SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Draft – For Discussion Purposes 
A use case… thoughts on how to leverage your technology and the cloud 
Iht2 Conference – Beverly Hills 
November 4, 2014 
Raymond Lowe 
Senior Director Enterprise IT Infrastructure and Technology’
Draft – For Discussion Purposes 
2 
•Dignity Health – Hello Humankindness 
•Data Centers and Cloud 
–Where are you in the cloud? 
•Dignity Health and the cloud 
–Big 7 trends in Healthcare 
•Steps to the Cloud 
•Cloud Security 
•Questions and Answers 
Agenda
Draft – For Discussion Purposes 
Dignity Health 
3
Draft – For Discussion Purposes 
Who is Dignity Health 
•Assets: $13.1 billion 
•Net Operating Revenue: $10.6 billion 
•General Acute Patient Care Days: 1.8 million 
•Community Benefits and Care of the Poor: $1.4 billion 
•Acute Care Beds: 8,800 
•Skilled Nursing Beds: 800 
•Acute Care Hospitals: 40 
•Clinics/Ancillary Care Centers: 150 
•Medical Foundations: 11 
•Active Physicians: 10,000 
•Total Employees: 55,000 
4
Draft – For Discussion Purposes 
Aligning Dignity Health for Future Success 
5 
Operating company with strong local leadership 
Focus on markets, not hospitals 
Aligns system and market leaders 
Fosters clinical enterprise focus 
Enables streamlined decision making 
Creates greater accountability for outcomes 
Responsive to community needs
Draft – For Discussion Purposes 
6
Draft – For Discussion Purposes 
7 
https://www.youtube.com/watch?v=K8s8UD211pU#t=34
Draft – For Discussion Purposes 
Where are you on your technology transformation and your journey to the cloud?
Draft – For Discussion Purposes 
Source: Vmware
Draft – For Discussion Purposes 
1.Do you have any ASP hosted applications? 
2.Do you use Box, Dropbox, MS OneDrive? 
3.Are your backup being electronically stored outside of the walls of your facility? 
4.Does your Disaster Recovery and business continuity storage leave your facilities? 
Poll the Audience
Draft – For Discussion Purposes 
Dignity Health – Cloud
Draft – For Discussion Purposes 
Big 7 Trends in Health Care 
1.Personalized Health Services 
•Transition from not-for-profit, one-time acute episodes to for-profit, recurring wellness services 
2.Consumerism 
•Embrace that health care is consumer-driven with many choices of retail experiences 
3.Employer Direct 
•Market a comprehensive, service-based network direct to employers with a focus on the self-funded employers - instead of relying on insurers and payers 
4.Telehealth 
•Expand core PCP and specialist services across the continuum of care with global reach and local partnerships for best-in-class hybrid delivery model 
5.Cloud 
•Provide interoperability with a consumer-focused “outside-in” perspective – integrating across many SaaS/IaaS/PaaS partners for speed-to-market 
6.IP-Enabled Medical Devices 
•Integrate wearables, implantibles for real-time monitoring, alerting, diagnosing, and prescribing that connect to the Internet of Medical Things 
7.Predictive Analytics 
•Drive care quality and cost efficiencies with analytics that forge new pathways from chronic to preventative to wellness
Draft – For Discussion Purposes 
Big Trend #5: The Cloud Is Already Here at Dignity Health 
Private PHI Cloud: 
Enterprise Data 
Warehouse (SAS) 
Private PHI Cloud: 
EMR (Cerner) 
Proprietary DC’s: 
- Patient Revenue 
Cycle (Lawson) 
- Ambulatory EMR 
(Allscripts) 
- MS Exchange, 
Sharepoint 
PHI Co-Lo: Disaster Recovery (Switch) 
Public Cloud: 
Social Collaboration 
(Yammer @Microsoft Azure) 
Private PHI Cloud: 
Patient Portal (MedSeek) 
Private PHI Cloud: HIE (MobileMD) 
Private PHI Cloud: 
Pathology Reporting 
(Olympus EndoWorks) 
Dignity Health PHI: Clinical Applications in the Cloud 
Public Cloud: 
File Sharing (Box)
Draft – For Discussion Purposes 
Steps to the Cloud
Draft – For Discussion Purposes 
15 
1.Define Cloud Security Governance and Policies 
2.Define approach to standardize the current architecture 
3.Develop and use a target state architecture to define standards 
4.Buy commoditized cloud services and capabilities whenever possible without exposing PHI. 
5.Migrate existing applications and systems into private/hybrid cloud using phased approach 
6.Decommission existing legacy systems as new capabilities come online within your target state environment 
Steps to Cloud Computing
Draft – For Discussion Purposes 
16 
Rationalizing, standardizing and consolidation of applications and infrastructure. 
Application Migration Strategy
Draft – For Discussion Purposes 
Cloud Security
Draft – For Discussion Purposes 
18 
Threats, Vulnerabilities, and Exposures are Increasing 
April, 2014 
4,500,000 individuals 
February, 2014 
405,000 individuals 
Healthcare Industry 
HIPAA Breaches and Fines 
33,800,000 individuals 
September, 2010 
6,800 individuals 
$4.5M fine May, 2014 
Consumer and Business Breaches 
July, 2013 4,000,000 individuals 
July, 2011 
4,900,000 individuals 
2011 
20,000 individuals 
$4M settlement March, 2014 
December, 2009 
1,200,000 individuals 
$3M settlement March, 2014
Draft – For Discussion Purposes 
19 
Situational Analysis: 
–Cloud computing has many facets to address for public, private or hybrid cloud solution deployment – including cost, infrastructure, software, platforms, contractual, management oversight, audit and security. 
–Important aspects for security in a virtualized environment and security defenses include confidentiality, integrity and availability. Further security analysis includes governance, risk management and compliance; including implementation visibility and auditing rights of security controls. 
–However, the most critical business decision point for leadership, assuming appropriate security, legal and audit controls are in place – is the decision point to include HIPAA regulatory requirements and accompanying Business Associate agreements in the cloud decision – as these compliance measures are at the most fundamental core on how Dignity Health protects PHI/ePHI-based business applications. 
Business Decision Point for Cloud Computing 
Undeniably, Cloud Computing is present at Dignity Health in various forms. However, as additional deployment options are developed driven by strategic business reasons, leadership must address a critical decision point in the deployment of cloud-based solutions at Dignity Health.
Draft – For Discussion Purposes 
20 
Development of a Cloud Security Plan 
1. Specific Business Goals 
•Regulatory Compliance 
•Organization Objectives & Capabilities Risk 
•Enable Technologies, Processes and People 
•Provide an aggregated view of the risk profile the company accept 
•ITILv3, ISO 2700X and NIST 
•3rd Party Relationships & Business Associates (HIPAA) 
2. Risk Management Program 
3. Develop a Security Plan to Support Business Goals 
4. Audit, Review and Continuously Improve 
•Compliance program, technologies, and processes with very specific results 
•HIPAA, HITECH, SSAE 16 
•Monitor changing Government & Regulatory Landscape (Omnibus) 
•Continue to expand HIPAA Compliance, PCI, Meaningful Use for all Stages 
•Risk Assessment as a Continuous Process and ‘Way of Thinking’ 
Key Considerations 
•Security of Enterprise Applications & PHI 
•Compliant Managed Cloud Service Provider 
•Take an active role in Security & Risk management 
4 
3 
2 
1 
Enterprise Cloud Security Plan
Draft – For Discussion Purposes 
21 
Regulatory, Compliance & Control Objectives Overview 
•The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) drives important protections, that require an entity providing a service to a provider, to control Protected Health Information (“PHI”) 
•A Business Associate Agreement (“BAA”) has significant contractual obligations by the service provider for covered entities, such as Dignity Health. A BAA shall have the meaning ascribed to them in HIPAA as contained in 45 CFR parts 160, 162 and 164, and of the American Recovery Act of 2009 (the “HITECH Act”) 
•HIPAA regulations include “HIPAA Privacy Regulations” (CFR Parts 160 & 164), “HIPAA Security Regulations” (CFR parts 160 & 164) , “HIPAA Transaction Regulations” ( CFR Parts 160 & 162), and “HIPAA Breach Notification” (CFR Part 164 Subpart D, and the HITECT Act) 
Healthcare Regulatory Drivers 
•An important security framework which provides a structured methodology for analysis is ISO27001 
•Payment Card Industry (“PCI”) has important considerations for cloud provider selection 
Security Frameworks and Control Objectives 
Drivers and Controls
Draft – For Discussion Purposes 
22 
Business Associate Agreement Responsibilities 
BAA Service Objectives 
A BAA Upon Commencement of Service Shall Agree to the Following Terms 
Security Incidents and Breach of Unsecured PHI 
Compliance Audits 
Information Safeguards, Mitigation 
Subcontractor and Agents 
Changing Regulatory and Compliance requirements 
Permitted Uses and Disclosures 
Accounting Disclosures 
Consent, Authorization, and Permission 
Designated Record Sets 
Minimum Necessary and Limited Data Sets 
Right to Terminate for Breach, Effects of Termination, Amendments, and Conflicts 
Marketing Use of PHI, Non-Permitted Use, and Uses or Disclosure Restrictions 
A BAA has significant contractual obligations, driven by 
Federal Regulations - continued oversight is essential.
Draft – For Discussion Purposes 
23 
ISO 27001:2005 Security Domains 
Security Objectives 
Regardless of Health Care Regulations, Cloud Providers Must Address the Following Security Controls 
Human Resources Security 
Security Policy 
Asset Management 
Communications and Operations Management 
Environmental and Physical Security 
Information Security Governance 
Business Continuity Management 
Encryption 
Information Systems Acquisition 
Information Security Incident Management 
Compliance 
Access Control 
Security practitioners for Cloud Providers will baseline control 
objectives against these well understood security domains.
Draft – For Discussion Purposes 
24 
Cloud Security Defense Best Practices 
Cloud Governance 
Align with recognized industry standards, including internal security policies, standards and processes to both internal audits and external certifications. 
Security Governance, Risk Management and Compliance 
Robust security compliance program. Including physical access, logical access with internal and external auditing. 
Problem and Information Security Incident Management 
Documented policies and procedures for management and monitoring of security events, including escalation and resolution. 
Identity and Access Management 
Ensure access is tightly controlled. Privileged user monitoring to ensure enforcement and compliance to customer data protections. 
Categorize and Protect Data and Information Assets 
Encryption in-flight, @Rest and backups. Key Management if necessary. Protection of portable media and storage device disposal controls. 
System Acquisition, Development and Maintenance 
Security applied throughout lifecycle, Hypervisors Common Criteria certified and hardened servers 
Secure Infrastructure Against Threats and Vulnerabilities 
Defense in depth, underpinned with people and technology, IDPS @ boundary, vulnerability scanning, configuration mngt & security zones 
Physical and Personnel Security 
Strong physical controls, including CCTV, biometric authentication, resiliency tools and door alarms. Employee training of customer data handling and protections. 
Secure by Design
Draft – For Discussion Purposes 
Questions & Answers 
25

Contenu connexe

Tendances

Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretCornerstone OnDemand
 
Using Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection ReadinessUsing Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection ReadinessVeeva Systems
 
Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...
Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...
Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...Veeva Systems
 
Webinar: Driving Operational Agility with Digital Quality Management
Webinar: Driving Operational Agility with Digital Quality ManagementWebinar: Driving Operational Agility with Digital Quality Management
Webinar: Driving Operational Agility with Digital Quality ManagementVeeva Systems
 
Designing an EDC System to Work for a CRA
Designing an EDC System to Work for a CRADesigning an EDC System to Work for a CRA
Designing an EDC System to Work for a CRAVeeva Systems
 
Shorten Database Builds by 60% with Agile Design
Shorten Database Builds by 60% with Agile DesignShorten Database Builds by 60% with Agile Design
Shorten Database Builds by 60% with Agile DesignVeeva Systems
 
Reimagine patient safety 2030 governance through a unified safety platform
Reimagine patient safety 2030 governance through a unified safety platformReimagine patient safety 2030 governance through a unified safety platform
Reimagine patient safety 2030 governance through a unified safety platformVeeva Systems
 
Best practices for implementing and maintaining successful standards
Best practices for implementing and maintaining successful standardsBest practices for implementing and maintaining successful standards
Best practices for implementing and maintaining successful standardsVeeva Systems
 
Vertex Reduces EDC Study Build Times by 50%
Vertex Reduces EDC Study Build Times by 50%Vertex Reduces EDC Study Build Times by 50%
Vertex Reduces EDC Study Build Times by 50%Veeva Systems
 
Modernizing Quality Management
Modernizing Quality ManagementModernizing Quality Management
Modernizing Quality ManagementVeeva Systems
 
The Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsThe Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsVeeva Systems
 
Veeva Systems Webinar: Driving Continuous Quality Improvements
Veeva Systems Webinar: Driving Continuous Quality ImprovementsVeeva Systems Webinar: Driving Continuous Quality Improvements
Veeva Systems Webinar: Driving Continuous Quality ImprovementsVeeva Systems
 
Building a Business Case for Quality Management Transformation
Building a Business Case for Quality Management TransformationBuilding a Business Case for Quality Management Transformation
Building a Business Case for Quality Management TransformationVeeva Systems
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approachEstellesc
 
The Benefits of a Seamless IRT and EDC Integration in Clinical Trial Execution
The Benefits of a Seamless IRT and EDC Integration in Clinical Trial ExecutionThe Benefits of a Seamless IRT and EDC Integration in Clinical Trial Execution
The Benefits of a Seamless IRT and EDC Integration in Clinical Trial ExecutionVeeva Systems
 
Enabling Proactive Quality Management Across Quality and Manufacturing
Enabling Proactive Quality Management Across Quality and ManufacturingEnabling Proactive Quality Management Across Quality and Manufacturing
Enabling Proactive Quality Management Across Quality and ManufacturingVeeva Systems
 
Implementing a New Clinical Systems Strategy
Implementing a New Clinical Systems StrategyImplementing a New Clinical Systems Strategy
Implementing a New Clinical Systems StrategyVeeva Systems
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsStatistics & Data Corporation
 

Tendances (20)

Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fret
 
Using Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection ReadinessUsing Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection Readiness
 
Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...
Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...
Micro-learning, Macro-compliance: Improving GxP Compliance with Modern Learni...
 
Webinar: Driving Operational Agility with Digital Quality Management
Webinar: Driving Operational Agility with Digital Quality ManagementWebinar: Driving Operational Agility with Digital Quality Management
Webinar: Driving Operational Agility with Digital Quality Management
 
Designing an EDC System to Work for a CRA
Designing an EDC System to Work for a CRADesigning an EDC System to Work for a CRA
Designing an EDC System to Work for a CRA
 
Shorten Database Builds by 60% with Agile Design
Shorten Database Builds by 60% with Agile DesignShorten Database Builds by 60% with Agile Design
Shorten Database Builds by 60% with Agile Design
 
DHS HQ Day 2018 - Barry West
DHS HQ Day 2018 - Barry WestDHS HQ Day 2018 - Barry West
DHS HQ Day 2018 - Barry West
 
Reimagine patient safety 2030 governance through a unified safety platform
Reimagine patient safety 2030 governance through a unified safety platformReimagine patient safety 2030 governance through a unified safety platform
Reimagine patient safety 2030 governance through a unified safety platform
 
Best practices for implementing and maintaining successful standards
Best practices for implementing and maintaining successful standardsBest practices for implementing and maintaining successful standards
Best practices for implementing and maintaining successful standards
 
Vertex Reduces EDC Study Build Times by 50%
Vertex Reduces EDC Study Build Times by 50%Vertex Reduces EDC Study Build Times by 50%
Vertex Reduces EDC Study Build Times by 50%
 
Modernizing Quality Management
Modernizing Quality ManagementModernizing Quality Management
Modernizing Quality Management
 
The Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsThe Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical Trials
 
Veeva Systems Webinar: Driving Continuous Quality Improvements
Veeva Systems Webinar: Driving Continuous Quality ImprovementsVeeva Systems Webinar: Driving Continuous Quality Improvements
Veeva Systems Webinar: Driving Continuous Quality Improvements
 
Building a Business Case for Quality Management Transformation
Building a Business Case for Quality Management TransformationBuilding a Business Case for Quality Management Transformation
Building a Business Case for Quality Management Transformation
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approach
 
The Benefits of a Seamless IRT and EDC Integration in Clinical Trial Execution
The Benefits of a Seamless IRT and EDC Integration in Clinical Trial ExecutionThe Benefits of a Seamless IRT and EDC Integration in Clinical Trial Execution
The Benefits of a Seamless IRT and EDC Integration in Clinical Trial Execution
 
