Start the Security Walkthrough

Size: px
Start display at page:

Download "Start the Security Walkthrough"

Transcription

1 Start the Security Walkthrough This guide will help you complete your HIPAA security risk analysis and can additionally be used for periodic review. It is based on the methodology used in PrivaPlan Stat guiding users through the assessment and gap analysis tasks in ten steps, with the second step focused on creating an inventory of all protected health information ( PHI ). This particular guide looks at electronic PHI (ephi). The inventory is completed by conducting a walk around or walkthrough of your organization. During the walk around you should try to look for trouble ; that is, look for areas where ephi exists and where it may not be adequately safeguarded. This includes administrative issues, such as employee use of passwords, physical issues, such as adequate protection against theft, and technical issues, such as the use of antivirus software. This guide is meant to provide a basic foundation in your review and does not cover every area where a safeguard may be needed (such as workforce security like background or clearance procedures and termination procedures, or security incident response and reporting). Please refer back to the PrivaGuides Implementing the Security Rule and Risk Analysis for more information and guidance on HIPAA security compliance. It is also important to remember that not all of these questions may apply to you, depending on your type or size of organization. Start the walkthrough and take notes pertaining to the following. Remember you can use the ephi Use and Disclosure Inventory form for documentation PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 1

2 1 Walk in the Front Door How is the front door locked? Who has keys? Has the lock and keys been the same for some time? When an employee is terminated are the keys returned? Is the lock periodically re-keyed? Apply these questions to other doors with outside access In you answers You must determine what is a reasonable and appropriate security measure for your organization. For example, if your office consists of only three staff members, it is likely that these same people will all have keys to the office. On the other hand, a large organization may only distribute keys to those who absolutely need them. You should also consider annually changing the locks, or at the very least keeping strict control over who has the keys (and make sure employees return them when they are terminated). Some offices use Do not duplicate keys that restrict duplication. Locks should be reasonably strong and secure for example deadbolts may be better than simple door handle locks. Is there an alarm? o If there is an alarm, are the codes changed after employee termination? Or otherwise periodically? o Does the alarm system protect windows and other doors? o Have you recently checked these? o Have there been any changes to the facility since the alarm was put in? o Was the alarm system configured to alarm new doors or windows if these were added or changed? In your answer: Again, think about what would be a reasonable way to keep the security of your office intact. This will depend on location, size of your organization, other security measures in the building, etc. If you do have an alarm system, you should routinely change the code to prevent terminated employees from accessing the office. If there is no alarm system, are door and window locks sufficiently strong to deter unauthorized access? Is the facility in an area of high risk (for example near a pharmacy) for crime or break-in? Has there ever been a break-in? o If so, was there any remedial action taken afterwards? Please describe. In your answer: After answering these questions, you may realize that you are not doing enough to secure the office from break-ins. If this is the case, you must come up with a remediation plan that is reasonable for your organization. HIPAA contains the concept of 2007 PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 2

3 security incident response and reporting. Simply stated, this means you should evaluate security incidents and respond to them accordingly. A break-in certainly can be considered a security incident. Is the area visitors enter separated from where ephi is? (For example a waiting room or visitor area.) In your answer: It is very important to make certain that you minimize the possibility of visitors (or patients) viewing any form of PHI, including electronic, during their visit to your location. This may mean positioning monitors away from sight, physical separations such as a desk or wall, and electronic measures such as screen savers etc. Are patients required to sign in? Are visitors required to sign in? Are visitors (non-patients) required to identify themselves? Are badges used for temporary visitor identification? In your answer: Badges are not a requirement of HIPAA. However, depending on the size of your organization, you may deem this an appropriate way to monitor any and all visitors. In a smaller office, it may be sufficient to have a staff member keep an eye on any visitors, including repair personnel or vendors, while they are in your office. Do employees wear any kind of identification tags or badges to authenticate them as authorized personnel? In your answer: Remember, this is not a HIPAA requirement! Again, larger organizations (like hospitals) may already have staff ID badges. A smaller organization may not need this kind of authentication. As your organization grows, however, current employees may not recognize new staff; identification badges or similar can authenticate the new employee and help you differentiate between staff and authorized visitors and persons who should not be present PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 3

4 2 Continue Walking Through the Office. Identify computer workstations. o Are they reasonably secure from accidental or deliberate viewing by patients or visitors? o Are they reasonably secured from theft? In your answer: You should consider each and every computer workstation. It may not always be practical to position a workstation so it is unable to be viewed by a patient or visitor. However, you can train and remind staff to monitor patients or visitors and request they not linger or deliberately look at workstation display screens. Do users need to log on with a unique user ID? Do users also need a password to log on? In your answer: It is very important to ensure that every computer application you use to store ephi is secured with unique logins and passwords for each employee. It is also important to be able to restrict access to specific areas of ephi depending on the employee s position. Again, this will be largely determined by the size of your organization. What is the policy regarding: a) use of strong passwords (for example, more characters and/or including a number or symbol) b) changing passwords c) monitoring log-on attempts, especially those that fail or are during unusual times, d) disabling log-ons after a certain number of failed attempts. In your answer: These are all appropriate and important measures to ensure the Security of your ephi. This often can be accomplished by configuring your system. Windows allows security (Click on the Control Panel from the Start menu, open Administrative Tools then Local Security Policy and view settings, or open the Event viewer). Your computer support can help with this. Often vendors of applications (practice management software, electronic medical records, and claims processing software) can advise you on configurations. They generally should also provide access management (passwords) and audit controls from within their software. Do you use any other kind of access control such as tokens or fingerprint mouse controls? In your answer: This is not a HIPAA requirement. However, depending on the size of your organization and the sensitivity level of the ephi you have access to, this may be an appropriate measure for your organization. Some organizations are moving to use of these technical options to reduce the need for staff to maintain complex passwords or continually change them. Are users given permission only to the ephi they need and given the appropriate level of access? o By operating system (such as Windows access) 2007 PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 4

5 o By application software (such as your billing software) In your answer: Depending on your size it may be reasonable to restrict access. For example, the front desk may not require access to the medical contents of an electronic medical or health record. Good software can restrict access by contents as well as restrict permission to read only, read/write and delete abilities. Workstations and servers can be configured to prevent users from connecting devices without authorization, making backups, and so forth. Do workstations have time-outs after a period of inactivity? o Is this simply a screen saver or does it actually log off the user? o What are the time outs in place at each workstation? In your answer: As mentioned above, this is a good way to minimize the risk of accidental (or deliberate) viewing of ephi. We suggest implementing not just a screensaver, but one that requires the person to login again or enter a password. These measures are built in to most Windows versions and must simply be activated to use. Are there any laptop computers or PDAs in use? In your answer: Don t forget any laptops or personal data assistants that the staff, such as physicians, may use. If they can use these devices to access ephi, then you must also ensure the security of the device. Are these laptops also secured by password and other access protection? Are they kept secure while not in the physical presence of the user? (For example are desktop lock/cables used for laptops?) What software applications run on the workstations? Do these applications create, maintain, store or transmit ephi? If so, which are the most critical? In your answer: This step is called a criticality analysis. You should think about what software you absolutely must have access to. For example, if an earthquake caused the power to go out, you could probably do without having access to your billing software for 24 hours; however, you may need access to the patient scheduling database immediately in order to call patients to tell them not to come in. Identify if there are any back up tapes, CD ROMs, Zip disks, memory sticks and so forth either near workstations or in other areas. Are these reasonably secure from theft? o Determine if they are used for backup and if their data is encrypted or otherwise protected, for example by password. In your answer: If the data on your backup media is not secure, you are at very high risk of a breach of your security of ephi. You may need to ask your software vendor whether or not the data back-up media are secure for example, if it was stolen, would the person have access to your ephi? 2007 PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 5

