HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Hey, Versailles! Berry Friends, Welcome to the A C I s t p certification course with Sai Buri third party connectivity.
00:08
My name is Shalane Hudgens, and I'll be your instructor for this course.
00:14
Today we have a short video on trust models for Burt, party interconnections,
00:19
technology standards and connection agreements.
00:23
As we discussed in a previous module around third parties, what the definition of a bird party is on. We talked a little bit about what needs to go into those agreements were going to go a little bit deeper in this module.
00:39
Data sharing between the primary entity and the third parties must be done in according with applicable walls and regulations, as well as the terms of contracts and data sharing agreements.
00:52
A key responsibility of the primary entity is to enforce minimum necessary controls or lease privilege when determining the amount and type of data that needs to be used by the vendor to carry out its contractual responsibilities.
01:08
For example,
01:11
does the vendor actually need data that can be tied back to an individual
01:15
or, if de identified, data will be sufficient
01:21
if the vendors employees will be accessing the primary entity system?
01:26
It's important to make sure that the vendor is aware of the entities, policies and procedures
01:30
processes will need to be in place, toe on board and or terminate Bender employees access to the primary entity systems as they join, leave or change jobs at the vendor.
01:45
When data must be transferred from one entity to another,
01:49
it's important to consider the safeguards that need to be in place to ensure its protection.
01:55
For example,
01:56
encryption is a key consideration when data is sent over the public network.
02:01
Primary entities and third party vendors must understand applicable laws and what offers them safe harbor. In the event of a security incident,
02:13
the way of Bender will use and store information is critical to understanding the risk to the information.
02:19
For example, will data be encrypted at rest?
02:23
Will vendor employees be allowed to use their own PCs or technology access information?
02:29
Does the vendor have a B Y O D policy?
02:32
Additionally, a discussion around data sharing must include discussion of data destruction or return in the event of a relationship between a primary into tea and third party when the relationship ends or the agreement is terminated.
02:50
Not on Lee should those terms be spelled out in contracts and agreements, But the primary entity should ensure the termination actions are carried out.
03:05
The primary entity should expect the following controls from a vendor.
03:09
Some example of physical controls include things such as visitors must be escorted at all times in sensitive areas. Oven office
03:20
or facility.
03:23
Data centers must have strict physical access entry procedures.
03:28
Sensitive areas must be monitored, for example, by cameras or security guards.
03:35
Data centers must have appropriate environmental controls, such as fire suppression and protection and ultimate power supplies.
03:45
Logical controls
03:46
should include things such a Z users must only receive access for which they are authorized and are required
03:53
to perform their job functions.
03:57
Password standards must be in place.
04:00
Laptops and other mobile devices must be adequately protected in the event there, lost or stolen,
04:09
such as encryption or remote device wipe capabilities.
04:15
Termination procedures must be followed to remove access in a timely manner when the user changes jobs or is no longer works for the vendor
04:25
as an example. Most recently, it was reported in February of 2020 that health share of Oregon, the state's largest Medicaid coordinated care organization exposed the records of 654,000 patients due to a laptop being stolen from its transportation bender.
04:45
The vendor was contract ID to conduct non emergent medical transportation services
04:49
in November of the previous year. Ah, break in and theft occurred at the vendors offices. The laptop contained members, names, contact information, dates of birth and medical I D members.
05:08
The purpose of a connection agreement is to establish how connective ity will occur to and from the primary entities with the third party.
05:17
It helps to identify how data will flow and how it will be secured along the flow path.
05:23
The agreements may include diagrams to show the data flow.
05:30
Now let's test your knowledge.
05:32
What would be an appropriate control for sending data over the public Internet to a vendor?
05:46
You guessed it encryption.
05:50
True or false?
05:53
Technical standards to be included in a vendor agreement would include network connectivity,
05:59
physical and technical controls.
06:10
That answer is true.
06:12
Okay, One more
06:15
connection agreements should include information for how the data will flow and how the data will be
06:30
secure. Correct. Awesome job.
06:35
So today we discuss trust models,
06:39
technical standards and connection agreements for third party connective ity.
06:44
Coming up next will be the regulatory and standards environments
06:47
season

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor