William, you raise a significant point, and one I have been struggling to get covered entities to understand. Privacy liability will mostly come from ignorance and carelessness in the workplace. You can't just train once, and have 400,000 page policies and expect to reduce liability. Also the nonsense about 4 paragraph privacy policies is just nuts! The whistleblowers will make a fortune if that mentality continues.
Your points about email at dead on, and much as I respect the average IT guy or gal, most don't understand these issues. Real workflows need to be understood, mapped, and reengineering to effectively change the liabilities of an organization. Working habits need to change through, not just policies, but through cultural change that requires not just training but education! Privacy offers need to understand that they are not just planners, and auditors, but also evangelists for change at every level of an organization. A privacy officer should spend 60% of their time walking the halls communicating! I think we have arrived at a point, where a white paper on email and electronic communications makes sense. This subject is full of bias and voodoo urban legends that have little to do with core business requirements and real-world workflow. I hope WEDI management will take notice, and I would like to volunteer to help author it. Perhaps we should title it "The Happy HIPAA and a Tale of Email!". Tim McGuinness, Ph.D. Consulting Specialist in Regulatory Privacy, Security, and Application Compliance (HIPAA/ASCA/FDA/CMS-HCFA/ICH/ADA 508c), [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> President, HIPAA Help Now [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> www.hipaahelpnow.com <http://www.hipaahelpnow.com/> Executive Co-Chairman for Privacy, HIPAA Conformance Certification Organization (HCCO) www.hipaacertification.org <http://www.hipaacertification.org> __________________________________________________________________ Phone: 727-787-3901 Cell: 305-753-4149 Fax: 240-525-1149 Instant Messengers: ICQ# 22396626 - MSN IM: [EMAIL PROTECTED] - Yahoo IM timmcguinness - AOL IM: mcguinnesstim __________________________________________________________________ =========================================================================== IMPORTANT NOTICE: This communication, including any attachment, contains information that may be confidential or privileged, and is intended solely for the entity or individual to whom it is addressed. If you are not the intended recipient, please notify the sender at once, and you should delete this message and are hereby notified that any disclosure, copying, or distribution of this message is strictly prohibited. Nothing in this email, including any attachment, is intended to be a legally binding signature. -----Original Message----- From: William J. Kammerer [mailto:[EMAIL PROTECTED]] Sent: Friday, September 20, 2002 9:43 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: More Deep Thoughts RE: 'Integrity Control' vs 'Message Authentication' Tim: A lot of this technical stuff discussed in the various 'Integrity Control' vs 'Message Authentication' threads went over my head. But you can do IP sourcing, MD5 Checksums, Message authentication, and stamp every "packet" till the cows come home, and it probably will do little good until the "people" issues are addressed. I emphatically agree with you that "the major risks are mostly internal. These represent the disgruntled employee, or just the lazy employee. Either way, these are more likely to result in Privacy abuses...and create security vulnerabilities. These are the ones that will have to be defended in civil litigation." A good illustration is the dozen or so postings addressed to the Privacy listserve asking to "add me to the PHI mapflow list." Surely these weren't meant to be sent to entire listserve, but certainly point out the risks of e-mail within HCOs. Admittedly, these e-mails are so low-risk that the extra seconds to confirm the recipient may not seem worth it (to the sender, that is; I would certainly appreciate not being inundated with this stuff each and every day!). But isn't it prudent to always be in the habit of checking - and double-checking - the recipients in any outbound e-mail, so that it becomes second nature, avoiding the inadvertent release of PHI to unintended recipients? I see that more and more people append these ubiquitous IMPORTANT NOTICEs at the tail of their e-mails; do these really work? Once the cat has been let out of the bag, what good does it do to admonish the (unintended) recipient to forget what's she's just seen? Isn't it better to just be super careful with EVERY