05
INTERNAL AUDIT REPORT INFORMATION TECHNOLOGY AUDIT HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) COMPLIANCE AUDIT 2016 ISSUE DATE: AUGUST 8, 2016 REPORT NO. 2016-13 EXECUTIVE SUMMARY AUDIT OBJECTIVES AND SCOPE The purpose of the audit was to ensure the Port is in compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). Details of our audit's scope and methodology are on page 2. BACKGROUND The HIPAA Security Rule includes the potential risks and vulnerabilities to the confidentiality, availability and integrity of all electronic protected health information (ePHI) that an organization creates, receives, maintains or transmits. This includes e-PHI in all forms of electronic media or portable electronic media. Electronic media includes a single workstation as well as complex networks connected between multiple locations. Thus, an organization's risk analysis should take into account all of its ePHI, regardless of the particular medium in which it is created, received, maintained or transmitted, and regardless of the source or location of the e-PHI. The HIPAA Privacy Rule extends the administrative, physical and technical safeguards of the HIPAA Security Rule to non-electronic PHI. 42 CFR 164.530(c) requires covered entities to have in place "appropriate administrative, physical and technical safeguards to protect the privacy of protected health information." Additional clarification is provided by the Office for Civil Rights (OCR) in its commentary on the Interim Final Breach Notification Rule in which it notes that "the term ''unsecured protected health information'' can include information in any form or medium, including electronic, paper, or oral form." (Federal Register, Volume 74, No. 162, Monday, August 24, 2009. "Breach Notification for Unsecured Protected Health Information") O AUDIT RESULT The Port is not in full compliance with the HIPAA ACT, which is prescriptive in its detailed and lengthy requirements. Opportunities exist to enhance Port practices and document procedures to become compliant. i TABLE OF CONTENTS EXECUTIVE SUMMARY ........................................................................................................................................... i TRANSMITTAL LETTER ........................................................................................................................................... 1 BACKGROUND ....................................................................................................................................................... 2 HIGHLIGHTS AND ACCOMPLISHMENTS ............................................................................................................... 2 AUDIT SCOPE AND METHODOLOGY ...................................................................................................................... 2 CONCLUSION ......................................................................................................................................................... 2 REPORTED ISSUES AND RECOMMENDATIONS....................................................................................................3 TRANSMITTAL LETTER Audit Committee Port of Seattle Seattle, Washington We have completed an audit of compliance with the HIPAA act. We conducted this performance audit in accordance with Generally Accepted Government Auditing Standards and the International Standards for the Professional Practice of Internal Auditing. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis of our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We extend our appreciation to the management and staff of the Human Resource Department, Information & Communications Technology (ICT), and Security & Emergency Preparedness for their assistance and cooperation during the audit. On behalf of Joyce Kirangi, CPA, CGMA Internal Audit, Director AUDIT TEAM RESPONSIBLE MANAGEMENT TEAM Brian Nancekivell, Sr. Auditor Selena Tonti, CISO APGAR & Associates Claudia Kay, HIPAA Privacy Officer, HR Kim Albert, Asst. ICT Director BACKGROUND The HIPAA Security Rule encompasses the potential risks and vulnerabilities to the confidentiality, availability and integrity of all electronic protected health information (ePHI) that an organization creates, receives, maintains or transmits. This includes e-PHI in all forms of electronic media or portable electronic media. Electronic media includes a single workstation as well as complex networks connected between multiple locations. Thus, an organization's risk analysis should take into account all of its ePHI, regardless of the particular medium in which it is created, received, maintained or transmitted, and regardless of the source or location of the e-PHI. The work related to HIPAA and ePHI is a small portion of the work that Port employee perform and PHI is likewise a small portion of all data that is used at the Port. The HIPAA Privacy Rule extends the administrative, physical and technical safeguards of the HIPAA Security Rule to non-electronic PHI. 42 CFR 164.530(c) requires covered entities to have in place "appropriate administrative, physical and technical safeguards to protect the privacy of protected health information." Additional clarification is provided by the Office for Civil Rights (OCR) in its commentary on the Interim Final Breach Notification Rule in which it notes that "the term ''unsecured protected health information'' can include information in any form or medium, including electronic, paper, or oral form." (Federal Register, Volume 74, No. 162, Monday, August 24, 2009. "Breach Notification for Unsecured Protected Health Information") HIGHLIGHTS AND ACCOMPLISHMENTS During the course of the audit, we observed the Port is well along the way towards compliance and implementing a robust information security program. AUDIT SCOPE AND METHODOLOGY To ensure that the Port is in compliance with the HIPAA requirements, we engaged Apgar & Associates, a firm specializing in HIPAA, to perform a detailed audit and risk assessment of the HIPAA Security and Privacy Rules. Detailed reports and analysis were provided to management for their consideration. CONCLUSION The Port is not in full compliance with the HIPAA act, which is prescriptive in its requirements. Opportunities exist to enhance Port practices and document procedures to become compliant. The Port of Seattle has made significant improvements to implement a robust information security program. However, several significant risks remain. 2 REPORTED ISSUES AND RECOMMENDATIONS 1. EXPAND THE SECURITY INCIDENT RESPONSE PLAN The Port of Seattle has developed a security Incident Response Plan. The Plan does not address security incidents that involve protected health information except by referral to the Benefits Department. There is not a specific Privacy Incident Response Plan. The current policy only addresses incidents that were caused by the Port's employees and vendors. Breaches are inevitable but the impact of a breach of sensitive information can be minimized if staff are trained and a thorough plan is developed. The cost of a breach can be significant if the team is unable to act quickly in the event of a breach of sensitive data. It is important to plan for breaches caused by employees and vendors. It's also important to plan for breaches that are the result of cybercrime. Recommendations We recommend that management expand the existing security incident response plan to address breaches of protected health information and train all team members. Management should also update its policy and plan to address breaches that are the result of cybercrime and/or physical intrusion by unauthorized individuals. Management response Management agrees that the Incident Response Plan should be expanded to address breaches (i.e. protected health information, privacy). This expansion, to include awareness and training will be led by the CISO. 2. ACCESS TERMINATION POLICY The Port has not adopted a termination policy. Defined termination procedures serve to ensure that terminating employees can no longer access Port assets following termination. Recommendations We recommend that management develop and adopt a termination policy and procedure and train impacted staff regarding responsibilities and timing for PHI. Management Response The Human Resources department appreciates the very thorough and specific approach that the auditors took while performing this audit. We believe it is important to recognize that about ten HR and other department employees have access to PHI and that it is imperative that this information be handled with the utmost care by those who work with it. We acknowledge that our existing employee off boarding practices do not specifically address off boarding employees when the termination is involuntary. To address this, the HR department plans to conduct a comprehensive review of all our HIPAA related practices in 2017. This review will include updating practices and associated documentation as well as ensuring that training reflects updated practices and that employees 3 needing to be aware of HIPAA requirements and those with access to PHI receive updated training on the updated practices. 3. MOBILE DEVICE USAGE Port employees may be permitted to access Port digital assets such as email using personally owned mobile devices. No tool has been implemented to manage personally owned devices to ensure that devices are encrypted and can be wiped if replaced, lost, or stolen. Mobile device use in the workplace, especially personally owned devices, represents one of the most significant risks to companies working in the healthcare space today. The lack of a formal and communicated mobile device management policy in the general private and public sectors has and will continue to lead to loss of sensitive health data, harm to businesses and harm to individuals. Recommendations We recommend that the Port of Seattle enforce the remote wipe of personally owned mobile devices used to access Port resources that are lost or stolen. We also recommend requiring at a minimum an eight-digit passcode. Finally, we recommend that management adopt a BOYD (Bring Your Own Device) policy. Management response The Port currently has a mobile device management (MDM) solution that manages all Port-owned devices, as well as a mobile user agreement that is signed by all Port users issued Port mobile devices. Policy related to the use of Port systems and Port mobile devices is understood. Security controls are also enforced on Port devices, such as remote wipe, a robust passcode length and encryption. For personally owned devices that receive Port email, the Port has another solution in place that supports a limited enforcement of passcode length and encryption. Management agrees that a formal personal device policy should be adopted and communicated across the Port. This will be an agenda item at the next scheduled IT Governance Board with the recommendation to technically (enforce) prohibit live-feed of Port email to Personal devices. Port Policy, Code of Conduct-7 (CC-7) Information Systems and Services Acceptable Use Policy, explicitly prohibits the storing of HIPAA information on personal computers and removable media. Reference Section V that discusses Prohibited Item (g): Downloading or storing of Port sensitive information (e.g., Social Security Numbers, HIPAA, CJIS, credit card numbers, etc.) on personal computers, removable media, or portable devices. CC-7, Section VI (h), also explicitly requires "System Users" to immediately report any lost or stolen systems to the service desk and to file a police report. It doesn't distinguish between personal and work systems. 4. DESTRUCTION OF MEDIA No mechanism is in place to ensure proper destruction by Benefits Department staff. It also appears a business associate agreement has not been executed between the Port of Seattle and the vendor to 4 destroy media at the end of its useful life. The HIPAA Security Plan states that the disposal of electronic media created by the Benefits Department and other departments, such as HRD, and stored on disks and/or memory sticks is done by members of those departments using standard techniques or the media is transferred to ICT for destruction. "Standard techniques" are not defined. A draft policy was provided that indicates that all portable media at the end of its useful life is transferred to ICT for proper destruction. Recommendations We recommend that the Port adopt the policy changes and update the HIPAA Security Plan to reflect the changes. Management response Port Policy, Code of Conduct-7 Information Systems and Services Acceptable Use Policy, prohibits the storing of HIPAA information on removable media: Section V(g) Downloading or storing of Port sensitive information (e.g., Social Security Numbers, HIPAA, CJIS, credit card numbers, etc.) on personal computers, removable media, or portable devices; If HRD and staff follow CC-7 policy, then sensitive data is not at risk from disposal policies as currently written. Nevertheless, Management agrees with the recommendation to finalize and communicate the destruction policy for the Port. The HIPAA Security Plan will be updated to reflect required method/process of destruction. 5
Limitations of Translatable Documents
PDF files are created with text and images are placed at an exact position on a page of a fixed size.
Web pages are fluid in nature, and the exact positioning of PDF text creates presentation problems.
PDFs that are full page graphics, or scanned pages are generally unable to be made accessible, In these cases, viewing whatever plain text could be extracted is the only alternative.