Pages

Showing posts with label corporate data security. Show all posts
Showing posts with label corporate data security. Show all posts

Are you doing enough to prevent breaches of protected health information?

HIPAA violations can have serious legal consequences.

Case in point: A federal grand jury has indicted a former employee at the University of Pittsburgh Medical Center for allegedly stealing patient data. The defendant disclosed to other people the names, birth dates and Social Security numbers of patients – information later used to file false tax returns. The law carries of maximum sentence of 80 years in prison, a fine of more than $4.7 million, or both.

In another case, a former researcher at the UCLA School of Medicine has been sentenced to four months in federal prison for HIPAA violations. Upon learning that he was being dismissed from his job, the UCLA employee accessed the medical records of his superior and coworkers, as well as more than 320 patient records (many of them celebrities) during the following four weeks. Charges were filed in 2009 and the defendant pleaded guilty in early 2010 to four misdemeanor counts of illegally reading private and confidential medical records.

Not only do these cases demonstrate the long reach of HIPAA enforcement, but also the importance of bumping up security and other safeguards to prevent these types of medical data breaches.

What is a breach?

A breach occurs when 1) there has been “unauthorized” access, use or disclosure of “unsecured” PHI that violates the HIPAA Privacy Rule, and 2) the disclosure “compromises the security or privacy” of the PHI, which means that it “poses a significant risk of financial, reputational or other harm to the individual.”

What is “unsecured” PHI?

The rules define “unsecured” PHI as any information that has not been rendered unusable, unreadable or indecipherable to unauthorized individuals through the application of a technology such as encryption and destruction.

Encryption - Proper encryption should use an algorithmic process to transform data into a form that is meaningless without a confidential process or key (which also must be protected).

Destruction - Hard copy PHI, such as paper or film, needs to be thoroughly shredded or destroyed so that it cannot be read or reconstructed.

How do I protect my business?

To steer clear of HIPAA violations and breaches, you should:

Establish breach notification procedures and update policies - Develop guidelines for determining when a breach has occurred, who will prepare individual notifications, and when a breach will trigger a requirement for notice to the media or immediate notice to HHS. Amend your HIPAA privacy and security policies, too, to cover the security breach notification rules.

Maintain a breach incident log - Set up a system to log security breaches affecting fewer than 500 individuals, which you must file with HHS within 60 days after the end of the year.

Revise business associate agreements - Discuss with your business associates (and put in writing) when they should notify you of a breach by their organization, what information should be reported, and which party will issue the required notifications.

Train employees on proper procedures - Employees should understand when they have encountered a breach and how to report it. A successful training program will provide formal instruction on HIPAA-related policies and procedures, as well as build awareness through workplace postings and other employee materials.
Share/Bookmark

Employees putting your data security at risk?

Odds are good that they are, according to the latest research.

More employees are ignoring data security policies and engaging in online activities that could put their employer at risk, according to a survey released by Ponemon Institute. Even more worrisome is knowing that they’re doing it even if they understand it’s wrong.

The top data security offenses include copying secure data to USB drives or disabling security settings on mobile devices like laptops. Some employees admit to losing USB sticks that stored confidential corporate data, but failed to report it to the company immediately, the report said.

Almost 31% of employees surveyed said they also engaged in social-networking activities from work computers. More than half (53%) said they downloaded personal software on company computers, heightening the risk of infecting the corporate network with malicious software.

Mobile technologies that let employees do more while on the road are contributing to the issue, said Larry Ponemon, chairman and founder of Ponemon Institute, in a blog entry. As the use of mobile devices grows, the inability to enforce data security policies could increase the possibility of data breaches. "I'm seeing a confluence of conditions that appear to be contributing to this challenge to data integrity," he said. (PC World)

Negligent online activity puts not only data security at risk, but could also be putting the company’s reputation in a vulnerable position. Remember the Domino’s incident?

About 60% of corporate executives feel they have the right to know how employees portray themselves and their organizations in online social networks, according to the Deloitte LLP Ethics & Workplace survey. However, most employees (53%) say their activity on social networks should be none of their employers’ business.

Whether it’s your data security or corporate reputation you’re looking to protect, having a sound social media policy is your first line of defense. We’re all adults here, but once in a while we all need a friendly reminder of what it means to be responsible online.

Social media policies will differ from company to company, but they all share a few key points: understanding what unacceptable online behavior is, being mindful of the business’ image, using good judgement and knowing that employees represent of the company.

For more help on developing a social media policy, read these past posts:

Bosses concerned over employees’ online behavior, employees say “butt out”

Domino’s employees fired, charged after “gross” video goes viral

The impact of social media on corporate culture

Dangers of using social networking sites to screen applicants
Share/Bookmark
 

Labels :

Copyright (c) 2010. Blogger templates by Bloggermint