Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

Using the cloud data life cycle to protect patient privacy

cloud data life cycle

Using the cloud data life cycle to protect patient privacy

In an ideal world, technology would maximize individual benefits while also protecting privacy.

But in practice, the pivot to digital-first healthcare has sometimes left personal information vulnerable to attack – as evidenced by the recent spike in targeting of health systems.

One example of this paradigm, says Dr. James Angle, product manager for IT services in information security, at Trinity Health, involves the migration of increased amounts of data to the cloud.

“Before the use of cloud, PHI was stored either in the [health delivery organization’s] data center or a third-party data center,” noted Angle, who will be presenting on the subject at HIMSS21 in August.

“With cloud, data is stored in multiple data centers in multiple jurisdictions,” Angle continued. “The increase [in] data storage locations gives attackers more targets.”

“In addition, having multiple jurisdictions means more, as well as different, requirements. This adds complexity, which is the enemy of privacy and security,” he added.

During his HIMSS21 presentation, Angle will discuss the process of analyzing how an organization collects, uses, shares and maintains personal identifying information, as well as how to best protect that information.

“Ensuring privacy for our patients is a process that starts with privacy engineering and includes conducting privacy risk assessments and understanding the data life cycle,” he said. “If these processes are followed, we will enhance our ability to protect our patients’ information.”

Angle will also explain how HIPAA’s privacy rule functions in the context of security and information sharing.

“The purpose of the privacy rule is to give patients more control over their health information. The HIPAA Privacy Rule creates national standards to protect individuals’ medical records and other protected health information,” he said.

“Additionally, the privacy rule defines and limits the circumstances in which an individual’s PHI can be used or disclosed by a covered entity or its business associates,” he continued.

Returning to the matter of the cloud, Angle notes that the data life cycle gives the analyst a structured way to look at privacy.

“There are six phases in the cloud data life cycle: create, store, use, share, archive and destroy. Each phase has different requirements and issues that must be addressed,” he said.

The “create” phase, which involves the generation or acquisition of new data or the modification of existing data, can be a useful example of this.

“When personal data is collected, it is important to remember that the individual whose data is being collected has the right to know what data is being collected, what the data will be used for, and if it will be shared,” Angle said. “The collector must obtain consent, which means asking users for permission to process their data.

“Healthcare delivery organizations must explain their data collection practices in clear and simple language, and then users must explicitly agree to them. Additionally, it defines who can collect PHI/PII data and map the data to access rights for everyone who has access,” he added.

Even as the cloud has enabled innovation, Angle notes that it also adds complexity to an organization’s data protection plan.

“Data must not only be protected inside the HDO’s network but also in transit and in the cloud,” he said. “The HDO needs to know where the data will be stored, who has access to the data, and what controls are in place to protect the data.”

“Using the data life cycle, the analyst can look at the requirements for each phase and ensure the correct controls are in place to protect the patient’s privacy throughout the entire data life cycle,” he continued.

“By using the data life cycle, you are answering who, what, when, why, and how the data is treated in each phase. This will give you a clear picture of the data and, in turn, how to protect the data.