SlideShare una empresa de Scribd logo
Protecting Personal Health Records – Data at Rest Encryption Privacy and Security of Personal Health Information Protecting Data at Rest
Health Information Security Adoption and implementation of emerging  health IT solutions must involve reassessment of security practices and policies Healthcare providers are expected to prevent the unauthorized access, use and disclosure of a patient’s protected electronic health information  Developing a comprehensive strategy for  ensuring the confidentiality, integrity and availability of  electronic patient data will be required
Health Information Security Assessing the health IT environment requires an understanding of all technologies being used throughout the enterprise for clinical, and administrative purposes Evaluate any possible situation for unauthorized access and use.  Today, many individuals and groups have access to, and can share electronic medical records and confidential patient information, including: Government and public health agencies Insurance companies Hospital and Physician office personnel IT vendors and their business associates Part of the healthcare providers comprehensive security strategy will include a professional grade encryption solution
Encryption Is a process that transforms plaintext data (using a certified algorithm like AES – Advanced Encryption Standard) into a format that makes it unreadable without an authorization key  The authorization key is a type of password and is required to encrypt and also decrypt the data Key Management is the process of monitoring the algorithms and the employees keys, and is managed by a key custodian Changing keys regularly is referred to as Key Rotation, and is necessary in order to maintain optimum security levels
Encryption	 The key management and key rotation processes are the most critical aspects of data encryption  Most conventional solutions are time consuming and can be difficult, especially with limited IT staffing and support A simple yet sophisticated technology is necessary in order to manage a continuous cycle of key creation, splitting, initialization, rotation and deletion
Encryption Encryption is part of a comprehensive prevention strategy when used in conjunction with other technologies, and can be a first and last line of defense against: Accidental loss or disclosure of confidential data by employees, business associates and consultants Internal access by employees (malicious) Lost or misplaced laptops Theft Office break-in External breach / Hacker (malicious)
Types of Encryption Solutions Software Solutions Limited security capability with inside employees Sold as individual licenses – can be very expensive  Will decrease database performance Difficult and complex key management and rotation Typically requires a dedicated IT staff to manage and support May not support certain operating systems (Linux, Mac OS X)
Types of encryption solutions Hardware or Appliance-based Lower Total Cost of Ownership – No licensing fees  Can be installed at web, application or database server Does not effect system speed or performance Minimal integration and IT expertise needed Non-proprietary, can be used with any operating system Scalable to large organizations without additional licensing costs Offloads encryption processing from servers
Appliance-based Encryption Resides on the network and use a hardware device to encrypt and decrypt at high speeds Offloads cryptographic processing from database  for improving system performance Scalable to handle any quantity of data Not operating system (OS) dependent.  Typically compatible to most IT environments and networks Integrates easily with EMR, Practice Management, Imaging and Clinical information systems Ideal for hosted solutions
JANA Series Technology Award-winning encryption technology Complies with state and federal security and privacy rules Powerful, yet simple key management and key rotation features Works in any operating environment Can be used simultaneously by multiple (different) business applications Scalable to any size healthcare provider, from a physician office to the large, geographically dispersed Integrated Delivery Network (IDN) Manufactured in USA by Dark Matter Labs
JANA Series Technology Appliance-based solution offering superior performance and security Easy upgrading and updating when required State-of-the-art software delivered on a revolutionary hardware platform Offers strict control over encryption keys Increases network performance Can be interfaced with web servers,  application servers (recommended), database servers, or customized servers
	JANA Series Technology JANA appliances are award winning encryption solutions that completely offload intense cryptographic processing from overworked servers 3 Devices designed for small to enterprise-wide applications Employs government certified algorithms Completely independent of database, operating system, and application Units differentiate based on processing power, speed, number of Ethernet ports and high availability capability
Installation Diagram
Dark Matter Labs Offers an advanced level of security through an appliance-based solution Highest level customer support with an industry-first perpetual hardware replacement warranty Offers comprehensive technical support and encryption training No hidden costs, licenses or vendor lock-in when purchasing appliance-based technology Simple to install and use
Who should encrypt? All healthcare providers who access and store protected health information. Hospitals, physician offices, pharmacies, clinics, labs, psychiatry offices, imaging centers and dentists Healthcare management organizations, i.e. HMO’s Health Insurance companies  Commercial vendors i.e. EMR software, Hospital Information Systems, Billing and Transcription, Hosting services, Imaging Equipment
Why encrypt? Protect data even in the event of a security breach Safeguard patient information HIPAA compliance, and  TO AVOID Financial loss (large fines, lost patients & revenue) Legal ramifications (regulatory or civil prosecution) Damage to professional image (negative publicity & media fallout)
Jana series encryption  http://darkmatterlabs.net

Más contenido relacionado

Último

Why invest into infodemic management in health emergencies
Why invest into infodemic management in health emergenciesWhy invest into infodemic management in health emergencies
Why invest into infodemic management in health emergenciesTina Purnat
 
Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Sujoy Dasgupta
 
Aptopadesha Pramana / Pariksha: The Verbal Testimony
Aptopadesha Pramana / Pariksha: The Verbal TestimonyAptopadesha Pramana / Pariksha: The Verbal Testimony
Aptopadesha Pramana / Pariksha: The Verbal TestimonyDr KHALID B.M
 
Final CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptx
Final CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptxFinal CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptx
Final CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptxgauripg8
 
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...Catherine Liao
 
Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)
Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)
Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)Dr. Aryan (Anish Dhakal)
 
Factors Affecting child behavior in Pediatric Dentistry
Factors Affecting child behavior in Pediatric DentistryFactors Affecting child behavior in Pediatric Dentistry
Factors Affecting child behavior in Pediatric DentistryDr Simran Deepak Vangani
 
PT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptxPT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptxdrtabassum4
 
DECIPHERING COMMON ECG FINDINGS IN ED.pptx
DECIPHERING COMMON ECG FINDINGS IN ED.pptxDECIPHERING COMMON ECG FINDINGS IN ED.pptx
DECIPHERING COMMON ECG FINDINGS IN ED.pptxdrwaque
 
Introducing VarSeq Dx as a Medical Device in the European Union
Introducing VarSeq Dx as a Medical Device in the European UnionIntroducing VarSeq Dx as a Medical Device in the European Union
Introducing VarSeq Dx as a Medical Device in the European UnionGolden Helix
 
THORACOTOMY . SURGICAL PERSPECTIVES VOL 1
THORACOTOMY . SURGICAL PERSPECTIVES VOL 1THORACOTOMY . SURGICAL PERSPECTIVES VOL 1
THORACOTOMY . SURGICAL PERSPECTIVES VOL 1DR SETH JOTHAM
 
Impact of cancers therapies on the loss in cardiac function, myocardial fffic...
Impact of cancers therapies on the loss in cardiac function, myocardial fffic...Impact of cancers therapies on the loss in cardiac function, myocardial fffic...
Impact of cancers therapies on the loss in cardiac function, myocardial fffic...Catherine Liao
 
180-hour Power Capsules For Men In Ghana
180-hour Power Capsules For Men In Ghana180-hour Power Capsules For Men In Ghana
180-hour Power Capsules For Men In Ghanahealthwatchghana
 
A thorough review of supernormal conduction.pptx
A thorough review of supernormal conduction.pptxA thorough review of supernormal conduction.pptx
A thorough review of supernormal conduction.pptxSergio Pinski
 
Muscle Energy Technique (MET) with variant and techniques.
Muscle Energy Technique (MET) with variant and techniques.Muscle Energy Technique (MET) with variant and techniques.
Muscle Energy Technique (MET) with variant and techniques.Anjali Parmar
 
Young at heart: Cardiovascular health stations to empower healthy lifestyle b...
Young at heart: Cardiovascular health stations to empower healthy lifestyle b...Young at heart: Cardiovascular health stations to empower healthy lifestyle b...
Young at heart: Cardiovascular health stations to empower healthy lifestyle b...Catherine Liao
 
Retinal consideration in cataract surgery
Retinal consideration in cataract surgeryRetinal consideration in cataract surgery
Retinal consideration in cataract surgeryKafrELShiekh University
 
TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...
TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...
TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...kevinkariuki227
 
ANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptx
ANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptxANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptx
ANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptxBright Chipili
 
Integrated Neuromuscular Inhibition Technique (INIT)
Integrated Neuromuscular Inhibition Technique (INIT)Integrated Neuromuscular Inhibition Technique (INIT)
Integrated Neuromuscular Inhibition Technique (INIT)Anjali Parmar
 

Último (20)

Why invest into infodemic management in health emergencies
Why invest into infodemic management in health emergenciesWhy invest into infodemic management in health emergencies
Why invest into infodemic management in health emergencies
 
Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...
 
Aptopadesha Pramana / Pariksha: The Verbal Testimony
Aptopadesha Pramana / Pariksha: The Verbal TestimonyAptopadesha Pramana / Pariksha: The Verbal Testimony
Aptopadesha Pramana / Pariksha: The Verbal Testimony
 
Final CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptx
Final CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptxFinal CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptx
Final CAPNOCYTOPHAGA INFECTION by Gauri Gawande.pptx
 
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
 
Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)
Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)
Book Trailer: PGMEE in a Nutshell (CEE MD/MS PG Entrance Examination)
 
Factors Affecting child behavior in Pediatric Dentistry
Factors Affecting child behavior in Pediatric DentistryFactors Affecting child behavior in Pediatric Dentistry
Factors Affecting child behavior in Pediatric Dentistry
 
PT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptxPT MANAGEMENT OF URINARY INCONTINENCE.pptx
PT MANAGEMENT OF URINARY INCONTINENCE.pptx
 
DECIPHERING COMMON ECG FINDINGS IN ED.pptx
DECIPHERING COMMON ECG FINDINGS IN ED.pptxDECIPHERING COMMON ECG FINDINGS IN ED.pptx
DECIPHERING COMMON ECG FINDINGS IN ED.pptx
 
Introducing VarSeq Dx as a Medical Device in the European Union
Introducing VarSeq Dx as a Medical Device in the European UnionIntroducing VarSeq Dx as a Medical Device in the European Union
Introducing VarSeq Dx as a Medical Device in the European Union
 
THORACOTOMY . SURGICAL PERSPECTIVES VOL 1
THORACOTOMY . SURGICAL PERSPECTIVES VOL 1THORACOTOMY . SURGICAL PERSPECTIVES VOL 1
THORACOTOMY . SURGICAL PERSPECTIVES VOL 1
 
Impact of cancers therapies on the loss in cardiac function, myocardial fffic...
Impact of cancers therapies on the loss in cardiac function, myocardial fffic...Impact of cancers therapies on the loss in cardiac function, myocardial fffic...
Impact of cancers therapies on the loss in cardiac function, myocardial fffic...
 
180-hour Power Capsules For Men In Ghana
180-hour Power Capsules For Men In Ghana180-hour Power Capsules For Men In Ghana
180-hour Power Capsules For Men In Ghana
 
A thorough review of supernormal conduction.pptx
A thorough review of supernormal conduction.pptxA thorough review of supernormal conduction.pptx
A thorough review of supernormal conduction.pptx
 
Muscle Energy Technique (MET) with variant and techniques.
Muscle Energy Technique (MET) with variant and techniques.Muscle Energy Technique (MET) with variant and techniques.
Muscle Energy Technique (MET) with variant and techniques.
 
Young at heart: Cardiovascular health stations to empower healthy lifestyle b...
Young at heart: Cardiovascular health stations to empower healthy lifestyle b...Young at heart: Cardiovascular health stations to empower healthy lifestyle b...
Young at heart: Cardiovascular health stations to empower healthy lifestyle b...
 
Retinal consideration in cataract surgery
Retinal consideration in cataract surgeryRetinal consideration in cataract surgery
Retinal consideration in cataract surgery
 
TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...
TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...
TEST BANK For Wong’s Essentials of Pediatric Nursing, 11th Edition by Marilyn...
 
ANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptx
ANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptxANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptx
ANATOMY OF THE LOWER URINARY TRACT AND MALE [Autosaved] [Autosaved].pptx
 
Integrated Neuromuscular Inhibition Technique (INIT)
Integrated Neuromuscular Inhibition Technique (INIT)Integrated Neuromuscular Inhibition Technique (INIT)
Integrated Neuromuscular Inhibition Technique (INIT)
 

Destacado

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Protecting Personal Health Records - Data at Rest Encryption

