Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012
|
|
- Daniel Page
- 5 years ago
- Views:
Transcription
1 Interagency Advisory Board Meeting Agenda, Wednesday, December 5, Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV and PIV-I Use in Health IT Relying Party Systems (Mike Magrath, Gemalto) 4. Briefing on Draft NIST SP , Guidelines on Hardware-Rooted Security in Mobile Devices (Andy Regenscheid, NIST) 5. Cloud-Sourcing Public Key Enablement (Steve Howard, Certipath) 6. Closing Remarks
2 PIV-I in the U.S. Healthcare Market Michael Magrath, CSCIP Director, Business Development - Government & Healthcare Gemalto Chair Smart Card Alliance s Healthcare Council IAB Meeting December 5, 2012
3 Gemalto The Leader in Digital Security It is most likely you have one or more of our products in your possession right now!!!! The SIM card in your mobile phone The bank cards in your wallet or purse (Mag stripe or chip based) Your US Passport If you are a federal employee your CAC or PIV card 30
4 Agenda Identity Initiatives Impacting Healthcare egov NwHIN myhealthevet ssa.gov mymedicare.gov NSTIC Identity Mgt & Authentication PHRs FRAC Electronic Prescriptions Fraud Waste & Abuse 31
5 Key points! The US healthcare market is quite fragmented.! It is very inefficient and is riddled with fraud estimated at over $100 billion annually.! Large investment in migration from paper records to electronic records! Migration from handwritten prescriptions to electronic! The federal government remains technology neutral and is determined to let the market decide when it comes to technological solutions. The government is leery of moving forward with a specific technology only to have it obsolete in a matter of years. 12/10/12 32
6 The Highway for Health Information Exchange NwHIN is a Network of Networks Each network can include multiple organizations and partners with different roles and authorities Data exchange can include more than one exchange intermediary NwHIN data exchange may be between organizations in a region or between different regions or states Trust in Question 33
7 HHS Advisory Committees formed via ARRA 2009! Health IT Policy Committee will make recommendations to the National Coordinator for Health IT on a policy framework for the development and adoption of a nationwide health information infrastructure, including standards for the exchange of patient medical information.! Health IT Standards Committee is charged with making recommendations to the National Coordinator for Health IT on standards, implementation specifications, and certification criteria for the electronic exchange and use of health information. 34
8 Meaningful Use The HITECH portion of the American Recovery and Reinvestment Act (ARRA) of 2009 specifically mandated that incentives should be given to Medicare and Medicaid providers not for EHR adoption but for meaningful use of EHRs.! Stage 1 Effective Jan. 2012! Stage 2 Effective Jan 2014! Stage 3 RFC issued by HIT Policy Committee due 1/14/13 HITPC recommended that EHRs should be able to accept two factor (or higher) authentication for provider users to remotely access protected health information (PHI). NIST LoA 3 is being recommended. No mention of LoA 4 thus far 35
9 DEA s Interim Final Rule for eprescribing controlled substances! Published in The Federal Register, March 31, 2010 Two of three factors must be used: a biometric, a knowledge factor (e.g., password), or a hard token The rule does not require the use of a specific form of biometric technology. DEA is establishing standards for biometric systems in conjunction with NIST. DEA has revised this rule to allow the use of a hard token that is separate from the computer being accessed and that meets FIPS Security Level 1 security or higher. Proximity cards that are smart cards with cryptographic modules could serve as hard tokens. DEA believes that NIST Assurance Level 3 as described will meet its security concerns. 36
10 NSTIC s Identity Ecosystem! Carving niche for high assurance credentials! Healthcare Committee formed! Advocating for NIST LoA 3 and LoA 4 credentials in ecosystem! No grant pilots included smart card technology! PIV / PIV-I in mobile devices will help in future 12/10/12Jan 27,
11 First Responder Authentication Credential! 800,000 doctors! 3 million nurses! 210,000 EMTs! A multipurpose electronic identity credential 38
12 Patient Identity Assurance Reducing Fraud & Medical Identity Theft Identity of Patients in Cyberspace Hearing for the HIT Privacy & Security Tiger Team and Privacy & Security Workgroup, 11/29/12 39
13 Medicare, Medicaid & CHIP
14 A Relying Party "We want to be a relying party. We don't want to be a credential provider for the government. Federated identity management is the end goal, "where we can accept the level 3 credential, or a level 4 credential, or even a level 2 credential from whoever, federate that and utilize it so a provider will not have to get multiple credentials," - Tony Trenkle, CMS CIO, 10/18/2012! CMS is working closely with the NSTIC NPO and HHS! CMS provides 4 million national provider IDs for the various entities that do business with CMS, he said. It also has 175 applications currently using seven different access management systems. And with the forthcoming health insurance exchange,! CMS could eventually be handling access and credentials for 30 to 50 million users 41
15 Beneficiaries under Centers of Medicare & Medicaid Services! 91 Million Beneficiaries (Medicare, Medicaid, CHIP) (FY 2010). Medicare = 48 M Medicaid = 35 M Children's Health Insurance Program (CHIP) = 8 M! 240,000 beneficiaries are added every month! ACA will add 30 million more individuals to Medicaid bringing the number close to 121M.! About half the 30 million people gaining coverage under the ACA would do so through Medicaid. Most of the new beneficiaries would be childless adults 2.7 million would be parents with children at home. The federal government would pay the full cost of the first three years of the expansion, gradually phasing down to a 90 percent share. 12/10/12 42
16 Medicare Common Access Card Act of 2011 Bipartisan legislation (S & H.R 2925) Would establish a pilot program to develop a secure Medicare card using smart card technology to protect seniors personal information, prevent fraud and speed payment to doctors and hospitals. Removes SSN from front of card and stores in on the chip allowing CMS to continue using the SSN as the claim number AARP, 60 Plus, American College of Physician Executives. American Academy of Orthopedic Surgeons endorse legislation. Funded by transferring funds from the Medicare Improvement Fund (MIF) which makes funds available to HHS for the purpose of making improvements under the Medicare Parts A & B programs including program integrity improvements. 43
17 Medicare Common Access Card Act of 2011 PIN 44
18 Medicare CAC - Current Status! At request for Senator Kirk, the Smart Card Alliance commissioned a 3 rd party to audit the industry s estimated cost for the program! Co-signers in the House and Senate.! June Members of the Senate Finance Committee solicited ideas from interested stakeholders in the health care community regarding effective solutions to improve federal efforts to combat waste, fraud, and abuse in the Medicare and Medicaid programs.! Nov 15 - Frank Abangale, world renown document security and fraud prevention expert as well as the subject of the movie Catch Me If You Can, based on his earlier life as a professional forger testified before a Senate Committee on Aging hearing entitled America s Invisible Epidemic: Preventing Elder Financial Abuse. In advising Congress on how to best protect seniors against identity theft and fraud, Abangale strongly urged Congress to create an upgraded Medicare smart card as described in The Medicare Common Access Card (CAC) Act, S.1551.! Nov 28 The House Energy and Commerce Subcommittee on Health held hearing on Medicare Fraud Waste and Abuse. Medicare CAC was discussed. On behalf of the Secure ID Coalition, Gemalto s Neville Pattinson testified.! 113 th Congress begins January. New bills to be introduced. 12/10/12 45
19 Identity Initiatives Impacting Healthcare NwHIN egov myhealthevet ssa.gov mymedicare.gov NSTIC PHRs (CIV) FRAC Electronic Prescriptions Fraud Waste & Abuse 46
20 Utopia - Healthcare Identity Management PIV PIV-I Commercial Identity Verification (CIV) 47
21 Benefits of Smart Cards to Improve Provider and Payer processes! Quickly and accurately identifying patients, reducing medical identity theft and improving quality of care.! Streamlining patient registration and patient information access at any points of care, reducing routine paperwork and eliminating errors.! Supporting audit logging and remote access accountability.! Enabling secure access to healthcare websites.! Storing all necessary applications and information on the card, enabling offline access to critical healthcare information using portable readers.! Additional information on the use of smart cards for healthcare applications can be found on the Smart Card Alliance web site, 48
22 Smart Card Centered Healthcare
23 Thank You Michael Magrath Director, Business Development 4401 Wilson Blvd., Suite 210 Arlington, VA Office: Cell: &
HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013
HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 The Smart Card Alliance hereby submits the following comments regarding the Health Information Technology Policy Committee
More informationThe Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services
The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO
More informationSmart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012
Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationUpdate from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013
Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S
More informationCertification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption
Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;
More informationPKI and FICAM Overview and Outlook
PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies
More informationInformation Technology (CCHIT): Report on Activities and Progress
Certification Commission for Healthcare Information Technology Certification Commission for Healthcare Information Technology (CCHIT): Report on Activities and Progress Mark Leavitt, MD, PhD Chair, CCHIT
More informationThe Benefits of EPCS Beyond Compliance August 15, 2016
The Trusted Source for Secure Identity Solutions The Benefits of EPCS Beyond Compliance August 15, 2016 Presenters Sheila Loy Director Healthcare Solutions HID Global Joe Summanen Technical Architect Nemours
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationInteragency Advisory Board Meeting Agenda, Wednesday, February 27, 2013
Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 1. Opening Remarks 2. Discussion on Revisions Contained in Draft SP 800-63-2 (Bill Burr, NIST) 3. The Objectives and Status of Modern
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationTrust Services for Electronic Transactions
Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg
More informationThe HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.
The HITECH Act 5 things you can do Right Now to pave the road to compliance Beginning in 2011, HITECH Act financial incentives will create a $5,800,000 opportunity over four years for mid-size hospital
More informationSecuring Americans Identities: The Future of the Social Security Number
Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James
More informationFIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP
FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com :: @jgrantindc 1 WHAT IS REGTECH? RegTech: Technology
More informationResponse to CMS. WEDI Attachment Forum Questions. August 9th Attachment Standard
Response to CMS WEDI Attachment Forum Questions August 9th 2016 Attachment Standard August 25, 2016 Cooperative Exchange National Association of Clearinghouses 28 Clearinghouse member companies Represent
More informationInteragency Advisory Board Meeting Agenda, Wednesday, April 24, 2013
Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV
More informationAll Aboard the HIPAA Omnibus An Auditor s Perspective
All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes
More informationOverview of the Multi-Payer Claims Database (MPCD)
Overview of the Multi-Payer Claims Database (MPCD) Genesis of the MPCD The MPCD project is one of a number of initiatives related to comparative effectiveness research (CER) funded by the American Recovery
More information10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment
Preparing Your Organization for a HHS OIG Information Security Audit David Holtzman, JD, CIPP/G CynergisTek, Inc. Brian C. Johnson, CPA, CISA HHS OIG Section 1: Models for Risk Assessment Section 2: Preparing
More informationIdentity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation
Booz Allen Hamilton Proprietary 1 Conference Presentation Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Kris O Neal Dan Steinberg Harvard Privacy Symposium August
More informationIs Your Compliance Strategy Putting Your Business at Risk?
Is Your Compliance Strategy Putting Your Business at Risk? January 20, 2015 2015 NASDAQ-LISTED: EGHT Today s Speakers Michael McAlpen Exec. Dir. of Security & Compliance, 8x8, Inc. David Leach Business
More informationACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families
ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System
More informationPrior Authorization and Clinician Burden: Updates from ONC
Prior Authorization and Clinician Burden: Updates from ONC Thomas A. Mason, MD, FACP Chief Medical Officer Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationGuidance for Exchange and Medicaid Information Technology (IT) Systems
Department of Health and Human Services Office of Consumer Information and Insurance Oversight Centers for Medicare & Medicaid Services Guidance for Exchange and Medicaid Information Technology (IT) Systems
More informationWill Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?
Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California
More informationFederal-State Connections: Opportunities for Coordination and Collaboration
Federal-State Connections: Opportunities for Coordination and Collaboration State Health Information Exchange Program October 23, 2012 Chris Muir Program Manager 1 ONC Overview Vision A health system that
More informationSummary of Changes in CSCIP/P Training Modules: June 2015 Release June 15, 2015
Summary of Changes in CSCIP/P Training Modules: June 2015 Release June 15, 2015 Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program 1 June 2015 Release June 15, 2015 About
More informationEPCS in the State of New York
EPCS in the State of New York Medical Society of the State of New York November 20, 2014 Ken Majkowski Vice President Partner Development EPCS Adoption Status as of October 19, 2014 Over 1.3 million New
More informationRemote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act
Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act Are your authentication, access, and audit paradigms up to date? Table of Contents Synopsis...1
More informationMaryland Health Care Commission
Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT
More informationInteragency Advisory Board Meeting Agenda, Wednesday, May 23, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content
More informationHIPAA / HITECH Overview of Capabilities and Protected Health Information
HIPAA / HITECH Overview of Capabilities and Protected Health Information August 2017 Rev 1.8.9 2017 DragonFly Athletics, LLC 2017, DragonFly Athletics, LLC. or its affiliates. All rights reserved. Notices
More informationMassachusetts Health Data Consortium CAQH CORE - NEHEN - VeriSign/Symantec Pilot. September 2010
Massachusetts Health Data Consortium CAQH CORE - NEHEN - VeriSign/Symantec Pilot September 2010 Agenda CAQH status CORE UPD Pilot overview Q&A 2 HR 3590 Patient Protection and Affordable Care Act: Section
More informationHIT Policy Committee. Recommendations by the Certification and Adoption Workgroup. Paul Egerman Marc Probst, Intermountain Healthcare.
HIT Policy Committee Recommendations by the Certification and Adoption Workgroup Paul Egerman Marc Probst, Intermountain Healthcare July 16, 2009 Agenda The Workgroup The Workgroup s Charge Workgroup Process
More informationADTRAN: Real Solutions. Healthcare
ADTRAN: Real Solutions Healthcare Transforming Healthcare Networks Productivity Meeting the Challenge to Change: Understanding the U.S. HITECH ACT As part of the recently defined United States American
More informationInteragency Advisory Board Meeting Agenda, August 25, 2009
Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and
More informationAn Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication
An Overview of Draft SP 800-157 Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov
More informationHIPAA Case Study. Long Term Care (LTC) Industry. October 26, Presented by: James Pfeiffer Brian Zoeller
HIPAA Case Study Long Term Care (LTC) Industry October 26, 2001 Presented by: James Pfeiffer Brian Zoeller Overview LTC Industry Characteristics LTC HIPAA Compliance Issues Kindred Healthcare s HIPAA Compliance
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationMultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions
CASE STUDY MultiPlan Selects CyrusOne for Exceptional Scalable, secure and reliable data center solution keeps healthcare company operating seamlessly MultiPlan Inc., the industry s most comprehensive
More informationData Backup and Contingency Planning Procedure
HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage
More informationHIPAA & Privacy Compliance Update
HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com
More informationCMS and ehealth. Robert Tagalicod Director, Office of ehealth Standards and Services (OESS)
CMS and ehealth Robert Tagalicod Director, Office of ehealth Standards and Services (OESS) Robert Anthony Deputy Director, Health IT Initiatives Group, OESS September 16, 2013 www.cms.gov/ehealth 2 ehealth
More informationSecuring Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS
Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Introduction The expectations and requirements on government contracts for safety and security projects
More informationCHIEF INFORMATION OFFICER
OFFICE OF THE CHIEF INFORMATION OFFICER DEPARTMENT OF HEALTH AND HUMAN SERVICES U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES HHS IT Direction & Priorities iti April 7, 2011 John Teeter Deputy Chief Information
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationMedical Assistance Provider Incentive Repository. User Guide. For Eligible Professionals
Medical Assistance Provider Incentive Repository User Guide For Eligible Professionals February 25, 2013 Table of Contents Introduction...1 Before You Begin...2 Complete your R&A registration.... 2 Identify
More informationState of the Industry and Councils Reports. Access Control Council
State of the Industry and Councils Reports Access Control Council Chairman: Lars R. Suneborn, Sr. Manager, Technical Marketing, Government ID, Oberthur Technologies Property of the Smart Card Alliance
More informationSECURETexas Health Information Privacy & Security Certification Program
Partners in Texas Health Informa3on Protec3on SECURETexas Health Information Privacy & Security Certification Program 2015 HITRUST, Frisco, TX. All Rights Reserved. Outline Introduction Background Benefits
More informationI. The Medical Technology Industry s Cybersecurity Efforts and Requirements
701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org June 12, 2018 U.S. House of Representatives Committee on Energy and Commerce 2125 Rayburn
More informationAuditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC
Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements
More informationDecrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute October 1, 2014 10/1/2014 1 1 Who is
