Skip to main content

NIST guidance on managing IoT(Internet of Things) cybersecurity and privacy

Compliance Key -  HIPAA Webinar in United States

Overview
To date the only specific requirement relating to the National Institute of Standards and Technology ("NIST") Standards in the Security Rule does not require compliance with any NIST Standard but rather exempts covered entities from having to report breaches if they meet either of two NIST standards-the encryption standard or the disposal standard. The Security Breach Notification Rule only requires reporting of breaches of "unsecured" PHI. 45 C.F.R.  164.400-414. If data is encrypted or disposed of consistent with those two standards, it is secured, and, hence, unreportable

With the increasing number of cybersecurity breaches since HIPAA became law, DHHS recognized that more attention needed to be paid to improving cybersecurity and focused on the NIST Framework for Improving Critical Infrastructure Cybersecurity (the Cybersecurity Framework) and developed a crosswalk between it and the HIPAA Security Rule. It provides a policy framework of computer security guidance for how private sector organizations in the U.S. can improve their ability to prevent, detect, and respond to cyber attacks.

NIST publications, many of which are required for federal agencies, can serve as voluntary guidelines and best practices for state, local, and tribal governments and the private sector, and may provide enough depth and breadth to help organizations of many sizes select the type of implementation that best fits their unique circumstances. NIST security standards and guidelines (Federal Information Processing Standards [FIPS], Special Publications in the 800 series), which can be used to support the requirements of HIPAA and may be used by organizations to help provide a structured, yet flexible framework for selecting, specifying, employing, and evaluating the security controls in information systems.

Although not a specific reference like the one above re reporting, HHS has referenced the NIST standards in several places as a valuable resource and has provided a crosswalk between the HIPAA
Why should you attend this webinar?
With the increasing number of cybersecurity breaches since HIPAA became law, DHHS has become more aggressive in penalizing covered entities and business associates for breaches of Protected Health Information ("PHI") Privacy and Security with civil money penalties (fines) as high as high as $5.5 million and with the majority in the seven-figure range. Many of these fines could have been avoided if the entity had encrypted or destroyed the PHI consistent with the NIST standards. While HIPAA does not require encryption or that level of destruction, in terms, if encryption or destruction consistent with the NIST standards is employed, the possible compromise is not considered a breach and need not be reported to the Department of Health and Human Services ("DHHS") for possible enforcement action.
Additionally, the Security Rule is very vague and only requires "reasonable and appropriate security measures. But what are such measures? In recent guidance, DHHS has released a crosswalk developed with NIST and the Office of the National Coordinator for Health IT ("ONC"), that identifies "mappings" between the NIST Framework for Improving Critical Infrastructure Cybersecurity (the Cybersecurity Framework) and the HIPAA Security Rule. Use of this crosswalk will help covered entities and business asssociates ensure that their security measures are reasonable and appropriate. If one follows the NIST guidance, it would be extremely difficult for HHS or any court to find that a healthcare information security system was anything but reasonable and appropriate.
Areas Covered in the Session:
  • What is IoT
  • What is NIST?
  • What are the NIST Standards?
  • What does NIST have to do with HIPAA?
    • The HIPAA Security Rule's reporting requirement.
    • What is Secured PHI that need not be reported?
    • How does the NIST Encryption Standard secure data so it is not reportable?
    • How does the NIST Disposal Standard secure data?
  • What is the NIST Framework for Improving Critical Infrastructure Cybersecurity?
  • What is the Purpose of the Framework?
  • NIST Cybersecurity Risk and Privacy Risk Considerations.
  • Relationship Between Cybersecurity Risks and Privacy Risks.
  • Organizational Level Cybersecurity Risk and Privacy Risk Considerations.
  • Device-level Security Risk Mitigation.
  • Device-level Privacy Risk Mitigation.
  • Control Sets, Baselines, and Overlays.
  • Possible Pre-Market Controls for IoT Device Acquisitions.
  • NIST Key Steps in Risk Assessment.
  • Conclusion and Question and Answer
Who can Benefit:
HIPAA compliance officers, HIPAA Security Officers, HIPAA Privacy Officers, Healthcare IT Officers, CFOs, CEOs, COOs, CIOs, human resources directors, business office managers, administrators, medical records personnel, health information management professionals, health care attorneys, patient accounts managers, billing services, physicians, dentists, pharmacists, physical and occupational therapists, mental and behavioral health professionals, speech and language pathologists and audiologists, nurses, chiropractors, and business associates.


Comments

Popular posts from this blog

HIPAA Compliance with the New Omnibus Rule: How to Pass an Audit to Avoid Penalties and Criminal Convictions

Compliance Key INC  -  H ipaa webinar                                           Jonathan P. Tomes Jonathan P. Tomes , J.D., is Keynote Speaker at Compliance key Inc. He is a health care attorney practicing in the greater Kansas City.   Webinar Id:   HIPHJPT001  2:30 PM PT | 03:30 PM ET    01/18/2018  Duration: 60 mins  Overview Before the HITECH Act, DHHS could audit covered entities for HIPAA compliance, but did not have to. With that Act, now the must audit those entities and business associates as well. In the first audits, the Phase I audits, DHHS came on site. The subsequent Phase II audits, however, were paper audits in which those audited had to provide documentation of their compliance. As yet, we do not know what form Phase III will take, but the necessary actions to prepar...

HIPAA Compliant Fundraising Under New Rules - 2019

Compliance Key  -  H ipaa   Compliance Training HIPAA Compliant Fundraising Under New Rules - 2019 Joel Simon Joel Simon is one of the nation's leading experts on the fund raising aspects of HIPAA. Joel has been a member of the Maryland bar for 30 years, and his professional experience includes work as the assistant general counsel of a community hospital. Joel is an editor of "Fundraising Under HIPAA" published by the Association of Fundraising Professionals. He has lectured on Fund Raising under HIPAA to national audiences since the original HIPAA regulations were first proposed 17 years ago. Read More Overview Not-for-Profit organizations that are governed by HIPAA often need or want to fund raise from their patients, clients, or families. What protocols should be in place to maximize philanthropic opportunities under HIPAA? What compliance measures need to be in place and assessed to properly use protected health information for fund raisi...

New 2019 HIPAA Guidance on De-Identifying Protected Health Information

Compliance Key  -   HIPAA Compliance Training Overview This seminar will be addressing how practice/business managers or compliance officers need to get their HIPAA house in order, as HIPAA is now fully enforced and the government is not using kid gloves anymore. It will also address major 2019 changes taking place with the Health and Human Services regarding the enforcement of the HIPAA law as well as detailed discussions on the Phase 2 audit process and current events regarding HIPAA cases (both in courtrooms and from real-life Audits). Our instructor - Mr. Brian Tuttle  has over 20 years of experience in working as Compliance auditor and has been an expert witness on multiple HIPAA cases. He`ll thoroughly explain on HOW and in WHAT scenarios patients can claim for cash remedies. More importantly, Brian will show you how to limit those risks by simply taking proactive steps and utilizing best practices. Why should you attend this seminar? This Sem...