• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Vendors Take Aim at HITECH Act for Healthcare IT Overhaul

    November 17, 2009 Alex Woodie

    While our representatives in Congress hash out healthcare reform, the executive branch of the government is already moving forward with aggressive new regulations aimed at ensuring the security of electronic medical health records and healthcare information systems. Whatever changes Washington imposes upon the healthcare industry, existing laws like the HITECH Act, a recently strengthened HIPAA, and the Red Flag Rules have put into motion a massive overhaul of healthcare IT systems–and the healthcare industry is woefully unprepared to deal with it.

    The HITECH Act (officially the Health Information Technology for Economic and Clinical Health Act) was part of President Obama’s $787 billion economic stimulus package (officially the American Recovery and Reinvestment Act, or ARRA) that was passed in February. The aim of HITECH is largely to encourage the healthcare industry to adopt electronic health records (EHRs), which are supposed to save us money, by putting into place strong provisions to keep that sensitive data private and secure.

    HITECH will mandate that good security practices are used by hospitals, doctors’ offices, insurance companies, billing companies, and the myriad other groups that touch sensitive medical data. Like the PCI mandate, HITECH will require the use of encryption to protect data. Like Sarbanes-Oxley, it requires audits and a scale of fines for violations–as well as the tantalizing possibility that healthcare company executives will be marched off to jail for repeated violations. And in a unique nod to the power of the pen, HITECH requires companies to notify the media of security breeches greater than 500 records.

    The timeline for the implementation of HITECH is a little bit up in the air. Lawyers and judges are still hashing out the document, but a ruling is expected next month that will put the final law into effect by next summer. That is also the general timeline that the Red Flag Rule, which mandates that doctors protect personal data like credit card numbers, goes into effect. Then there is the change made this month on HIPAA, which got the enforcement “teeth” that is expected to push the industry into adoption, making HIPAA, HITECH, and Red Flag a powerful one-two-three regulatory punch.

    Now, it’s up to healthcare providers and the IT industry–specifically the security software and services providers–to figure out how to put this into action. The ARRA stimulus package included $19 billion to help implement HITECH. But nobody thinks it will be easy or cheap.

    A ‘Disaster Waiting to Happen’

    Information security in the healthcare industry is woefully inadequate, and the industry is highly unprepared to deal with the massive changes that are needed adapt to HITECH and new HIPAA provisions, according to security experts and recent studies.

    One person with a good perspective of the poor state of security in the nation’s healthcare industry is Feisal Nanji, executive director for Techumen, a provider of information security services to healthcare companies. From 2003 to 2008, Nanji headed up the applications security unit at Ernst and Young. During that time, he worked with a large healthcare company that was considered to be the “gold standard” for information management and informatics.

    “When I looked at [their information security], I realized, ‘Oh, my gosh, this is a disaster waiting to happen,'” Nanji says. “The records are clearly not secure. They’re not private. And there are many reasons for this.”

    One of the biggest reasons is that, when lives are on the line, healthcare organizations–from individual hospitals to regional health information organizations (RHIOs) that function as hubs for EHRs–prefer to err on the side of easy information access.

    “If I’m a doctor in an operating room, and I’m prevented from getting access to a critical image or medical record, because I don’t have my secure ID token with me, or I forgot my password, I’m going to be really pissed,” Nanji says. “And as you know, in hospitals doctors are gods, so for the most part, providers are going the route of providing full access to all the doctors.

    “But then the question becomes, How do I know if doctor A or doctor B, or the nursing administrator or the person doing the billing or the coding, is not looking at records that he or she is not supposed to see?” Nanji says.

    That first-hand experience of poor security practices at healthcare organizations is backed up by a recent survey conducted by the Ponemon Institute on behalf of Crowe Horwath, a national accounting company.

