Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Similar documents
Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

How Managed File Transfer Addresses HIPAA Requirements for ephi

HIPAA Federal Security Rule H I P A A

Policy and Procedure: SDM Guidance for HIPAA Business Associates

HIPAA Compliance Checklist

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

HIPAA Security Checklist

HIPAA Security Checklist

HIPAA Security and Privacy Policies & Procedures

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

HIPAA COMPLIANCE FOR VOYANCE

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA FINAL SECURITY RULE 2004 WIGGIN AND DANA LLP

efolder White Paper: HIPAA Compliance

HIPAA Regulatory Compliance

HIPAA Security Rule Policy Map

HIPAA Security Rule s Technical Safeguards - Compliance

HIPAA Compliance and OBS Online Backup

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards

The simplified guide to. HIPAA compliance

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

UNIVERSITY OF WISCONSIN MADISON POLICY AND PROCEDURE

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Healthcare Privacy and Security:

Support for the HIPAA Security Rule

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Meeting the Meaningful Use Security and Privacy Measure

Access Control Procedure

Summary Analysis: The Final HIPAA Security Rule

Remote Desktop Access for the Mobile Workforce

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Seven gray areas of HIPAA you can t ignore

SECURITY & PRIVACY DOCUMENTATION

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

HIPAA / HITECH Overview of Capabilities and Protected Health Information

Health Insurance Portability and Accountability Act (HIPAA) Security Requirements for Mobile Healthcare Solutions

Employee Security Awareness Training Program

HIPAA Security Awareness Training

GoToMyPC Corporate Product Guide

The ABCs of HIPAA Security

EXHIBIT A. - HIPAA Security Assessment Template -

HIPAA COMPLIANCE AND

Complete document security

HIPAA Security Manual

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

Checklist: Credit Union Information Security and Privacy Policies

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation.

Department of Public Health O F S A N F R A N C I S C O

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Data Backup and Contingency Planning Procedure

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

A Security Risk Analysis is More Than Meaningful Use

Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel

Making life simpler for remote and mobile workers

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

Access to University Data Policy

Companion Guide Institutional Billing 837I

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

HIPAA RISK ADVISOR SAMPLE REPORT

Security and Privacy Breach Notification

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

ngenius Products in a GDPR Compliant Environment

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

HIPAA Enforcement Training for State Attorneys General

Projectplace: A Secure Project Collaboration Solution

Chapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats

SAC PA Security Frameworks - FISMA and NIST

Companion Guide Benefit Enrollment and Maintenance 834

Federal Breach Notification Decision Tree and Tools

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Bring Your Own Device Policy

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).

Therapy Provider Portal. User Guide

WHITEPAPER. Security overview. podio.com

Implementing an Audit Program for HIPAA Compliance

The Honest Advantage

Start the Security Walkthrough

Transcription:

: HIPPA Compliance GoToMyPC Corporate HIPAA Compliance Privacy, productivity and remote access

2 The healthcare industry has benefited greatly from the ability to use remote access to view patient data from anywhere and share data among partners and suppliers. Although transmitting patient data across networks improves care, speeds service and reduces healthcare costs, many remote-access products inadvertently put patient privacy at risk, especially if the data is sent over unsecured networks such as the Internet. For this reason, the Health Insurance Portability and Accountability Act (HIPAA) calls for privacy and security standards that protect the confidentiality and integrity of patient health information. Specifically, if you are transmitting patient data across the Internet, your remote-access products and security architecture must provide end-to-end encryption so the data cannot be intercepted by anyone other than the intended recipient. In addition, the remote-access products and network must provide access control to allow viewing only by authorized people. HIPAA security compliance Every business that is part of the U.S. healthcare industry needs to comply with the federal standards regulating patient information. In addition to protecting worker health insurance coverage, HIPAA sets forth standards for protecting the integrity, confidentiality and availability of electronic health information. GoToMyPC Corporate is a HIPAA-compliant remote-access solution that can help your company or office meet these guidelines. The following matrix is based upon the HIPAA Security Standards rule published in the Federal egister on February 20, 2003 (45 CF Parts 160, 162 and 164 Health Insurance eform: Security Standards; Final ule). A copy of the final rule is available here: http://www.gpo.gov/fdsys/pkg/f-2003-02-20/html/03-3877.htm The following matrix was created as a guide to assist healthcare providers in navigating the various HIPAA requirements and to demonstrate how GoToMyPC Corporate can support HIPAA compliance. General HIPAA requirements can be found in the FAQ section at the end of this document.

3 Technical safeguards 164.312 Standard covered entities must implement (a) (1) Access Control Implementation specifications =required A=addressable Key factors Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to authorized persons or software programs. Support in GoToMyPC Corporate Host computer access is protected by two levels of strong password authentication. Separate passwords are used for authentication to the website and then to the host computer. Optional support is available for one-time passwords or SecurID token-based twofactor authentication. Account managers can configure the failed log-in lockout threshold. Account managers can terminate sessions in progress with a single click of the mouse. Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption A A Assign a unique name and/or number for identifying and tracking user identity. Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency. Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. Implement a mechanism to encrypt and decrypt electronic protected health information. Users and account managers are identified by using their unique email address as their log-in name. GoToMyPC Corporate provides rapid, secure access to a computer desktop from virtually anywhere, which may be used as a supplementary method for providing emergency access to healthcare information. Manager-configurable session inactivity time-out ensures that GoToMyPC Corporate remote-access sessions are not left running indefinitely. Website inactivity time-out automatically logs users out of their GoToMyPC Corporate accounts. All sensitive chat, session and control data transmitted across the network is protected using the Advanced Encryption Standard (AES), FIPS 197 in 8-bit cipher feedback mode. A unique 128-bit AES encryption key is generated at the start of each session.

4 Standard covered entities must implement Implementation specifications =required A=addressable Key factors (b) Audit Controls Implement hardware, software and/ or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. (c)(1) Integrity A Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. Support in GoToMyPC Corporate All connection and session activity through our distributed network service infrastructure is logged (including file transfers, remote printing, WAN IP and more) for security and quality-of-service purposes. Account managers have up-to-theminute web-based access to advanced management and reporting tools. Integrity protection mechanisms in GoToMyPC Corporate are designed to ensure a high degree of data and service integrity, working independently of any integrity controls that may already exist on the customer s computers and internal data systems. Physical access to the host computer s screen, mouse and keyboard can be disabled during a session, ensuring the integrity of a remote user s application commands and inputs. All session data is compressed using proprietary lossless compression techniques and protected via the AES cipher in counter mode with 128-bit keys and additional integrity protection. Mechanism to Authenticate Electronic Protected Health Information A Implement methods to corroborate that information has not been destroyed or altered in an unauthorized manner. Numerous additional structural integrity checks are made on the decrypted session data after it is received to ensure data and service integrity. GoToMyPC Corporate never modifies files when they are viewed or edited by the user. Only programs on the host computer can modify the files.

5 Standard covered entities must implement (d) Person or Entity Authentication Implementation specifications =required A=addressable Key factors Verify that the person or entity seeking access is the one claimed. Support in GoToMyPC Corporate Website access is protected by a strong password; the only way to access individual host computers is via the website. Each host computer is protected by a unique strong password and optional two-factor authentication. Access to data and applications on the host computer requires the user to be logged in with a valid domain account. Participation in GoToMyPC Corporate sessions may optionally be restricted to only pre-authorized host and client machines identified by their unique network adaptor MAC addresses or disk drive serial numbers. (e)(1) Transmission Security Protect electronic health information that is being transmitted over a network. All network traffic is protected and encrypted using 128-bit AES encryption. After a session ends, no GoToMyPC Corporate software or information is left on the client computer. Integrity Controls A Ensure that protected health information is not improperly modified without detection. All session data is compressed using proprietary lossless compression techniques and protected via the AES cipher in counter mode with 128-bit keys and additional integrity protection. Encryption A Encrypt protected health information whenever deemed appropriate. Numerous additional checks are made on the decrypted session data after it is received to ensure network transmission integrity. All sensitive chat, session, file transfer and service control data transmitted across the network is protected using AES (FIPS 197) in counter mode. A unique 128-bit AES encryption key is generated at the start of each session.

