Time
51 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:01
Hello and welcome to CyberRays. Intermediate Data Security Course ph. I. I'll be instructor Dustin Perry. In today's video, we're going to discuss what PH. I is and go over a little bit about your health and your rights so it's going get started.
00:18
P. H. I or protected health information, sometimes referred to as private or personal health information, includes most information about someone's personal health,
00:29
things like demographic information, medical history tests,
00:33
lab results, mental health conditions, insurance information and really any other data that a health care provider collects to help identify a person and determine the appropriate care.
00:45
Under the Health Insurance Portability and Accountability Act, or HIPPA, of 1996 and revisions to HIPPA in 2009. Health Information Technology for Economic and Clinical Health,
00:58
or the high Tech Act covered entities include healthcare providers, insurers and their business associates.
01:04
And these entities air limited in the types of ph I. They can collect from individuals, share with other organizations or use in marketing.
01:14
In addition, organizations must provide protected health information to patients if requested
01:19
beyond its use to patients and health care professionals. It's also really valuable to clinical and scientific researchers When Anonima ized
01:29
for hackers, Ph. I is a treasure trove of personal consumer information that, when stolen, can be sold elsewhere, held hostage to ransomware or used Teoh steal someone's identity
01:42
by its very nature. Healthcare deals with sensitive details about a patient including birthdate, medical conditions and health insurance claims
01:49
while he used to be stored in a paper based records or now typically these air stored as Elektronik health records and known as AH E H R from their stored in any HR system.
02:04
PH I explains a patient's medical history, including any ailments, various treatments and outcomes.
02:10
From the moment you were born, you had your pH I entered into an each our system, including your date of birth, any measurements like height, length, weight, body temperatures in any issues you may have had during delivery
02:23
every time you went to the doctor for a vaccination, a cold, a broken bone. All that information is tracked in an E H R system,
02:31
and this helps doctors and other professionals in the healthcare field during future visits. All this information about you from the time you were born until the time you pass, is kept in an HR system.
02:43
As you can imagine, this information is typically a huge target for hackers, whether it's gathering the information for other purposes, like stealing identities, accessing medical records for targeted tax getting medications. It's also targeted by hackers because it's so valuable to the health care groups themselves.
03:01
Typically, hospitals and other health care organizations have old and outdated systems, and these systems are extremely vulnerable to ransomware and other attacks.
03:12
With this information encrypted, it's very important for hospitals and healthcare organizations to get the data back,
03:17
which allows the rants were craters and Attackers to charge large amounts of money
03:23
in order to get that information back.
03:25
Another use for Ph. I is research, typically the state. It will be stripped of any identifying features like names, socials, birthdates, then submitted anonymously to large databases of patient information.
03:39
This data can be used for health management and value based care programs.
03:46
Most of us believe that our medical records and other health information is private and should be protected,
03:53
and we want to know who has this information.
03:54
The privacy rule, which is a federal law, gives you rights over your health information and sets rules and limits on who can look at and receive your health information.
04:04
The privacy rule applies to all forms of individuals protected health information, whether that's Elektronik written or even aural. The security rule is a federal law that requires security for health information in electronic form.
04:18
Covered entities for the security rule include health plans, and that's things like health insurance companies, HMO's company, health plans and even certain government programs that pay for health care like Medicare or Medicaid.
04:33
Most health care providers are also covered those that conduct certain businesses electronically. Like your Elektronik. Rebuilding Your health insurance includes most doctors, clinics, hospitals, psychologists,
04:46
chiropractors, nursing homes, pharmacies and dentists.
04:50
It also covers health care clearinghouses, which are entities that process nonstandard health information they receive from another entity into a standard Elektronik format, typically or vice versa. In addition, business associates of covered entities must follow parts of the HIPPA regulations.
05:12
Often contractors, subcontractors and other outside persons and companies that are not employees of a covered entity will need to have access to your health information when providing services to that covered entity.
05:25
We call these entities typically business associates and this some examples of business associates include companies that help your doctors get paid for providing health care, like building companies. Companies that process health care claims,
05:41
companies that help administer health plans.
05:46
Some people like outside lawyers, accountants, I t specialists. So even if you are in I t. You main run into hip a data all the time, depending on where you work.
05:59
So here's a quick quiz question. It kind of gets you thinking more about pH. I. Why do you think hackers like to target pH. I
06:10
Yeah, what could someone do with your pH. I.
06:15
The first thing that comes to mind for me is it's really the perfect information to steal someone's identity.
06:19
If that's not the Attackers goal. Maybe they want to target you specifically for another attack. A social engineering attack.
06:27
They can gain inside information to generate a phishing email
06:30
that's
06:31
really tailored specifically to you and almost guaranteed to work every time.
06:36
Another reason hackers like to target pH. I is typically, hospitals and other healthcare organizations have old and outdated systems. It's pretty easy, which they're extremely vulnerable to ransomware.
06:48
With this information encrypted, it's very important for hospitals and healthcare organizations to try and get that data back, which allows the Attackers to charge pretty much whatever they want and usually make Ah lot of money.
07:01
So in today's video, we discussed briefly pH i what it is, and we went over your health and some of the rights that you have in regarding in regards to your pH I data.

Up Next

Intermediate Data Security

This intermediate level course will cover data security in detail.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor