RSI Security

How HITRUST Is Growing It’s Privacy Controls For Greater Security

There are plenty of industries with which government intervention plays a necessary role. Unarguably, they provide for national defense, a platform for international relations and foreign policy, and they ensure minimum basic dignity to citizens within their borders. Then — some might say “unarguably” again — there are the sectors with which government intervention lends a less helpful hand. To get specific, today we’re talking about data security in the healthcare industry.

To learn about how and why the private sector has increased the demands for security and how HITRUST, a data security platform, is growing its privacy controls, read ahead.

 

A Series of Unfortunate Events by Healthcare 2015

Anybody who works in healthcare, data security, or health information technologies knows that 2015 was a monumental failure in terms of cybersecurity. For hackers, it was an all you can mine data buffet. In terms of exposed records, 2015 accounted for more than half of the last ten years’ worth, coming in at over 113 million patient records.

The five biggest breaches of the year were:

What this did to the healthcare industry was not just expose records but expose the entire underpinning of patient data security. This sparked an outcry from both citizens and organizations alike. While the Health Insurance Portability and Accountability Act (HIPAA) mandated guidelines for data security, it became clear this was not enough.

 

NIST CSF: Government Security Framework

Two years prior to this 2015 debauchery, President Obama signed executive order 13636 which allowed the National Institute of Standards and Technology (NIST) to create a cybersecurity framework (CSF). By 2014 it was ready to be rolled out for all sectors to use.

This was desperately needed at the time. Outside of the healthcare industry, companies were succumbing to cyberattacks left and right. The number of records exposed cross-industry increased by the year:

 Also Read: How Long Does it Take to Get HITRUST Certified?

 

Problems with NIST CSF

The idea underpinning NIST CSF was that a comprehensive framework was needed. But the cybersecurity framework didn’t solve this issue. Organizations’ major complaints about the NIST framework were threefold.

These problems were enough for healthcare organizations to shrug their shoulders and hope for a better solution. Even currently in 2019, a report found that only 47% of organizations have adopted and conformed to the NIST security method. Which means another solution was needed, perhaps one not created by the government.

 

 

The Private Sector of Healthcare

Back in 2015, in the wake of these massive phishing and hacking scandals, a working group of health information systems users, health IT vendors, and medical tech manufacturers came together to share security vulnerabilities and recognize higher standards of security. What followed was the Health Information Technology and Medical Device Integrity and Security Program.

The idea was that the private sector needed to fill in the gap where the government couldn’t — cybersecurity. One of the private organizations involved was the Health Information Trust Alliance (HITRUST) who created the community security framework (CSF) catered toward the healthcare industry.

 

HITRUST Long Before NIST

HITRUST began in 2007 as an early response to the inevitable adoption of electronic health records (EHRs). It’s an organization that collaborates with security experts, technologists, and information system experts in the private and public sectors to develop a comprehensive security framework.

 

Assess your HITRUST compliance

 

How HITRUST is Adapting For Greater Security

The idea behind HITRUST CSF was to create a framework that could be adapted to whatever healthcare mandate, law, regulation, or technology that came into existence. It’s part of the reason why more healthcare organizations are requiring their business associates to be HITRUST certified. With HITECH’s passage in 2009, HIPAA compliance applies to all HIPAA-covered entities and their associates.

To be HITRUST CSF certified (more on this later) means to be HIPAA compliant because the regulations are built into the framework. However, it’s important to note that cybersecurity is an ever-widening net that must catch an ever-growing collection of security threats. And with a larger net comes more holes to plug.

Thus, HITRUST had to be a flexible system — and that’s exactly what it was made to be. HITRUST updates its framework to adopt more developed privacy controls and to expand its scope for greater security. This has been proven time and again, with adaptations made for:

Running through each of these different systems of implementation will show the versatility of the HITRUST security framework.

 

HIPAA and HITECH Compliance

Beginning with the most fundamental of the securit y guidelines: HIPAA and HITECH compliance. One of the major goals of HIPAA and HITECH was the adoption of EHRs to make the process of sharing and disclosing protected health information (PHI) more secure and efficient. To be compliant meant to follow the HIPAA Privacy Rule, Security Rule, and the Breach Notification Rule:

 

 

 

General Data Protection Regulation

HITRUST understands that many US-based healthcare organizations have operations and business subsidiaries overseas. Because of this, HITRUST has adopted European data regulations known as the General Data Protection Regulation (GDPR) into its own system.

For global healthcare organizations, having this type of data regulation built into the security framework helps to avoid massive penalties. Whereas in the US, HIPAA fines max out at $1.5 million per year for worst-case scenarios, EU violations can attract fines of €20 million (or 4% turnover, whichever is greater).

 

NIST CSF

In 2017, HITRUST announced enhancements to their CSF to help smaller organizations improve their risk management and added nine security controls to its certification process to comply with NIST’s cybersecurity framework — ultimately making the government’s framework redundant.

 

Singapore’s Personal Data Protection Act of 2012

Continuing its expansion of global data security regulations, HITRUST adapted its security regulations to match Asia’s growing demand for secure health information. As global data security regulations arise, healthcare organizations are going to find it increasingly difficult to operate cross-border. However, with HITRUST CSF creating a singular framework that operates across multiple countries, companies can seamlessly continue operations and expand.

 

California Consumer Privacy Act (CCPA)

California made headlines when the California Consumer Privacy Act of 2018 was announced. The bill is meant to further the privacy protections for California residents. It applies to both businesses operating in California as well as businesses operating outside of California who are collecting or using data of California residents. The latter of which has presented the most pushback.

The intent of the act was to inform consumers about:

HITRUST, knowing this applies to the healthcare industry, was quick to adapt their current framework to the new data security mandates.

 

Assess your CCPA compliance

 

HITRUST Version 10: In The Works

Announced to release by the fourth quarter of 2019 is the latest version — version 10 — of HITRUST CSF. According to HITRUST, the two major changes to the framework will be: 

 

 

How Healthcare Organizations Can Utilize HITRUST

Because HITRUST is constantly adopting new security guidelines and upgrading its own framework, when healthcare organizations use HITRUST CSF, they gain all these benefits. Companies can run through three forms of assessments to ensure they have implemented HITRUST properly:

 

HITRUST CSF Self-Assessment

The first step is self-assessment. This can be done with a self-assessment report through HITRUST. Or it can be done using MyCSF, HITRUST’s software designed for companies to track their own security system.

Self-assessment pros and cons include:

 

HITRUST CSF Validation

Once an organization has performed a self-assessment, the next step is to authorize a CSF assessor (either through HITRUST or a third-party organization) to review the assessment and perform an onsite visit. CSF validation offers:

Again, this does not ensure that the organization would survive an audit by the Office of Civil Rights (the organization in charge of enforcing HIPAA compliance and penalties). The only way to truly be audit-secure is to obtain a HITRUST CSF certification.

 

HITRUST CSF Certification

Becoming CSF Certified means to be compliant with all regulating bodies. To do this, the certification process runs through each security measure and scores the compliance on a five-tiered scale from Non-Compliant to Fully Compliant. It scores each one based on five different criteria:

ALSO READ: How Long Does it Take to Get HITRUST Certified?

 

Proper Implementation: CSF Assessors

For organizations to properly implement the HITRUST framework, running through a certified HITRUST assessor is necessary. The experts at RSI Security are certified in HITRUST and HIPAA compliance, offering the full range of security needs for healthcare organizations. RSI Security offers:

If your organization needs a security framework upgrade, or if you are a business associate of a HIPAA-compliant entity, implementing HITRUST CSF is the easiest way to secure your e-PHI.

 

 

HITRUST CSF and Growing Privacy Controls

As more organizations operate globally, the need for a communal set of data security regulations is necessary. HITRUST is standardizing this process by growing its privacy controls and offering greater security to organizations inside and outside the US. By becoming CSF certified, you ensure that your cybersecurity is up to date and compliant with all government mandates.

Talk to the experts at RSI Security about becoming CSF certified and how to leverage these privacy controls for your organization.

 

 

 


Download Our HITRUST Compliance Checklist

Assess where your organization currently stands with being HITRUST compliant by completing this checklist. Upon filling out this brief form you will receive the checklist via email.


Sources:

HIPAA Journal. Analysis of 2018 Healthcare Data Breaches. https://www.hipaajournal.com/analysis-of-healthcare-data-breaches/

NIST. History and Creation of the Framework. https://www.nist.gov/cyberframework/online-learning/history-and-creation-framework

Statista. Annual number of data breaches and exposed records in the United States from 2005 to 2018 (in millions). https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

Healthcare IT News. Healthcare organizations lagging behind NIST Cybersecurity Framework, HIPAA guidance. https://www.healthcareitnews.com/news/healthcare-organizations-lagging-behind-nist-cybersecurity-framework-hipaa-guidance

HITRUST. HITRUST Announces HITRUST CSF Roadmap Including a New Simplified Program for Small Healthcare Organizations and NIST Cybersecurity Framework Certification. https://hitrustalliance.net/hitrust-announces-hitrust-csf-roadmap-including-new-simplified-program-small-healthcare-organizations-nist-cybersecurity-framework-certification/

Exit mobile version