Limiting PHI Exposure (Part IV): Access Management
What is Access Management?
As part of the HIPAA Privacy Rule, user access to PHI must be restricted to the “minimum necessary” that allows the individual to perform his or her job functions. Consequently, HHS requires healthcare organizations to have information access management systems in place. Access management controls which individuals can view certain information. For example, someone working in the billing department doesn’t need access to patient medical records, just as nurses don’t need access to patient’s financial information.
An organization must:
- Give users unique login credentials
- Restrict users from sharing their login with others
- Have the ability to attribute actions to specific individuals
- Restrict network access based on their job function
- Review network access for individuals who change roles within the organization
- Enforce the use of secure passwords
- Monitor logon and logoff activity
Access Management Using Multi Factor Authentication (MFA)
The government recommends that organizations implement multi-factor authentication (MFA) to control which users, within an organization, have access to what information. MFA uses multiple security factors to identify an individual, such as a password in combination with a biometric scan. A biometric scan is a security identification device that uses fingerprints, facial images, iris, or voice recognition to identify an individual.
Users must use two of the following security factors to gain access to information:
- “Knowledge” factor: a password or PIN
- “Possession” factor: a one-time access code generated by a secure mobile app
- “Inherence” factor: a biometric scan
- “Location” factor: a specific location that can verify your identity
Not only does HHS mandate organizations restrict access to PHI, it also requires authorized users to have easy access to PHI. As such, the most effective authentication system for healthcare organizations is a single sign-on system (SSO). SSO allows individuals to use one set of login credentials to access multiple applications, maintaining the enhanced security of MFA while allowing for quick access to records.
$5.5 Million Fine Issued for Unauthorized Access
To put this into perspective, Memorial Healthcare Systems (MHS) in Florida was recently fined $5.5 million for failure to implement adequate access controls. An employee of MHS had used the login credentials of a physician to illegally access the records of 80,000 patients. Had the organization implemented multi-factor authentication, the breach and the subsequent fine could have been avoided.
This is Part IV of the XI-part blog series. You can also read Parts I to III below:
Behavioral health practices handle protected health information (PHI) regularly, and as such, must take precautions to safeguard the sensitive information. The Department of Health and Human Services (HHS) recommends ten practices that anyone handling PHI needs to implement, the third of which is access management. (Each one of these XI HIPAA outlined practices will be examined in its own article, labeled Part I-XI for your convenience. This current article is Part IV of that XI-part series.)
- Phishing Emails and Why Encryption Software is Warranted
- Using Clinical Email (Part II): Secured Email Protection Systems
- Securing your Network (Part III): Endpoint Protection Systems
What Are Your Thoughts?
Please leave your comments below.