removing barriers
to healthier
healthcare
HIPPA, Security & Cloud
Presented  By:
Chris  Bowen,  MBA,  CISSP,  CIPP/US,  CIPT
Founder,  Chief  Privacy  &  Security  Officer
Matt  Ferrari
Chief  Technology  Officer
Using  the  Cloud  as  an  enabler.
2PROPRIETARY AND CONFIDENTIAL
Learning Objectives
Understand   HIPAA  and  HIPAA
Understand   the  patients’   rights  under   HIPAA  and  how   those  relate  to  the  BAA
Examine  the  purpose   of  the  BAA  – what  it  is  designed   to  do
Review   Meaningful   Use  and  its  place  in  driving   Security  Risk  Assessments
Know   the  penalties   for  a  data  breach
Understand   what  makes  up  a  SRA
Discuss  some  real  breaches,   what  happened   and  how   it  could  have  been   prevented
3PROPRIETARY AND CONFIDENTIAL
Objectives for HIPAA
• Make  Health  Insurance  More  Portable
• Reduce  Healthcare  Fraud
• Improve  Efficiency  of  Payment,  Claims,  Etc.
• Protect  Personal  Medical  Information
• Gather  Statistical  Data  About  Diseases
4PROPRIETARY AND CONFIDENTIAL
The HIPAA Security Rule
• Establishes  national  standards  to  protect  ePHI  that  is  created,  
received,  used,  or  maintained  by  a  covered  entity.  
• Applies  to:
– Covered  Entities
– Business  Associates
• Maintain  reasonable  and  appropriate
– Administrative
– Technical
– Physical  safeguards  for  protecting  e-­PHI
5PROPRIETARY AND CONFIDENTIAL
Specifically
• Ensure  the  confidentiality,  integrity,  and  availability  of  all  e-­PHI  
Covered  Entities  create,  receive,  maintain  or  transmit
• Identify  and  protect  against  reasonably  anticipated  threats  to  the  
security  or  integrity  of  the  information
• Protect  against  reasonably  anticipated,  impermissible  uses  or  
disclosures
• Ensure  compliance  by  their  workforce.
6PROPRIETARY AND CONFIDENTIAL
Patient Rights Under HIPAA
• Right  to  receive  a  notice  of  privacy  practices
• Right  to  copy  and  inspect  One’s  own  PHI
• Right  to  request  PHI  Amendments
• Right  to  restrict  disclosures  to  others
• Right  to  receive  PHI  by  alternate  means
– PO  Box  not  home  address,  for  example
• Right  to  file  a  privacy  complaint  (anyone)
7PROPRIETARY AND CONFIDENTIAL
The Business Associate Agreement
• Covered  Entities  must  enter  into  these  with  service  providers  like  
ClearDATA
• ClearDATA  must  enter  into  these  with  our  service  providers
• Three  Major  Obligations  of  a  BAA
– Facilitate  Patient  Rights
– Complete  Risk  Analysis,  Policies  and  Procedures
– Report  Breaches  and  Liability
8PROPRIETARY AND CONFIDENTIAL
BAA: Safeguarding Data
• ClearDATA  and  our  
subcontractors  (such  as  
AWS)  must:
– Assess  risk  and  implement  
the  safeguards,  policies,  
and  procedures.  
– Conform  and  comply  with  
the  HIPAA  Rules.
– And  ensure  that  our  
service  providers  do  the  
same!
Risk  
Management
Assess
Evaluate
Manage
Measure
9PROPRIETARY AND CONFIDENTIAL
Askew
If  you  search  for  “Askew”  in
Google,  the  content  will  tilt  
slightly  to  the  right.
10PROPRIETARY AND CONFIDENTIAL
Breach Notification
• CE/BA  must  investigate  any  and  all  legitimate  potential  breaches  
of  unsecured  PHI.
• Investigation  Process:
– Isolate
– Investigate
– Remediate
– Report
Unsuccessful  
Security  
Incidents
Breaches  of  
less  than  500  
records
Internal  
Logging
Successful  
Security  
Incidents
Breaches  of  
more  than  
500  records  
External  
Reporting
11PROPRIETARY AND CONFIDENTIAL
Meaningful Use: Basic Requirements
1. Use  of  certified  EHR  in  a  meaningful  manner  
(e.g.,  e-­prescribing)
2. Use  of  certified  EHR  technology  for  electronic  exchange of  
health  information  to  improve  quality  of  health  care
3. Use  of  certified  EHR  technology  to  submit  clinical  quality  
measures (CQM)
4. Meaningful  Use  is  how  the  EHR  is  used.     This  is  the  
responsibility  of  providers  with  assistance  from  local,  area,  and  
national  staff
12PROPRIETARY AND CONFIDENTIAL
Use vs. Meaningful Use
Pumpkin Pumpkin
Used  Meaningfully
13PROPRIETARY AND CONFIDENTIAL
Meaningful Use
2009
HITECH  Policies
2011
Stage  1
Capture/Share
Data
2014
Stage  2
Advanced  Care
Processes  
w/Decision  
Support
2016
Stage  3
Improved  
Outcomes
14PROPRIETARY AND CONFIDENTIAL
Objective: 45 CFR 164.308 (a)(1)
SRA  Objectives: Core  9  Meaningful  Use
•Assessment  of  the  Administrative,  Physical  and  Technical  
Safeguards  per  Security  Rule.
•Review  of  physical  computing  environment.
•Interrogation  of  security  software  &  protocols.
•Assessment  of  electronic  transmission  procedures  for  PHI.  
•Assess  vulnerabilities  to  the  confidentiality,  integrity                
and  availability  of  ePHI.
15PROPRIETARY AND CONFIDENTIAL
Review of Safeguards
Administrative
Physical
Technical
Organizational
1
2
3
4
16PROPRIETARY AND CONFIDENTIAL
OCR Audit Protocol
New  &  Stricter  Requirements
Preventative  Measures
Written  Policies  &  Procedures
Management  Accountability
Significant  Documentation
1
2
3
4
5
ClearDATA’s  SRA  Meets  OCR  Audit  Protocol
17PROPRIETARY AND CONFIDENTIAL
SRA Urgency
$
Important  to  Avoid  Security  Breaches  &  Fine
Required  to  Receive  Incentive  Funding
Meaningful  Use  Requirement
Required  Regularly  or  When  Systems  Change
18PROPRIETARY AND CONFIDENTIAL
Source:  https://cybersponse.com/data-­breaches-­by-­the-­numbers
19PROPRIETARY AND CONFIDENTIAL
Source:  https://cybersponse.com/data-­breaches-­by-­the-­numbers
20PROPRIETARY AND CONFIDENTIAL
The Attack
21PROPRIETARY AND CONFIDENTIAL
Breaches by Business Associates
January  2014 -­ Blue  Cross  Blue  Shield  of  New  Jersey  
Loss  of  data  affecting  839,711  individuals.  A  laptop  was  stolen – there  was  
no  encryption.
January  2014 -­ Triple-­C,  Inc.  
Theft  of  data  affecting  398,000  individuals.  A  network  server  was  stolen –
there  was  no  encryption.
May  2014  -­ Sutherland  Healthcare  Solutions,  Inc.  
Thieves  stole  eight  computers  from  Sutherland’s  Torrance,  Calif.  Office.  
They  got  away  with  the  medical  records  of  342,197 individuals.  There  was  
no  encryption.  
August  2014 -­ Community  Health  Pro-­Services  Corporation
Unauthorized access.  In  a  legal  dispute  with  Texas  HHS,  Xerox  removed  
patient  records  from  servers  and  hard  drives  and  permitted  other  parties  to  
view  the  records  of  2,000,000  individuals.  
December  2014  -­ Senior  Health  Partners
Theft  of  2,700  records  after  laptop  and  mobile  phone  belonging  to  a  
registered  nurse  employed  by  its  business  associates  were  reported.  
1
2
3
4
5
22PROPRIETARY AND CONFIDENTIAL
Value of PHI
2%  -­ Credit  report  was  
accessed  or  modified    
29%  -­ Obtain  healthcare  services              
or  treatments  
28%  -­ Obtain  prescription  drugs  
or  medical  equipment  
Obtain  government  benefits  -­ 26%  
Including  Medicare  or  Medicaid
My  healthcare  records  -­ 11%  
were  accessed  or  modified
Obtain  fraudulent  – 2%
credit  accounts  in  my  name
2%  -­ Don’t  know
23PROPRIETARY AND CONFIDENTIAL
Why Breaches Are Occurring
Hackers  have  incentive  and  opportunity
A  single  stolen  password  tends  to  access  multiple  accounts
Selling  personal  information  has  become  a  profitable  global  enterprise
Weak  passwords  and  authentication  are  a  big  part  of  that  opportunity.
24PROPRIETARY AND CONFIDENTIAL
The Aftermath
Identity  Theft Espionage
Future  AttacksMoney  Spent
Reputations  Lost
25PROPRIETARY AND CONFIDENTIAL
HIPAA Fines and Penalties
Violation  Category Each  Violation All  Identical  Violations
per  Calendar  Year
Did  Not Know $100  -­ $50,000 $1,500,000
Reasonable Cause $1,000  -­ $50,000 $1,500,000
Willful  Neglect  -­
Corrected
$10,000  -­ $50,000 $1,500,000
Willful  Neglect  –
Not  Corrected
$50,000 $1,500,000
26PROPRIETARY AND CONFIDENTIAL
How Much This Graph Reminds Me of Mr. T
Reminds  me  of  Mr.  T
Still  kind  of  reminds
me  of  Mr.  T
27PROPRIETARY AND CONFIDENTIAL
More Learning Objectives
Understand   Cloud   challenges   for  healthcare   and  how   we  solve  for  them
Review   how   to  use  the  Cloud   to  overcome   security  challenges
Discuss  trends  in  the  Cloud,   such  as  Multi-­cloud
The  AWS  overlay   and  its  drivers
Understand   how  to  get  the  best  out  of  both  worlds   – HIPAA  Managed   Services  +  Multi-­cloud
Review   a  real-­world   example   – case  study
28PROPRIETARY AND CONFIDENTIAL
The Cloud’s Role in Transforming Healthcare
Data  Aggregation
Centralized,  high-­performance  access
Agility  /  Speed
Speed  &  flexibility  
to  implement  new  services  
Simplicity
No  hardware,  no  software,  no  new  staff
Reduce  Costs
Lower  costs,  no  capex,  pay  as  you  grow
Security
70%  less  breach,  HITRUST  certified
Reliability  /  Scalability
Greater  uptime/redundancy,  SLAs,  scalability  
29PROPRIETARY AND CONFIDENTIAL
Healthcare IT Transformation Challenges: Problems We Solve
• Aging  infrastructure
• Maintenance  costs
• Support  costs
• Standardization
• Virtualization
• Scalability  /  Reliability
• Capital  &  Personnel  
Constraints
~50%  of  Challenges  in  
IT  Operations  and  Maintenance?
Aging  Infrastructure,  
Support  and  Maintenance?
Healthcare  IT  Complexity  
Increasing?  HIT  Know  How?
Lack  of  IT  Visibility:
Utilization  of  Systems,   Applications,   Data?
Security  &  Compliance
by  Application
• Visibility,  What  is  Secure?
• Compliancy  by  App
• Maintaining  HIPAA  IT  Policy  and  Procedures  
• Annual  Risk  Analysis
75%  Reduction   of  Breach  Potential
• Application  sprawl
• Data  sprawl
• Image  /  archive
• Intelligent  storage
• Backups  /  DR
• Agility
• Impeding  Innovation
• BYOD
• Adoption  of  Advanced  
Apps
Innovation   Throttles  to  ~30%?
• Multiple  IT  Portals
• Increased  Regulatory  Compliance
• IT  Transformation  Tech:
Wireless,  BYOD,  Telemedicine,  Cloud,  Analytics
Reduce  IT  Complexity  by  ~50%
30PROPRIETARY AND CONFIDENTIAL
ClearDATA: The Vision for Transformation
healthcare IT
infrastructure,
network, security
secure patient data,
data lifecycle
management
organize, normalize,
access & share
healthcare data
+
+
+
STORE
MANAGE
PROTECT
SHARE
fix and modernize the
infrastructure, store HC
applications and data
BAA Covered AWS Services
ClearDATA Healthcare  Managed  
Platform
HealthDATA™
Cloud Suite
HealthDATA™
Security & Privacy
HealthDATA™
Management
Healthcare IT
Service & Support
ClearDATA Enhanced Security, Compliance & BAA
Risk Assessment
Policy Development
Advisory Services
Hardened Hosting
Complete Encryption
HC PaaS Portal/API
Scalable Hosting
Flexible Interchange
HC Analytics
24 x 7 Support
Compliance Trained
HIT ProServ
Gov HealthcarePhysicians Medical  DevicesLife  SciencesHospitalsHealthcare  Software
Compute
Data
Storage
Network
Services
App
Services
What  AWS  services  could  be  BAA  covered  today?
DynamoDB – NoSQL Cloud Database Service
Elastic Block Store (EBS)
Elastic Compute Cloud (EC2)
Elastic Map Reduce (EMR)
Elastic Load Balancer (ELB)
Glacier
Relational Database Service (RDS)
Redshift – Cloud Data Warehouse
Simple Storage Service - S3
Managed  Service  overview
Capability Customer ClearDATA
ClearDATA with
AWS
Application development, deployment &monitoring X Option
Compliance Scorecard X
Cloud Infrastructure Healthcare Architecture, Optimization & Support X
On demand Security Risk Assessments X
Quarterly Vulnerability Scanning X
Breach detection, notification & remediation X
PHI and other data Encryption at rest and in motion including key management access X
Intrusion Detection X
OS deployment, hardening, patching X
Managed Backup configuration & management X
VPN & Firewall configuration & management X
Anti virus configuration & management X
Infrastructure Ecosystem X
Infrastructure Development, Availability, Scaling, Security X
Geo Diversity & Physical security X
34
ClearDATA
1600  W.  Broadway  Road  Ÿ Tempe,  AZ  85282
Ph:  (888)  899-­2066  Ÿ sales@cleardata.com  Ÿ www.cleardata.com  
Healthcare Infrastructure That is Controlled, Managed, and Optimized
By Our HealthDATA™ Platform
Key  Benefits  
• Healthcare  specific  portal for  all  managed  services
• Cloud  automation,  templates  &  HIPAA  compliant  dashboard
• API  for  direct  access  to  ClearDATA configured  AWS  services
HealtDATA™ HIT & Cloud Management Platform
• Centralizing  management  across  ClearDATA  products
• Secure  support  request  management
• ITIL-­Aligned  Configuration  Management  Database
• Deploy  AWS  environments  with  Cloud  Formations
• View  billing  and  invoice  information
• Security  hardened  AMIs  for  common  services
35PROPRIETARY AND CONFIDENTIAL
Questions
36
ClearDATA
1600  W.  Broadway  Road  Ÿ Tempe,  AZ  85282
Ph:  (888)  899-­2066  Ÿ sales@cleardata.com  Ÿ www.cleardata.com  
Thank You
For  additional information  please  contact:
Joseph  Vadakkan
Solution  Architect
480.939.3476
josephs.vadakkan@cleardata.com

More Related Content

PPTX
HIPAA Compliance: Simple Steps to the Healthcare Cloud
PPTX
The Startup Path to HIPAA Compliance
PPTX
HIPAA
PDF
Application Developers Guide to HIPAA Compliance
PDF
HIPAA Compliance for Developers
PPTX
HIPAA Security 2019
PPTX
HIPPA Security Presentation
PPTX
HIPAA Access Medical Records by Sainsbury-Wong
HIPAA Compliance: Simple Steps to the Healthcare Cloud
The Startup Path to HIPAA Compliance
HIPAA
Application Developers Guide to HIPAA Compliance
HIPAA Compliance for Developers
HIPAA Security 2019
HIPPA Security Presentation
HIPAA Access Medical Records by Sainsbury-Wong

What's hot (20)

PDF
A brief introduction to hipaa compliance
PPTX
The HIPAA Security Rule: Yes, It's Your Problem
PPTX
Health Insurance Portability and Accountability Act (HIPAA) Compliance
PDF
You and HIPAA - Get the Facts
PDF
HIPAA Basic Healthcare Guide
PPTX
Mha690 brittany koenig week 1 assignment2
PPTX
Assessing Your Hosting Environment for HIPAA Compliance
PDF
HIPAA and How it Applies to You
PPSX
HIPAA HITECH training 7-9-12
PDF
HIPAA 101- What all Doctors NEED to know
PPTX
HIPAA Audit Implementation
PDF
HIPAA compliance for Business Associates- The value of compliance, how to acq...
PPT
Hipaa101 updated
PPTX
HIPAA - Understanding the Basics of Compliance
PDF
Cyberinsurance 111006
PPTX
The Health Insurance Portability and Accountability Act 
PPTX
HIPAA | HITECH
PDF
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
PPT
HIPAA
PDF
HIPAA for Dummies
A brief introduction to hipaa compliance
The HIPAA Security Rule: Yes, It's Your Problem
Health Insurance Portability and Accountability Act (HIPAA) Compliance
You and HIPAA - Get the Facts
HIPAA Basic Healthcare Guide
Mha690 brittany koenig week 1 assignment2
Assessing Your Hosting Environment for HIPAA Compliance
HIPAA and How it Applies to You
HIPAA HITECH training 7-9-12
HIPAA 101- What all Doctors NEED to know
HIPAA Audit Implementation
HIPAA compliance for Business Associates- The value of compliance, how to acq...
Hipaa101 updated
HIPAA - Understanding the Basics of Compliance
Cyberinsurance 111006
The Health Insurance Portability and Accountability Act 
HIPAA | HITECH
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
HIPAA
HIPAA for Dummies
Ad

Similar to HIPAA Compliant Cloud Computing, An Overview (20)

PDF
Upcoming New 2025 HIPAA Changes and Beyond
PPTX
Healthcare Compliance: HIPAA and HITRUST
PPTX
Healthcare and Cyber security
PPTX
MindLeaf - HIPAA privacy and cybersecurity insurance
PDF
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
PDF
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
PDF
Is it time for an IT Assessment?
PDF
How Safe is Your Patient Data?
PPTX
Confidentiality and information security33.pptx
PDF
Health care compliance webinar may 10 2017
PDF
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
DOCX
Hi paa and eh rs
PDF
Cloud compliance test
PPTX
Multi-faceted Cyber Security v1
PDF
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
PPSX
Mbm Hipaa Hitech Ss Compliance Risk Assessment
PDF
HealthCare Compliance - HIPAA & HITRUST
PDF
Insight into DHHS OCR Audit Protocols
PPTX
HealthCare Compliance - HIPAA and HITRUST
PDF
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Upcoming New 2025 HIPAA Changes and Beyond
Healthcare Compliance: HIPAA and HITRUST
Healthcare and Cyber security
MindLeaf - HIPAA privacy and cybersecurity insurance
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Is it time for an IT Assessment?
How Safe is Your Patient Data?
Confidentiality and information security33.pptx
Health care compliance webinar may 10 2017
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Hi paa and eh rs
Cloud compliance test
Multi-faceted Cyber Security v1
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Mbm Hipaa Hitech Ss Compliance Risk Assessment
HealthCare Compliance - HIPAA & HITRUST
Insight into DHHS OCR Audit Protocols
HealthCare Compliance - HIPAA and HITRUST
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Ad

Recently uploaded (20)

PPTX
BP504T_PGPC_UNIT_II (1) (1)PHARMACOGNOSY AND PHYTOCHEMISTRY 2
PPTX
Seizures in paediatrics as a big cause of morbidity.pptx
PPTX
Common Bacterial infections-converted_64bcdc4f77a3b7b90bdeb611f66c6ddd.pptx
PPTX
Single Visit Endodontics.pptx root canal treatment in one visit
PPTX
Water Diseases and their prevention.pptx
PPTX
#15 ANS & SNS Anatomy BY DR. SADAKAT.pptx
PDF
SKELETAL SYSTEM PPT FOR THE BSN 1ST YEAR
PDF
18-23_Weeks_Scan ultrsasound scan in medecine.pdf
PDF
Mobile Radiography: Techniques, Applications, and Safety Measures
PPTX
Head Spine trauma assesment and managementATLS Final.pptx
PDF
Dental Implants Review : A detailed Review
PPTX
Pediatrics Hemodynamic monitoring in ICU.pptx
PPTX
OBSTRUCTIVE SLEEP APNOEA- features and management
PPTX
anatomy and physiology of pharynx ( oro and naso and pharyngeal)
PPTX
Emotional Well Being & Conflict Resolution_VKV.pptx
PPTX
Physiological Changes in Pregnancy.pptx..
PDF
Chapter 8. HHS Facility Design and Construction _ HHS.gov.pdf
PPT
53afocus7fluidelectrolytesacid-basebalance-121205082904-phpapp01.ppt
PPTX
Anti-depressant ggggghhhhhhhhhhhhhhhhhhh
PPTX
Tuberculosis Control Bangladesh Current 2025.pptx
BP504T_PGPC_UNIT_II (1) (1)PHARMACOGNOSY AND PHYTOCHEMISTRY 2
Seizures in paediatrics as a big cause of morbidity.pptx
Common Bacterial infections-converted_64bcdc4f77a3b7b90bdeb611f66c6ddd.pptx
Single Visit Endodontics.pptx root canal treatment in one visit
Water Diseases and their prevention.pptx
#15 ANS & SNS Anatomy BY DR. SADAKAT.pptx
SKELETAL SYSTEM PPT FOR THE BSN 1ST YEAR
18-23_Weeks_Scan ultrsasound scan in medecine.pdf
Mobile Radiography: Techniques, Applications, and Safety Measures
Head Spine trauma assesment and managementATLS Final.pptx
Dental Implants Review : A detailed Review
Pediatrics Hemodynamic monitoring in ICU.pptx
OBSTRUCTIVE SLEEP APNOEA- features and management
anatomy and physiology of pharynx ( oro and naso and pharyngeal)
Emotional Well Being & Conflict Resolution_VKV.pptx
Physiological Changes in Pregnancy.pptx..
Chapter 8. HHS Facility Design and Construction _ HHS.gov.pdf
53afocus7fluidelectrolytesacid-basebalance-121205082904-phpapp01.ppt
Anti-depressant ggggghhhhhhhhhhhhhhhhhhh
Tuberculosis Control Bangladesh Current 2025.pptx

HIPAA Compliant Cloud Computing, An Overview

  • 1. removing barriers to healthier healthcare HIPPA, Security & Cloud Presented  By: Chris  Bowen,  MBA,  CISSP,  CIPP/US,  CIPT Founder,  Chief  Privacy  &  Security  Officer Matt  Ferrari Chief  Technology  Officer Using  the  Cloud  as  an  enabler.