  • 1. Protecting Personal Health Records – Data at Rest Encryption Privacy and Security of Personal Health Information Protecting Data at Rest
  • 2. Health Information Security Adoption and implementation of emerging health IT solutions must involve reassessment of security practices and policies Healthcare providers are expected to prevent the unauthorized access, use and disclosure of a patient’s protected electronic health information Developing a comprehensive strategy for ensuring the confidentiality, integrity and availability of electronic patient data will be required
  • 3. Health Information Security Assessing the health IT environment requires an understanding of all technologies being used throughout the enterprise for clinical, and administrative purposes Evaluate any possible situation for unauthorized access and use. Today, many individuals and groups have access to, and can share electronic medical records and confidential patient information, including: Government and public health agencies Insurance companies Hospital and Physician office personnel IT vendors and their business associates Part of the healthcare providers comprehensive security strategy will include a professional grade encryption solution
  • 4. Encryption Is a process that transforms plaintext data (using a certified algorithm like AES – Advanced Encryption Standard) into a format that makes it unreadable without an authorization key The authorization key is a type of password and is required to encrypt and also decrypt the data Key Management is the process of monitoring the algorithms and the employees keys, and is managed by a key custodian Changing keys regularly is referred to as Key Rotation, and is necessary in order to maintain optimum security levels
  • 5. Encryption The key management and key rotation processes are the most critical aspects of data encryption Most conventional solutions are time consuming and can be difficult, especially with limited IT staffing and support A simple yet sophisticated technology is necessary in order to manage a continuous cycle of key creation, splitting, initialization, rotation and deletion
  • 6. Encryption Encryption is part of a comprehensive prevention strategy when used in conjunction with other technologies, and can be a first and last line of defense against: Accidental loss or disclosure of confidential data by employees, business associates and consultants Internal access by employees (malicious) Lost or misplaced laptops Theft Office break-in External breach / Hacker (malicious)
  • 7. Types of Encryption Solutions Software Solutions Limited security capability with inside employees Sold as individual licenses – can be very expensive Will decrease database performance Difficult and complex key management and rotation Typically requires a dedicated IT staff to manage and support May not support certain operating systems (Linux, Mac OS X)
  • 8. Types of encryption solutions Hardware or Appliance-based Lower Total Cost of Ownership – No licensing fees Can be installed at web, application or database server Does not effect system speed or performance Minimal integration and IT expertise needed Non-proprietary, can be used with any operating system Scalable to large organizations without additional licensing costs Offloads encryption processing from servers
  • 9. Appliance-based Encryption Resides on the network and use a hardware device to encrypt and decrypt at high speeds Offloads cryptographic processing from database for improving system performance Scalable to handle any quantity of data Not operating system (OS) dependent. Typically compatible to most IT environments and networks Integrates easily with EMR, Practice Management, Imaging and Clinical information systems Ideal for hosted solutions
  • 10. JANA Series Technology Award-winning encryption technology Complies with state and federal security and privacy rules Powerful, yet simple key management and key rotation features Works in any operating environment Can be used simultaneously by multiple (different) business applications Scalable to any size healthcare provider, from a physician office to the large, geographically dispersed Integrated Delivery Network (IDN) Manufactured in USA by Dark Matter Labs
  • 11. JANA Series Technology Appliance-based solution offering superior performance and security Easy upgrading and updating when required State-of-the-art software delivered on a revolutionary hardware platform Offers strict control over encryption keys Increases network performance Can be interfaced with web servers, application servers (recommended), database servers, or customized servers
  • 12. JANA Series Technology JANA appliances are award winning encryption solutions that completely offload intense cryptographic processing from overworked servers 3 Devices designed for small to enterprise-wide applications Employs government certified algorithms Completely independent of database, operating system, and application Units differentiate based on processing power, speed, number of Ethernet ports and high availability capability
  • 14. Dark Matter Labs Offers an advanced level of security through an appliance-based solution Highest level customer support with an industry-first perpetual hardware replacement warranty Offers comprehensive technical support and encryption training No hidden costs, licenses or vendor lock-in when purchasing appliance-based technology Simple to install and use
  • 15. Who should encrypt? All healthcare providers who access and store protected health information. Hospitals, physician offices, pharmacies, clinics, labs, psychiatry offices, imaging centers and dentists Healthcare management organizations, i.e. HMO’s Health Insurance companies Commercial vendors i.e. EMR software, Hospital Information Systems, Billing and Transcription, Hosting services, Imaging Equipment
  • 16. Why encrypt? Protect data even in the event of a security breach Safeguard patient information HIPAA compliance, and TO AVOID Financial loss (large fines, lost patients & revenue) Legal ramifications (regulatory or civil prosecution) Damage to professional image (negative publicity & media fallout)
  • 17. Jana series encryption http://darkmatterlabs.net