SlideShare a Scribd company logo
HIPAA and E-Mail:  Protecting PHI Maurene Caplan Grey Founder, Principal Analyst
HIPAA “101” Health Insurance Reform Administrative Simplification Standards for electronic health information transactions  Mandate on providers and health plans, and timetable Pre-emption of state law Penalties Privacy http://www.cms.hhs.gov/hipaa/hipaa2/default.asp  (CMS: HIPPA – Administrative Simplification, updated September 2005) http://www.hipaadvisory.com/regs/compliancecal.htm  (Status of HIPAA Regulations Compliance Calendar, updated August 2005)
Today’s Topics How is the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
Healthcare Industry Evolution Targeted treatments Focus on wellness Customer is the consumer Mass market treatment Focus on illness Customer is the doctor
Increasing Self-Management via E-Mail Physicians, Pharmacists, Peers… Source: Health Data Management Magazine, “Quick Poll,” 9 Sept 2005 Physician resistance to communicating with patients via e-mail is decreasing.   I wonder if I have diabetes? What more can I find out? What are other people doing to control it? Patient = Consumer Is this serious?  Do I need a checkup? 32.43 24 Disagree 67.7 50 Agree Percentage Respondents
Using an Online Consultation System for Self-Management
PHI within the Healthcare Community Patient’s PHI stored as record by the hospital. PHI sent to lab Insurance company stores patient record Lab report sent to doctor Hospital MD gathers PHI from patient Invoice sent to patient’s healthcare insurance
The New Healthcare Community Suppliers Providers Payers Employers Government Consumers Physicians Life Sciences
Today’s Topics How is the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
Why Security and Privacy Policies Fail Rulings are ambiguous and untested Poor or no business processes Social engineering Wrong technology Right technology, poorly implemented No auditing Lack of user training Poor or no governance Rulings change Fraud “ Lost”  PHI Local hard drives, cache, memory sticks, PDAs, smart phones, server storage, application data stores…
Approach 1: Gateway  1) File uploads to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to the gateway and downloads file Often used for  ad hoc relationships
Approach 2: End-to-End, Gateway  1) File sent to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to gateway and downloads file Often used for  ad hoc relationships, where extra  security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME …
Approach 3: Gateway-to-Gateway  Sender Recipient Sender’s gateway to recipient’s gateway Recipient Sender Often used for  trusted  relationships
Approach 4: End-to-End, Gateway-to-Gateway Sender’s gateway to recipient’s gateway Often used for  trusted relationships,  where extra security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME … Sender Recipient Recipient Sender
Scenario: University with Teaching Hospital Administrative Policies Information Security Information Management Securing E-Mail University’s standards Technology options Employee responsibilities Security Risk assessment templates HIPAA assessment plan Sys Admin toolkits Governance board Chancellor’s Office School of Dentistry School of Medicine School of Nursing School of Pharmacy Medical Center – IT Medical Center – Non-IT Student Academic Affairs Information Security Officer Privacy Officer Training
What You Need To Do Now  – People and Business Engage legal counsel to interpret HIPAA regulations for your scenario. Conduct, and reinforce, employee training. Appoint a privacy officer (rule requires). Educate business partners on your PHI security and privacy policies.
What You Need To Do Now   –  Technology Deploy secure e-mail technologies that fit the relationship model between sender and recipient. Simplicity at the user end is key for adoption.  Develop secure e-mail frameworks that are extensible as healthcare community needs evolve.  Budget for and carry out continuous vulnerability testing and security audits. HIPAA is designed to protect patient privacy. Architect security measures accordingly.
For further information on this topic, contact Grey Consulting [email_address]   845.531.5050 www.grey-consulting.com making messaging and collaboration work

More Related Content

PPT
What Does Openness Mean to the Web Manager?
PPT
Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidel...
PPT
Beyond Compliance - A Holistic Approach to Web Accessibility
PPT
What Does Openness Mean To The Openness Museum Community
PPT
Accessibility 2.0: People, Policies and Processes
PPT
Benefits of the Social Web: How Can It Help My Museum?
PPT
Engagement, Impact, Value: Measuring and Maximising Impact Using the Social Web
PPT
From Web Accessibility 2.0 to Web Adaptability (1.0)
What Does Openness Mean to the Web Manager?
Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidel...
Beyond Compliance - A Holistic Approach to Web Accessibility
What Does Openness Mean To The Openness Museum Community
Accessibility 2.0: People, Policies and Processes
Benefits of the Social Web: How Can It Help My Museum?
Engagement, Impact, Value: Measuring and Maximising Impact Using the Social Web
From Web Accessibility 2.0 to Web Adaptability (1.0)

What's hot (20)

