Addressing HIPAA privacy compliance on hospital wireless network

Similar documents
Data privacy and security:

The Windstream Enterprise Advantage for Healthcare

MD-HQ Utilizes Atlantic.Net s Private Cloud Solutions to Realize Tremendous Growth

efax Corporate for Independent Agent Offices

HIPAA Security and Privacy Policies & Procedures

A HOSPITAL S HEALTH STARTS WITH ITS NETWORK INFRASTRUCTURE

User-to-Data-Center Access Control Using TrustSec Design Guide

The First Six Steps to Securing Remote Locations 1

2016 Survey: A Pulse on Mobility in Healthcare

Managed Wi-Fi. Connect whenever, wherever

Whitepaper. Comprehensive Print Management in a Healthcare Environment

All Aboard the HIPAA Omnibus An Auditor s Perspective

Securing Health Data in a BYOD World

Memorial Hermann Health System Eases Encryption with Zix

The simplified guide to. HIPAA compliance

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

Cloud & Managed Server Hosting for Healthcare Professionals

Network Segmentation Through Policy Abstraction: How TrustSec Simplifies Segmentation and Improves Security Sept 2014

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Bring Your Own Device (BYOD) Initiative Enable Clinical Transformation by Gregg Malkary, Managing Director, SPYGLASS Consulting Group

DigitalPersona for Healthcare Organizations

HIPAA / HITECH Overview of Capabilities and Protected Health Information

ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation

Shaping the Cloud for the Healthcare Industry

Evaluating the Security of Your IT Network. Vulnerability Scanning & Network Map

ISSP Network Security Plan

Horizon Health Care, Inc.

Protecting Health Information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Privacy and Security in the Age of Meaningful Use

Designated Cyber Security Protection Solution for Medical Devices

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

Hospital System Accelerates Stroke Diagnosis

Security and Privacy Governance Program Guidelines

Compliance with CloudCheckr

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

Securing the Corporate WLAN in a Healthcare Regulated Organization

Cisco BioMed NAC Solution for Healthcare: Flexible, Cost-Effective Provisioning for Identified Networked Biomedical Devices

Cloud Communications for Healthcare

Connecting Your Coworking: Cable vs. WiFi

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Derive IP Configuration + Project Management Solutions Major NY Metro Area Hospital System

Disaster recovery planning for health care data and HIPAA compliance regulations

5 Tips to Fortify your Wireless Network

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

Exam : Title : ASAM Advanced Security for Account Managers Exam. Version : Demo

Case Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance

Policy. Sensitive Information. Credit Card, Social Security, Employee, and Customer Data Version 3.4

Cloud-Based Data Security

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Information Technology Standards

PCI DSS Compliance. White Paper Parallels Remote Application Server

Enterprise Mobile Management (EMM) Policies

9 myths about moving to the cloud. What small and medium-size businesses need to know about moving to Microsoft Office 365

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Compliance in 5 Steps

SEPARATING WORK AND PERSONAL

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Information Technology Procedure IT 3.4 IT Configuration Management

Accessing CharityMaster data from another location

Leveraging the Cloud & Managing Compliance HITRUST Alliance.

HEALTHCARE IT NETWORK SURVEY REPORT

PROService REMOTE SERVICE APPLICATION. Frequently asked questions

Vocera Secure Texting 2.1 FAQ

INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT

The Data Center is Dead Long Live the Virtual Data Center

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

ADTRAN: Real Solutions. Healthcare

Secure, affordable, and easy-to-administer healthcare networks

INDUSTRY PERSPECTIVE

Critical HIPAA Privacy & Security Crossover Areas

Kindred Healthcare, Inc.

GET MORE OUT OF YOUR TECHNOLOGY INVESTMENT. GET MORE OUT OF NOW.

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices

Whitepaper. 10 Reasons to Move to the Cloud

Encryption Vision & Strategy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

IAM Security & Privacy Policies Scott Bradner

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

Complete document security

Information Technology Paul Kronberger, Chief Information Officer

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

What is HIPPA/PCI? Understanding HIPAA. Understanding PCI DSS

Prestigious hospital. Outdated network.

Sage Data Security Services Directory

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

Introduction to Cloud Networking. Company and Product Overview

HIPAA AND SECURITY. For Healthcare Organizations

MaaS360 Secure Productivity Suite

Watson Developer Cloud Security Overview

ATLANTICARE HEALTH-E YOU PATIENT PORTAL

Deploying to the Cloud: A Case study on the Development of EHNAC s Cloud Enabled Accreditation Program (CEAP)

Firewall Policy. Prepared By Document Version Phone Number Kevin Kuhn Version /

PULSE TAKING THE PHYSICIAN S

Healthcare Independent Health Jeremy Walczak

Transcription:

E-Guide Addressing HIPAA privacy compliance on hospital wireless network Medical devices, tablets, smartphones and RFID are forcing hospital wireless networks open. HIPAA privacy compliance is harder than ever, however. Here's how CIOs can cope. Sponsored By:

E-Guide Addressing HIPAA privacy compliance on hospital wireless network Table of Contents About CDW Healthcare Sponsored By: Page 2 of 6

Addressing HIPAA privacy compliance on hospital wireless network By Don Fluckinger, Features Writer Health care CIOs are caught between a rock (technology) and a hard place (regulation). On the one hand, demanding patients and increasing numbers of wireless medical devices are requiring they open up their wireless networks. On the other, tighter rules for HIPAA privacy compliance are forcing them to lock networks down with encryption and tighter access control, lest they find their facility's name posted on a government website in connection with a data breach. For John Cameron, computer technical specialist and wireless technician at the 121-bed Milford Regional Medical Center in Massachusetts, accommodating guests while maintaining HIPAA privacy compliance on the facility's new wireless network begins with three technology measures: Partitioning the network and keeping patient data and guest activity on separate partitions Limiting guest activity to the browser -- that is, no virtual private networks, or VPN, or other applications Using public domain name servers, or DNS, for the guest partition, not the hospital's own HIPAA guidelines also should be taken into account when the hospital's medical equipment buyers order new wireless gear, Cameron recommended. Not every monitoring device or wireless intravenous pump has the capacity to encrypt the bits of data that HIPAA protects, such as name and date of birth. That reality should be factored into buying decisions whenever possible. On the same point, all the medical devices in use on a hospital's wireless network should be evaluated and the security settings maxed out, he added. "Work with the [wireless and biomedical equipment] vendors on getting the highest security level you can get with what you have," Cameron said. "Biomedical gear is a couple years behind in the wireless field. Eventually, when they come on to the wireless, we need to make sure they can withstand a certain amount of encryption... and make sure it's within the HIPAA guidelines." Sponsored By: Page 3 of 6

For Robert Mann, manager of information technology for Westminster Canterbury Richmond, a continuing care retirement community in Virginia, the HIPAA wireless compliance problem is especially thorny. The community's three-floor, 158-bed facility uses the network in delivering health care, but its 900 residents also access it for their personal use. That represents 900 more vulnerable points in the network for malware or other unauthorized access that hospitals with more transient populations might not have. Yet the facility chose to offer Internet to residents via Aruba Networks Inc. wireless gear because wiring the community's 1970s-vintage buildings would have busted the budget. "We decided this would be a great place to kick off our great enterprise wireless initiative," said Mann, whose network recently was further upgraded to accommodate physicians and nurses accessing Westminster Canterbury's electronic health record (EHR) system via laptops and bedside workstations on wheels. "This is going to give us real-time documentation," he said. To do that and maintain his compliance with HIPAA and with Payment Card Industry (PCI) data security standards, his team first set up virtual LANs on Cisco Systems Inc. switches to cordon off certain areas of the network and beef up security, Mann said. To keep patient data locked down, the team then set up a policy enforcement firewall on the wireless side. Then they slowly rolled out the wireless in the health care buildings and tested for vulnerabilities. Secure, HIPAA-compliant health care wireless networks begin with a locked-down wired network, stressed both Mann and Scott Vachon, manager of network services for the Laconia, N.H.-based two-hospital LRGHealthcare system. Once access to those areas is properly limited and secured, wireless security with encryption and traffic routing and policies can be tackled. "My CIO and I both come from financial companies, so we're schooled in PCI," Vachon said. "[PCI and HIPAA] are not so different. We practice defense in depth, so everything we do, we start at 'no,' then work our way out and say, 'What do we need to open up to meet your requirements?'" Sponsored By: Page 4 of 6

Mann stresses that HIPAA privacy compliance is an ongoing process. After the hospital wireless network becomes operational, the work has just begun. Maintaining security is a matter of testing and retesting, as well as going over areas where maintenance operations could affect wireless gear and its function. "For us it's not a case of 'set it and forget it,'" Mann said. "It's something that we've brought along, something we've grown. But we continue to monitor it, we continue to have thirdparty vendors come in and do testing on it." Sponsored By: Page 5 of 6

About CDW Healthcare CDW Healthcare is a leading provider of technology solutions focused exclusively on serving the healthcare marketplace. Working closely with more than 15,000 healthcare organizations nationwide, customers range from small rural providers to large integrated delivery networks. The dedicated healthcare team leverages the expertise of CDW technology specialists and engineers to deliver best-in-class solutions from data center infrastructure through to point of patient care. The company's technology specialists and engineers offer expertise in designing customized solutions, while its advanced technology engineers can assist customers with the implementation and long-term management of those solutions. Areas of focus include notebooks, desktops, printers, servers and storage, unified communications, security, wireless, power and cooling, networking, software licensing and mobility solutions. Sponsored By: Page 6 of 6