More informationApril 25, Dear Secretary Sebelius,
April 25, 2014 Department of Health and Human Services Office of the National Coordinator for Health Information Technology Attention: 2015 Edition EHR Standards and Certification Criteria Proposed Rule
More informationInteragency Advisory Board Meeting Agenda, December 7, 2009
Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO
More informationTesting for Reliable and Dependable Health Information Exchange
Testing for Reliable and Dependable Health Information Exchange Presented by Didi Davis, Testing Programs Director 1 Copyright 2016 The Sequoia Project. All rights reserved. Discussion Topics 1. ehealth
More informationPrepared by. On behalf of The California HealthCare Foundation. Nov. 24, Sujansky & Associates, LLC 1
Guidelines for the Electronic Prescribing of Controlled Substances: Identity Proofing, Issuing Authentication Credentials, and Configuring Logical Access Controls Prepared by Sujansky & Associates, LLC
More informationASC X12 Clearinghouse Caucus
ASC X12 Clearinghouse Caucus January 23, 2018 AGENDA 1. Welcome and Introduction - Joe Bell, Board Chair, Cooperative Exchange and Senior Program Manager, esolutions Inc. 2. ASC X12N Update - Stacey Barber,
More informationInteragency Advisory Board Meeting Agenda, Wednesday, December 5, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV
More informationA Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction
A Market Solution to Online Identity Trust Background OIX is an Internet scale solution to the problem of how identity credentials can be trusted online. Background "OIX is the organization where different
More informationPULSE TAKING THE PHYSICIAN S
TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity.
More informationRe: Draft Trusted Exchange Framework & Draft U.S. Core Data for Interoperability
February 20, 2018 Don Rucker, M.D. National Coordinator for Health Information Technology Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health & Human Services
More informationInteragency Advisory Board Meeting Agenda, July 28, 2010
Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities
More informationEXPERIENCE SIMPLER, STRONGER AUTHENTICATION
1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 783 data breaches >1 billion records stolen since 2012 $3.5 million average cost per breach 4 We have a PASSWORD
More informationEHR & HIPAA Managing Compliance & Progress. Agenda. Federal EHR Imperatives & Achieving Meaningful Use. EHR & HIPAA: Managing Compliance & Progress
EHR & HIPAA Managing Compliance & Progress Presented by Rodney Walsh, Senior Managing Consultant May 20, 2010 Agenda Federal EHR imperatives Certification & meaningful use Management of EHR upgrades &
More informationPrograms that Work. March 7,
Programs that Work March 7, 2017 www.workforcedqc.org @workforcedqc Panelists Jenna Leventoff, Workforce Data Quality Campaign Kermit Kaleba, National Skills Coalition David W. Ramsay, Office of Research
More informationMapping to the National Broadband Plan
The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National
More informationNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,
More informationAssuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09
Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance
More informationInteragency Advisory Board Meeting Agenda, Tuesday, November 1, 2011
Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. FIPS 201-2 Update and Panel Discussion with NIST Experts in Q&A Session (Bill MacGregor
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationManaging Trust in e-health with Federated Identity Management
ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun
More informationYOUR GUIDE TO I-STOP COMPLIANCE AND EPCS
YOUR GUIDE TO I-STOP COMPLIANCE AND EPCS Q: I prescribe medication in New York. Why does EPCS matter to me? A: Beginning March 2015, paper prescriptions will no longer be accepted. Beginning March 27,
More informationCLINICAL DIRECT MESSAGING FREQUENTLY ASKED QUESTIONS
Surescripts has the experience to handle all of your direct messaging needs. Serving the nation with the single most trusted and capable health information network since 2001, we seamlessly connect the
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationDigitalPersona for Healthcare Organizations
DigitalPersona for Healthcare Organizations RAPID, SECURE AUTHENTICATION FOR MEDICAL PROVIDERS AND STAFF Secure Access to Electronic Health Records Streamline Clinical Workflow Reduce Cybersecurity Costs
More informationThe Provider Enrollment Process. Provider Relations BlueCross BlueShield of South Carolina BlueChoice HealthPlan Healthy Blue SM
The Provider Enrollment Process Provider Relations BlueCross BlueShield of South Carolina BlueChoice HealthPlan Healthy Blue SM Introduction The enrollment process is performed for several reasons: To
More informationFIPS and Mobility (SP Derived PIV Credentials) Sal Francomacaro FIPS201/PIV Team NIST ITL Computer Security Division
FIPS 201-2 and Mobility (SP 800-157 Derived PIV Credentials) Sal Francomacaro FIPS201/PIV Team NIST ITL Computer Security Division salfra@nist.gov 2013 Smart Card Alliance Member Meeting Coral Gables,
More informationUpdate for the Workgroup for Electronic Data Interchange (WEDI) July 31, 2018
Update for the Workgroup for Electronic Data Interchange (WEDI) July 31, 2018 Madhu Annadata, Director, Christine Gerhardt, Deputy Director, Division of National Standards Administrative Simplification
More informationCryptologic and Cyber Systems Division
Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,
More informationQualifying Alternative Payment Model Participants (QPs) Methodology Fact Sheet
Qualifying Alternative Payment Model Participants (QPs) Methodology Fact Sheet Overview This methodology fact sheet describes the process and methodology that the Centers for Medicare & Medicaid Services
More informationVirtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).