    According to the study, 57 percent of respondents said they have known deficiencies concerning privacy or security, while 90 percent admit to losing at least one record over the last two years. Fewer than 80 percent said they don’t have regular independent audits (which will be required under HITECH), while less than half said they have the money to comply with the new regulations.

    The survey led the accounting firm to conclude that “most organizations are not ready for HITECH.” But that hardly comes as a surprise.

    No Silver Bullet

    As is the case with most information security problems, there is no single product or process–no silver bullet–that healthcare companies can implement to take care of their new security obligations.

    But security vendors are still expecting to reap significant dividends from the new laws. In particular, the companies that develop software known as security information and event management (SIEM) systems are champing at the proverbial bit.

    Mike Regan, vice president of marketing for SIEM vendor LogRhythm, says there has already been an up tick in sales as a result of HITECH. “It’s early innings. But this is going to mushroom,” he says.

    It’s hard to say whether HITECH will do for SIEM sales what SOX did for change management vendors. But there’s a really good chance, because experts like Nanji don’t see how the healthcare industry can get the needed visibility into their systems without something like SIEM.

    “Everybody will tell you they have a log file,” Nanji says. “But if you’re trying to collate log files from 400 servers and 500 devices and four different medical record systems and a pictorial archive system, and so forth, and overlying that with an LDAP directory, then it becomes completely crazy. So what you really need is a centralized logging engine to help you do that, and one that allows you to build on intelligence as you grow.”

    Nanji is a big backer of LogRythm, which he says has a superior architecture that has the required scalability to address the provisions of HITECH. Not only does LogRythm allow security professionals to monitor data access across all major platforms–thereby helping to address new audit requirements–but it has the capability to take steps to shut down unauthorized access in real time, providing operational teeth.

    Other SIEM vendors offer similar capabilities, and are also jumping on the HITECH bandwagon. ArcSight, Cisco Systems, LogLogic, RSA Security, and Symantec are all talking about HITECH.

    Regan doesn’t see how healthcare companies can comply with HITECH without significant investments in new security systems. “If you’re not capturing the log data–which in effect is the digital fingerprints of all activity associated with accessing this confidential data–and structuring it in a database in a way that you can quickly search and monitor for and alert on anomalies, then you’re really dead in the water and you have no good source of insight into level of abuse or misuse or unauthorized use of that confidential information,” he says.

    Software vendors and auditors have done quite well over the last decade as the result of government mandates, starting with the overhaul of financial reporting with Sarbanes-Oxley in 2002, food safety with CFR 21 Part 11, and credit card transactions with PCI. Now it’s healthcare’s turn to air its dirty laundry and be publicly reprimanded for jeopardizing the information security of Americans, and it’s not going to be pretty.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ARCAD Software:  November 20 Webinar: Unify your multi-platform release management - with IOS
    Halcyon Software:  Simplify the monitoring of your ERP systems and HA solutions
    Manta Technologies:  Your complete source for IBM i training

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Hewlett-Packard Eats 3Com for $2.7 Billion File Caching in RSE

    Leave a Reply Cancel reply

Volume 9, Number 42 -- November 17, 2009
THIS ISSUE SPONSORED BY:

Help/Systems
Vision Solutions
Linoma Software
Computer Keyes
East Coast Computer

Table of Contents

  • Security Vendors Take Aim at HITECH Act for Healthcare IT Overhaul
  • Raz-Lee Adds Object-Level Security to i OS Security Suite
  • i365 Plans Multi-Platform Backup and Recovery Based on Windows Server
  • Data Masking Tool from dataguise to Get DB2/400 Support
  • Kronos Unveils Software, New Sales Approach at Conference
  • Dimensional Insight Takes ‘The Diver’ BI Solution Up a Notch
  • Storagepipe Offers Online Backups for i OS, Too
  • Binary Tree Debuts E-Mail Migration Tool for Exchange 2010
  • DSI Data Collection Software Validated for EnterpriseOne 9.0
  • Vegas Casino Doesn’t Gamble with Software from Agilysys

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle