HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
a their cyber re fans. Welcome back to the Hcs PP certification course with Sai Buri
00:07
International Regulations and Controls. My name is Shalane Hutchins and I will be your instructor
00:15
in this video. We're going to talk about treaties and laws and regulations.
00:19
This is not my area of expertise, so I'm going to give you the study book version of information.
00:25
Just know that some of this information about the specific treaties and regulations may be on the exam.
00:31
Let's begin.
00:34
Since most countries craft privacy and security regulations for internally specific reasons, it's not surprising that the regulations different
00:44
to settle the differences. Sets of countries have collaborated on international agreements to bridge the differences in how personal information is protected.
00:53
The agreements we will discuss or targeted toward international business exchanges and do not specifically address exchanges among health care organizations.
01:03
The U. S. Use Safe harbor is a framework to allow US organizations to be in compliance with the European Union in Switzerland, data protection requirements when engaged in commerce transactions with member countries.
01:18
Specifically, there is a safe harbor framework between the US and the EU
01:23
and another framework between the US and Switzerland.
01:26
organizations seeking collaboration, and either or both
01:30
the U and Switzerland would be required to review and commit to each set of principles.
01:37
On February 4th 2011 by US Canada Joint Declaration, the beyond the Border action plan was announced.
01:46
It's a shared approach to security, in which both countries work together to address threats within at an away from the borders while expediting lawful trade and travel.
01:59
The Transatlantic Information Sharing and Data Privacy Act is an effort toe enable the U and the United States to work more closely and efficiently together to exchange law enforcement information while ensuring the protection of personal data privacy.
02:19
So we've reviewed thes several times throughout the course. The mills, important laws and regulations related to health care information within the U. S is HIPPA and high tech.
02:31
Hip hop is a federal law
02:34
that was enacted and has been furthered by the requirements of the Affordable Care Act of 2010 with operating rules for each of the hip A cover transactions.
02:45
They are a unique standard health plan identify
02:47
and the standard and operating rules for Elektronik funds transfer
02:53
and Elektronik Remittance advice and claims attaches.
02:57
In addition, health plans will be required to certify their compliance.
03:02
The act provides for substantial penalties for failures to comply with the new standards and upgrading rules.
03:10
I must note and take note of this that there is no such thing as a HIPPA certification.
03:19
There are companies that claim toe offer a certificate of HIPAA compliance, and it just simply doesn't exist
03:27
while companies need to certify that they're meeting the requirements. That just means that you
03:34
assess your own organization and assess your controls against the HIPPA regulations and standards.
03:42
Um, these these false certifications air the same things as companies offering a sock to certification.
03:49
Again, there's no such thing. Sock To is an audit report
03:53
to review service in controls for an organization and to give an independent opinion.
03:58
While organizations can assess their level of compliance, HIPPA has standards of controls that are addressable and some that are required.
04:05
Those that are required must be implemented by covered entities.
04:10
Addressable requirements may or may not be implemented according to their applicability.
04:15
The high tech back
04:17
ushered in an era of rapid Elektronik record adoption, but it also brought in new requirements for security privacy and specifically breach reporting.
04:29
The sculpt of covered entities was also clarified to include business associates such as billing providers, software companies and, in some cases, banks.
04:40
The breach notification rules of high tech are detailed and mandatory for covered entities.
04:46
Covered entities must maintain a log of all breaches and submit the law to the HHS.
04:55
They must notify individuals affected by a breach within 60 days.
05:00
Breaches involving more than 500 individuals must be reported to the HHS.
05:05
They must understand restrictions related to marketing activities. Using patient information
05:13
they must use and disclose the minimum necessary subject data. To conduct a particular function or task,
05:20
they must provide an electronic copy of a patient's health record. Upon request,
05:27
the provider may charge a fee for producing the copy.
05:30
They must mail first class letters to patients who might be affected by the breach.
05:36
One important safe harbor provision exists in the high tech back for encrypted information.
05:43
If the information breached was encrypted with certified Phipps 1 40 dash to encryption,
05:49
the breach does not have to be reported.
05:53
Breaches did not have to be disclosed if the information was exposed to an authorised recipient
05:59
and not further disclosed.
06:01
For instance, if a hospital faxes information to the wrong number,
06:06
but the wrong number was also a covered entity like another doctor's office.
06:12
That doctor's office is also covered by HIPPA
06:15
and that disclosure does not have to be reported to the HHS.
06:25
Pepita is the Canadian regulation.
06:29
Organizations covered by Pepita must generally obtain an individual's consent when they collect,
06:35
use or disclose that person's information.
06:40
GDP are is one of the more recent data protection regulations.
06:45
GDP are is a regulation in the European Union
06:48
on data protection and privacy in the U and the European Economic Area. It addresses the transfer of personal data outside of the U.
07:01
As an information security professional, you should be aware of other privacy and security regulations outside of healthcare, especially where aspects of the regulations may affect or relate to health care information protection regulations.
07:15
Here are a few examples of other industry specific laws.
07:20
OSHA
07:23
is a unit of the U. S. Department of Labor and the dresses, safety and protection of workers in organizations that involve hazards and hazardous waste as potential sources of injuries and health related problems.
07:36
OSHA covers health care workers at hospitals and other medical facilities where exposures to chemicals or equipment could result in injuries or diseases.
07:48
Pc i DSS
07:50
The security standard is unique within this training and that it's the Onley standard that is the private industry sector standard as opposed to a government mandated regulation.
08:03
PC I targets merchants who accept
08:07
product and service payments from customers using specific credit cards.
08:11
Emergency air ranked by levels levels one through four based on the number of specific credit card transactions processed per year.
08:20
And each merchant is required to implement privacy and security programs to protect the financial information of customers with as much rigour and completeness as the health care standards provide. For Ph. I
08:35
health care organizations that allow credit card transactions for the payment services fall under PC Idea says compliance.
08:43
Such services provided by hospitals such as bill payments, pharmacy, laboratory, radiology services, food services, gift shops for all shops, etcetera may be covered by P. C. I.
09:00
Now f O I. A or Freedom of Information Act is primarily seen as a basis for obtaining federal stores of information that are seen as publicly accessible and is frequently used by private citizens for political or legal issues.
09:18
F o I. A. Offers very little to direct protection of pH I or P I I
09:24
that is not found in more appropriate regulations, but it is included here because it was actually one of the first U. S. Laws toe identify federal information that was not free to be distributed.
09:39
Wow. Congratulations. You made it through treaties, laws and regulations. I'll see in the next video.

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor