SlideShare une entreprise Scribd logo
1  sur  10
Looking Back and Forward
Improving Health Data Security
in Utah
Robert Rolfs, MD, MPH
22 May 2013
Privacy, Confidentiality, Data Security
Not New!
• Hippocratic Oath (5th century BC)
All that may come to my knowledge in the exercise of my
profession or in daily commerce with men, which ought
not to be spread abroad, I will keep secret and will never
reveal.
• Privacy Act of 1974 – Fair information practices
• Recognition of AIDS - 1981
• HIPAA – Privacy Rule 2001
• Federal Information Security Management Act of 2002
– FISMA designated NIST to develop standards, guidelines,
methods, and practices for information security
Health Data Security
Looking Back
Today’s Problems come from Yesterday’s
“Solutions”
Senge – The Fifth Discipline
Evolution of Public Health Data
Security
• 1994 – Principles and Practices of Public Health Surveillance
– Ch 11 – “Computerizing PH Surv. Systems”
• 2002 – PH Informatics and Information Systems
– Chapters on legal framework, security, etc.
• 2011 – Data Security and Confidentiality Guidelines
For HIV, Viral Hepatitis, STD, and TB Programs
Computerization of Public Health Data
• 1980s – mainframes, stand-alone computers
– Restricted access to mainframes
– Security often achieved by locking in filing cabinets
• 1990s – Wave of integration
– Development of networks, widespread PC’s
– Focus on improving function, access to data, deriving value
– Katz report, IS Vision, Data Stewardship, etc.
• 21st century
– Dramatic increase in access, flexibility, ability of individuals to
develop and implement information systems
– Internet, web-based access, social media, etc.
Approaches to Information System
Development and Management
• Central control and management very difficult
– Rapid change, difficulty anticipating needs/future
• Innovation and entrepreneurial approach
• Centralization of IT services at DTS
IT Security Today
• Breaches and consequences
– Financial
• Since 2012, OCR penalties
– BCBS Tennessee – 57 unencrypted drives – $1.5 million
– Alaska DHHS – stolen USB from vehicle - $1.7 million
– UDOH – medicaid breach - $?
– Trust
• Legislation, cHIE, CSD
• not confined to responsible party
IT Security
Looking Forward
• Greater central control is needed
– There will be cost to flexibility, innovation, etc
• Need to comply with complex and demanding
regulations
• Need to fundamentally improve IT practices so
that security is part of development and not
after thought
• Cost of IT systems will increase
Health Data Security
Looking Forward
Today’s Problems come from Yesterday’s
“Solutions”
Senge – The Fifth Discipline

Contenu connexe

Tendances

Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
brentcarey
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
Doug Landoll
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
E-Journal ICT4D
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
MIS-lecture-2
MIS-lecture-2MIS-lecture-2
MIS-lecture-2
27273737
 

Tendances (20)

Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 
Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
MIS-lecture-2
MIS-lecture-2MIS-lecture-2
MIS-lecture-2
 

En vedette

B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...
B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...
B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...
Mike Blamires
 

En vedette (15)

The Impact of Agriculture on Utah's Economy
The Impact of Agriculture on Utah's EconomyThe Impact of Agriculture on Utah's Economy
The Impact of Agriculture on Utah's Economy
 
University Of Sunderland - Migrating Vocational Places To Diploma Lines
University Of Sunderland - Migrating Vocational Places To Diploma LinesUniversity Of Sunderland - Migrating Vocational Places To Diploma Lines
University Of Sunderland - Migrating Vocational Places To Diploma Lines
 
D13 - Alison Lawson (NFER) and colleagues from eep, ttrb and CERUKplus: Conne...
D13 - Alison Lawson (NFER) and colleagues from eep, ttrb and CERUKplus: Conne...D13 - Alison Lawson (NFER) and colleagues from eep, ttrb and CERUKplus: Conne...
D13 - Alison Lawson (NFER) and colleagues from eep, ttrb and CERUKplus: Conne...
 
Utah: The Cradle of Public Health Informatics
Utah: The Cradle of Public Health InformaticsUtah: The Cradle of Public Health Informatics
Utah: The Cradle of Public Health Informatics
 
DPP - Introducing Diploma Development Partnerships Consultancy & Low Uptake
DPP - Introducing Diploma Development Partnerships Consultancy & Low UptakeDPP - Introducing Diploma Development Partnerships Consultancy & Low Uptake
DPP - Introducing Diploma Development Partnerships Consultancy & Low Uptake
 
C5 - Shelley Tracey (Queens): Crossing thresholds and expanding conceptual sp...
C5 - Shelley Tracey (Queens): Crossing thresholds and expanding conceptual sp...C5 - Shelley Tracey (Queens): Crossing thresholds and expanding conceptual sp...
C5 - Shelley Tracey (Queens): Crossing thresholds and expanding conceptual sp...
 
D11 - Dr Alison Jackson (Cumbria): Teaching – a Masters profession
D11 - Dr Alison Jackson (Cumbria): Teaching – a Masters professionD11 - Dr Alison Jackson (Cumbria): Teaching – a Masters profession
D11 - Dr Alison Jackson (Cumbria): Teaching – a Masters profession
 
Lucy Avery PowerPoint
Lucy Avery PowerPointLucy Avery PowerPoint
Lucy Avery PowerPoint
 
TDA 14-19 Diploma ITT Strand 2 - "With Experience" Programme Evaluation Of 20...
TDA 14-19 Diploma ITT Strand 2 - "With Experience" Programme Evaluation Of 20...TDA 14-19 Diploma ITT Strand 2 - "With Experience" Programme Evaluation Of 20...
TDA 14-19 Diploma ITT Strand 2 - "With Experience" Programme Evaluation Of 20...
 
Disruptive processes for creating astonishing user interfaces
Disruptive processes for creating astonishing  user interfacesDisruptive processes for creating astonishing  user interfaces
Disruptive processes for creating astonishing user interfaces
 
Utah State Parks Newsletter Summer 2009
Utah State Parks Newsletter Summer 2009Utah State Parks Newsletter Summer 2009
Utah State Parks Newsletter Summer 2009
 
Red Butte Oil Spill Presentation
Red Butte Oil Spill PresentationRed Butte Oil Spill Presentation
Red Butte Oil Spill Presentation
 
Keynote 1 - Developing Inspection – HMCI Christine Gilbert, OfSTED
Keynote 1 - Developing Inspection – HMCI Christine Gilbert, OfSTEDKeynote 1 - Developing Inspection – HMCI Christine Gilbert, OfSTED
Keynote 1 - Developing Inspection – HMCI Christine Gilbert, OfSTED
 
Making Policy Happen: Improving Practice in the DCSF
Making Policy Happen: Improving Practice in the DCSFMaking Policy Happen: Improving Practice in the DCSF
Making Policy Happen: Improving Practice in the DCSF
 
B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...
B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...
B12 - Keith Posthlethwaite (Exeter) and Linda Haggarty (Open): From student t...
 

Similaire à Looking back and forward: Improving Health Data Security in Utah

Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
Rai University
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
Noriha Nori
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
bgshalini
 

Similaire à Looking back and forward: Improving Health Data Security in Utah (20)

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
2021FSAConfSession22.pptx
2021FSAConfSession22.pptx2021FSAConfSession22.pptx
2021FSAConfSession22.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
The age of data - Putting responsible data into practice
The age of data - Putting responsible data into practiceThe age of data - Putting responsible data into practice
The age of data - Putting responsible data into practice
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdf
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
NCVHS Privacy and Security Update
NCVHS Privacy and Security Update NCVHS Privacy and Security Update
NCVHS Privacy and Security Update
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
 

Plus de State of Utah, Salt Lake City

Plus de State of Utah, Salt Lake City (20)

Utah Veterinary Diagnostic Laboratory
Utah Veterinary Diagnostic LaboratoryUtah Veterinary Diagnostic Laboratory
Utah Veterinary Diagnostic Laboratory
 
Health Data Transparency: Utah’s All Payer Claims Database
Health Data Transparency: Utah’s All Payer Claims DatabaseHealth Data Transparency: Utah’s All Payer Claims Database
Health Data Transparency: Utah’s All Payer Claims Database
 
Utah Division of Juvenile and Justice Services
Utah Division of Juvenile and Justice ServicesUtah Division of Juvenile and Justice Services
Utah Division of Juvenile and Justice Services
 
Health Disparities by Utah Legislative District 2019
Health Disparities by Utah Legislative District 2019Health Disparities by Utah Legislative District 2019
Health Disparities by Utah Legislative District 2019
 
Localscapes
LocalscapesLocalscapes
Localscapes
 
Status of Translocated Tortoises in Southwest Utah
Status of Translocated Tortoises in Southwest UtahStatus of Translocated Tortoises in Southwest Utah
Status of Translocated Tortoises in Southwest Utah
 
The Logan River Observatory
The Logan River ObservatoryThe Logan River Observatory
The Logan River Observatory
 
Utah Strategic Workforce Presentation
Utah Strategic Workforce PresentationUtah Strategic Workforce Presentation
Utah Strategic Workforce Presentation
 
The Utah Geological Survey provides timely scientific information about Utah’...
The Utah Geological Survey provides timely scientific information about Utah’...The Utah Geological Survey provides timely scientific information about Utah’...
The Utah Geological Survey provides timely scientific information about Utah’...
 
Utah Forestry, Fire and State Lands 2019
Utah Forestry, Fire and State Lands 2019Utah Forestry, Fire and State Lands 2019
Utah Forestry, Fire and State Lands 2019
 
Utah Division of Wildlife Resources Presentation to 2019 Legislature
Utah Division of Wildlife Resources Presentation to 2019 LegislatureUtah Division of Wildlife Resources Presentation to 2019 Legislature
Utah Division of Wildlife Resources Presentation to 2019 Legislature
 
UDOT Presentation to 2019 Legislature
UDOT Presentation to 2019 LegislatureUDOT Presentation to 2019 Legislature
UDOT Presentation to 2019 Legislature
 
Utah System of Technical Colleges
Utah System of Technical CollegesUtah System of Technical Colleges
Utah System of Technical Colleges
 
Public Water System Identification in Utah
Public Water System Identification in UtahPublic Water System Identification in Utah
Public Water System Identification in Utah
 
State of Utah Suicide Prevention
State of Utah Suicide PreventionState of Utah Suicide Prevention
State of Utah Suicide Prevention
 
Utah Division of Aeronautics Annual Needs and Accomplishments
Utah Division of Aeronautics Annual Needs and AccomplishmentsUtah Division of Aeronautics Annual Needs and Accomplishments
Utah Division of Aeronautics Annual Needs and Accomplishments
 
Fourth Quarter FY2018 Quarterly Report from Utah DCFS
Fourth Quarter FY2018 Quarterly Report from Utah DCFSFourth Quarter FY2018 Quarterly Report from Utah DCFS
Fourth Quarter FY2018 Quarterly Report from Utah DCFS
 
Update on FirstNet in Utah
Update on FirstNet in UtahUpdate on FirstNet in Utah
Update on FirstNet in Utah
 
Energy Incentives in Utah - 2018 Audit
Energy Incentives in Utah - 2018 AuditEnergy Incentives in Utah - 2018 Audit
Energy Incentives in Utah - 2018 Audit
 
Transportation Policy and Funding: Historical and Emerging Trends
Transportation Policy and Funding: Historical and Emerging TrendsTransportation Policy and Funding: Historical and Emerging Trends
Transportation Policy and Funding: Historical and Emerging Trends
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Looking back and forward: Improving Health Data Security in Utah

  • 1. Looking Back and Forward Improving Health Data Security in Utah Robert Rolfs, MD, MPH 22 May 2013
  • 2. Privacy, Confidentiality, Data Security Not New! • Hippocratic Oath (5th century BC) All that may come to my knowledge in the exercise of my profession or in daily commerce with men, which ought not to be spread abroad, I will keep secret and will never reveal. • Privacy Act of 1974 – Fair information practices • Recognition of AIDS - 1981 • HIPAA – Privacy Rule 2001 • Federal Information Security Management Act of 2002 – FISMA designated NIST to develop standards, guidelines, methods, and practices for information security
  • 3. Health Data Security Looking Back Today’s Problems come from Yesterday’s “Solutions” Senge – The Fifth Discipline
  • 4. Evolution of Public Health Data Security • 1994 – Principles and Practices of Public Health Surveillance – Ch 11 – “Computerizing PH Surv. Systems” • 2002 – PH Informatics and Information Systems – Chapters on legal framework, security, etc. • 2011 – Data Security and Confidentiality Guidelines For HIV, Viral Hepatitis, STD, and TB Programs
  • 5. Computerization of Public Health Data • 1980s – mainframes, stand-alone computers – Restricted access to mainframes – Security often achieved by locking in filing cabinets • 1990s – Wave of integration – Development of networks, widespread PC’s – Focus on improving function, access to data, deriving value – Katz report, IS Vision, Data Stewardship, etc. • 21st century – Dramatic increase in access, flexibility, ability of individuals to develop and implement information systems – Internet, web-based access, social media, etc.
  • 6. Approaches to Information System Development and Management • Central control and management very difficult – Rapid change, difficulty anticipating needs/future • Innovation and entrepreneurial approach • Centralization of IT services at DTS
  • 7. IT Security Today • Breaches and consequences – Financial • Since 2012, OCR penalties – BCBS Tennessee – 57 unencrypted drives – $1.5 million – Alaska DHHS – stolen USB from vehicle - $1.7 million – UDOH – medicaid breach - $? – Trust • Legislation, cHIE, CSD • not confined to responsible party
  • 8. IT Security Looking Forward • Greater central control is needed – There will be cost to flexibility, innovation, etc • Need to comply with complex and demanding regulations • Need to fundamentally improve IT practices so that security is part of development and not after thought • Cost of IT systems will increase
  • 9.
  • 10. Health Data Security Looking Forward Today’s Problems come from Yesterday’s “Solutions” Senge – The Fifth Discipline