  • 2. 2PROPRIETARY AND CONFIDENTIAL Learning Objectives Understand   HIPAA  and  HIPAA Understand   the  patients’   rights  under   HIPAA  and  how   those  relate  to  the  BAA Examine  the  purpose   of  the  BAA  – what  it  is  designed   to  do Review   Meaningful   Use  and  its  place  in  driving   Security  Risk  Assessments Know   the  penalties   for  a  data  breach Understand   what  makes  up  a  SRA Discuss  some  real  breaches,   what  happened   and  how   it  could  have  been   prevented
  • 3. 3PROPRIETARY AND CONFIDENTIAL Objectives for HIPAA • Make  Health  Insurance  More  Portable • Reduce  Healthcare  Fraud • Improve  Efficiency  of  Payment,  Claims,  Etc. • Protect  Personal  Medical  Information • Gather  Statistical  Data  About  Diseases
  • 4. 4PROPRIETARY AND CONFIDENTIAL The HIPAA Security Rule • Establishes  national  standards  to  protect  ePHI  that  is  created,   received,  used,  or  maintained  by  a  covered  entity.   • Applies  to: – Covered  Entities – Business  Associates • Maintain  reasonable  and  appropriate – Administrative – Technical – Physical  safeguards  for  protecting  e-­PHI
  • 5. 5PROPRIETARY AND CONFIDENTIAL Specifically • Ensure  the  confidentiality,  integrity,  and  availability  of  all  e-­PHI   Covered  Entities  create,  receive,  maintain  or  transmit • Identify  and  protect  against  reasonably  anticipated  threats  to  the   security  or  integrity  of  the  information • Protect  against  reasonably  anticipated,  impermissible  uses  or   disclosures • Ensure  compliance  by  their  workforce.
  • 6. 6PROPRIETARY AND CONFIDENTIAL Patient Rights Under HIPAA • Right  to  receive  a  notice  of  privacy  practices • Right  to  copy  and  inspect  One’s  own  PHI • Right  to  request  PHI  Amendments • Right  to  restrict  disclosures  to  others • Right  to  receive  PHI  by  alternate  means – PO  Box  not  home  address,  for  example • Right  to  file  a  privacy  complaint  (anyone)
  • 7. 7PROPRIETARY AND CONFIDENTIAL The Business Associate Agreement • Covered  Entities  must  enter  into  these  with  service  providers  like   ClearDATA • ClearDATA  must  enter  into  these  with  our  service  providers • Three  Major  Obligations  of  a  BAA – Facilitate  Patient  Rights – Complete  Risk  Analysis,  Policies  and  Procedures – Report  Breaches  and  Liability
  • 8. 8PROPRIETARY AND CONFIDENTIAL BAA: Safeguarding Data • ClearDATA  and  our   subcontractors  (such  as   AWS)  must: – Assess  risk  and  implement   the  safeguards,  policies,   and  procedures.   – Conform  and  comply  with   the  HIPAA  Rules. – And  ensure  that  our   service  providers  do  the   same! Risk   Management Assess Evaluate Manage Measure
  • 9. 9PROPRIETARY AND CONFIDENTIAL Askew If  you  search  for  “Askew”  in Google,  the  content  will  tilt   slightly  to  the  right.
  • 10. 10PROPRIETARY AND CONFIDENTIAL Breach Notification • CE/BA  must  investigate  any  and  all  legitimate  potential  breaches   of  unsecured  PHI. • Investigation  Process: – Isolate – Investigate – Remediate – Report Unsuccessful   Security   Incidents Breaches  of   less  than  500   records Internal   Logging Successful   Security   Incidents Breaches  of   more  than   500  records   External   Reporting
  • 11. 11PROPRIETARY AND CONFIDENTIAL Meaningful Use: Basic Requirements 1. Use  of  certified  EHR  in  a  meaningful  manner   (e.g.,  e-­prescribing) 2. Use  of  certified  EHR  technology  for  electronic  exchange of   health  information  to  improve  quality  of  health  care 3. Use  of  certified  EHR  technology  to  submit  clinical  quality   measures (CQM) 4. Meaningful  Use  is  how  the  EHR  is  used.     This  is  the   responsibility  of  providers  with  assistance  from  local,  area,  and   national  staff
  • 12. 12PROPRIETARY AND CONFIDENTIAL Use vs. Meaningful Use Pumpkin Pumpkin Used  Meaningfully
  • 13. 13PROPRIETARY AND CONFIDENTIAL Meaningful Use 2009 HITECH  Policies 2011 Stage  1 Capture/Share Data 2014 Stage  2 Advanced  Care Processes   w/Decision   Support 2016 Stage  3 Improved   Outcomes
  • 14. 14PROPRIETARY AND CONFIDENTIAL Objective: 45 CFR 164.308 (a)(1) SRA  Objectives: Core  9  Meaningful  Use •Assessment  of  the  Administrative,  Physical  and  Technical   Safeguards  per  Security  Rule. •Review  of  physical  computing  environment. •Interrogation  of  security  software  &  protocols. •Assessment  of  electronic  transmission  procedures  for  PHI.   •Assess  vulnerabilities  to  the  confidentiality,  integrity                 and  availability  of  ePHI.
  • 15. 15PROPRIETARY AND CONFIDENTIAL Review of Safeguards Administrative Physical Technical Organizational 1 2 3 4
  • 16. 16PROPRIETARY AND CONFIDENTIAL OCR Audit Protocol New  &  Stricter  Requirements Preventative  Measures Written  Policies  &  Procedures Management  Accountability Significant  Documentation 1 2 3 4 5 ClearDATA’s  SRA  Meets  OCR  Audit  Protocol
  • 17. 17PROPRIETARY AND CONFIDENTIAL SRA Urgency $ Important  to  Avoid  Security  Breaches  &  Fine Required  to  Receive  Incentive  Funding Meaningful  Use  Requirement Required  Regularly  or  When  Systems  Change
  • 18. 18PROPRIETARY AND CONFIDENTIAL Source:  https://cybersponse.com/data-­breaches-­by-­the-­numbers
  • 19. 19PROPRIETARY AND CONFIDENTIAL Source:  https://cybersponse.com/data-­breaches-­by-­the-­numbers
  • 21. 21PROPRIETARY AND CONFIDENTIAL Breaches by Business Associates January  2014 -­ Blue  Cross  Blue  Shield  of  New  Jersey   Loss  of  data  affecting  839,711  individuals.  A  laptop  was  stolen – there  was   no  encryption. January  2014 -­ Triple-­C,  Inc.   Theft  of  data  affecting  398,000  individuals.  A  network  server  was  stolen – there  was  no  encryption. May  2014  -­ Sutherland  Healthcare  Solutions,  Inc.   Thieves  stole  eight  computers  from  Sutherland’s  Torrance,  Calif.  Office.   They  got  away  with  the  medical  records  of  342,197 individuals.  There  was   no  encryption.   August  2014 -­ Community  Health  Pro-­Services  Corporation Unauthorized access.  In  a  legal  dispute  with  Texas  HHS,  Xerox  removed   patient  records  from  servers  and  hard  drives  and  permitted  other  parties  to   view  the  records  of  2,000,000  individuals.   December  2014  -­ Senior  Health  Partners Theft  of  2,700  records  after  laptop  and  mobile  phone  belonging  to  a   registered  nurse  employed  by  its  business  associates  were  reported.   1 2 3 4 5
  • 22. 22PROPRIETARY AND CONFIDENTIAL Value of PHI 2%  -­ Credit  report  was   accessed  or  modified     29%  -­ Obtain  healthcare  services               or  treatments   28%  -­ Obtain  prescription  drugs   or  medical  equipment   Obtain  government  benefits  -­ 26%   Including  Medicare  or  Medicaid My  healthcare  records  -­ 11%   were  accessed  or  modified Obtain  fraudulent  – 2% credit  accounts  in  my  name 2%  -­ Don’t  know
  • 23. 23PROPRIETARY AND CONFIDENTIAL Why Breaches Are Occurring Hackers  have  incentive  and  opportunity A  single  stolen  password  tends  to  access  multiple  accounts Selling  personal  information  has  become  a  profitable  global  enterprise Weak  passwords  and  authentication  are  a  big  part  of  that  opportunity.
  • 24. 24PROPRIETARY AND CONFIDENTIAL The Aftermath Identity  Theft Espionage Future  AttacksMoney  Spent Reputations  Lost
  • 25. 25PROPRIETARY AND CONFIDENTIAL HIPAA Fines and Penalties Violation  Category Each  Violation All  Identical  Violations per  Calendar  Year Did  Not Know $100  -­ $50,000 $1,500,000 Reasonable Cause $1,000  -­ $50,000 $1,500,000 Willful  Neglect  -­ Corrected $10,000  -­ $50,000 $1,500,000 Willful  Neglect  – Not  Corrected $50,000 $1,500,000
  • 26. 26PROPRIETARY AND CONFIDENTIAL How Much This Graph Reminds Me of Mr. T Reminds  me  of  Mr.  T Still  kind  of  reminds me  of  Mr.  T
  • 27. 27PROPRIETARY AND CONFIDENTIAL More Learning Objectives Understand   Cloud   challenges   for  healthcare   and  how   we  solve  for  them Review   how   to  use  the  Cloud   to  overcome   security  challenges Discuss  trends  in  the  Cloud,   such  as  Multi-­cloud The  AWS  overlay   and  its  drivers Understand   how  to  get  the  best  out  of  both  worlds   – HIPAA  Managed   Services  +  Multi-­cloud Review   a  real-­world   example   – case  study
  • 28. 28PROPRIETARY AND CONFIDENTIAL The Cloud’s Role in Transforming Healthcare Data  Aggregation Centralized,  high-­performance  access Agility  /  Speed Speed  &  flexibility   to  implement  new  services   Simplicity No  hardware,  no  software,  no  new  staff Reduce  Costs Lower  costs,  no  capex,  pay  as  you  grow Security 70%  less  breach,  HITRUST  certified Reliability  /  Scalability Greater  uptime/redundancy,  SLAs,  scalability  
  • 29. 29PROPRIETARY AND CONFIDENTIAL Healthcare IT Transformation Challenges: Problems We Solve • Aging  infrastructure • Maintenance  costs • Support  costs • Standardization • Virtualization • Scalability  /  Reliability • Capital  &  Personnel   Constraints ~50%  of  Challenges  in   IT  Operations  and  Maintenance? Aging  Infrastructure,   Support  and  Maintenance? Healthcare  IT  Complexity   Increasing?  HIT  Know  How? Lack  of  IT  Visibility: Utilization  of  Systems,   Applications,   Data? Security  &  Compliance by  Application • Visibility,  What  is  Secure? • Compliancy  by  App • Maintaining  HIPAA  IT  Policy  and  Procedures   • Annual  Risk  Analysis 75%  Reduction   of  Breach  Potential • Application  sprawl • Data  sprawl • Image  /  archive • Intelligent  storage • Backups  /  DR • Agility • Impeding  Innovation • BYOD • Adoption  of  Advanced   Apps Innovation   Throttles  to  ~30%? • Multiple  IT  Portals • Increased  Regulatory  Compliance • IT  Transformation  Tech: Wireless,  BYOD,  Telemedicine,  Cloud,  Analytics Reduce  IT  Complexity  by  ~50%
  • 30. 30PROPRIETARY AND CONFIDENTIAL ClearDATA: The Vision for Transformation healthcare IT infrastructure, network, security secure patient data, data lifecycle management organize, normalize, access & share healthcare data + + + STORE MANAGE PROTECT SHARE fix and modernize the infrastructure, store HC applications and data
  • 31. BAA Covered AWS Services ClearDATA Healthcare  Managed   Platform HealthDATA™ Cloud Suite HealthDATA™ Security & Privacy HealthDATA™ Management Healthcare IT Service & Support ClearDATA Enhanced Security, Compliance & BAA Risk Assessment Policy Development Advisory Services Hardened Hosting Complete Encryption HC PaaS Portal/API Scalable Hosting Flexible Interchange HC Analytics 24 x 7 Support Compliance Trained HIT ProServ Gov HealthcarePhysicians Medical  DevicesLife  SciencesHospitalsHealthcare  Software Compute Data Storage Network Services App Services
  • 32. What  AWS  services  could  be  BAA  covered  today? DynamoDB – NoSQL Cloud Database Service Elastic Block Store (EBS) Elastic Compute Cloud (EC2) Elastic Map Reduce (EMR) Elastic Load Balancer (ELB) Glacier Relational Database Service (RDS) Redshift – Cloud Data Warehouse Simple Storage Service - S3
  • 33. Managed  Service  overview Capability Customer ClearDATA ClearDATA with AWS Application development, deployment &monitoring X Option Compliance Scorecard X Cloud Infrastructure Healthcare Architecture, Optimization & Support X On demand Security Risk Assessments X Quarterly Vulnerability Scanning X Breach detection, notification & remediation X PHI and other data Encryption at rest and in motion including key management access X Intrusion Detection X OS deployment, hardening, patching X Managed Backup configuration & management X VPN & Firewall configuration & management X Anti virus configuration & management X Infrastructure Ecosystem X Infrastructure Development, Availability, Scaling, Security X Geo Diversity & Physical security X
  • 34. 34 ClearDATA 1600  W.  Broadway  Road  Ÿ Tempe,  AZ  85282 Ph:  (888)  899-­2066  Ÿ [email protected]  Ÿ www.cleardata.com   Healthcare Infrastructure That is Controlled, Managed, and Optimized By Our HealthDATA™ Platform Key  Benefits   • Healthcare  specific  portal for  all  managed  services • Cloud  automation,  templates  &  HIPAA  compliant  dashboard • API  for  direct  access  to  ClearDATA configured  AWS  services HealtDATA™ HIT & Cloud Management Platform • Centralizing  management  across  ClearDATA  products • Secure  support  request  management • ITIL-­Aligned  Configuration  Management  Database • Deploy  AWS  environments  with  Cloud  Formations • View  billing  and  invoice  information • Security  hardened  AMIs  for  common  services
  • 36. 36 ClearDATA 1600  W.  Broadway  Road  Ÿ Tempe,  AZ  85282 Ph:  (888)  899-­2066  Ÿ [email protected]  Ÿ www.cleardata.com   Thank You For  additional information  please  contact: Joseph  Vadakkan Solution  Architect 480.939.3476 [email protected]