Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

3 EHR Security Lessons from Anthem’s Security Breach

3 ehr security

Exclusive Article by Ronald Vatalaro at EMRIndustry.com

As the medical industry goes high-tech with the implementation of electronic health records (EHR), credit card companies are not the only targets catching the eye of cybercriminals.

A massive security breach made public in February at Anthem, the nation’s second largest health insurer, sheds light on the importance of security and vigilance as healthcare providers and others bring sensitive patient information into the world of e-healthcare.

About the Anthem Breach

The breach at Anthem, the medical insurer of one in nine Americans, occurred on Dec. 10, 2014. The compromise went undetected until Jan. 27, 2015, when a database administrator became aware of someone using his credentials to perform a suspicious query.

Just two days later, Anthem reported the findings of its internal investigation to federal authorities and the breach was made public on Feb. 4.

Anthem’s breach makes it very clear that vigilance is necessary as EHRs are implemented in practices and facilities across the country.

Safe data storage with networks and security processes designed to protect patient information that includes account numbers, names, addresses, Social Security numbers and more, must be created.

3 Key Takeaways

The highly publicized breach at Anthem teaches lessons all healthcare-related providers using EHRs can benefit from.

Three main takeaways from the cyberattack pinpoint the responsibilities providers and support agencies, such as insurance companies, have in safeguarding their patient and/or client information:

System Considerations

Selection of systems to handle the need for EHR must go beyond program features and bells and whistles. Organizations must seek out products that deliver security features consistent with their needs and the sensitivity of the information stored on patients’ behalf.

Sound EHRs offer the ability to limit access and provide screening controls so only authorized staff can access sensitive information.

In addition, user activity logging features provide audit trails that record all navigation in the system while features that require users to justify manual printing of information limit the potential for unauthorized screen printing and unauthorized downloading of information.

Seeking out and demanding informatics systems that offer these safeguards and more is fast becoming critical.

Recommendations for HIM Professionals

Health Information Management professionals find themselves in not just the role of organizing, collecting and managing patient data, but also making sure it is protected.

With that in mind, HIM professionals must ensure their EHRs offer the functionality necessary for the organization to meet regulatory and operational requirements while safeguarding patient information.

Recommendations for doing so include:

  • Identifying the location of information in the organization to verify state-specific guidelines
  • Identifying functions in the system that create risk and working to limit or restrict their use
  • Identifying security features that deliver higher levels of protection and implementing their use to safeguard sensitive information
  • When choosing an EHR system, it falls on HIM professionals to systematically and independently evaluate the system without relying on vendor information to gauge system functionality
  • Creating partnerships with IT counterparts to ensure the best functionality and security on a day-to-day basis

Security Features to Consider

Making sure EHRs deliver the necessary level of security to avoid breaches such as Anthem’s requires inclusion of a number of security features in the system itself.

These distinct features can make a difference in providing appropriate levels of protection:

  • Role-based security that restricts access to information based on pre-established categories of patients, encounters and documents based on specific job requirements of the user
  • VIP status indicators that enable restriction of identified patients and encounters to only those with VIP permissions
  • Ability to create an alias to mask patient identity
  • Ability to restrict physician access to only those patients the doctor serves as the physician of record for
  • Blocking abilities for specific progress notes or lab results
  • Ability to track and mask sensitive entries for release of information

Where to Turn for More Assistance

HIM professionals and others interested in learning more about how to safeguard sensitive patient data will find the federal government provides a clearinghouse of information on privacy and security via HealthIT.gov.

This website provides step-by-step plans for ensuring patient privacy and security, offers advice on how to integrate privacy and security into a medical practice and discusses privacy and security in regard to meaningful use, among other crucial topics.

As EHRs take the practice of medicine further into the high-tech world, cybercriminals are taking note. Safeguarding sensitive information is critical for protecting patients and their identities.

As the Anthem breach demonstrates, this brave new world is giving rise to potential pitfalls that HIM professionals must serve as sentinels against.

Ron Vatalaro works at Bisk Education with the USF Health online and writes about health informatics. Ron holds an advanced degree in Business Administration with a concentration in technology.

Take the USF Health Online 2015 Health IT Industry Survey .