e-mail, especially if you've ever handled PHI before? A habit that I've found useful is to double-click on each recipient (in the To:, Cc: and Bcc: boxes) to ensure the correct underlying e-mail address appears, forcing me to evaluate the appropriateness of that recipient. And with Outlook Express, I have the options set to NOT send e-mail immediately, nor to SEND/RECEIVE on an interval basis, preventing the sending of mail if I accidentally push the "Send" button: an explicit "Send/Receive" must be done, instead - this gives me even more chances to mull over the contents of the "Outbox" and the message recipients. Further, I have the option set to always encrypt: yet one more chance (at "Send") to see my list of recipients, since I'll be presented with a dialog box of all those for whom I have no digital ID. These few simple habits have kept me from sending to the wrong recipients. To this day, I don't think I've ever made a single mistake in disseminating an e-mail to an unintended recipient. Of course, this provides no protection at all from saying stupid things I'll later regret to INTENDED recipients!! William J. Kammerer Novannet, LLC. Columbus, US-OH 43221-3859 +1 (614) 487-0320 ----- Original Message ----- From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; "Bill Pankey" <[EMAIL PROTECTED]>; "Chris Riley" <[EMAIL PROTECTED]>; "Anthony Mercaldi" <[EMAIL PROTECTED]> Sent: Tuesday, 17 September, 2002 12:53 PM Subject: More Deep Thoughts RE: 'Integrity Control' vs 'Message Authentication' But let's look at this from an institutional risk perspective. 1) it is possible to reasonably defend your infrastructure using: network firewalls, active intrusion detection monitoring, antiviral appliances, desktop firewalls and antiviral software, spyware checkers, solid security policies properly followed and audited. Nothing is perfect, but properly implemented, with constant attention to patches and upgrades, you can be "reasonably secure". In short, the whole BS7799 package on steroids (as my grandma used to say). 2) IP sourcing is not 100% reliable unless you know ALL of the potential servers your business partners will use, and have reporting mechanisms in place to track their changes. I do agree (an use this method myself to control spam) that vast blocks of IP space should be "blacked out". Most US HCOs have no business receiving packets from Asia or Africa for example, and these are notorious as points of attack. But there is little, from an IP perspective, you can do the black out in advance the teen down the street, except use your firewall to block because he/she is most likely using a DHCP assigned IP for that session, that next time around may be used by a doctor or a patient. 3) it is impractical to require sever AND client keys. Even VeriSign client certificates are problematic in actual practice unless you rigidly control both sides of the connection and the physical machines. You can even go so far as to be your own certificate authority, but in the end, with lesser skilled individuals, the overhead drowns you. I have deployed client AND server certificates in apps that I have designed in the past, and deployed world wide - it can be done economically - but you have to eliminate extraneous systems to control the help desk issues. Help desk issues are a major factor in whatever you do - PGP implementations have produced numerous horror stories about the end user support requirements. 4) where real security is required, you use "Trusted" services. There are a small number of vendors who provide real trusted networks for the big boys at CIA and NSA. Here is one such, and it's free! www.lok.com The bottom line from my perspective is that you do it by the numbers and be thorough. If you have a properly layered defense against internet attacks, properly maintained and monitored, I would argue that your real risks from the outside are low - in other words it will take a determined attacker to get through - which they will anyway. At least with layering of protections, including full intrusion monitoring, at least you can constrain the attack, and do something about it (hopefully in time). I am a big fan of managed services that will be there 24/7 - their cost is relatively low compared to your own time in managing the same activity. An example of this were stats given by my personal favorite CounterPane, where they flagged 100,000 problematic events - their automated screening system tossed out all but 50, which were passed to a human for analysis, of which only 5 were serious enough to call the IT staff. That's 5 wake up calls vs. 100,000. In my opinion, tools by any vendor, be it ISS, CounterPane, or others, extend your protections in depth and are essential in real security (mythic though that may actually be). And remember, external consultants that do assessments are great for a snap shot, but only work where their recommendations are implemented, but a single vendor is a bad idea - they all have their unique and sometimes conflicting agendas, not to mention skill sets (myself included) - always layer! When in doubt, pile it higher and deeper (the Ph.D. philosophy!). For those that are focused on the external, I suggest subscribing to a monthly external penetration testing service. They are as cheap as $25 a month now. They at least tell you if your firewall is solid. My contention is that the major risks are mostly internal. These represent the disgruntled employee, or just the lazy employee. Either way, these are more likely to result in Privacy abuses in my opinion, and create security vulnerabilities. These are the ones that will have to be defended in civil litigation. For example, with web-based apps proliferating, how many of you actually have a policy to control the browser cache? There is a major point of privacy vulnerability at the very least! Deep Thoughts quote of the day "Broken promises don't upset me. I just think, why did they believe me?" :) Nudge nudge, wink wink, say no more! I promise! Tim McGuinness, Ph.D. Consulting Specialist in Privacy and Security [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> President, HIPAA Help Now Inc. [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> www.hipaahelpnow.com <http://www.hipaahelpnow.com/> Executive Co-Chairman for Privacy, HIPAA Conformance Certification Organization (HCCO) www.hipaacertification.org <http://www.hipaacertification.org> __________________________________________________________________ Phone: 727-787-3901 Cell: 305-753-4149 Fax: 240-525-1149 Instant Messengers: ICQ# 22396626 - MSN IM: [EMAIL PROTECTED] - Yahoo IM timmcguinness - AOL IM: mcguinnesstim __________________________________________________________________ ======================================================================== === IMPORTANT NOTICE: This communication, including any attachment, contains information that may be confidential or privileged, and is intended solely for the entity or individual to whom it is addressed. If you are not the intended recipient, please notify the sender at once, and you should delete this message and are hereby notified that any disclosure, copying, or distribution of this message is strictly prohibited. Nothing in this email, including any attachment, is intended to be a legally binding signature. To be removed from this list, go to: http://snip.wedi.org/unsubscribe.cfm?list=Security and enter your email address. <P>The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions on this listserv therefore represent the views of the individual participants, and do not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If you wish to receive an official opinion, post your question to the WEDI SNIP Issues Database at http://snip.wedi.org/tracking/. Posting of advertisements or other commercial use of this listserv is specifically prohibited.
BEGIN:VCARD VERSION:2.1 N:McGuinness;Tim;;;Ph. D. FN:Tim McGuinness Ph. D. ORG:HIPAA Help Now Inc. TITLE:President TEL;WORK;VOICE:(727) 787-3901 TEL;CELL;VOICE:(305) 753-4149 TEL;WORK;FAX:(240) 525-1149 ADR;WORK;ENCODING=QUOTED-PRINTABLE:;;Corporate Office:=0D=0A1920 East Hallandale Blvd., Suite 600,;Hallandale B= each;Florida;33009;United States of America LABEL;WORK;ENCODING=QUOTED-PRINTABLE:Corporate Office:=0D=0A1920 East Hallandale Blvd., Suite 600,=0D=0AHallandal= e Beach, Florida 33009=0D=0AUnited States of America ADR;POSTAL;ENCODING=QUOTED-PRINTABLE:;;Tampa Bay Office:=0D=0A687 First Court;Palm Harbor;Florida;34684;United St= ates of America LABEL;POSTAL;ENCODING=QUOTED-PRINTABLE:Tampa Bay Office:=0D=0A687 First Court=0D=0APalm Harbor, Florida 34684=0D= =0AUnited States of America URL;WORK:http://www.hipaahelpnow.com EMAIL;PREF;INTERNET:[EMAIL PROTECTED] EMAIL;INTERNET:[EMAIL PROTECTED] REV:20020906T095704Z END:VCARD To be removed from this list, go to: http://snip.wedi.org/unsubscribe.cfm?list=Security and enter your email address. <P>The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions on this listserv therefore represent the views of the individual participants, and do not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If you wish to receive an official opinion, post your question to the WEDI SNIP Issues Database at http://snip.wedi.org/tracking/. Posting of advertisements or other commercial use of this listserv is specifically prohibited.