6 Are workstations configured to store information on a central server that is reliably backed up? If not, are local workstations that contain ephi backed up? o How often? o By who? In your answer: This question is part of your criticality analysis. If your computer were to suddenly fail, would you lose all of your data? Regular back-ups are an important part of maintaining the integrity of your data and also limit the risks of data loss should any emergency or natural disaster occur. Often server data is backed up, while workstation level data is not! Is there a specific location where backup tapes (or other backup media) are securely stored in the office? Is this location secure from theft as well as environmental hazards such as flooding or from fire? In your answer: You may determine that a simple fix, such as a locked cabinet, is sufficient to ensure the safety of your backup tapes. Or, you may consider something like a fireproof safe that is more likely to withstand natural disasters and theft. Are backup tapes (or other backup media) ever taken offsite? o If so by who? o How often? In your answer: A backup kept in the office is of no use if the office is destroyed! You may deem it necessary to make duplicate backup tapes, and to take one copy off-site should a disaster make the office inaccessible. If you do, you should remember that the security of these tapes should be ensured off-site as well. Are backup tapes ever discarded or thrown away? o If so, is the ephi properly erased prior to discarding? Or are they appropriately shredded or otherwise destroyed? In your answer: Backup media contains ephi. Unless it is destroyed or erased, this data can fall into the wrong hands. You may need to use a commercial software product to sanitize the backup media or simply destroy it. Are backup tapes (or other backup media) every verified to ensure they contain the data? o By who? o How often? Are backup tapes (or other backup media) ever restored to ensure that they actually can be accessed by the software? In your answer: This question leads to your contingency and emergency plan. HIPAA requires that you have a plan of action should an emergency ever take place. As such, it is a good idea to routinely test your emergency mode operations by testing the reliability of your data backup. Backup media, like tapes, have a life cycle ; that is, they wear out and need to be replaced. Changes in your computer system may accidentally disable your backup or not backup newer critical files. Routine review is one way to safeguard against these and similar problems PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 6

7 Is there another location that can be used to access ephi in the event this location is unavailable (a hot site that has a similar computer system and the software applications that you currently use)? o If so, where is it located? o How can it be accessed during an emergency? In your answer: As part of your emergency plan, you should determine whether or not you will need access to your ephi should you be unable to gain access to the office. For example, if the only ephi you maintain is patient billing information, you may be able to go without access to this information for up to a week. However, if you maintain electronic patient records, you will need to have access to them no matter what. It is a good idea to designate another location either at home or a neighboring office where you can recover your data should an emergency make your office inaccessible. As part of your emergency plan, you may need to load your software onto the off-site computer. You may need to ask your software vendor for help with your emergency plan. They may even be able to provide an alternate location. Does a trusted person maintain a list of all user IDs and passwords, and is this kept in a secure location that can be accessed during an emergency? In your answer: Keeping a list of user IDs and passwords is important not only in the event of an emergency, but also in the case of a key staff member (like the computer administrator) leaving unexpectedly due to illness or termination. Is there a computer server or central unit? o If so evaluate its location: Is the location secure and separately locked or restricted from the rest of the office? o Is the location adequately protected from heat and cold? o Is the location reasonably protected from flooding and environmental hazards? In your answer: Think about ways to minimize the risk of losing data or access to your ephi. Computer servers are becoming smaller and smaller, making it easier for a thief to remove one! Is there surge protection in place for the workstations and the server/central unit? Does the surge protection include uninterruptible power supply or backup in the event of a power loss? Is your facility prone to power losses like brownouts? Is your facility prone to lightning strikes? Is it prone to power surges? In your answer: Depending on the likelihood of specific natural disasters in your area, you will have to think about ways to deal with these disasters should they occur and how to minimize the risk of these disasters compromising your ephi. Are computers ever discarded, or given away? o If so, is the ephi properly erased prior to this? Or are they appropriately shredded or otherwise destroyed? In your answer: Workstations, laptops, servers and PDAs all may contain ephi. Unless it is destroyed or erased, this data can fall into the wrong hands. You may need to use a 2007 PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 7

