HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Hello again and welcome to the Hcs PP certification course with Sai Buri. I'm so happy you're here for security definitions and concepts. Part three.
00:10
My name is Shalane Hutchins and I'm your instructor.
00:15
In this video, we're gonna talk about segregation of duties least privilege, more about business continuity and data retention and destruction.
00:27
Segregation of duties is the method of reducing
00:31
the risk of accidental or deliberate misuse of the system.
00:34
How you're saying, Well, let's talk it out.
00:37
Separating the management or execution of certain duties or areas of responsibility
00:43
is key in reducing the potential opportunities for misuse or unauthorised modification of information or services.
00:52
Care must be taken so that no single person can perpetrate fraud in areas of single responsibility without being detected.
01:00
The easiest scenario to consider this concept is within banking or finance.
01:06
To have one person responsible for collecting, storing and reconcile it finances is a recipe for fraud. In this series,
01:14
segregating duties between multiple people reduces the risk of collusion and fraud
01:19
When it comes to information technology. Those systems that maintain finances or purchase orders or any sensitive data creates an opportunity for misusing collusion, segregation of duties is a security concept and a control to mitigate that.
01:38
Okay, let's talk about least privilege. It's just a zit sounds Onley, allowing someone to have just the privilege they need
01:47
to do the job. They're responsible to do it.
01:49
No more than that.
01:52
The minimum necessary standard requires covered entities to evaluate their practices and enhanced safeguards as needed to limit unnecessary or inappropriate access to and disclosure of personal health information.
02:08
The privacy rules requirements for minimum necessary are designed to be sufficiently flexible to accommodate the various circumstances of any covered entity.
02:20
The privacy rule generally requires covered into teas to take responsible steps and reasonable steps to limit the use or disclosure of
02:29
and requests for protected health information to the minimum necessary to accomplish the intended purpose.
02:36
However,
02:38
the minimum necessary standard does not apply to the father
02:42
does not apply to disclosures to or requests by a health care provider
02:46
for treatment purposes. So if a doctor needs the information to to provide treatment,
02:53
the minimum necessary does not. Why
02:55
disclosures to the individual who is the subject of the information
03:00
so patients have access to all the information,
03:04
uses or disclosures made pursuant to an individual's authorization.
03:08
So if a patient has not provided authorization or has given authorization,
03:15
um minimum necessary does not apply
03:17
uses or disclosures required for compliance with HIPPA. Administrative simplification rules.
03:25
And it does not acquire to disclosures to the HHS when disclosures required for enforcement purposes and uses or disclosures that are required by other loss.
03:39
Business continuity is very closely related to business contingency and disaster recovery.
03:46
Sometimes the terms are used interchangeably.
03:50
However, the one key distinction of business continuity
03:53
is the continuity
03:57
how a business continues during and after a significant disruption.
04:02
Once again, we're currently experiencing a worldwide pandemic. Look Cove in 19
04:10
Business continuity is how covered entities, critical systems and processes are able to continue
04:16
during this sustained disruption
04:19
on a national level within the United States, we suffered a shortage of personal protective equipment for our frontline workers due to the initial spike in the cove. It 19 virus
04:31
hospital systems were at or above their limit to handle the large number of patients, and states began to issue stay at home orders to help slow down the spread of the fires.
04:43
As social distancing began to have the effect of slowing down the sprint so that hospital systems could vanish the number of patients.
04:51
As businesses began to reopen hospitals Air still tasked with being prepared for another spike with newly infected patients,
05:03
many covered entities began to leverage their business continuity plans. The pandemic situation will not be over any time soon and will likely last a year or more until a vaccine is created and administered broadly enough to slow down the effects of the virus.
05:21
Business continuity should be a part of the security policy and program.
05:26
The main reason to have a BCP is to reduce the risk of financial loss by improving the hospital's ability to recover and restore operations and mitigate the effects of the disaster for emergency situation.
05:41
Make sure to review the information around disaster recovery plans and business continuity plans within the supplemental materials to gain an understanding of the various background backup methods.
05:57
Mandated retention and destruction is the act of story
06:00
and destroying data in accordance with the records management framework that meets legal and business data storage requirements.
06:10
The hip a security rule requires that covered entities implement policies and procedures to address the final disposition of electronics, PH. I and or the hardware or electronics media that it is start on, as well as having procedures for removal of data from media
06:29
before reuse.
06:30
In general, examples of proper disposal methods may include, but are not limited to,
06:38
P. H I and paper records by shredding, burning pulping or polarizing the records. So the pH eyes rendered unreadable,
06:46
indecipherable and cannot be reconstructed.
06:50
Maintain label prescription bottles and other pH. I in opaque bags in a secure area. And using a disposal vendor as a business associate to pick up and shred or destroy the pH i
07:05
E. Ph. I on electronic media by clearing or using software to override it. Purging or dig housing, destroying the magnetic domains or destroying the media via shredding, melting, polarizing or incinerating.
07:25
Those are examples of proper disposal methods that may be included in your data retention and destruction program.
07:35
Well, that's it. Friends we've cover. It's segregation of duties, least privilege, business continuity and data retention and destruction. Stay tuned for the next video on privacy principles

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor