirements and workfl ows.

Archiving of email containing PHI Enables IT organizations to comply with new HIPAA re-quirements for tracking all access and disclosure of PHI and delivering reports of that access to patients.

Reporting to discover potential issues and to

demon-strate compliance

Meets HIPAA requirements for reporting and monitoring. Aids employee training on security.

Flexible deployment models to meet different customer needs:

• SaaS

• On-premises appliances

• Plug-in architecture

Adapts security implementations to the varied needs of organizations and even to the varied needs among branch offi ces within an organization.

CONCLUSION

Judging from both the HITECH Act included in the stimulus bill and the FTC’s multi-million dollar penalty against CVS, this much is clear: the U.S. federal government has gotten serious about enforcing HIPAA security regula-tions. At the same time, state governments are demonstrating their own fervor for data security by enacting privacy laws modeled on California SB 1386. These new laws, such as the Massachusetts Data Privacy Law took effect on January 1, 2010, compel enterprises to protect individuals’ data at rest and in motion and to disclose any security lapse, even small lapses that previously would have been overlooked.

By taking steps now to implement automated, comprehensive email security, HCOs and their business partners can reap the undisputed operational benefi ts of email communications while avoiding the public censure and fi -nancial penalties that might result from regulatory action. A fl exible email security solution should readily accom-modate the IT architecture, business operations, and regulatory requirements of any healthcare enterprise today while preparing that enterprise to benefi t from EMRs and other exciting IT advances in the future.

ABOUT PROOFPOINT

Proofpoint focuses exclusively on the art and science of cloud-based email security, eDiscovery and compliance solutions. Organizations around the world depend on Proofpoint’s dedication, expertise, patented technologies and on-demand delivery system to protect against spam and viruses, safeguard privacy, encrypt sensitive informa-tion, and archive messages for easier management and discovery. Proofpoint’s enterprise email solutions mitigate the challenges and amplify the benefi ts of enterprise messaging. Learn more at www.proofpoint.com.

(11)

1 See The Critical Need for Encrypted Email and Secure File Transfer Technologies, Osterman Research, July 2009.

2 “De-identifi ed” information is information that excludes any details, such as a complete Social Security Number, that could be used to identify a specifi c person.

3 http://www.aan.com/news/?event=read&article_id=7734

4 http://www.cdc.gov/nchs/icd/icd10cm.htm

5 Protected health information (PHI) is any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment. Source: http://cphs.berkeley.edu/content/hipaa/hipaa18.htm. 6 “HIPAA: Clean bill of health, or dying a slow death?”, Paul Korzeniowski, SearchFinancialSecurity.com, http://searchfi nancialsecurity.techtarget.com/news/ article/0,289142,sid185_gci1294167,00.html

7 “CVS to pay $2.25 million to settle HIPAA violation,” Dan Kaplan, SC Magazine, February 18, 2009, settle-HIPAA-violation/article/127570/

8 The HHS list of security breaches is here:

http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotifi cationrule/breachtool.html For more information, see: http://www.frostbrowntodd.com/news_ca_hitech_act/

9 Consumer’s Report Card on Data Breach Notifi cation, Ponemon Institute, April 2008.

10 http://www.informationweek.com/news/healthcare/policy/229700217 11 http://www.healthcareinfosecurity.com/articles.php?art_id=3379 12 http://edocket.access.gpo.gov/2009/pdf/E9-20142.pdf 13 http://edocket.access.gpo.gov/2009/pdf/E9-20169.pdf 14 http://en.wikipedia.org/wiki/Personal_Information_Protection_and_Electronic_Documents_Act 15 http://www.leg.state.nv.us/NRs/NRS-597.html#NRS597Sec970 16 Lhttp://www.bankinfosecurity.com/articles.php?art_id=1599&rf=070609eb

17 Research fi rm Kalorama Information estimates that the EMR market overall has reached $9.5 billion. The market just for EMR transfer equipment and applications which would involve email and other electronic communications—will triple between 2008 and 2013, reaching $1.6 billion. See “Market for EMRs pegged at $1.6 billion by 2013”, Healthcare IT News, http://www.healthcareitnews.com/news/market-emrs-pegged-16-billion-2013

15 SAS 70 is an auditing statement issued by the Auditing Standards Board of the American Institute of Certifi ed Public Accountants (AICPA). SAS 70 Type II evaluates whether controls were operating effectively during a period of review.

(12)

www.proofpoint.com

US Worldwide Headquarters Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 United States Tel +1 408 517 4710 US Federal Offi ce Proofpoint, Inc. 13800 Coppermine Road Suite 203 Herndon, VA 20171 United States Tel +1 703 885 6809 Asia Pacifi c Proofpoint APAC Suntec Tower 2, 9 Temasek Boulevard, 31F Singapore 038989 Tel +65 6559 6128 EMEA Proofpoint, Ltd. 200 Brook Drive Green Park Reading, UK RG2 6UB Tel +44 (0) 870 803 0704 Japan Proofpoint Japan K.K. BUREX Kojimachi Kojimachi 3-5-2, Chiyoda-ku Tokyo, 102-0083 Japan Tel +81 3 5210 3611 Canada Proofpoint Canada 210 King Street East, Suite 300 Toronto, Ontario, M5A 1J7 Canada Tel +1 647 436 1036 Mexico Proofpoint Mexico Salaverry 1199 Col. Zacatenco CP 07360 México D.F. Tel: +52 55 5905 5306

Proofpoint focuses exclusively on the art and science of cloud-based email security, eDiscovery and compliance solutions. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against spam and viruses, safeguard privacy, encrypt sensitive information, and archive messages for easier management and discovery. Proofpoint’s enterprise email solutions mitigate the challenges and amplify the benefi ts of enterprise messaging.

References

Related documents

The stakeholders responsible for tourists‟ safety such as tourism police, lifeguards, tourism officials, and staff members of the Home Department were

Based on the definition of AT, items range from low to high tech; and, if low tech items are used by a student and are included in the IEP, the AT indicator should be coded “1.”

A statistically significant negative correlation was dem- onstrated in the study cohort between the maternal serum PIGF levels, foetal heart rate (FHR), birth weight and length,

Securing data in compliance with HIPAA regulation through an EHR can not only “maintain privacy and security of patient health information,” but also enable healthcare

associated with relative measures of abundance and is generally cost and time efficient (Royle and Nichols 2003, Jones 2011). The goal of this study was to build a model that

FOR COMPLIANCE WITH THE HIPAA PRIVACY & SECURITY REGULATIONS The purpose of the HIPAA Privacy and Security Regulations are to require group health plans not to use or disclose

HIPAA Privacy and Security Rules were passed to protect patient privacy and secure electronic health information.. secure electronic

I have reviewed the HIPAA basic training module which includes information regarding the Privacy and Security regulations the IU HIPAA Privacy and Security. regulations, the IU