phi protection infographic - security · 2020-05-13 · network shares other folders on hard drive...

1
HIPAA PHI Protection Where is your PHI stored? On your computer. The cloud Remote servers MS database My Documents on network shares Other folders on hard drive Unencrypted images in other folders Development test environments 1 2 3 4 5 6 7 Walk around your office to check for PHI left in the open (e.g., sticky notes, computer screens) Start a risk analysis to identify your biggest vulnerabilities Make sure servers, back rooms, filing systems, offices, etc. are locked Encrypt PHI on all electronic systems Don’t leave PHI in your car or at your house Securely empty your computer trash Shred everything Protected health information (PHI) isn’t just stored in your Electronic Health Record system (EHR). It’s everywhere! HIPAA compliance law mandates that you protect PHI, in all its forms, wherever it resides. PHI is anything that identifies an individual used for healthcare purposes. Names Geographic subdivisions Dates related to an individual Phone numbers Fax numbers Email addresses Social Security Numbers Medical record numbers Health plan beneficiary numbers Account numbers Vehicle identifiers URLs IP address numbers Biometric identifiers Full face pictures URL Account Number Social Security # Hello. Patient X ? Email Shared network drives Recycle bin Excel documents Word documents Documents EHR Temporary browser cache files HHS.gov Documents Patient Records At the office. water plant!! Trash bags in dumpsters Trash cans/ compactors Under desks Closets Back rooms Backup drives Sticky notes Desk drawers File rooms Old computers/servers no longer in use On shelves Charts Calendars 17 USB drives On your network. On the go. c://MS database c://entry01 c://entry02 c://entry03 c://entry04 At home Laptops Tablets Smartphones Carry on luggage Paper 48% say they would consider changing healthcare providers if their medical records were lost or stolen.* * Ponemon Medical ID Theft Study, 2015 7 Top 7 ways to start protecting all PHI [email protected] 801.705.5656 © 2015 SecurityMetrics PHI is often stored... Talk to one of our consultants who can come onsite to help you find and protect all your PHI!

Upload: others

Post on 26-May-2020

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PHI Protection Infographic - Security · 2020-05-13 · network shares Other folders on hard drive Unencrypted images in other folders Development ... Social Security Numbers Medical

HIPAA PHI ProtectionWhere is your PHI stored?

On yourcomputer.

The cloud

Remote servers

MS database

My Documents onnetwork shares

Other folderson hard drive

Unencrypted imagesin other folders

Developmenttest environments

1

2

3

4

5

6

7

Walk around your office to check for PHI left in the open (e.g., sticky notes, computer screens)

Start a risk analysis to identify your biggest vulnerabilities

Make sure servers, back rooms, filing systems, offices, etc. are locked

Encrypt PHI on all electronic systems

Don’t leave PHI in your car or at your house

Securely empty your computer trash

Shred everything

Protected health information (PHI) isn’t just stored in your Electronic Health Record system (EHR). It’s everywhere! HIPAA compliance law mandates that you protect PHI, in all its forms, wherever it resides.

PHI is anything that identifies an individual used for healthcare purposes.

Names

Geographicsubdivisions

Dates relatedto an individual

Phone numbers

Fax numbers

Email addresses

Social SecurityNumbers

Medicalrecord numbers

Health planbeneficiary numbers

Accountnumbers

Vehicle identifiers

URLs

IP address numbers

Biometricidentifiers

Full facepictures

URL

AccountNumber

SocialSecurity

#

Hello.

Patient X

?

Email

Shared network drives

Recycle bin

Excel documents

Word documents

Documents

EHR

Temporary browser cache files

HHS.gov DocumentsPatient Records

At the office.

waterplant!!

Trash bagsin dumpsters

Trash cans/compactors

Underdesks

Closets

Back roomsBackup drives

Sticky notes

Desk drawers

File rooms

Old computers/servers no longer in use

On shelves

Charts

Calendars 17

USB drives

On yournetwork.

On the go.

c://MS database

c://entry01

c://entry02

c://entry03

c://entry04

At home

Laptops

TabletsSmartphones

Carry on luggage

Paper

48% say they would consider changing healthcare providers if their medical records were lost or stolen.*

* Ponemon Medical ID Theft Study, 2015

7 Top 7 ways to start protecting all PHI

[email protected]

801.705.5656

© 2015 SecurityMetrics

PHI is often stored...

Talk to one of our consultants who can come onsite to help you find and protect all your PHI!