SlideShare a Scribd company logo
1 of 15
Download to read offline
SAFEGUARDING PATIENT
PRIVACY IN A DIGITAL AGE
“A Health System’s Journey to Build
a Culture of Confidentiality”
Presented by
Meredith R. Phillips, CHC, CHPC, HCISPP, ITIL
Chief Information Privacy & Security Officer
Henry Ford Health System
§  Founded in 1915 and comprised of
–  Acute Care Facilities
–  Specialty Centers & Institutes
–  Research Program
–  Substance Abuse & Behavioral Health Facilities
–  Approx. 31,000 workforce members (FTEs, Contract, Researchers,
Vendors, etc.)
–  Medical Group & Physician Network
–  Health Plan
–  Home Health, Retail Pharmacy, Optical Care, Hospice, Occupational
Health Divisions
§  Malcolm Baldrige National Quality Award
2
THE HFHS LANDSCAPE
Privacy Security
IT Problem
Technology
Only
Non-
Regulatory
Focus
Necessary
Evil
Compliance
INDUSTRY PERSPECTIVE
Not so delicate balancing act
OUR CULTURE OF CONFIDENTIALITY
Technology
Process
People
Executive Leadership
& Board Commitment
IPSO MISSION
To establish a system-wide culture of
confidentiality through education, accessibility,
and a customer focus where privacy & security is
viewed as paramount in our daily operations.
HFHS MISSION
To improve people's lives through
excellence in the science and art of health
care and healing.
IPSO MISSION & VISION
5
IPSO VISION
Cultivating a collective mindset where
protecting privacy & security is a part of our
standard of care
HFHS VISION
Transforming lives and communities
through health and wellness - one person
at a time.
6
Information Privacy
Services
Privacy & Security Audit & Risk
Management Services
Network & Information
Security Services
Identity & Access
Management Services
Information Privacy & Security Office
Policy Development, Education, Access Controls Admin., Business Associate & Data Use
Agreement Mgmt., Patient Rights Mgmt., PCI Mgmt., Network/Workstation Security,
Penetration Testing, Firewalls, Breach Investigations, Incident Response, eDiscovery, Digital
Forensics, Data Loss Prevention, Change Mgmt., etc.
IPSO GOVERNANCE STRUCTURE
§  Any routine investigations and incidents that may result in a breach must be
forwarded to the IPSO for a Code A(ssessment) and potential Code
B(reach) Alert
§  Investigations are led by the IPSO in conjunction with operational
management, Human Resources, external agencies (i.e., local police, etc.)
§  All investigative documentation (i.e., notes, interview transcripts, audit logs,
etc.) are stored in a centralized repository to ensure the ability for metric
reporting and auditing
§  Corrective Action is always recommended by the IPSO in accordance with
the outcome of the investigation
–  Application of corrective action is consistent across business units and
employee types
§  Re-education required for the entire department within 30 days of
investigation closure not just the offender
CENTRALIZED INVESTIGATIVE PROCESS
7
8
IPSO COUNCILS & RESPONSE TEAMS
HFHS Privacy &
Security Council
•  The oversight
council that
approves System
policies and
procedures
related to privacy
& security
Code B
Alert Team
•  The rapid-
response
workgroup
established to
centrally respond
and manage all
System data
breaches
Office for Civil
Rights Response
Team
•  Reviews all OCR
data requests
related to privacy
& security
violations and
respond on behalf
of the System and/
or specific
business unit
§  Code A(ssessment) Alerts
–  Alerts issued by the Information Privacy & Security Office led by the
Chief Information Privacy & Security Officer
–  Communication limited to the Information Privacy & Security Office,
Public Relations Crisis Team, Corporate Legal Affairs, Risk Finance &
Insurance and Executive Leadership (i.e., CEO, CEO, etc.)
–  Alert provides a summary and initial analysis of potential data breach
–  Includes initial data analysis culminating in an official breach risk
assessment to determine if an actual breach has occurred
–  Once a “Breach” has been called, the Code B Alert (Rapid Response)
Team assembles to respond to the breach
CODE B ALERT PROGRAM
9
§  Code B(reach) Alerts
–  Issued and managed by the Information Privacy & Security Office for all
media reportable data breaches or data breaches with significant risk
–  Branded communication plan consistently utilized throughout the
system and managed corporately instead of at the business unit level
•  External: Includes the notification to the prominent media outlets,
required state agencies, Office for Civil Rights
•  Internal: Includes a copy of the patient/member notification letter,
FAQs about the breach and instructions for forwarding patient
inquiries to toll-free call center
–  Requires immediate attention by all System leadership and
should be shared with staff
–  All Code B Alerts are active for a 90 day period
CODE B ALERT PROGRAM
10
}  Phase I: Targeted portable storage devices
–  Required employees to visit one of 20 “IT staffed” stations to turn in all
personal flash drives for our approved IronKey solution; register any
portable hard drives or personal laptops for follow-up by IT
–  Employees could enter a drawing for an iPad 2 by completing a
crossword puzzle based on our privacy & security policies
–  Removed 5000 flash drives in 4 weeks
§  Phase II: Targeted “culture” through educational modules (97%)
§  Phase III: Focused on reducing our printer “unsecured” footprint
§  Phase IV: Targeted the culture again to reinforce HITECH/Omnibus (98%)
§  Phase V: BYOD & Mobile Device Management
§  Phase VI: Vendor Management Risk Program Implementation
§  Phase VII: Why iComply Video Series
11
THE iCOMPLY PROGRAM
12
HOW DO WE COMMUNICATE OUR STRATEGY?
Our Workforce
•  Morning Post Messages & System Emails – Scheduled to deliver key
privacy & security messages
•  Annual Mandatory Education – iComply & Job Specific
•  Privacy & Security refresher trainings conducted by the IPSO team
•  Manager’s Update – Monthly email to all leaders detailing key messages
Our Board Members
•  Quarterly privacy & security Board updates
•  Updates to the Trustee newsletter
Our Patients & Communities
•  “privateTALK” or “secureSPEAK” with the CIPSO – Scheduled chat
sessions where questions can be addressed in an online forum
•  Intranet Webpage, Internet Webpage & Social Media Sites
§  Investments into a state of the art electronic health record
§  Invested in a Governance, Risk & Compliance application to centralize the
management of enterprise risk including privacy & security
§  Strategies developed around virtualization, cloud computing & storage
§  Invested in Mobile Device Management software to secure devices
§  Developing strategies around medical device security
§  Developing strategies around secure texting (i.e., iComply Phase VII)
13
SUPPORTIVE TECHNOLOGY STRATEGIES
§  Incident reporting increases approximately 30% every year
§  Employees “Think Privacy & Security First”…when in doubt, they call the
IPSO…we are partners & not “necessary evils”!
§  Patients frequently access our webpage or their MyChart account to submit
questions about the privacy & security of their PHI
§  Department leadership frequently requests refresher training for their teams
in the absence of an incident
§  See technology as the enabler of our “culture of confidentiality” and not the
enforcer
14
HOW DID OUR CULTURE RESPOND?
15
QUESTIONS
Meredith R. Phillips, CHC, CHPC, HCISPP, ITIL
Chief Information Privacy & Security Officer
Henry Ford Health System
One Ford Place, Suite 2A10
Detroit, MI 48202
313-874-5168
mphilli2@hfhs.org

More Related Content

What's hot

Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management OverviewWesley Moore
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Lucien Pierce
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthPECB
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 

What's hot (20)

Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 

Viewers also liked

United nations mission in nepal
United nations mission in   nepalUnited nations mission in   nepal
United nations mission in nepalsudeepshrestha
 
MR Shane Krueger Federal Resume completed
MR Shane Krueger Federal Resume completedMR Shane Krueger Federal Resume completed
MR Shane Krueger Federal Resume completedShane Krueger
 
Presentación W-TRON 2016
Presentación W-TRON 2016Presentación W-TRON 2016
Presentación W-TRON 2016WTLABS1
 
Información Urbanística y Avance de la Revisión del Plan General de Ordenació...
Información Urbanística y Avance de la Revisión del Plan General de Ordenació...Información Urbanística y Avance de la Revisión del Plan General de Ordenació...
Información Urbanística y Avance de la Revisión del Plan General de Ordenació...Instituto Universitario de Urbanística
 
C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...
C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...
C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...Instituto Universitario de Urbanística
 
Transformative Partnerships in Digital Health - Innovation and the Evolving H...
Transformative Partnerships in Digital Health - Innovation and the Evolving H...Transformative Partnerships in Digital Health - Innovation and the Evolving H...
Transformative Partnerships in Digital Health - Innovation and the Evolving H...U.S. News Healthcare of Tomorrow
 
C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...
C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...
C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...Instituto Universitario de Urbanística
 
Derecho Tributario y su Ramificaciones
Derecho Tributario y su RamificacionesDerecho Tributario y su Ramificaciones
Derecho Tributario y su RamificacionesJunior Rodriguez
 

Viewers also liked (14)

Note aux autorites haitiennes
Note aux autorites haitiennesNote aux autorites haitiennes
Note aux autorites haitiennes
 
United nations mission in nepal
United nations mission in   nepalUnited nations mission in   nepal
United nations mission in nepal
 
greenwich and PMP (1)
greenwich and PMP (1)greenwich and PMP (1)
greenwich and PMP (1)
 
MR Shane Krueger Federal Resume completed
MR Shane Krueger Federal Resume completedMR Shane Krueger Federal Resume completed
MR Shane Krueger Federal Resume completed
 
ayo
ayoayo
ayo
 
Presentación W-TRON 2016
Presentación W-TRON 2016Presentación W-TRON 2016
Presentación W-TRON 2016
 
Dna&rna
Dna&rnaDna&rna
Dna&rna
 
Información Urbanística y Avance de la Revisión del Plan General de Ordenació...
Información Urbanística y Avance de la Revisión del Plan General de Ordenació...Información Urbanística y Avance de la Revisión del Plan General de Ordenació...
Información Urbanística y Avance de la Revisión del Plan General de Ordenació...
 
C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...
C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...
C-16-2_9. Del sistema de parques al green infrastructure - Juan Luis de las R...
 
Transformative Partnerships in Digital Health - Innovation and the Evolving H...
Transformative Partnerships in Digital Health - Innovation and the Evolving H...Transformative Partnerships in Digital Health - Innovation and the Evolving H...
Transformative Partnerships in Digital Health - Innovation and the Evolving H...
 
C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...
C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...
C-16-1_6. Nouvelles approches du patrimoine en histoire urbaine - Loïc Vadelo...
 
Criminalistica
CriminalisticaCriminalistica
Criminalistica
 
Derecho Tributario y su Ramificaciones
Derecho Tributario y su RamificacionesDerecho Tributario y su Ramificaciones
Derecho Tributario y su Ramificaciones
 
Extrait et signification a l'apn
Extrait et signification a l'apnExtrait et signification a l'apn
Extrait et signification a l'apn
 

Similar to Building a Culture of Confidentiality: Henry Ford Health System's Journey to Safeguard Patient Privacy

Privacy and Security: Teamwork Required to Tackle Incident Response
Privacy and Security: Teamwork Required to Tackle Incident ResponsePrivacy and Security: Teamwork Required to Tackle Incident Response
Privacy and Security: Teamwork Required to Tackle Incident ResponseID Experts
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012mrpchcchpc
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...Health IT Conference – iHT2
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 

Similar to Building a Culture of Confidentiality: Henry Ford Health System's Journey to Safeguard Patient Privacy (20)

Privacy and Security: Teamwork Required to Tackle Incident Response
Privacy and Security: Teamwork Required to Tackle Incident ResponsePrivacy and Security: Teamwork Required to Tackle Incident Response
Privacy and Security: Teamwork Required to Tackle Incident Response
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Information security
Information securityInformation security
Information security
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 

More from U.S. News Healthcare of Tomorrow

Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...
Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...
Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...U.S. News Healthcare of Tomorrow
 
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...U.S. News Healthcare of Tomorrow
 
A Population Health Imperative: Tackling Childhood Obesity (All Slides)
A Population Health Imperative: Tackling Childhood Obesity (All Slides)A Population Health Imperative: Tackling Childhood Obesity (All Slides)
A Population Health Imperative: Tackling Childhood Obesity (All Slides)U.S. News Healthcare of Tomorrow
 
The Pediatric Partnership Playbook: Getting the most out of strategic collabo...
The Pediatric Partnership Playbook: Getting the most out of strategic collabo...The Pediatric Partnership Playbook: Getting the most out of strategic collabo...
The Pediatric Partnership Playbook: Getting the most out of strategic collabo...U.S. News Healthcare of Tomorrow
 
The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)
The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)
The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)U.S. News Healthcare of Tomorrow
 
Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...
Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...
Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...U.S. News Healthcare of Tomorrow
 
Healthcare Community Change Agents: Addressing the Social Determinants of Hea...
Healthcare Community Change Agents: Addressing the Social Determinants of Hea...Healthcare Community Change Agents: Addressing the Social Determinants of Hea...
Healthcare Community Change Agents: Addressing the Social Determinants of Hea...U.S. News Healthcare of Tomorrow
 
Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)
Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)
Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)U.S. News Healthcare of Tomorrow
 
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...U.S. News Healthcare of Tomorrow
 
Enhancing the Patient Experience: Design Strategies That Work (All Slides)
Enhancing the Patient Experience: Design Strategies That Work (All Slides)Enhancing the Patient Experience: Design Strategies That Work (All Slides)
Enhancing the Patient Experience: Design Strategies That Work (All Slides)U.S. News Healthcare of Tomorrow
 
Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)
Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)
Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)U.S. News Healthcare of Tomorrow
 
A Population Health Imperative: Tackling Childhood Obesity (All slides)
A Population Health Imperative: Tackling Childhood Obesity (All slides)A Population Health Imperative: Tackling Childhood Obesity (All slides)
A Population Health Imperative: Tackling Childhood Obesity (All slides)U.S. News Healthcare of Tomorrow
 
Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)
Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)
Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)U.S. News Healthcare of Tomorrow
 
How Children’s Hospitals Are Shifting Toward Value and Population Health (All...
How Children’s Hospitals Are Shifting Toward Value and Population Health (All...How Children’s Hospitals Are Shifting Toward Value and Population Health (All...
How Children’s Hospitals Are Shifting Toward Value and Population Health (All...U.S. News Healthcare of Tomorrow
 
Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...
Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...
Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...U.S. News Healthcare of Tomorrow
 

More from U.S. News Healthcare of Tomorrow (20)

Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...
Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...
Using Hospital Data Insights to Improve Clinical Quality at UCLA Medical Cent...
 
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
 
A Population Health Imperative: Tackling Childhood Obesity (All Slides)
A Population Health Imperative: Tackling Childhood Obesity (All Slides)A Population Health Imperative: Tackling Childhood Obesity (All Slides)
A Population Health Imperative: Tackling Childhood Obesity (All Slides)
 
The Pediatric Partnership Playbook: Getting the most out of strategic collabo...
The Pediatric Partnership Playbook: Getting the most out of strategic collabo...The Pediatric Partnership Playbook: Getting the most out of strategic collabo...
The Pediatric Partnership Playbook: Getting the most out of strategic collabo...
 
The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)
The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)
The Difficult Journey to Value: A Roadmap for Success (Ari Robicsek)
 
Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...
Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...
Focus on Post Acute Care: Lower Costs, Fewer Readmissions, Happier Patients (...
 
Healthcare Community Change Agents: Addressing the Social Determinants of Hea...
Healthcare Community Change Agents: Addressing the Social Determinants of Hea...Healthcare Community Change Agents: Addressing the Social Determinants of Hea...
Healthcare Community Change Agents: Addressing the Social Determinants of Hea...
 
Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)
Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)
Enhancing the Patient Experience: Design Strategies That Work (Laura Forese)
 
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
How Children’s Hospitals Can Make an Impact on the Social Determinants of Hea...
 
Inside U.S. News Best Hospitals Rankings (Ben Harder)
Inside U.S. News Best Hospitals Rankings (Ben Harder)Inside U.S. News Best Hospitals Rankings (Ben Harder)
Inside U.S. News Best Hospitals Rankings (Ben Harder)
 
Enhancing the Patient Experience: Design Strategies That Work (All Slides)
Enhancing the Patient Experience: Design Strategies That Work (All Slides)Enhancing the Patient Experience: Design Strategies That Work (All Slides)
Enhancing the Patient Experience: Design Strategies That Work (All Slides)
 
Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)
Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)
Creating a New Hospital Ranking: Can Health Equity be Measured? (All Slides)
 
A Population Health Imperative: Tackling Childhood Obesity (All slides)
A Population Health Imperative: Tackling Childhood Obesity (All slides)A Population Health Imperative: Tackling Childhood Obesity (All slides)
A Population Health Imperative: Tackling Childhood Obesity (All slides)
 
Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)
Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)
Global Child Health at the Tipping point: Lessons from the Field (Mark Kline)
 
How Children’s Hospitals Are Shifting Toward Value and Population Health (All...
How Children’s Hospitals Are Shifting Toward Value and Population Health (All...How Children’s Hospitals Are Shifting Toward Value and Population Health (All...
How Children’s Hospitals Are Shifting Toward Value and Population Health (All...
 
Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...
Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...
Smart Master Planning: How Health Systems Can Be Ready for the Uncertainties ...
 
The Telemedicine Revolution (Deanna Larson)
The Telemedicine Revolution (Deanna Larson)The Telemedicine Revolution (Deanna Larson)
The Telemedicine Revolution (Deanna Larson)
 
The Power of Precision Medicine (Lynn Dressler)
The Power of Precision Medicine (Lynn Dressler)The Power of Precision Medicine (Lynn Dressler)
The Power of Precision Medicine (Lynn Dressler)
 
The Power of Precision Medicine (Robert Vonderheide)
The Power of Precision Medicine (Robert Vonderheide)The Power of Precision Medicine (Robert Vonderheide)
The Power of Precision Medicine (Robert Vonderheide)
 
The Power of Precision Medicine (Jonathan Keats)
The Power of Precision Medicine (Jonathan Keats)The Power of Precision Medicine (Jonathan Keats)
The Power of Precision Medicine (Jonathan Keats)
 

Recently uploaded

Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.ANJALI
 
Presentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptx
Presentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptxPresentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptx
Presentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptxpdamico1
 
Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...
Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...
Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...Badalona Serveis Assistencials
 
PULMONARY EDEMA AND ITS MANAGEMENT.pdf
PULMONARY EDEMA AND  ITS  MANAGEMENT.pdfPULMONARY EDEMA AND  ITS  MANAGEMENT.pdf
PULMONARY EDEMA AND ITS MANAGEMENT.pdfDolisha Warbi
 
Presentation on General Anesthetics pdf.
Presentation on General Anesthetics pdf.Presentation on General Anesthetics pdf.
Presentation on General Anesthetics pdf.Prerana Jadhav
 
Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...
Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...
Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...MehranMouzam
 
Nutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience ClassNutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience Classmanuelazg2001
 
Plant Fibres used as Surgical Dressings PDF.pdf
Plant Fibres used as Surgical Dressings PDF.pdfPlant Fibres used as Surgical Dressings PDF.pdf
Plant Fibres used as Surgical Dressings PDF.pdfDivya Kanojiya
 
Basic principles involved in the traditional systems of medicine PDF.pdf
Basic principles involved in the traditional systems of medicine PDF.pdfBasic principles involved in the traditional systems of medicine PDF.pdf
Basic principles involved in the traditional systems of medicine PDF.pdfDivya Kanojiya
 
Giftedness: Understanding Everyday Neurobiology for Self-Knowledge
Giftedness: Understanding Everyday Neurobiology for Self-KnowledgeGiftedness: Understanding Everyday Neurobiology for Self-Knowledge
Giftedness: Understanding Everyday Neurobiology for Self-Knowledgeassessoriafabianodea
 
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptx
COVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptxCOVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptx
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptxBibekananda shah
 
L1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptx
L1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptxL1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptx
L1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptxDr Bilal Natiq
 
Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!ibtesaam huma
 
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners
 
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara RajendranMusic Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara RajendranTara Rajendran
 
CEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand University
CEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand UniversityCEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand University
CEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand UniversityHarshChauhan475104
 
Measurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptxMeasurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptxDr. Dheeraj Kumar
 
Culture and Health Disorders Social change.pptx
Culture and Health Disorders Social change.pptxCulture and Health Disorders Social change.pptx
Culture and Health Disorders Social change.pptxDr. Dheeraj Kumar
 
ANEMIA IN PREGNANCY by Dr. Akebom Kidanemariam
ANEMIA IN PREGNANCY by Dr. Akebom KidanemariamANEMIA IN PREGNANCY by Dr. Akebom Kidanemariam
ANEMIA IN PREGNANCY by Dr. Akebom KidanemariamAkebom Gebremichael
 
Introduction to Sports Injuries by- Dr. Anjali Rai
Introduction to Sports Injuries by- Dr. Anjali RaiIntroduction to Sports Injuries by- Dr. Anjali Rai
Introduction to Sports Injuries by- Dr. Anjali RaiGoogle
 

Recently uploaded (20)

Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.
 
Presentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptx
Presentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptxPresentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptx
Presentation for Bella Mahl 2024-03-28-24-MW-Overview-Bella.pptx
 
Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...
Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...
Presentació "Real-Life VR Integration for Mild Cognitive Impairment Rehabilit...
 
PULMONARY EDEMA AND ITS MANAGEMENT.pdf
PULMONARY EDEMA AND  ITS  MANAGEMENT.pdfPULMONARY EDEMA AND  ITS  MANAGEMENT.pdf
PULMONARY EDEMA AND ITS MANAGEMENT.pdf
 
Presentation on General Anesthetics pdf.
Presentation on General Anesthetics pdf.Presentation on General Anesthetics pdf.
Presentation on General Anesthetics pdf.
 
Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...
Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...
Study on the Impact of FOCUS-PDCA Management Model on the Disinfection Qualit...
 
Nutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience ClassNutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience Class
 
Plant Fibres used as Surgical Dressings PDF.pdf
Plant Fibres used as Surgical Dressings PDF.pdfPlant Fibres used as Surgical Dressings PDF.pdf
Plant Fibres used as Surgical Dressings PDF.pdf
 
Basic principles involved in the traditional systems of medicine PDF.pdf
Basic principles involved in the traditional systems of medicine PDF.pdfBasic principles involved in the traditional systems of medicine PDF.pdf
Basic principles involved in the traditional systems of medicine PDF.pdf
 
Giftedness: Understanding Everyday Neurobiology for Self-Knowledge
Giftedness: Understanding Everyday Neurobiology for Self-KnowledgeGiftedness: Understanding Everyday Neurobiology for Self-Knowledge
Giftedness: Understanding Everyday Neurobiology for Self-Knowledge
 
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptx
COVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptxCOVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptx
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptx
 
L1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptx
L1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptxL1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptx
L1.INTRODUCTION to ENDOCRINOLOGY MEDICINE.pptx
 
Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!
 