PPT
Implementing A Holistic Approach To E-Learning Accessibility
PPT
From Web Accessibility to Web Adaptability
PPT
What Can We Learn From Amplified Events?
PPT
This Year's Technology That Has Blown Me Away
PPT
The Future for Educational Resource Repositories in a Web 2.0 World
PPT
Organisational Use of Twitter
PDF
UKWebFocus blog posts
PPT
Empowering Users and Institutions: A Risks and Opportunities Framework for Ex...
PPTX
Building an Accessible Digital Institution
PPT
Why Impact, ROI and Marketing are No Longer Dirty Words
PPT
Welcome to IWMW 2010
PPT
The Social Aspect Of Resource Discovery
PPT
BS 8878 and the Holistic Approaches to Web Accessibility
PPT
Engagement, Impact, Value: Introduction
PPT
Short brown presentation 26th june 2011
PPT
The Web Management Community: Beyond IWMW and JISCMail Lists (#A4)
PPT
E health presentation 28th june 2011
PPTX
Digital Life Beyond The Institution
PPTX
Preparing Our Users For Digital Life Beyond the Institution
PPT
Enhancing Access to Researchers' Papers: How Librarians and Use of Social Med...
Implementing A Holistic Approach To E-Learning Accessibility
From Web Accessibility to Web Adaptability
What Can We Learn From Amplified Events?
This Year's Technology That Has Blown Me Away
The Future for Educational Resource Repositories in a Web 2.0 World
Organisational Use of Twitter
UKWebFocus blog posts
Empowering Users and Institutions: A Risks and Opportunities Framework for Ex...
Building an Accessible Digital Institution
Why Impact, ROI and Marketing are No Longer Dirty Words
Welcome to IWMW 2010
The Social Aspect Of Resource Discovery
BS 8878 and the Holistic Approaches to Web Accessibility
Engagement, Impact, Value: Introduction
Short brown presentation 26th june 2011
The Web Management Community: Beyond IWMW and JISCMail Lists (#A4)
E health presentation 28th june 2011
Digital Life Beyond The Institution
Preparing Our Users For Digital Life Beyond the Institution
Enhancing Access to Researchers' Papers: How Librarians and Use of Social Med...
Ad

Similar to HIPAA and E-Mail: Protecting PHI (20)

PPTX
Issues in Mobile Health (Barbara Mittleman)
PPT
Anatomy of an EMR System
PPT
Priv&security&profin electrcommunicationsrev9 23
PPTX
Healthcare and Cyber security
PPT
Introduction to EMR
PPT
EMR Intro
PDF
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
PPTX
Health Informatics- Module 4-Chapter 2.pptx
PDF
Texting and E-mail with Patients: Patient Requests and Complying with HIPAA
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
PPTX
Modernizing Patient Records
PDF
Patient relationship management on the cloud
PPT
Health Informatics Professionalism and Improving Patient Care
PDF
HIPAA Compliance: Safeguarding Healthcare Information in the Digital Age
DOCX
1042 PM (CST)Assignment DetailsAssignment Description
DOCX
1042 PM (CST)Assignment DetailsAssignment Description
DOCX
1042 pm (cst)assignment details assignment description
DOCX
Tips for transitioning to electronic health records
PPTX
Babithas Notes on unit-2 Health/Nursing Informatics Technology
PPT
Health Informatics Professionalism and Improving Patient Care
Issues in Mobile Health (Barbara Mittleman)
Anatomy of an EMR System
Priv&security&profin electrcommunicationsrev9 23
Healthcare and Cyber security
Introduction to EMR
EMR Intro
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health Informatics- Module 4-Chapter 2.pptx
Texting and E-mail with Patients: Patient Requests and Complying with HIPAA
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Modernizing Patient Records
Patient relationship management on the cloud
Health Informatics Professionalism and Improving Patient Care
HIPAA Compliance: Safeguarding Healthcare Information in the Digital Age
1042 PM (CST)Assignment DetailsAssignment Description
1042 PM (CST)Assignment DetailsAssignment Description
1042 pm (cst)assignment details assignment description
Tips for transitioning to electronic health records
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Health Informatics Professionalism and Improving Patient Care
Ad

More from Maurene Caplan Grey (7)

PPTX
Communication: Chaos to Clarity
PDF
Leveraging linked in for the job search passive vs active techniques
PPT
Social Media: An Avenue In Your Job Search
PDF
Collaboration & Social Media New Challenges For Records Management
PDF
E Mail Management At A Crossroad
PDF
New Media: Transforming Organizational Communications
PPT
Collaboration: New Challenges for Electronic Records Management
Communication: Chaos to Clarity
Leveraging linked in for the job search passive vs active techniques
Social Media: An Avenue In Your Job Search
Collaboration & Social Media New Challenges For Records Management
E Mail Management At A Crossroad
New Media: Transforming Organizational Communications
Collaboration: New Challenges for Electronic Records Management

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
project resource management chapter-09.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
August Patch Tuesday
PPTX
Modernising the Digital Integration Hub
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
STKI Israel Market Study 2025 version august
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
Chapter 5: Probability Theory and Statistics
project resource management chapter-09.pdf
The various Industrial Revolutions .pptx
August Patch Tuesday
Modernising the Digital Integration Hub
NewMind AI Weekly Chronicles - August'25-Week II
Getting started with AI Agents and Multi-Agent Systems
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Tartificialntelligence_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Web App vs Mobile App What Should You Build First.pdf
Hybrid model detection and classification of lung cancer
WOOl fibre morphology and structure.pdf for textiles
Assigned Numbers - 2025 - Bluetooth® Document
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Developing a website for English-speaking practice to English as a foreign la...
STKI Israel Market Study 2025 version august
A comparative study of natural language inference in Swahili using monolingua...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hindi spoken digit analysis for native and non-native speakers

HIPAA and E-Mail: Protecting PHI

  • 1. HIPAA and E-Mail: Protecting PHI Maurene Caplan Grey Founder, Principal Analyst
  • 2. HIPAA “101” Health Insurance Reform Administrative Simplification Standards for electronic health information transactions Mandate on providers and health plans, and timetable Pre-emption of state law Penalties Privacy http://www.cms.hhs.gov/hipaa/hipaa2/default.asp (CMS: HIPPA – Administrative Simplification, updated September 2005) http://www.hipaadvisory.com/regs/compliancecal.htm (Status of HIPAA Regulations Compliance Calendar, updated August 2005)
  • 3. Today’s Topics How is the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
  • 4. Healthcare Industry Evolution Targeted treatments Focus on wellness Customer is the consumer Mass market treatment Focus on illness Customer is the doctor
  • 5. Increasing Self-Management via E-Mail Physicians, Pharmacists, Peers… Source: Health Data Management Magazine, “Quick Poll,” 9 Sept 2005 Physician resistance to communicating with patients via e-mail is decreasing. I wonder if I have diabetes? What more can I find out? What are other people doing to control it? Patient = Consumer Is this serious? Do I need a checkup? 32.43 24 Disagree 67.7 50 Agree Percentage Respondents
  • 6. Using an Online Consultation System for Self-Management
  • 7. PHI within the Healthcare Community Patient’s PHI stored as record by the hospital. PHI sent to lab Insurance company stores patient record Lab report sent to doctor Hospital MD gathers PHI from patient Invoice sent to patient’s healthcare insurance
  • 8. The New Healthcare Community Suppliers Providers Payers Employers Government Consumers Physicians Life Sciences
  • 9. Today’s Topics How is the role of messaging evolving within the healthcare community? What best practices should healthcare providers take to conform with regulations and plan for the future?
  • 10. Why Security and Privacy Policies Fail Rulings are ambiguous and untested Poor or no business processes Social engineering Wrong technology Right technology, poorly implemented No auditing Lack of user training Poor or no governance Rulings change Fraud “ Lost” PHI Local hard drives, cache, memory sticks, PDAs, smart phones, server storage, application data stores…
  • 11. Approach 1: Gateway 1) File uploads to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to the gateway and downloads file Often used for ad hoc relationships
  • 12. Approach 2: End-to-End, Gateway 1) File sent to gateway 2) E-mail sent to recipient with URL that points to file 3) Recipient clicks on URL, authenticates to gateway and downloads file Often used for ad hoc relationships, where extra security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME …
  • 13. Approach 3: Gateway-to-Gateway Sender Recipient Sender’s gateway to recipient’s gateway Recipient Sender Often used for trusted relationships
  • 14. Approach 4: End-to-End, Gateway-to-Gateway Sender’s gateway to recipient’s gateway Often used for trusted relationships, where extra security is required Commercial PGP, OpenPGP, S/MIME … Commercial PGP, OpenPGP, S/MIME … Sender Recipient Recipient Sender
  • 15. Scenario: University with Teaching Hospital Administrative Policies Information Security Information Management Securing E-Mail University’s standards Technology options Employee responsibilities Security Risk assessment templates HIPAA assessment plan Sys Admin toolkits Governance board Chancellor’s Office School of Dentistry School of Medicine School of Nursing School of Pharmacy Medical Center – IT Medical Center – Non-IT Student Academic Affairs Information Security Officer Privacy Officer Training
  • 16. What You Need To Do Now – People and Business Engage legal counsel to interpret HIPAA regulations for your scenario. Conduct, and reinforce, employee training. Appoint a privacy officer (rule requires). Educate business partners on your PHI security and privacy policies.
  • 17. What You Need To Do Now – Technology Deploy secure e-mail technologies that fit the relationship model between sender and recipient. Simplicity at the user end is key for adoption. Develop secure e-mail frameworks that are extensible as healthcare community needs evolve. Budget for and carry out continuous vulnerability testing and security audits. HIPAA is designed to protect patient privacy. Architect security measures accordingly.
  • 18. For further information on this topic, contact Grey Consulting [email_address] 845.531.5050 www.grey-consulting.com making messaging and collaboration work