SlideShare a Scribd company logo
The Four Balancing Acts
Involved with Healthcare
Data Security Frameworks
̶̶ Patrick Nelli
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Balancing Healthcare Data Security
Balance is a timely topic.
The data and analytics sector of
healthcare has an obligation to patients
to make the best use of data collected
on their behalf.
HIPAA is typically considered a security
and privacy regulation, but it also refers
to the need for easy access to data to
improve healthcare quality.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Balancing Healthcare Data Security
Those who are responsible for developing healthcare data security
frameworks in data warehousing should focus on the interplay, or the
balance, between data utilization and data security and privacy.
Four areas affect this balance and are worth discussing:
1. Monitoring
2. Data de-identification
3. Cloud environments
4. User access
Figure 1: Healthcare has an obligation to patients to make
the best use of the data collected on their behalf.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Balancing Healthcare Data Security
Figure 1 shows this balance as a seesaw,
which is often the perceived relationship
between data utilization and security; but
it’s not always a zero-sum game.
It’s not necessarily true that more data
utilization results in less security and
privacy, or vice versa. Some processes
help with both; some hurt both.
Think of a rising tide that lifts all boats or
an ebb tide that leaves them high and dry.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Balancing Healthcare Data Security
Balancing utilization and security is top-
of-mind for CIOs, who, in 2016, are
investing heavily in business:
• Data and business analytics – 27%
• Security – 29%
• Cloud computing – 30%
Quite often, IT and security have a
different focus from other groups in the
organization in terms of data security.
Picture a stronghold, surrounded by a
moat, surrounded by a barbwire fence.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Balancing Healthcare Data Security
Security and privacy consists of multiple
layers that include physical, preventive,
detective, and administrative controls.
The Health Information Trust Alliance
(HITRUST) uses 14 other control
categories based on ISO 27001.
Preventive controls address the
critical issues of ransomware and
email phishing.
There are a lot of materials available
about these controls.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
The first area that affects the balance
between security/privacy and data
utilization is monitoring:
According to the 2016 Data Breach
Investigations Report:
A security event that
compromises the
integrity, confidentiality,
or availability of an
information asset.
INCIDENT
An incident that
results in the
confirmed disclosure
(not just potential
exposure) of data to
unauthorized party.
BREACH
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
Healthcare data is particularly private and sensitive. Individuals accessing
information for the wrong reasons is more prevalent in healthcare.
Privilege Misuse
Misc. Errors
Stolen Assets
Point of Sale
Web Apps
Crimeware
Cyberespionage
Everything Else
0% 5% 10% 15% 20% 25% 30% 35%
32%
22%
19%
7%
3%
3%
3%
11%
** Higher
Than Any
Other
Industry
Figure 2: Security incident patterns in healthcare (percent of total incidents, only confirmed data breaches).
Source: Verizon 2016 Data Breaches Investigations Report
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
Only 60 percent of acute care providers audit the logs of each access to
patient health and financial records. (2016 HIMSS Cybersecurity Survey)
Figure 3: Tools implemented by acute care providers for information security. Source: 2016 HIMSS Cybersecurity Survey
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Antivirus/malware
Firewalls
Data encryption (data in transit
Data encryption (data at rest)
Patch and vulnerability management
Audit logs of access to pt. records
Intrusion Detection Systems (IDS)
Network monitoring tools
85%
78%
68%
61%
61%
60%
57%
55%
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
Logging is simply writing event data, such
as someone accessing a record or logging
into a machine.
But logging is simply “checking the box” in
an audit, which is a minimal level of security.
What’s needed is monitoring, putting tools,
such as search or BI capabilities, on top of
those logs.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
Relevant metrics being measured regularly,
can be plugged into incident resolution tools
such as WebHooks, PagerDuty, or Azure OMS,
that simplify metrics tracking and require less
human review time.
Different layers of the analytics stacks include
everything from who is logging into the network
at the lowest level, to who’s logging into VMs,
to what’s their performance and whether they
have anti-malware at the VM or hardware level.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
Figure 4: Monitoring within five layers of the analytics stack
Stack Examples Example Metrics Benefits
Analytical Applications/
Reports
Web-based, Qlik,
Tableau, BO
Usage, click paths,
performance
Analytic Environments Specialty focused
environments for
Predictive Analytics,
NLP, Image Analysis
Performance, run times,
model metrics
(rmse accuracy)
Database / Data Store
/ ETL / Compute
SQL Server, Oracle,
Data Lake
Queries, Access (AD),
ETL run times
VMS Hardware OS (Windows/Linux),
Visualization (HyperV,
VMWare)
Event logs (installs,
invalid logins, failed
apps), performance logs
Network Switches, Firewalls,
Routers
Invalid logins,
suspicious login
patterns (IP-analysis)
Security/Privacy
Performance/Efficiencies
Product
Development
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #1: Monitoring
There are three kinds benefits when putting
monitoring in place on top of data that’s
relevant at the analytics layer of the stack:
1. Enhanced security and privacy
2. Improved performance and efficiencies
3. Improved product development
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #1: Security and Privacy
When going through HITRUST certification or
another type of audit, there are levels of
assessments related to measuring and managing.
Specifically, HITRUST has five levels when
assessing a particular control:
Policy
Process Procedures
Implemented
Measures
Managed
>
>
>
>
>
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #1: Security and Privacy
By putting monitoring in place across these
different segments, an organization
automatically performs the measuring piece.
By reviewing the monitoring data and putting
alerts in place, the organization performs
the management piece for specific controls
depending on what’s being logged.
This helps to achieve the high levels from an
audit perspective.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #1: Security and Privacy
SOC 2 and HITRUST have certain windows of
opportunity for when the recertification or audit
is valid, typically a year or two depending on
the type being sought.
The next year, the process must start over.
There are also interim assessments at six
months or annually.
Of healthcare systems auditing their EDW
and analytic environments, auditing data
access and data use is their top issue.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #1: Security and Privacy
What are some best practices relevant to
addressing appropriate use and access?
Appropriate use:
1: Log data at database level to see who is
making what query, at what time, and
from what table.
2: Setup dashboard to easily view the data
that can filtered on user or patient using
SSN or other identifiable field.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #1: Security and Privacy
Figure 5: Monitoring dashboard shows user access by field name.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #1: Security and Privacy
There are three best practices for automating
user access review:
Query the Lightweight Directory Access
Protocol (e.g., Active Directory) and review
who is in which access groups.
Query database access (SQL Server) or
application access (Qlik, Tableau, Web) to
see which access groups have access to
which databases, tables, or applications.
Query SQL queries (IDERA) and application
usage (Qlik, Tableau, Web)
>
>
>
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #2: Performance and Efficiency
ETL processes are logged and monitored
to see how often they succeed or fail and
how long they take.
Oftentimes, there will be a spike over a few
days in the number of failures associated
with an ETL process.
That could mean it’s time for a data
architect to review those specific SQL
queries and test the connections to
determine what’s wrong.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #2: Performance and Efficiency
When the average run time shows
a sustained increase, it’s time for
questions to be asked.
Are ETL jobs being scheduled at
the same time?
Do they need to be staggered?
Are SQL queries non-optimized
within the ETL jobs?
Do they need to be altered?
Figure 6: The ETL log shows spikes in run times and
anomalies with failed processes
>
>
>
>
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #3: Product Development
Eric Ries, in his principles of The Lean
Startup, describes a process that can be
applied to product development.
Building a product doesn’t end once code
is ready to ship. It’s a full cycle that starts
with an idea or hypothesis. The idea gets
coded, built, and shared with users.
Most importantly, it is specifically
measured and the idea or hypothesis is
reassessed based on the learnings from
those measurements.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #3: Product Development
An example of this type of monitoring comes from Uber, which runs
surveys and A/B testing.
Figure 7: Uber requires riders to rate their drivers and the company before booking their next trip.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #3: Product Development
A few years ago, a team at Health
Catalyst was building a new advanced
analytics application.
Figure 8 shows the number of user
sessions during testing, with a small
spike as the app rolled out to a larger
test group.
The average usage was expected to
remain high. But the number of sessions
quickly returned to almost zero.
Figure 8: Weekly session counts during
application development.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #3: Product Development
The team dove in to understand the
hypothesis and why they got it wrong.
The amount of time users spent in the
app was heavily weighted toward the
Performance sheet, however the
development team anticipated higher
weighting toward the Provider sheet.
The monitoring dashboard (figure 9)
showed user session details, pointing
us to the problem and then to further
iterate the product.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Benefit of Monitoring #3: Product Development
Figure 9: Testers spent their time on the Performance sheet, but developers spent their time perfecting the Provider sheet.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #2: Data De-Identification
Data de-identification is actually a
negative balance (recall the “ebb tide”) on
both data utilization and security/privacy.
There are two ways to de-identify a
dataset to satisfy HIPAA requirements.
1. Safe Harbor Method
2. Expert Determined Method
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #2: Data De-Identification
SAFE HARBOR METHOD
HIPAA defines 18 elements that must be
removed or transformed from data before it is
considered de-identified.
This means removing anything more detailed
than the year (month/day/hour/minute).
When it comes to healthcare analytics and
clinical quality improvement, date elements
are particularly important for understanding
the sequence of episodes of care and
the timing between them.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #2: Data De-Identification
SAFE HARBOR METHOD
Geographic details* more granular than the
state where care was provided must be
removed. This makes it difficult to develop
network optimizations or referral patterns.
Furthermore, HIPAA requires that the data user
not be able to use a dataset by itself or in
combination with any other dataset to re-
identify an individual. This means removing
any rare ICD-10 codes and procedures that
could be used to isolate an individual.
*Exception: Zip code data contains more than 20,000 individuals
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #2: Data De-Identification
The Data Continuum
Security and utilization experts work in three
categories of healthcare data:
1. Full Protected Health Information (PHI)
2. Redacted Data (still PHI)
3. HIPAA De-Identified Datasets
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #2: Data De-Identification
Figure 10 Privacy and security risk of data in the three categories of healthcare data.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #3: Cloud Environments
Most of the analytic stack will eventually
move to the cloud.
In healthcare, this may take a while, but
the first pressure that we are experiencing
is for specific analytic use cases, such as
performing predictive analytics on a larger
dataset, Natural Language Processing
(NLP), and image recognition.
The cloud can help with both data utilization
and security/privacy.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #3: Cloud Environments
The major cloud vendors (Amazon,
Google, Microsoft Azure) perform ISO and
SOC II audits and they will sign HIPAA
Business Associate Agreements (BAAs),
which allows healthcare organizations to
fully leverage their audits.
Figure 11 shows the responsibilities
between the healthcare organization and
the cloud provider over three variations of
hosted services.
Figure 11: Customer and cloud provider shared
responsibilities for security controls.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #3: Cloud Environments
Regardless of the structure, there is a lot
of blue in this diagram, aka, cloud
customer responsibility.
This means still following security best
practices when moving to the cloud –
putting in firewalls, installing anti-
malware, installing intrusion prevention,
and monitoring is crucial.
The cloud has tools to scan the environ-
ment, see what security is in place and
make change recommendations. Figure 11: Customer and cloud provider shared
responsibilities for security controls.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #4: User Access
The final point for creating balance between data
utilization and security/privacy is user access.
We don’t have a good answer for addressing
this issue, but it’s something the industry
should be considering for improvement.
There are two areas to emphasize:
1. Streamline the permission-granting process
2. Role-based security
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #4: User Access
Streamline the permission-granting process
One audit issue that comes up in conversations
with healthcare systems across the U.S. is not
that the process isn’t secure when granting users
permission to data, but that it takes too long.
So users are bypassing best practices.
Taking too long to grant access is bad from both
a data utilization and security perspective.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #4: User Access
Streamline the permission-granting process
One way to alleviate this problem is to make
certain default applications available to everyone
within certain security groups, especially if those
applications don’t have patient level data.
When thinking about granting access to a
dataset, like HR or clinical data, involve data
stewards, someone who best knows that dataset.
They will often have a good sense of who
should be granted access and how the
data will be used.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Detective Controls Within the Security Framework
Balancing Act #4: User Access
Role-based security
Simplify this as much as possible.
Complicating it results in mistakes
because it becomes too challenging to
match individuals to security groups.
It’s generally better practice to simplify and
give fewer people access to data than it is
to overcomplicate and make the IT mistake
of putting people in the wrong buckets.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Joining the Pieces of the Security Framework
Data is useless unless it gets in the hands
of analysts, operators, and clinicians.
But healthcare organizations need to
strike the balance between security,
privacy and data exposure.
When monitoring, logging must be
integrated into a search and BI tool for
manual review.
While this will take longer, it will lead to
multiple benefits in security/privacy,
performance efficiencies, and better
product development.
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
For more information:
“This book is a fantastic piece of work”
– Robert Lindeman MD, FAAP, Chief Physician Quality Officer
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
More about this topic
Link to original article for a more in-depth discussion.
The Four Balancing Acts Involved with Healthcare Data Security Frameworks
PHI Security and Auditing: Reducing Risk and Ensuring Compliance with a Data Warehouse
Nate Arnold, Solutions Architect, VP
7 Essential Practices for Data Governance in Healthcare
Dale Sanders, Executive VP of Software
How Health Catalyst Ensures HIPAA Security Compliance: 2 Key Components
Clara Pugsley, Corporate Development, VP; Bob White, Director of Security & Compliance
5 Reasons Healthcare Data Is Unique and Difficult to Measure
Dan LeSueur, Technical Operations, VP
Healthcare Data Stewardship: The Key to Going from Information Poor to Information Rich
Eric Just, Technology, VP
Download
PDF
© 2016 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Other Clinical Quality Improvement Resources
Click to read additional information at www.healthcatalyst.com
Patrick Nelli joined Health Catalyst in August 2013. Prior to coming to Health Catalyst, he
was an Associate in the healthcare group at GTCR, a Chicago-based private equity firm,
and an Analyst in the healthcare group at McColl Partners, a boutique investment bank.
He has a degree in Physics with a Concentration in Biophysics and Biochemistry from
Wake Forest University.

More Related Content

What's hot

6 Essential Data Analyst Skills for Your Healthcare Organization
6 Essential Data Analyst Skills for Your Healthcare Organization6 Essential Data Analyst Skills for Your Healthcare Organization
6 Essential Data Analyst Skills for Your Healthcare OrganizationHealth Catalyst
 
Exploring How to Use Hadoop in your Healthcare Big Data Strategy
Exploring How to Use Hadoop in your Healthcare Big Data StrategyExploring How to Use Hadoop in your Healthcare Big Data Strategy
Exploring How to Use Hadoop in your Healthcare Big Data StrategyHealth Catalyst
 
Three Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in HealthcareThree Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in HealthcareHealth Catalyst
 
Why Most Analytic Applications Will Never Be Able to Significantly Improve He...
Why Most Analytic Applications Will Never Be Able to Significantly Improve He...Why Most Analytic Applications Will Never Be Able to Significantly Improve He...
Why Most Analytic Applications Will Never Be Able to Significantly Improve He...Health Catalyst
 
Landmark Review of Population Health Management
Landmark Review of Population Health ManagementLandmark Review of Population Health Management
Landmark Review of Population Health ManagementHealth Catalyst
 
Top 7 Financial Healthcare Trends and Challenges for 2016
Top 7 Financial Healthcare Trends and Challenges for 2016Top 7 Financial Healthcare Trends and Challenges for 2016
Top 7 Financial Healthcare Trends and Challenges for 2016Health Catalyst
 
Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...
Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...
Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...Health Catalyst
 
Why Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinWhy Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinHealth Catalyst
 
Data Driven Healthcare That Work: A Physician Group Perspective
Data Driven Healthcare That Work:  A Physician Group PerspectiveData Driven Healthcare That Work:  A Physician Group Perspective
Data Driven Healthcare That Work: A Physician Group PerspectiveHealth Catalyst
 
Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...
Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...
Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...Health Catalyst
 
How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...
How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...
How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...Health Catalyst
 
Patient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare OutcomesPatient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare OutcomesHealth Catalyst
 
Deliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for SuccessDeliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for SuccessHealth Catalyst
 
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to MeasureHealth Catalyst
 
Four Population Health Management Strategies that Help Organizations Improve ...
Four Population Health Management Strategies that Help Organizations Improve ...Four Population Health Management Strategies that Help Organizations Improve ...
Four Population Health Management Strategies that Help Organizations Improve ...Health Catalyst
 
Linking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost OutLinking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost OutHealth Catalyst
 
Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...
Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...
Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...Health Catalyst
 
Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...
Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...
Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...Health Catalyst
 
Use Well-Crafted Aim Statements To Achieve Clinical Quality Improvements
Use Well-Crafted Aim Statements To Achieve Clinical Quality ImprovementsUse Well-Crafted Aim Statements To Achieve Clinical Quality Improvements
Use Well-Crafted Aim Statements To Achieve Clinical Quality ImprovementsHealth Catalyst
 
Introducing catalyst.ai and MACRA Measures & Insights
Introducing catalyst.ai and MACRA Measures & InsightsIntroducing catalyst.ai and MACRA Measures & Insights
Introducing catalyst.ai and MACRA Measures & InsightsHealth Catalyst
 

What's hot (20)

6 Essential Data Analyst Skills for Your Healthcare Organization
6 Essential Data Analyst Skills for Your Healthcare Organization6 Essential Data Analyst Skills for Your Healthcare Organization
6 Essential Data Analyst Skills for Your Healthcare Organization
 
Exploring How to Use Hadoop in your Healthcare Big Data Strategy
Exploring How to Use Hadoop in your Healthcare Big Data StrategyExploring How to Use Hadoop in your Healthcare Big Data Strategy
Exploring How to Use Hadoop in your Healthcare Big Data Strategy
 
Three Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in HealthcareThree Approaches to Predictive Analytics in Healthcare
Three Approaches to Predictive Analytics in Healthcare
 
Why Most Analytic Applications Will Never Be Able to Significantly Improve He...
Why Most Analytic Applications Will Never Be Able to Significantly Improve He...Why Most Analytic Applications Will Never Be Able to Significantly Improve He...
Why Most Analytic Applications Will Never Be Able to Significantly Improve He...
 
Landmark Review of Population Health Management
Landmark Review of Population Health ManagementLandmark Review of Population Health Management
Landmark Review of Population Health Management
 
Top 7 Financial Healthcare Trends and Challenges for 2016
Top 7 Financial Healthcare Trends and Challenges for 2016Top 7 Financial Healthcare Trends and Challenges for 2016
Top 7 Financial Healthcare Trends and Challenges for 2016
 
Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...
Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...
Reducing Unwanted Variation in Healthcare Clears the Way for Outcomes Improve...
 
Why Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinWhy Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't Win
 
Data Driven Healthcare That Work: A Physician Group Perspective
Data Driven Healthcare That Work:  A Physician Group PerspectiveData Driven Healthcare That Work:  A Physician Group Perspective
Data Driven Healthcare That Work: A Physician Group Perspective
 
Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...
Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...
Why Precise, Tailored Patient Registries Lead to Cost-Effective Care Manageme...
 
How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...
How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...
How To Avoid The 3 Most Common Healthcare Analytics Pitfalls And Related Inef...
 
Patient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare OutcomesPatient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
Patient Flight Path Analytics: From Airline Operations to Healthcare Outcomes
 
Deliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for SuccessDeliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for Success
 
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
 
Four Population Health Management Strategies that Help Organizations Improve ...
Four Population Health Management Strategies that Help Organizations Improve ...Four Population Health Management Strategies that Help Organizations Improve ...
Four Population Health Management Strategies that Help Organizations Improve ...
 
Linking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost OutLinking Clinical And Financial Data: The Key To Real Quality And Cost Out
Linking Clinical And Financial Data: The Key To Real Quality And Cost Out
 
Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...
Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...
Eight Reasons Why Chief Data Officers Will Help Healthcare Organizations Thri...
 
Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...
Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...
Aiding Analytics Adoption Via Metadata-Driven Architecture: If You Build It, ...
 
Use Well-Crafted Aim Statements To Achieve Clinical Quality Improvements
Use Well-Crafted Aim Statements To Achieve Clinical Quality ImprovementsUse Well-Crafted Aim Statements To Achieve Clinical Quality Improvements
Use Well-Crafted Aim Statements To Achieve Clinical Quality Improvements
 
Introducing catalyst.ai and MACRA Measures & Insights
Introducing catalyst.ai and MACRA Measures & InsightsIntroducing catalyst.ai and MACRA Measures & Insights
Introducing catalyst.ai and MACRA Measures & Insights
 

Similar to The Four Balancing Acts Involved with Healthcare Data Security Frameworks

CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comVSNaipaul15
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comagathachristie112
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comKeatonJennings104
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comMcdonaldRyan80
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.comDavisMurphyA98
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.comDavis12a
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comdonaldzs9
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.comDavis10a
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comrobertlesew8
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comagathachristie265
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comclaric240
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comdonaldzs7
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.comDavisMurphyA97
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comrobertlesew5
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 

Similar to The Four Balancing Acts Involved with Healthcare Data Security Frameworks (20)

CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 

More from Health Catalyst

Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...
Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...
Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...Health Catalyst
 
Looking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesLooking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesHealth Catalyst
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology InsightsHealth Catalyst
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborHealth Catalyst
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3Health Catalyst
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2Health Catalyst
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1Health Catalyst
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondHealth Catalyst
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementHealth Catalyst
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule UpdatesHealth Catalyst
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleHealth Catalyst
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Health Catalyst
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfHealth Catalyst
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsHealth Catalyst
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingHealth Catalyst
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set UpdatesHealth Catalyst
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHealth Catalyst
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsHealth Catalyst
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientHealth Catalyst
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxHealth Catalyst
 

More from Health Catalyst (20)

Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...
Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...
Unlock the Secrets to Optimizing Ambulatory Operations Efficiency and Change ...
 
Looking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesLooking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare Issues
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and Labor
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and Beyond
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final Rule
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average Outsourcing
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital Technology
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency Ends
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and Patient
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
 

Recently uploaded

CHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdf
CHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdfCHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdf
CHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdfSachin Sharma
 
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...aunty1x1
 
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxAnushriSrivastav
 
Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...
Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...
Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...aunty1x1
 
Importance of Diet on Dental Health.docx
Importance of Diet on Dental Health.docxImportance of Diet on Dental Health.docx
Importance of Diet on Dental Health.docxSachin Mittal
 
Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur
Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur
Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur aunty1x1
 
Virtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdfVirtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdfsmartcare
 
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...GQ Research
 
Management of psoriasis.pptx (Recent advances)
Management of psoriasis.pptx (Recent advances)Management of psoriasis.pptx (Recent advances)
Management of psoriasis.pptx (Recent advances)DR. MOHNISH SEKAR
 
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfDemystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfSasikiranMarri
 
Digital Healthcare: The Future of Medical Consultations
Digital Healthcare: The Future of Medical ConsultationsDigital Healthcare: The Future of Medical Consultations
Digital Healthcare: The Future of Medical Consultationssmartcare
 
Enhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdfEnhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdfgajendrasinh1303
 
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade
 
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...saimasadaf14
 
Storage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptxStorage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptxBariquins
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...rajkumar669520
 
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...aunty1x1
 
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptxNose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptxDr. Rabia Inam Gandapore
 
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdfCHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdfSachin Sharma
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cell
 

Recently uploaded (20)

CHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdf
CHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdfCHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdf
CHAPTER 1 SEMESTER V - ROLE OF PEADIATRIC NURSE.pdf
 
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
Notify ME 89O1183OO2 #cALL# #gIRLS# In Chhattisgarh By Chhattisgarh #ℂall #gI...
 
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptxASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
ASSISTING WITH THE USE OF URINAL BY ANUSHRI SRIVASTAVA.pptx
 
Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...
Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...
Call Girls in Jaipur (Rajasthan) call me [🔝89011-83002🔝] Escort In Jaipur ℂal...
 
Importance of Diet on Dental Health.docx
Importance of Diet on Dental Health.docxImportance of Diet on Dental Health.docx
Importance of Diet on Dental Health.docx
 
Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur
Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur
Jaipur #ℂall #gIRLS Oyo Hotel 89O1183OO2 #ℂall #gIRL in Jaipur
 
Virtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdfVirtual Health Platforms_ Revolutionizing Patient Care.pdf
Virtual Health Platforms_ Revolutionizing Patient Care.pdf
 
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
Healthcare Companion Robots: Key Features and Functionalities, Benefits, Chal...
 
Management of psoriasis.pptx (Recent advances)
Management of psoriasis.pptx (Recent advances)Management of psoriasis.pptx (Recent advances)
Management of psoriasis.pptx (Recent advances)
 
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdfDemystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
Demystifying-Gene-Editing-The-Promise-and-Peril-of-CRISPR.pdf
 
Digital Healthcare: The Future of Medical Consultations
Digital Healthcare: The Future of Medical ConsultationsDigital Healthcare: The Future of Medical Consultations
Digital Healthcare: The Future of Medical Consultations
 
Enhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdfEnhancing-Patient-Centric-Clinical-Trials.pdf
Enhancing-Patient-Centric-Clinical-Trials.pdf
 
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
Chris Shade BS MEd MS LPC-Associate "Presume" (What Do I Do?)
 
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
Jesse Jhaj: Building Relationships with Patients as a Doctor or Healthcare Wo...
 
Storage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptxStorage_of _Bariquin_Components_in_Storage_Boxes.pptx
Storage_of _Bariquin_Components_in_Storage_Boxes.pptx
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
Contact mE 👙👨‍❤️‍👨 (89O1183OO2) 💘ℂall Girls In MOHALI By MOHALI 💘ESCORTS GIRL...
 
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptxNose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
Nose-Nasal Cavity & Paranasal Sinuses BY Dr.Rabia Inam Gandapore.pptx
 
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdfCHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
CHAPTER- 1 SEMESTER - V NATIONAL HEALTH PROGRAMME RELATED TO CHILD.pdf
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
 

The Four Balancing Acts Involved with Healthcare Data Security Frameworks

  • 1. The Four Balancing Acts Involved with Healthcare Data Security Frameworks ̶̶ Patrick Nelli
  • 2. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Balancing Healthcare Data Security Balance is a timely topic. The data and analytics sector of healthcare has an obligation to patients to make the best use of data collected on their behalf. HIPAA is typically considered a security and privacy regulation, but it also refers to the need for easy access to data to improve healthcare quality.
  • 3. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Balancing Healthcare Data Security Those who are responsible for developing healthcare data security frameworks in data warehousing should focus on the interplay, or the balance, between data utilization and data security and privacy. Four areas affect this balance and are worth discussing: 1. Monitoring 2. Data de-identification 3. Cloud environments 4. User access Figure 1: Healthcare has an obligation to patients to make the best use of the data collected on their behalf.
  • 4. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Balancing Healthcare Data Security Figure 1 shows this balance as a seesaw, which is often the perceived relationship between data utilization and security; but it’s not always a zero-sum game. It’s not necessarily true that more data utilization results in less security and privacy, or vice versa. Some processes help with both; some hurt both. Think of a rising tide that lifts all boats or an ebb tide that leaves them high and dry.
  • 5. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Balancing Healthcare Data Security Balancing utilization and security is top- of-mind for CIOs, who, in 2016, are investing heavily in business: • Data and business analytics – 27% • Security – 29% • Cloud computing – 30% Quite often, IT and security have a different focus from other groups in the organization in terms of data security. Picture a stronghold, surrounded by a moat, surrounded by a barbwire fence.
  • 6. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Balancing Healthcare Data Security Security and privacy consists of multiple layers that include physical, preventive, detective, and administrative controls. The Health Information Trust Alliance (HITRUST) uses 14 other control categories based on ISO 27001. Preventive controls address the critical issues of ransomware and email phishing. There are a lot of materials available about these controls.
  • 7. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring The first area that affects the balance between security/privacy and data utilization is monitoring: According to the 2016 Data Breach Investigations Report: A security event that compromises the integrity, confidentiality, or availability of an information asset. INCIDENT An incident that results in the confirmed disclosure (not just potential exposure) of data to unauthorized party. BREACH
  • 8. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring Healthcare data is particularly private and sensitive. Individuals accessing information for the wrong reasons is more prevalent in healthcare. Privilege Misuse Misc. Errors Stolen Assets Point of Sale Web Apps Crimeware Cyberespionage Everything Else 0% 5% 10% 15% 20% 25% 30% 35% 32% 22% 19% 7% 3% 3% 3% 11% ** Higher Than Any Other Industry Figure 2: Security incident patterns in healthcare (percent of total incidents, only confirmed data breaches). Source: Verizon 2016 Data Breaches Investigations Report
  • 9. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring Only 60 percent of acute care providers audit the logs of each access to patient health and financial records. (2016 HIMSS Cybersecurity Survey) Figure 3: Tools implemented by acute care providers for information security. Source: 2016 HIMSS Cybersecurity Survey 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Antivirus/malware Firewalls Data encryption (data in transit Data encryption (data at rest) Patch and vulnerability management Audit logs of access to pt. records Intrusion Detection Systems (IDS) Network monitoring tools 85% 78% 68% 61% 61% 60% 57% 55%
  • 10. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring Logging is simply writing event data, such as someone accessing a record or logging into a machine. But logging is simply “checking the box” in an audit, which is a minimal level of security. What’s needed is monitoring, putting tools, such as search or BI capabilities, on top of those logs.
  • 11. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring Relevant metrics being measured regularly, can be plugged into incident resolution tools such as WebHooks, PagerDuty, or Azure OMS, that simplify metrics tracking and require less human review time. Different layers of the analytics stacks include everything from who is logging into the network at the lowest level, to who’s logging into VMs, to what’s their performance and whether they have anti-malware at the VM or hardware level.
  • 12. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring Figure 4: Monitoring within five layers of the analytics stack Stack Examples Example Metrics Benefits Analytical Applications/ Reports Web-based, Qlik, Tableau, BO Usage, click paths, performance Analytic Environments Specialty focused environments for Predictive Analytics, NLP, Image Analysis Performance, run times, model metrics (rmse accuracy) Database / Data Store / ETL / Compute SQL Server, Oracle, Data Lake Queries, Access (AD), ETL run times VMS Hardware OS (Windows/Linux), Visualization (HyperV, VMWare) Event logs (installs, invalid logins, failed apps), performance logs Network Switches, Firewalls, Routers Invalid logins, suspicious login patterns (IP-analysis) Security/Privacy Performance/Efficiencies Product Development
  • 13. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #1: Monitoring There are three kinds benefits when putting monitoring in place on top of data that’s relevant at the analytics layer of the stack: 1. Enhanced security and privacy 2. Improved performance and efficiencies 3. Improved product development
  • 14. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #1: Security and Privacy When going through HITRUST certification or another type of audit, there are levels of assessments related to measuring and managing. Specifically, HITRUST has five levels when assessing a particular control: Policy Process Procedures Implemented Measures Managed > > > > >
  • 15. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #1: Security and Privacy By putting monitoring in place across these different segments, an organization automatically performs the measuring piece. By reviewing the monitoring data and putting alerts in place, the organization performs the management piece for specific controls depending on what’s being logged. This helps to achieve the high levels from an audit perspective.
  • 16. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #1: Security and Privacy SOC 2 and HITRUST have certain windows of opportunity for when the recertification or audit is valid, typically a year or two depending on the type being sought. The next year, the process must start over. There are also interim assessments at six months or annually. Of healthcare systems auditing their EDW and analytic environments, auditing data access and data use is their top issue.
  • 17. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #1: Security and Privacy What are some best practices relevant to addressing appropriate use and access? Appropriate use: 1: Log data at database level to see who is making what query, at what time, and from what table. 2: Setup dashboard to easily view the data that can filtered on user or patient using SSN or other identifiable field.
  • 18. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #1: Security and Privacy Figure 5: Monitoring dashboard shows user access by field name.
  • 19. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #1: Security and Privacy There are three best practices for automating user access review: Query the Lightweight Directory Access Protocol (e.g., Active Directory) and review who is in which access groups. Query database access (SQL Server) or application access (Qlik, Tableau, Web) to see which access groups have access to which databases, tables, or applications. Query SQL queries (IDERA) and application usage (Qlik, Tableau, Web) > > >
  • 20. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #2: Performance and Efficiency ETL processes are logged and monitored to see how often they succeed or fail and how long they take. Oftentimes, there will be a spike over a few days in the number of failures associated with an ETL process. That could mean it’s time for a data architect to review those specific SQL queries and test the connections to determine what’s wrong.
  • 21. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #2: Performance and Efficiency When the average run time shows a sustained increase, it’s time for questions to be asked. Are ETL jobs being scheduled at the same time? Do they need to be staggered? Are SQL queries non-optimized within the ETL jobs? Do they need to be altered? Figure 6: The ETL log shows spikes in run times and anomalies with failed processes > > > >