8 commercial software product to sanitize or erase the data or ensure that all hard disks have been reformatted (remember simply recycling a file does not destroy it). What software applications run on the server/central unit? o Do these create, maintain, store or transmit ephi? o If so, which are the most critical? In your answer: Again, this is part of your criticality analysis and contingency planning. Does the software application audit all access and activities? o Is an easy-to-use log available of access by user ID, time and day? o Does the log display what part of the application was accessed and what was done? In your answer: If the software creates, maintains, stores, or transmits ephi, an audit trail is usually needed. The level of detail of the audit will depend on what is appropriate for your organization. Remember, even billing systems contain enough information for identity theft! Good software applications should allow you to know when a user accessed the system, who it was, and what they did (read, write, delete and even in some cases copy).your IT professional may be able to help you create a policy about how to use the audit--for example, routine review after terminating an employee or after a security incident. What kind of data communication exists with other entities? In your answer: Don t forget about electronic communications with other entities! For example, data backups from your software vendor, electronic billing, , etc. Do you have a dial-up modem in place? o Is the dial in number to your computer known to only authorized persons? In your answer: Even though the chances for hackers to gain access to your system via a dial-up connection is less likely, it is still important to think about ways to ensure the security of your system. Dial-up modems can be turned off (or unplugged) when not in use or needed. Is a high speed (always on) connection in place? o Is it used for Internet access as well as point to point access to a specific entity (such as a clearinghouse or your software vendor)? o What kind of protection is in place to ensure only authorized access to your computer? In your answer: If you have a high speed connection, it is imperative that you have a firewall or some other safeguard in place to ensure the security of your connection. You may need both a hardware firewall (usually built-in to your router) and a software firewall PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 8

9 If you have a high speed connection, do you have a router? o Does the router have the password enabled to ensure that only authorized users can configure its settings? o Does the password get verified in the case of power failures? o Is the router configured to restrict access from the outside by verifying remote user IP addresses, or MAC addresses? o Does it act in any other way as a hardware firewall? o Does it monitor and record access? o Can it provide an audit of these? o Does your organization use any other restrictions such as a Virtual Private Network for access? In your answer: You may need to seek the help of your IT professional or internet connection provider to answer these questions. Routers can be configured with a password but often this is overlooked. Even when configured, the password may be reset when there is a power outage or you reset the router. Most commercially available routers have factory-set passwords that are known by hackers. Routers can vary in levels of sophistication. They can authenticate remote users by the actual physical unit the user employs, or by an electronically assigned address. They can be set to dynamically assign an address to your network workstations and server so these cannot be easily seen by a hacker. They can be set up to log all access attempts and even report suspicious use. Does your organization use wireless access internally for communication between workstations, laptops and so forth with the server or central unit? In your answer: Keep in mind that although wireless internet access is convenient, it can make your organization at high risk for hackers. Does the wireless access extend to areas beyond your office where the public could obtain a signal? If so, is the wireless access configured to provide encryption? Is this encryption reasonably strong to protect ephi? (For example use of dynamically changing encryption keys?) Is the wireless access configured to restrict remote access such as by IP address or MAC address? In your answer: You may need to ask your networking professional for help in answering these questions about your wireless internet access. It is possible for a hacker to listen in to wireless communications and with sophisticated software break the encryption of your wireless device! If you use wireless for sensitive ephi like medical records, you may want to ensure higher level encryption that is harder to break. Is a software firewall in place? o Is it configured for automatic updates and does it protect all workstations as well as the server/central unit? Does the practice maintain up-to-date software to protect against any kind of malware (viruses, Trojans, worms, spyware, phishing)? o Does this software remain updated automatically? 2007 PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 9

10 o Are all workstations as well as the server/central unit protected? o Are routine scans done of ephi to ensure it is not infected or corrupted? In your answer: It is extremely important to ensure that your firewall and virus protection is up-to-date, as new viruses etc. are made each day. Without these updates, you are only protected against old threats! Threats can include viruses which can damage the integrity of your data as well as spyware that can be malicious enough to log all your keystrokes (and figure out likely passwords)! Most antivirus software can be configured to routinely scan your files and even scan outgoing messages. This is a good way to periodically review the integrity of ephi. Does your organization restrict spam? Does your organization use encryption to send any with ephi? In your answer: Many viruses are contained in spam ( advertisements). Using a spam filter is a good way to minimize this risk. Many providers automatically provide spam filters. Additionally, if you transmit any ephi via , you must ensure the security of this data via some type of encryption. You may need to speak to an IT professional to determine what the best solution is for you. Is there a back or side door(s) that are used for employee or other access? o If so, are they kept locked from the outside during business hours? If they are not kept locked from the outside, are they monitored or positioned such that someone is always nearby to determine unauthorized access during business hours? In your answer: Don t forget to secure all means of access to your office! The back door left open and not monitored can provide easy access for a thief! Does the staff appear to understand and follow security policies and procedures? o If you have noted any vulnerabilities, are they because staff has not followed your policies? o Is the staff adequately trained? o Are they periodically reminded of security policies? In your answer: HIPAA requires security training just like the privacy rule. It may also be appropriate to periodically remind staff of security threats (for example in response to a security incident) to help them remain aware and attentive to following your security procedures PrivaPlan Associates, Inc. Patent Pending. All Rights Reserved, 10