myvirtua.org Terms of Use PLEASE READ THESE TERMS OF USE CAREFULLY Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). Virtua has partnered with a company
More informationChoosing the right two-factor authentication solution for healthcare
Choosing the right two-factor authentication solution for healthcare The healthcare industry s transition from paper to electronic records has introduced significant security risk from hackers around the
More informationPresented by the Federal Interagency Elder Justice Working Group May 13, 2013
Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with
More informationA Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances
A Quick Guide to EPCS What You Need to Know to Implement Electronic Prescriptions for Controlled Substances Many healthcare providers have delayed implementing electronic prescriptions for controlled substances
More informationby Robert Hudock and Patricia Wagner April 2009 Introduction
HITECH Updates: Proposed Health Breach Notification Rule Promulgated by the FTC; HHS Releases Guidance on How to Render PHI Unusable, Unreadable, or Indecipherable by Robert Hudock and Patricia Wagner
More informationX12 Clearinghouse Caucus. January 31, :00-6:30 pm Sheraton Seattle Hotel / Metropolitan B
X12 Clearinghouse Caucus January 31, 2017-5:00-6:30 pm Sheraton Seattle Hotel / Metropolitan B Clearinghouse Caucus Sponsors Clearinghouse Caucus - ASC X12 Standing Meeting January 31, 2017-5:00-6:15pm
More informationHITRUST ON THE CLOUD. Navigating Healthcare Compliance
HITRUST ON THE CLOUD Navigating Healthcare Compliance As the demand for digital health solutions increases, the IT regulatory landscape continues to evolve. Staying ahead of new cybersecurity rules and
More informationFuture-Proof Security & Privacy in IoT
All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design
More informationHIPAA COMPLIANCE AND DATA PROTECTION Page 1
HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud
More informationSmart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security
Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds
More informationFIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication
FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity
More informationSLI Compliance ONC-ATL Testing Program Guide
SLI Compliance A Division of Gaming Laboratories International, LLC 4720 Independence St. Wheat Ridge, CO 80033 303-422-1566 www.slicompliance.com SLI Compliance ONC-ATL Testing Program Guide Document
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationIntra-ASEAN Secure Transactions Framework. Pitinan Kooarmornpatana Director of IT Infrastructure Office of ETDA Jun 2015
Intra-ASEAN Secure Transactions Framework Pitinan Kooarmornpatana Director of IT Infrastructure Office of ETDA Jun 2015 Background What is Intra-ASEAN Secure Transactions Framework? Funded Project by ASEAN
More informationFIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013
FIPS 201-2 and NIST Special Publications Update Smart Card Alliance Webinar November 6, 2013 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance FIPS
More informationData Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory
Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable
More informationIllinois Medicaid EHR Incentive Program for EPs
The Chicago HIT Regional Extension Center Bringing Chicago together through health IT Illinois Medicaid EHR Incentive Program for EPs A Guide to Attesting for the 2017 Program Year in the emipp System
More information