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
 
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara RajendranMusic Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
 
CEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand University
CEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand UniversityCEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand University
CEHPALOSPORINS.pptx By Harshvardhan Dev Bhoomi Uttarakhand University
 
Measurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptxMeasurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptx
 
Culture and Health Disorders Social change.pptx
Culture and Health Disorders Social change.pptxCulture and Health Disorders Social change.pptx
Culture and Health Disorders Social change.pptx
 
ANEMIA IN PREGNANCY by Dr. Akebom Kidanemariam
ANEMIA IN PREGNANCY by Dr. Akebom KidanemariamANEMIA IN PREGNANCY by Dr. Akebom Kidanemariam
ANEMIA IN PREGNANCY by Dr. Akebom Kidanemariam
 
Introduction to Sports Injuries by- Dr. Anjali Rai
Introduction to Sports Injuries by- Dr. Anjali RaiIntroduction to Sports Injuries by- Dr. Anjali Rai
Introduction to Sports Injuries by- Dr. Anjali Rai
 

Building a Culture of Confidentiality: Henry Ford Health System's Journey to Safeguard Patient Privacy

  • 1. SAFEGUARDING PATIENT PRIVACY IN A DIGITAL AGE “A Health System’s Journey to Build a Culture of Confidentiality” Presented by Meredith R. Phillips, CHC, CHPC, HCISPP, ITIL Chief Information Privacy & Security Officer Henry Ford Health System
  • 2. §  Founded in 1915 and comprised of –  Acute Care Facilities –  Specialty Centers & Institutes –  Research Program –  Substance Abuse & Behavioral Health Facilities –  Approx. 31,000 workforce members (FTEs, Contract, Researchers, Vendors, etc.) –  Medical Group & Physician Network –  Health Plan –  Home Health, Retail Pharmacy, Optical Care, Hospice, Occupational Health Divisions §  Malcolm Baldrige National Quality Award 2 THE HFHS LANDSCAPE
  • 4. OUR CULTURE OF CONFIDENTIALITY Technology Process People Executive Leadership & Board Commitment
  • 5. IPSO MISSION To establish a system-wide culture of confidentiality through education, accessibility, and a customer focus where privacy & security is viewed as paramount in our daily operations. HFHS MISSION To improve people's lives through excellence in the science and art of health care and healing. IPSO MISSION & VISION 5 IPSO VISION Cultivating a collective mindset where protecting privacy & security is a part of our standard of care HFHS VISION Transforming lives and communities through health and wellness - one person at a time.
  • 6. 6 Information Privacy Services Privacy & Security Audit & Risk Management Services Network & Information Security Services Identity & Access Management Services Information Privacy & Security Office Policy Development, Education, Access Controls Admin., Business Associate & Data Use Agreement Mgmt., Patient Rights Mgmt., PCI Mgmt., Network/Workstation Security, Penetration Testing, Firewalls, Breach Investigations, Incident Response, eDiscovery, Digital Forensics, Data Loss Prevention, Change Mgmt., etc. IPSO GOVERNANCE STRUCTURE
  • 7. §  Any routine investigations and incidents that may result in a breach must be forwarded to the IPSO for a Code A(ssessment) and potential Code B(reach) Alert §  Investigations are led by the IPSO in conjunction with operational management, Human Resources, external agencies (i.e., local police, etc.) §  All investigative documentation (i.e., notes, interview transcripts, audit logs, etc.) are stored in a centralized repository to ensure the ability for metric reporting and auditing §  Corrective Action is always recommended by the IPSO in accordance with the outcome of the investigation –  Application of corrective action is consistent across business units and employee types §  Re-education required for the entire department within 30 days of investigation closure not just the offender CENTRALIZED INVESTIGATIVE PROCESS 7
  • 8. 8 IPSO COUNCILS & RESPONSE TEAMS HFHS Privacy & Security Council •  The oversight council that approves System policies and procedures related to privacy & security Code B Alert Team •  The rapid- response workgroup established to centrally respond and manage all System data breaches Office for Civil Rights Response Team •  Reviews all OCR data requests related to privacy & security violations and respond on behalf of the System and/ or specific business unit
  • 9. §  Code A(ssessment) Alerts –  Alerts issued by the Information Privacy & Security Office led by the Chief Information Privacy & Security Officer –  Communication limited to the Information Privacy & Security Office, Public Relations Crisis Team, Corporate Legal Affairs, Risk Finance & Insurance and Executive Leadership (i.e., CEO, CEO, etc.) –  Alert provides a summary and initial analysis of potential data breach –  Includes initial data analysis culminating in an official breach risk assessment to determine if an actual breach has occurred –  Once a “Breach” has been called, the Code B Alert (Rapid Response) Team assembles to respond to the breach CODE B ALERT PROGRAM 9
  • 10. §  Code B(reach) Alerts –  Issued and managed by the Information Privacy & Security Office for all media reportable data breaches or data breaches with significant risk –  Branded communication plan consistently utilized throughout the system and managed corporately instead of at the business unit level •  External: Includes the notification to the prominent media outlets, required state agencies, Office for Civil Rights •  Internal: Includes a copy of the patient/member notification letter, FAQs about the breach and instructions for forwarding patient inquiries to toll-free call center –  Requires immediate attention by all System leadership and should be shared with staff –  All Code B Alerts are active for a 90 day period CODE B ALERT PROGRAM 10
  • 11. }  Phase I: Targeted portable storage devices –  Required employees to visit one of 20 “IT staffed” stations to turn in all personal flash drives for our approved IronKey solution; register any portable hard drives or personal laptops for follow-up by IT –  Employees could enter a drawing for an iPad 2 by completing a crossword puzzle based on our privacy & security policies –  Removed 5000 flash drives in 4 weeks §  Phase II: Targeted “culture” through educational modules (97%) §  Phase III: Focused on reducing our printer “unsecured” footprint §  Phase IV: Targeted the culture again to reinforce HITECH/Omnibus (98%) §  Phase V: BYOD & Mobile Device Management §  Phase VI: Vendor Management Risk Program Implementation §  Phase VII: Why iComply Video Series 11 THE iCOMPLY PROGRAM
  • 12. 12 HOW DO WE COMMUNICATE OUR STRATEGY? Our Workforce •  Morning Post Messages & System Emails – Scheduled to deliver key privacy & security messages •  Annual Mandatory Education – iComply & Job Specific •  Privacy & Security refresher trainings conducted by the IPSO team •  Manager’s Update – Monthly email to all leaders detailing key messages Our Board Members •  Quarterly privacy & security Board updates •  Updates to the Trustee newsletter Our Patients & Communities •  “privateTALK” or “secureSPEAK” with the CIPSO – Scheduled chat sessions where questions can be addressed in an online forum •  Intranet Webpage, Internet Webpage & Social Media Sites
  • 13. §  Investments into a state of the art electronic health record §  Invested in a Governance, Risk & Compliance application to centralize the management of enterprise risk including privacy & security §  Strategies developed around virtualization, cloud computing & storage §  Invested in Mobile Device Management software to secure devices §  Developing strategies around medical device security §  Developing strategies around secure texting (i.e., iComply Phase VII) 13 SUPPORTIVE TECHNOLOGY STRATEGIES
  • 14. §  Incident reporting increases approximately 30% every year §  Employees “Think Privacy & Security First”…when in doubt, they call the IPSO…we are partners & not “necessary evils”! §  Patients frequently access our webpage or their MyChart account to submit questions about the privacy & security of their PHI §  Department leadership frequently requests refresher training for their teams in the absence of an incident §  See technology as the enabler of our “culture of confidentiality” and not the enforcer 14 HOW DID OUR CULTURE RESPOND?
  • 15. 15 QUESTIONS Meredith R. Phillips, CHC, CHPC, HCISPP, ITIL Chief Information Privacy & Security Officer Henry Ford Health System One Ford Place, Suite 2A10 Detroit, MI 48202 313-874-5168 mphilli2@hfhs.org