6 GoToMyPC Corporate product information Healthcare applications Physicians, nurses, IS/IT staff, administrative employees and authorized healthcare partners can use GoToMyPC Corporate patented web-based screen-sharing technology to instantly and securely view Mac and PC desktops and to use files, database applications and other corporate resources from any location connected to the web. Unlike other remote-access solutions, GoToMyPC Corporate does not distribute the actual patient data across networks. ather, by using screensharing technology, security is strengthened because only mouse and keyboard commands are transmitted. GoToMyPC Corporate further protects data confidentiality through a combination of encryption, strong access control and host computer protection methods. Security, control and customization Users and administrators have the option of assigning users to groups defined by the features to which they are granted access. Some features may be disabled by an IT administrator to customize the level of security that is appropriate for your organization. In addition, GoToMyPC Corporate offers an Authorization Management Service to ensure that only users with approved GoToMyPC Corporate accounts can access your organization s networks. Because the security features are built in, administrators can rest easy: Security cannot be weakened by inexperienced users. Encryption GoToMyPC Corporate employs industry-standard end-to-end Advanced Encryption Standard (AES) encryption using 128-bit keys to protect the data stream, file transfers, chat and keyboard and mouse input. Additional built-in security features such as end-to-end user authentication, host screen blanking and host keyboard and mouse locking (PC only) ensure data confidentiality. GoToMyPC Corporate encryption fully complies with the HIPAA Security ule to ensure the security and privacy of patient data. Frequently asked questions Q: What are the general requirements of the HIPAA Security Standards? (ef: 164.306 Security Standards: General ules) Covered entities must do the following: 1. Ensure the confidentiality, integrity and availability of all electronic protected health information the covered entity creates, receives, maintains or transmits. 2. Protect against any reasonably anticipated threats or hazards to the security or integrity of such information. 3. Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under the privacy regulations. 4. Ensure compliance with this subpart by its workforce.

7 Q: How are covered entities expected to address these requirements? Covered entities may use any security measures that reasonably and appropriately implement the standards; however, covered entities must first take into account the risks to protected electronic information; the organization s size, complexity and existing infrastructure; and costs. The final rule includes three safeguards sections outlining standards (what must be done) and implementation specifications (how it must be done) that are either required or addressable. If required, it must be implemented to meet the standard; if addressable, a covered entity can either implement it, implement an equivalent measure or do nothing (documenting why it would not be reasonable and appropriate). Administrative Safeguards: Policies and procedures, workforce security and training, evaluations and business associate contracts. Physical Safeguards: Facility access, workstation security and device and media controls. Technical Safeguards: Access control, audit controls, data integrity, authentication and transmission security. Q: What is happening to help customers address HIPAA regulations? To facilitate our customers compliance with HIPAA security regulations, we are providing detailed information about the security safeguards we have implemented into the GoToMyPC Corporate service. This information is provided in several forms, including security white papers, service-specific HIPAA-compliance matrices and other technical collateral. Additionally, our Client Services group is available to provide guidance and assistance in all deployments. Q: Is GoToMyPC Corporate HIPAA compliant? Although HIPAA compliance per se is applicable only to entities covered by HIPAA regulations (e.g., healthcare organizations), the technical security controls employed in the GoToMyPC Corporate service and associated host and client software meet or exceed HIPAA technical standards. Furthermore, the administrative configuration and control features provided with GoToMyPC Corporate support healthcare-organization compliance with the Administrative and Physical Safeguards sections of the final HIPAA Security ule. The net result is that GoToMyPC Corporate may be confidently deployed as an outsourced remote-access component of a larger information-management system without affecting HIPAA compliance. Q: What is the best way to deploy GoToMyPC Corporate in an environment subject to HIPAA regulations? Just as HIPAA allows considerable latitude in the choice of how to implement security safeguards, a single set of guidelines is not applicable for all deployments. Organizations should carefully review all configurable security features of

8 GoToMyPC Corporate in the context of their specific environments, user population and policy requirements to determine which features should be enabled and how best to configure. Depending on enterprise policy, disabling the file transfer and/or remote printing features may be advisable to ensure host integrity and maximize data containment and confidentiality. The GoToMyPC Corporate administration center offers a comprehensive set of web-based user management, host/client end-point management and auditing features. Organizations are advised to review and use the features that they believe will achieve maximum overall system-assurance levels and compliance with HIPAA-mandated administrative, technical and physical security safeguards. 2017 LogMeIn, Inc. All rights reserved. 6.26.2017/B-89155/PDF