Enabling Proactive Quality Management Across Quality and Manufacturing
Enabling Proactive Quality Management Across Quality and ManufacturingEnabling Proactive Quality Management Across Quality and Manufacturing
Enabling Proactive Quality Management Across Quality and Manufacturing
 
Implementing a New Clinical Systems Strategy
Implementing a New Clinical Systems StrategyImplementing a New Clinical Systems Strategy
Implementing a New Clinical Systems Strategy
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
 
ITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORKITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORK
 

Similaire à Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage your Technology and The Cloud” with Raymond Lowe, Senior Director, Information Technology, Dignity Health

cloud computing in health care.pptx
cloud computing in health care.pptxcloud computing in health care.pptx
cloud computing in health care.pptxamanyosama12
 
HIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHostway|HOSTING
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurancemindleaftechnologies
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcarePerficient, Inc.
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsAegify Inc.
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...Peter de Haas
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationUBMCanon
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewClearDATACloud
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
CTO Perspectives: What's Next for Data Management and Healthcare?
CTO Perspectives: What's Next for Data Management and Healthcare?CTO Perspectives: What's Next for Data Management and Healthcare?
CTO Perspectives: What's Next for Data Management and Healthcare?Health Catalyst
 
Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019CitiusTech
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPLuke Arrington
 
Diaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 

Similaire à Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage your Technology and The Cloud” with Raymond Lowe, Senior Director, Information Technology, Dignity Health (20)

cloud computing in health care.pptx
cloud computing in health care.pptxcloud computing in health care.pptx
cloud computing in health care.pptx
 
HIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare Cloud
 
Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in Healthcare
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Moving healthcare applications to the cloud
Moving healthcare applications to the cloudMoving healthcare applications to the cloud
Moving healthcare applications to the cloud
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Veera raghavan
Veera raghavanVeera raghavan
Veera raghavan
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems Integration
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
CTO Perspectives: What's Next for Data Management and Healthcare?
CTO Perspectives: What's Next for Data Management and Healthcare?CTO Perspectives: What's Next for Data Management and Healthcare?
CTO Perspectives: What's Next for Data Management and Healthcare?
 
Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 
Diaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark Healthcare Technology Services
Diaspark Healthcare Technology Services
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 

Plus de Health IT Conference – iHT2

Plus de Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage your Technology and The Cloud” with Raymond Lowe, Senior Director, Information Technology, Dignity Health

  • 1. Draft – For Discussion Purposes A use case… thoughts on how to leverage your technology and the cloud Iht2 Conference – Beverly Hills November 4, 2014 Raymond Lowe Senior Director Enterprise IT Infrastructure and Technology’
  • 2. Draft – For Discussion Purposes 2 •Dignity Health – Hello Humankindness •Data Centers and Cloud –Where are you in the cloud? •Dignity Health and the cloud –Big 7 trends in Healthcare •Steps to the Cloud •Cloud Security •Questions and Answers Agenda
  • 3. Draft – For Discussion Purposes Dignity Health 3
  • 4. Draft – For Discussion Purposes Who is Dignity Health •Assets: $13.1 billion •Net Operating Revenue: $10.6 billion •General Acute Patient Care Days: 1.8 million •Community Benefits and Care of the Poor: $1.4 billion •Acute Care Beds: 8,800 •Skilled Nursing Beds: 800 •Acute Care Hospitals: 40 •Clinics/Ancillary Care Centers: 150 •Medical Foundations: 11 •Active Physicians: 10,000 •Total Employees: 55,000 4
  • 5. Draft – For Discussion Purposes Aligning Dignity Health for Future Success 5 Operating company with strong local leadership Focus on markets, not hospitals Aligns system and market leaders Fosters clinical enterprise focus Enables streamlined decision making Creates greater accountability for outcomes Responsive to community needs
  • 6. Draft – For Discussion Purposes 6
  • 7. Draft – For Discussion Purposes 7 https://www.youtube.com/watch?v=K8s8UD211pU#t=34
  • 8. Draft – For Discussion Purposes Where are you on your technology transformation and your journey to the cloud?
  • 9. Draft – For Discussion Purposes Source: Vmware
  • 10. Draft – For Discussion Purposes 1.Do you have any ASP hosted applications? 2.Do you use Box, Dropbox, MS OneDrive? 3.Are your backup being electronically stored outside of the walls of your facility? 4.Does your Disaster Recovery and business continuity storage leave your facilities? Poll the Audience
  • 11. Draft – For Discussion Purposes Dignity Health – Cloud
  • 12. Draft – For Discussion Purposes Big 7 Trends in Health Care 1.Personalized Health Services •Transition from not-for-profit, one-time acute episodes to for-profit, recurring wellness services 2.Consumerism •Embrace that health care is consumer-driven with many choices of retail experiences 3.Employer Direct •Market a comprehensive, service-based network direct to employers with a focus on the self-funded employers - instead of relying on insurers and payers 4.Telehealth •Expand core PCP and specialist services across the continuum of care with global reach and local partnerships for best-in-class hybrid delivery model 5.Cloud •Provide interoperability with a consumer-focused “outside-in” perspective – integrating across many SaaS/IaaS/PaaS partners for speed-to-market 6.IP-Enabled Medical Devices •Integrate wearables, implantibles for real-time monitoring, alerting, diagnosing, and prescribing that connect to the Internet of Medical Things 7.Predictive Analytics •Drive care quality and cost efficiencies with analytics that forge new pathways from chronic to preventative to wellness
  • 13. Draft – For Discussion Purposes Big Trend #5: The Cloud Is Already Here at Dignity Health Private PHI Cloud: Enterprise Data Warehouse (SAS) Private PHI Cloud: EMR (Cerner) Proprietary DC’s: - Patient Revenue Cycle (Lawson) - Ambulatory EMR (Allscripts) - MS Exchange, Sharepoint PHI Co-Lo: Disaster Recovery (Switch) Public Cloud: Social Collaboration (Yammer @Microsoft Azure) Private PHI Cloud: Patient Portal (MedSeek) Private PHI Cloud: HIE (MobileMD) Private PHI Cloud: Pathology Reporting (Olympus EndoWorks) Dignity Health PHI: Clinical Applications in the Cloud Public Cloud: File Sharing (Box)
  • 14. Draft – For Discussion Purposes Steps to the Cloud
  • 15. Draft – For Discussion Purposes 15 1.Define Cloud Security Governance and Policies 2.Define approach to standardize the current architecture 3.Develop and use a target state architecture to define standards 4.Buy commoditized cloud services and capabilities whenever possible without exposing PHI. 5.Migrate existing applications and systems into private/hybrid cloud using phased approach 6.Decommission existing legacy systems as new capabilities come online within your target state environment Steps to Cloud Computing
  • 16. Draft – For Discussion Purposes 16 Rationalizing, standardizing and consolidation of applications and infrastructure. Application Migration Strategy
  • 17. Draft – For Discussion Purposes Cloud Security
  • 18. Draft – For Discussion Purposes 18 Threats, Vulnerabilities, and Exposures are Increasing April, 2014 4,500,000 individuals February, 2014 405,000 individuals Healthcare Industry HIPAA Breaches and Fines 33,800,000 individuals September, 2010 6,800 individuals $4.5M fine May, 2014 Consumer and Business Breaches July, 2013 4,000,000 individuals July, 2011 4,900,000 individuals 2011 20,000 individuals $4M settlement March, 2014 December, 2009 1,200,000 individuals $3M settlement March, 2014
  • 19. Draft – For Discussion Purposes 19 Situational Analysis: –Cloud computing has many facets to address for public, private or hybrid cloud solution deployment – including cost, infrastructure, software, platforms, contractual, management oversight, audit and security. –Important aspects for security in a virtualized environment and security defenses include confidentiality, integrity and availability. Further security analysis includes governance, risk management and compliance; including implementation visibility and auditing rights of security controls. –However, the most critical business decision point for leadership, assuming appropriate security, legal and audit controls are in place – is the decision point to include HIPAA regulatory requirements and accompanying Business Associate agreements in the cloud decision – as these compliance measures are at the most fundamental core on how Dignity Health protects PHI/ePHI-based business applications. Business Decision Point for Cloud Computing Undeniably, Cloud Computing is present at Dignity Health in various forms. However, as additional deployment options are developed driven by strategic business reasons, leadership must address a critical decision point in the deployment of cloud-based solutions at Dignity Health.
  • 20. Draft – For Discussion Purposes 20 Development of a Cloud Security Plan 1. Specific Business Goals •Regulatory Compliance •Organization Objectives & Capabilities Risk •Enable Technologies, Processes and People •Provide an aggregated view of the risk profile the company accept •ITILv3, ISO 2700X and NIST •3rd Party Relationships & Business Associates (HIPAA) 2. Risk Management Program 3. Develop a Security Plan to Support Business Goals 4. Audit, Review and Continuously Improve •Compliance program, technologies, and processes with very specific results •HIPAA, HITECH, SSAE 16 •Monitor changing Government & Regulatory Landscape (Omnibus) •Continue to expand HIPAA Compliance, PCI, Meaningful Use for all Stages •Risk Assessment as a Continuous Process and ‘Way of Thinking’ Key Considerations •Security of Enterprise Applications & PHI •Compliant Managed Cloud Service Provider •Take an active role in Security & Risk management 4 3 2 1 Enterprise Cloud Security Plan
  • 21. Draft – For Discussion Purposes 21 Regulatory, Compliance & Control Objectives Overview •The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) drives important protections, that require an entity providing a service to a provider, to control Protected Health Information (“PHI”) •A Business Associate Agreement (“BAA”) has significant contractual obligations by the service provider for covered entities, such as Dignity Health. A BAA shall have the meaning ascribed to them in HIPAA as contained in 45 CFR parts 160, 162 and 164, and of the American Recovery Act of 2009 (the “HITECH Act”) •HIPAA regulations include “HIPAA Privacy Regulations” (CFR Parts 160 & 164), “HIPAA Security Regulations” (CFR parts 160 & 164) , “HIPAA Transaction Regulations” ( CFR Parts 160 & 162), and “HIPAA Breach Notification” (CFR Part 164 Subpart D, and the HITECT Act) Healthcare Regulatory Drivers •An important security framework which provides a structured methodology for analysis is ISO27001 •Payment Card Industry (“PCI”) has important considerations for cloud provider selection Security Frameworks and Control Objectives Drivers and Controls
  • 22. Draft – For Discussion Purposes 22 Business Associate Agreement Responsibilities BAA Service Objectives A BAA Upon Commencement of Service Shall Agree to the Following Terms Security Incidents and Breach of Unsecured PHI Compliance Audits Information Safeguards, Mitigation Subcontractor and Agents Changing Regulatory and Compliance requirements Permitted Uses and Disclosures Accounting Disclosures Consent, Authorization, and Permission Designated Record Sets Minimum Necessary and Limited Data Sets Right to Terminate for Breach, Effects of Termination, Amendments, and Conflicts Marketing Use of PHI, Non-Permitted Use, and Uses or Disclosure Restrictions A BAA has significant contractual obligations, driven by Federal Regulations - continued oversight is essential.
  • 23. Draft – For Discussion Purposes 23 ISO 27001:2005 Security Domains Security Objectives Regardless of Health Care Regulations, Cloud Providers Must Address the Following Security Controls Human Resources Security Security Policy Asset Management Communications and Operations Management Environmental and Physical Security Information Security Governance Business Continuity Management Encryption Information Systems Acquisition Information Security Incident Management Compliance Access Control Security practitioners for Cloud Providers will baseline control objectives against these well understood security domains.
  • 24. Draft – For Discussion Purposes 24 Cloud Security Defense Best Practices Cloud Governance Align with recognized industry standards, including internal security policies, standards and processes to both internal audits and external certifications. Security Governance, Risk Management and Compliance Robust security compliance program. Including physical access, logical access with internal and external auditing. Problem and Information Security Incident Management Documented policies and procedures for management and monitoring of security events, including escalation and resolution. Identity and Access Management Ensure access is tightly controlled. Privileged user monitoring to ensure enforcement and compliance to customer data protections. Categorize and Protect Data and Information Assets Encryption in-flight, @Rest and backups. Key Management if necessary. Protection of portable media and storage device disposal controls. System Acquisition, Development and Maintenance Security applied throughout lifecycle, Hypervisors Common Criteria certified and hardened servers Secure Infrastructure Against Threats and Vulnerabilities Defense in depth, underpinned with people and technology, IDPS @ boundary, vulnerability scanning, configuration mngt & security zones Physical and Personnel Security Strong physical controls, including CCTV, biometric authentication, resiliency tools and door alarms. Employee training of customer data handling and protections. Secure by Design
  • 25. Draft – For Discussion Purposes Questions & Answers 25