  • 22. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #3: Product Development Eric Ries, in his principles of The Lean Startup, describes a process that can be applied to product development. Building a product doesn’t end once code is ready to ship. It’s a full cycle that starts with an idea or hypothesis. The idea gets coded, built, and shared with users. Most importantly, it is specifically measured and the idea or hypothesis is reassessed based on the learnings from those measurements.
  • 23. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #3: Product Development An example of this type of monitoring comes from Uber, which runs surveys and A/B testing. Figure 7: Uber requires riders to rate their drivers and the company before booking their next trip.
  • 24. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #3: Product Development A few years ago, a team at Health Catalyst was building a new advanced analytics application. Figure 8 shows the number of user sessions during testing, with a small spike as the app rolled out to a larger test group. The average usage was expected to remain high. But the number of sessions quickly returned to almost zero. Figure 8: Weekly session counts during application development.
  • 25. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #3: Product Development The team dove in to understand the hypothesis and why they got it wrong. The amount of time users spent in the app was heavily weighted toward the Performance sheet, however the development team anticipated higher weighting toward the Provider sheet. The monitoring dashboard (figure 9) showed user session details, pointing us to the problem and then to further iterate the product.
  • 26. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Benefit of Monitoring #3: Product Development Figure 9: Testers spent their time on the Performance sheet, but developers spent their time perfecting the Provider sheet.
  • 27. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #2: Data De-Identification Data de-identification is actually a negative balance (recall the “ebb tide”) on both data utilization and security/privacy. There are two ways to de-identify a dataset to satisfy HIPAA requirements. 1. Safe Harbor Method 2. Expert Determined Method
  • 28. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #2: Data De-Identification SAFE HARBOR METHOD HIPAA defines 18 elements that must be removed or transformed from data before it is considered de-identified. This means removing anything more detailed than the year (month/day/hour/minute). When it comes to healthcare analytics and clinical quality improvement, date elements are particularly important for understanding the sequence of episodes of care and the timing between them.
  • 29. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #2: Data De-Identification SAFE HARBOR METHOD Geographic details* more granular than the state where care was provided must be removed. This makes it difficult to develop network optimizations or referral patterns. Furthermore, HIPAA requires that the data user not be able to use a dataset by itself or in combination with any other dataset to re- identify an individual. This means removing any rare ICD-10 codes and procedures that could be used to isolate an individual. *Exception: Zip code data contains more than 20,000 individuals
  • 30. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #2: Data De-Identification The Data Continuum Security and utilization experts work in three categories of healthcare data: 1. Full Protected Health Information (PHI) 2. Redacted Data (still PHI) 3. HIPAA De-Identified Datasets
  • 31. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #2: Data De-Identification Figure 10 Privacy and security risk of data in the three categories of healthcare data.
  • 32. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #3: Cloud Environments Most of the analytic stack will eventually move to the cloud. In healthcare, this may take a while, but the first pressure that we are experiencing is for specific analytic use cases, such as performing predictive analytics on a larger dataset, Natural Language Processing (NLP), and image recognition. The cloud can help with both data utilization and security/privacy.
  • 33. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #3: Cloud Environments The major cloud vendors (Amazon, Google, Microsoft Azure) perform ISO and SOC II audits and they will sign HIPAA Business Associate Agreements (BAAs), which allows healthcare organizations to fully leverage their audits. Figure 11 shows the responsibilities between the healthcare organization and the cloud provider over three variations of hosted services. Figure 11: Customer and cloud provider shared responsibilities for security controls.
  • 34. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #3: Cloud Environments Regardless of the structure, there is a lot of blue in this diagram, aka, cloud customer responsibility. This means still following security best practices when moving to the cloud – putting in firewalls, installing anti- malware, installing intrusion prevention, and monitoring is crucial. The cloud has tools to scan the environ- ment, see what security is in place and make change recommendations. Figure 11: Customer and cloud provider shared responsibilities for security controls.
  • 35. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #4: User Access The final point for creating balance between data utilization and security/privacy is user access. We don’t have a good answer for addressing this issue, but it’s something the industry should be considering for improvement. There are two areas to emphasize: 1. Streamline the permission-granting process 2. Role-based security
  • 36. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #4: User Access Streamline the permission-granting process One audit issue that comes up in conversations with healthcare systems across the U.S. is not that the process isn’t secure when granting users permission to data, but that it takes too long. So users are bypassing best practices. Taking too long to grant access is bad from both a data utilization and security perspective.
  • 37. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #4: User Access Streamline the permission-granting process One way to alleviate this problem is to make certain default applications available to everyone within certain security groups, especially if those applications don’t have patient level data. When thinking about granting access to a dataset, like HR or clinical data, involve data stewards, someone who best knows that dataset. They will often have a good sense of who should be granted access and how the data will be used.
  • 38. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Detective Controls Within the Security Framework Balancing Act #4: User Access Role-based security Simplify this as much as possible. Complicating it results in mistakes because it becomes too challenging to match individuals to security groups. It’s generally better practice to simplify and give fewer people access to data than it is to overcomplicate and make the IT mistake of putting people in the wrong buckets.
  • 39. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Joining the Pieces of the Security Framework Data is useless unless it gets in the hands of analysts, operators, and clinicians. But healthcare organizations need to strike the balance between security, privacy and data exposure. When monitoring, logging must be integrated into a search and BI tool for manual review. While this will take longer, it will lead to multiple benefits in security/privacy, performance efficiencies, and better product development.
  • 40. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. For more information: “This book is a fantastic piece of work” – Robert Lindeman MD, FAAP, Chief Physician Quality Officer
  • 41. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. More about this topic Link to original article for a more in-depth discussion. The Four Balancing Acts Involved with Healthcare Data Security Frameworks PHI Security and Auditing: Reducing Risk and Ensuring Compliance with a Data Warehouse Nate Arnold, Solutions Architect, VP 7 Essential Practices for Data Governance in Healthcare Dale Sanders, Executive VP of Software How Health Catalyst Ensures HIPAA Security Compliance: 2 Key Components Clara Pugsley, Corporate Development, VP; Bob White, Director of Security & Compliance 5 Reasons Healthcare Data Is Unique and Difficult to Measure Dan LeSueur, Technical Operations, VP Healthcare Data Stewardship: The Key to Going from Information Poor to Information Rich Eric Just, Technology, VP Download PDF
  • 42. © 2016 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Other Clinical Quality Improvement Resources Click to read additional information at www.healthcatalyst.com Patrick Nelli joined Health Catalyst in August 2013. Prior to coming to Health Catalyst, he was an Associate in the healthcare group at GTCR, a Chicago-based private equity firm, and an Analyst in the healthcare group at McColl Partners, a boutique investment bank. He has a degree in Physics with a Concentration in Biophysics and Biochemistry from Wake Forest University.