Tip

Track legacy software for patient data security, HIPAA compliance

Patient data security and HIPAA compliance has been and will continue to be on the top of every IT executive's agenda within the healthcare space, especially with the omnibus rule's enforcement period commencing Sept. 23. With the constant changes and additions to health IT infrastructure and systems, coupled with the specter of increasing threats, CIOs and CISOs must constantly evaluate how to best monitor and ensure the protection of patient data.

    Requires Free Membership to View

Knowing where your risks lie can inform future system upgrades and other purchasing decisions based on minimizing data security risk.

One facet of data security getting a lot of attention these days is how to deal with end-of-life cycles for commonly-used PC products that no longer receive vendor security updates and patches. Specifically, Windows XP and Office 2013 will no longer be supported or receive security updates as of April 8, 2014.

While most hospitals have already upgraded or are in the process of replacing all their Windows XP machines, it's important to note that there are several other products used within a hospital facility that would likely need to be maintained with the latest stable updates, fixes or firmware. Other security updates will be needed for systems -- including those that apply to workstations, applications, routers, hypervisors, and medical devices -- that don't run on the latest versions of Windows.  

Patient data security is generally ensured when workstations are updated and patched with products from Microsoft and other third-party vendors. But IT staffers should consider maintaining a database and using other additional applications that will track all other relevant devices and applications that could pose a security risk.

These records will mostly be used as points of reference, to be periodically reviewed. Once communication is received from vendors in regards to security updates and fixes, then the product version can then be referenced to see what actions and upgrades are necessary to ensure HIPAA compliance.

more on data security compliance

HIPAA, meaningful use risk analysis advice

HIPAA omnibus compliance guide for health IT leaders

How well do you know the HIPAA omnibus rule?

As with most products and devices being used within hospitals, legacy systems are likely to carry some vulnerabilities. Fortunately, some vulnerabilities may never be exploited, but as a precaution and to ensure the appropriate steps are taken to safeguard electronic health records, it becomes critical to manage and be fully aware of risks associated with the products being used.

With close tracking of versions and updates, we see that many vendors release frequent security patches, while others remain question marks. Knowing where your risks lie can inform future system upgrades and other purchasing decisions based on minimizing data security risk.

About the author:
Reda Chouffani is vice president of development with Biz Technology Solutions Inc., which provides software design, development and deployment services for the healthcare industry. Let us know what you think about the story; email editor@searchhealthit.com or contact @SearchHealthIT on Twitter.

This was first published in August 2013

Join the conversation Comment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.

    Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.