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days or even weeks due to data loss

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

A Security Risk Analysis is More Than Meaningful Use

A Security Risk Analysis is More Than Meaningful Use A Security Risk Analysis is More Than Meaningful Use An Eagle Associates Presentation Eagle Associates, Inc. www.eagleassociates.net P.O. Box 1356 Ann Arbor, MI 48106 800-777-2337 Introduction Eagle Associates,

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

Let s get started with the module Ensuring the Security of your Clients Data.

Let s get started with the module Ensuring the Security of your Clients Data. Welcome to Data Academy. Data Academy is a series of online training modules to help Ryan White Grantees be more proficient in collecting, storing, and sharing their data. Let s get started with the module

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Healthcare Privacy and Security:

Healthcare Privacy and Security: Healthcare Privacy and Security: Breach prevention and mitigation/ Insuring for breach Colin J. Zick Foley Hoag LLP (617) 832-1000 www.foleyhoag.com www.securityprivacyandthelaw.com Boston Bar Association

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016 HIPAA Faux Pas Lauren Gluck Physician s Computer Company User s Conference 2016 Goals of this course Overview of HIPAA and Protected Health Information Define HIPAA s Minimum Necessary Rule Properly de-identifying

More information

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...

More information

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer Security Rule for IT Staffs J. T. Ash University of Hawaii System HIPAA Compliance Officer jtash@hawaii.edu hipaa@hawaii.edu Disclaimer HIPAA is a TEAM SPORT and everyone has a role in protecting protected

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Information Technology Update

Information Technology Update Information Technology Update HIPAA SECURITY RULE Faculty and Staff Training University of South Carolina USC Specialty Clinics HIPAA Security Rule Agenda What is the HIPAA Security Rule Authority Definition

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

The 10 Disaster Planning Essentials

The 10 Disaster Planning Essentials The 10 Disaster Planning Essentials For A Small Business Network 252 Plymouth Ave. S. Rochester, NY 14608 585-546-4120 info@capstoneitinc.com www.rochestercomputersupport.com The 10 Disaster Planning Essentials

More information

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs I S S U E P A P E Risky Business By Robert Gibbs R 2 0 0 8 Risky Business Remember when information security meant locking your file cabinets at night? Unfortunately, those days are long gone. With the

More information

Provided as an educational service by: Introduction

Provided as an educational service by: Introduction DPC TECHNOLOGY THE GUIDE DISASTER PLANNING ESSENTIALS CLAY ARCHER DPC TECHNOLOGY Provided as an educational service by: Clay Archer, CEO DPC Technology 7845 Baymeadows Way, Jacksonville, FL 32256 (844)

More information

Office Name: Enterprise Risk Management Questions

Office Name: Enterprise Risk Management Questions Office Name: Business Impact Analysis Questions The identification of information, computing hardware and software, and associated personnel that require protection against unavailability, unauthorized

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

The simplified guide to. HIPAA compliance

The simplified guide to. HIPAA compliance The simplified guide to HIPAA compliance Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

HIPAA Security Manual

HIPAA Security Manual 2010 HIPAA Security Manual Revised with HITECH ACT Amendments Authored by J. Kevin West, Esq. 2010 HALL, FARLEY, OBERRECHT & BLANTON, P.A. DISCLAIMER This Manual is designed to set forth general policies

More information

NMHC HIPAA Security Training Version

NMHC HIPAA Security Training Version NMHC HIPAA Security Training 2017 Version HIPAA Data Security HIPAA Data Security is intended to provide the technical controls to ensure electronic Protected Health Information (PHI) is kept secure and

More information

HIPAA COMPLIANCE FOR VOYANCE

HIPAA COMPLIANCE FOR VOYANCE HIPAA COMPLIANCE FOR VOYANCE How healthcare organizations can deploy Nyansa s Voyance analytics platform within a HIPAA-compliant network environment in order to support their mission of delivering best-in-class

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

Security Audit What Why

Security Audit What Why What A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site Physical configuration, environment, software, information handling processes,

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved. Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.

More information

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant. HIPAA Checklist There are 3 main parts to the HIPAA Security Rule. They include technical safeguards, physical safeguards, and administrative safeguards. This document strives to summarize the requirements

More information

HIPAA Security. What Every HIPAA Professional Should Know. Presented by: Sharon A. Budman, MS Ed, CIPP Ishwar Ramsingh, MBA, CISSP, CISA, CISM

HIPAA Security. What Every HIPAA Professional Should Know. Presented by: Sharon A. Budman, MS Ed, CIPP Ishwar Ramsingh, MBA, CISSP, CISA, CISM HIPAA Security What Every HIPAA Professional Should Know Presented by: Sharon A. Budman, MS Ed, CIPP Ishwar Ramsingh, MBA, CISSP, CISA, CISM Thursday, March 29, 2007 Purpose Provide guidance to IT administrators

More information

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE 164.502 Develop "minimum necessary" policies for: HIPAA PRIVACY RULE 164.514 - Uses 15 Exempts disclosure for the purpose of treatment from the minimum necessary standard. Page references for - Routine

More information

4 Information Security

4 Information Security 4 Information Security 1. Identify the five factors that contribute to the increasing vulnerability of information resources, and provide a specific example of each one. 2. Compare and contrast human mistakes

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department HIPAA Assessment Prepared For: ABC Medical Center Prepared By: Compliance Department Agenda Environment Assessment Overview Risk and Issue Score Next Steps Environment NETWORK ASSESSMENT (changes) Domain

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Recommendations for Implementing an Information Security Framework for Life Science Organizations

Recommendations for Implementing an Information Security Framework for Life Science Organizations Recommendations for Implementing an Information Security Framework for Life Science Organizations Introduction Doug Shaw CISA, CRISC Director of CSV & IT Compliance Azzur Consulting Agenda Why is information

More information

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst HIPAA Privacy and Security Kate Wakefield, CISSP/MLS/MPA Information Security Analyst Kwakefield@costco.com Presentation Overview HIPAA Legislative history & key dates. Who is affected? Employers too!

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Physical Safeguards Policy July 19, 2016

Physical Safeguards Policy July 19, 2016 Physical Safeguards Policy July 19, 2016 SCOPE This policy applies to Florida Atlantic University s Covered Components and those working on behalf of the Covered Components (collectively FAU ) for purposes

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

HIPAA Security Awareness Training

HIPAA Security Awareness Training HIPAA Security Awareness Training Spring 2015 DBHDS Vision: A life of possibilities for all Virginians What is HIPAA? HIPAA means: Health Insurance Portability and Accountability Act It is a set of regulations

More information

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c. Catherine M. Boerner, Boerner Consulting LLC Heather Fields, 1 Discuss any aggregate results of the desk audits Explore the Sample(s) Requested and Inquire of Management requests for the full on-site audits

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

HIPAA Compliance Assessment Module

HIPAA Compliance Assessment Module Quick Start Guide HIPAA Compliance Assessment Module Instructions to Perform a HIPAA Compliance Assessment Performing a HIPAA Compliance Assessment 2 HIPAA Compliance Assessment Overview 2 What You Will

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

KSI/KAI Cyber Security Policy / Procedures For Registered Reps KSI/KAI Cyber Security Policy / Procedures For Registered Reps Password Protection 1) All electronic devices used in any way for KSI/KAI business must be password protected. 2) Passwords, where applicable,

More information

Disaster Recovery Self-Audit

Disaster Recovery Self-Audit Disaster Recovery Self-Audit Disaster Recovery Audit There are 3 steps to this process: 1. Identify all data and IT-related functions (like credit card processing, documents on your file server, member

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

The ABCs of HIPAA Security

The ABCs of HIPAA Security The ABCs of HIPAA Security Daniel F. Shay, Esq 24 th Annual Health Law Institute Pennsylvania Bar Institute March 13, 2018 c. 2018 Alice G. Gosfield and Associates PC 1 Daniel F. Shay, Esq. Alice G. Gosfield

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Lesson 10 Data and Hardware Protection

Lesson 10 Data and Hardware Protection Data and Hardware Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition 1 Objectives Understand types of backups. Select a backup method. Determine a schedule for backing up

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

Vendor Security Questionnaire

Vendor Security Questionnaire Business Associate Vendor Name Vendor URL Vendor Contact Address Vendor Contact Email Address Vendor Contact Phone Number What type of Service do You Provide Covenant Health? How is Protected Health Information

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network? Cybersecurity Due Diligence Checklist Control # Control Name Risks Questions for IT 1 Make an Benign Case: Employees Inventory of using unapproved Authorized devices without Devices appropriate security

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/protect/ndcbf_

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

Summary Analysis: The Final HIPAA Security Rule

Summary Analysis: The Final HIPAA Security Rule 1 of 6 5/20/2005 5:00 PM HIPAAdvisory > HIPAAregs > Final Security Rule Summary Analysis: The Final HIPAA Security Rule By Tom Grove, Vice President, Phoenix Health Systems February 2003 On February 13,

More information

SHS Annual Information Privacy and Security Training

SHS Annual Information Privacy and Security Training SHS Annual Information Privacy and Security Training Purpose for Training Samaritan Health Services has created the following training to meet the annual regulatory requirements for education related to

More information

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Welcome! Thank you for joining us today. In today s call we ll cover the Security Assessment and next steps. If you want

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation A Security Model for Space Based Communication Thom Stone Computer Sciences Corporation Prolog Everything that is not forbidden is compulsory -T.H. White They are after you Monsters in the Closet Virus

More information

HIPAA Compliance and OBS Online Backup

HIPAA Compliance and OBS Online Backup WHITE PAPER HIPAA Compliance and OBS Online Backup Table of Contents Table of Contents 2 HIPAA Compliance and the Office Backup Solutions 3 Introduction 3 More about the HIPAA Security Rule 3 HIPAA Security

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com : HIPPA Compliance GoToMyPC Corporate HIPAA Compliance Privacy, productivity and remote access 2 The healthcare industry has benefited greatly from the ability to use remote access to view patient data

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

HIPAA Security Rule Policy Map

HIPAA Security Rule Policy Map Rule Policy Map Document Information Identifier Status Published Published 02/15/2008 Last Reviewed 02/15/1008 Last Updated 02/15/2008 Version 1.0 Revision History Version Published Author Description

More information

HIPAA & Privacy Compliance Update

HIPAA & Privacy Compliance Update HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com

More information

Chapter 12. Information Security Management

Chapter 12. Information Security Management Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

Physician Office Name Ambulatory EHR Security Risk Analysis

Physician Office Name Ambulatory EHR Security Risk Analysis Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).

More information

The 10 Disaster Planning Essentials For Any Small Business Network

The 10 Disaster Planning Essentials For Any Small Business Network The 10 Disaster Planning Essentials For Any Small Business Network Little-Known Facts, Mistakes And Blunders About Data Backup, IT Disaster Recovery and Business Continuity Every Small Business Owner Must

More information

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston CYBERSECURITY Recent OCR Actions & Cyber Awareness Newsletters Claire C. Rosston DISCLAIMER This presentation is similar to any other legal education materials designed to provide general information on

More information

Company Policy Documents. Information Security Incident Management Policy

Company Policy Documents. Information Security Incident Management Policy Information Security Incident Management Policy Information Security Incident Management Policy Propeller Studios Ltd is responsible for the security and integrity of all data it holds. Propeller Studios

More information

PATRICK ROUGEAU MARC HASKELSON

PATRICK ROUGEAU MARC HASKELSON PATRICK ROUGEAU Compliance Officer MARC HASKELSON President & CEO Horror Story The $750,000 HIPAA Mistake Recent HIPAA Trends and What They Mean for Your Business What Does HIPAA Require? How Does My Current

More information