This content is viewable by Everyone
News
Follow UC and UCSF IT Security Policies to Protect UCSF’s Patients, Research, Learners, and Employees
-
Author: Esther Silver
- Date:
The IT Security Awareness Quiz link is at the article's end. Everyone who completes the quiz is entered to win one of six $50 Amazon Gift Cards.
Regulations help ensure organizations act fairly, safely, and securely and are instrumental in everything from keeping drinking water safe to preventing the exploitation of children in the workplace. Regulations tend to increase in scope whenever risks posed to society or individuals are mounting in a particular area or industry. In recent years, due to the enormous growth in the use of technology and risks to its associated data, regulations that protect the security and privacy of data are on the rise.
UCSF is subject to many of these regulations, including the following:
Health Insurance Portability and Accountability Act (HIPAA):
- A federal law that requires the adoption of national standards for electronic health care transactions and code sets. The HIPAA Privacy Rule sets national standards for the definition and protection of individually identifiable protected health information (PHI) and requires access to PHI to be based on the principles of “need to know” and “minimum necessary, where only the patient information needed to do one’s job function is made available. The HIPAA Security Rule includes specific required or addressable Administrative, Physical, and Technical Safeguards to protect the confidentiality, integrity, and availability of electronic PHI. These safeguards include controls such as workforce training, workstation security, access control and authorization, transmission controls, and facility access controls.
- UCSF, as a HIPAA covered entity, must adopt reasonable and appropriate policies and procedures to comply with the provisions of the Security Rule and must maintain written security policies and procedures and written records of required actions, activities, or assessments.
- The HITECH legislation of 2009 was designed to further expand on the notions of privacy and security from HIPAA originally, explicitly defining requirements and increased expectations not only of the Covered Entity, but also their 3rd party business associates. HITECH expanded on areas such as breach notification, increased responsibilities and accountabilities of business associates, compliance & enforcement, incentives for a move towards electronic medical records, etc.
Family Educational Rights and Privacy Act (FERPA)
- FERPA restricts the disclosure of information from learner's education records and provides learners the right to inspect and review education records, seek amendment of education records, and control the disclosure of education records.
- FERPA compliance is important because failure to comply can lead to a loss of federal funding, learner privacy is important, and public scrutiny of privacy practices and handling of sensitive information is high.
- Examples of inadvertent disclosure of learner records include: posting grades publicly if linked to a learner ID, name, or other identifier; requiring learners to post homework assignments or projects in a publicly accessible online forum or social media space; circulating class rosters that include learner photographs or ID numbers; and storing learner information with a cloud service that is not under contract with the University.
- The UCSF Office of the Registrar provides more information about FERPA, including a campus processes, policies, and forms.
Payment Card Industry Data Security Standard (PCI DSS):
- PCI DSS provides a baseline of technical and operational requirements designed to protect payment account data.
- Applies to all entities, regardless of size, that process, store, transmit cardholder data (CHD) and/or sensitive authentication data (SAD) or could impact the security of the cardholder data environment (CDE).
- Failure to comply with the PCI DSS can result in:
- Large fines, civil fees, and audit costs
- A loss of trust, reputation, and payment card acceptance privileges for the University
- Notifications to all customers affected
- Additional costly and continual PCI DSS reporting requirements
General Data Protection Regulation (GDPR):
- A European Union privacy law that governs the use of personally identifiable information and grants certain legal rights to people in the European Economic Area (EEA) whose personal data is being collected and processed.
- Imposes legal responsibilities on the entities that control or process personal data, even if the entity resides outside the EEA.
- Privacy rights for individuals include: the right to be informed about data collection, the specific intended use of the data, and the right to be informed if the intended use changes; the right to make informed decisions regarding the use and disclosure of the data; the right to access the data; and the right to have the data returned or deleted.
- Units or areas at UCSF that are likely to be impacted by GDPR include: Admissions, Learners, Research, Employment, Fundraising, and Targeted Clinical Care. For more information about GDPR, contact the UCSF Privacy Office.
California Security Breach Information Act (SB-1386):
- Requires organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
- Data covered by SB-1386 includes: first and last names, or first initial and last name, in combination with one or more of the following: social security number; driver license number or CA identification card number; financial account number or credit/debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account; medical information; or health insurance information.
UC Policies
UC has developed IT security policies that address the requirements of these regulations. Fundamental among these policies is the systemwide BFB-IS-3: Electronic Information Security. IS-3 follows both a standards and risk-based approach to information security to ensure that UC meets industry, government, and regulatory requirements while also properly scoping controls and making appropriate investment decisions. It addresses legal requirements associated with HIPAA, PCI-DSS, and other state and federal regulations and includes requirements needed to qualify for certain grants that are essential to UC research funding (NIST 800-171). IS-3 establishes the minimum set of information security requirements, identifies ownership of risks and their mitigation, and delineates the penalties for non-compliance. Note that among many other things, IS-3 makes each unit within a UC organization responsible for the Information Security Management Plan (ISMP) for Institutional Information and IT Resources they handle. Unit managers should review IS-3 in detail to ensure they are meeting their responsibilities.
Additional UC systemwide IT policies include IS-12 Continuity Planning and Disaster Recovery and the UC Electronic Communications Policy.
Each UC campus further delineates its security requirements through its own local policies. UCSF IT policies are available on the Campus Administrative Policies page under the 650 series. Chief among them is 650-16 Information Security and Confidentiality. Its purpose is to provide the information necessary to comply with federal and state laws and regulations and university policy governing the security and confidentiality of electronic information. It includes many addendums but the most relevant are UCSF Roles and Responsibilities for Securing Electronic Information (Addendum A), which is a great place to start to understand your role as it relates to IT security at UCSF; UCSF Minimum Security Standards for Electronic Information Resources (Addendum B), which details required security controls for all devices that connect to the UCSF network; and UCSF Data Classification Standard (Addendum F), which system and business owners must use to identify the required protection level for any UCSF data they own and/or manage.
With the news of new cyber-attacks against high profile institutions appearing weekly, everyone is on edge and asking the question, "Who is next?" In response to a significant security incident, UCSF launched an initiative dubbed the IS-3 Program, which, combined with our IT transformation efforts, is aimed at standardizing our core operational IT processes and increasing our compliance with UC policy and decreasing our institutional risk exposure to cyber threats. We have been maturing the offerings from UCSF central IT that aid in compliance in hopes that these tools will be adopted broadly. Some technical controls being implemented are required across the organization, while others are aimed at making the process of abiding by policy easier. The end goal is a secure environment that protects our assets (and our people) from bad actors who are actively working to exploit our systems for their personal gain. The recently rolled out Campus IT Operating Model (ITOM) Program greatly supports and enhances this effort.
Take the quiz on Regulations and Policy. The prize for passing the quiz is one entry in a drawing for one of six $50 Amazon gift cards.
- Owning Team: IT Security
-
Team Lead: Patrick Phelan