Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
physical_security [2016/06/15 00:34]
jillian_nadette_de_leon
physical_security [2016/07/02 02:29] (current)
jillian_nadette_de_leon
Line 1: Line 1:
 ##PHYSICAL SECURITY ##PHYSICAL SECURITY
  
-**COMPUTER ACCESS**\\ +**1. Inventory of Information Technology Physical Devices.**\\ 
-  * Pre-deployment site assessment ​shall be conducted ​and computers to be installed shall be non-portable and fixed in one placeComputers ​shall be accessible ​to authorized personnel only and role-based system access shall be implemented. Each user shall have one account only. Multiple accounts per user are not allowed. A person requesting ​for access to a computer shall fill-out a request form. \\ +The IT personnel ​shall maintain ​and update an inventory of all information technology physical devices being used in the facilityThe inventory ​shall include but not be limited ​to, on premise server equipment, firewall ​and security devices, client workstations,​ network devices, mobile devices, biometric and authentication devices, as well as other present and future information technology devices that may be relevant ​for the purposes ​of PHIE. \\
-  * Anti-glare filters on computer monitors shall be installed. This will not only help reduce glare, but also prevent anyone from seeing what is on the screen unless directly in front of the computer.\\+
  
-//​Applications.// Only applications for the hospital information system ​shall be installed in the computer systemOther applications,​ most especially social media applications are strictly not allowed+**2Access to Physical Infrastructure**\\ Access to the IT physical infrastructure of the health facility ​shall be limited to authorized personnel, which will be defined by the participating health care providerAny special access to the physical infrastructure shall be documented thoroughly. Any unauthorized access to the IT physical infrastructure shall also be documented and escalated to the appropriate decision makers for further investigation and action\\
  
 +**2.1. Server Access.** The health facility may choose to have either an on premise server, a cloud server environment,​ or a combination of the two. Cloud technology is discussed separately under the cloud services section of this document. Should the health facility choose an on premise server, it shall provide a designated area for the housing of servers or data centers. It shall be a separate room from the data collection and processing as well as from the office of the IT personnel. The server room shall be marked as "​Restricted"​ and shall only be accessible to authorized personnel. The server room shall comply with the physical security ISO 27001 standards.\\
  
-**SERVERS**\\ +**2.2. Computer Access.** Pre-deployment site assessment ​shall be conducted prior to installation ​of computer workstations in the health facilityComputers ​shall be accessible to authorized personnel ​only and role-based system access shall be implementedEach user shall have on account only. Multiple accounts per user are not allowed. A person requesting ​for access to computer ​shall fill-out a request form. \\
-  *The health facility ​shall provide a designated area for the housing ​of servers/​data centers. It shall be a separate area from the data collection and processing as well as from the IT officeThe server room shall be marked as "​Restricted"​ and shall only be accessible to authorized personnel. ​If the health facility cannot allot a space for the server room, at the minimum, ​data cabinet ​shall be installed and restrictions in terms of access shall be provided.\\+
  
-//IT Room.// The IT room shall only be accessible to authorized personnel and to personnel involved during quality assurance monitoringA designated IT personnel shall be tasked to handle ​the servers.\\+Anti-glare filters on computer monitors ​shall be installedThis will not only help reduce glare, but also prevent anyone from seeing what is on the screen unless directly in front of the computer.\\
  
-**OTHER DEVICES**\\ +**2.3. Computer Loss.** In case of computer loss, the accounts in the computer system ​shall be reset and deactivated until it is retrieved ​or reportedThe privacy officer ​shall implement security incident procedures and contingency plans for such events.\\
-   * Facility-registered electronic devices ​shall not be brought outside the premises of the health facility except under circumstances such as disasters ​and vaccinations ​or unless otherwise approved by the head of the facilityUSB devices ​shall be limited to office use but as may be practical, shall not be used.\\ +
-   * Mobile devices used for job responsibilities are subject to audits even if an employee owns it.\\+
  
-  ​Capturing ​of patient ​data using camera phones ​and bringing ​of electronic ​devices such as cellular phoneslaptopstablets, and cameras inside the medical records area is strictly not allowed.\\+**3. Bringing of devices outside the health facility. ** Facility-registered devices shall not be brought outside the premises of the health facility except under circumstances where the point of patient ​encounter is outside the health facility, such as but not limited to, vaccinations,​ remote visits, ​and other community-oriented activities outside the health facility. In such cases where the devices are brought out of the health facility, proper documentation and security check shall be ensured. At the minimum, the following security components should be in place for the device brought ​ out of the facility:​\\ 
 +1. Hard disk encryption.\\ 
 +2. Data encryption.\\ 
 +3. Wireless network encryption.\\ 
 +4. Role-based access control.\\ 
 +5. Anti-virus software for vulnerable operating systems.\\ 
 +6. Password-protected user access that complies with facility password policies.\\ 
 +7. Encrypted portable ​devices such as but not limited toUSB drivessecure digital (SD) card drives, re-writable CD, and other present and future devices.\\
  
-**POINTS TO CONSIDER** +**4. Bring-your-own-device (BYOD).** Mobile and portable devices that are property ​of the health facility personnel may be allowed ​by the health facility, provided ​that the facility implements strict policies for access, processing, storage, transmission and output ​of information ​that may have implications over patient privacy and health information security.\\
-  * State provisions regarding setting-up of infrastructure where physical servers or data center of hospital information system shall be located. Applicability ​of the existing administrative order containing provisions on IHOMP shall be considered. Implementation of an off-site back-up shall be done if the aforementioned AO shall be affected ​by this proposed set of rules.\\ +
-(//We have to discuss whether we really want to specify in the IRR that setting up of infrastructure is required. I think it is sufficient to just specify the conditions ​that must be complied withPart of this has already been developed by Kit's group.-IP//​)\\+
  
 +**4.1. Agreement.** A signed usage agreement has to be submitted by the owner of the BYOD prior to using the device for handling health data and information.\\
  
-+**4.2. Training.** BYOD users shall undergo annual security training.\\ 
 + 
 +**4.3. Configuration.** The health facility IT personnel shall implement a mechanism that would create an audit trail of system activity by the BYOD user, including log-in attempts, security incidents, and attempts to access files containing personally identifiable information. The mechanism shall also have a provision for remote access by the IT personnel, in such events that privacy of health data and information are compromised. \\ 
 + 
 +**4.4. Device Requirements.** The privacy officer shall approve a checklist of requirements for the BYOD to comply before being certified as usable for the access of health information. At the minimum, the device shall have the following:​\\ 
 +1. Hard disk encryption.\\ 
 +2. Data encryption.\\ 
 +3. Wireless network encryption.\\ 
 +4. Role-based access control.\\ 
 +5. Anti-virus software for vulnerable operating systems.\\ 
 +6. Password-protected user access that complies with facility password policies.\\ 
 +7. Encrypted portable devices such as but not limited to, Flash Drives, secure digital (SD) card drives, re-writable CD, and other present and future devices.\\ 
 + 
 +Mobile devices used for job responsibilities are subject to audits even if an employee owns it.\\ 
 + 
 +Capturing of patient data using camera phones and bringing of unauthorized electronic devices such as cellular phones, laptops, tablets, and cameras inside the medical records area is strictly not allowed.\\ 
 + 
 +**5. Business continuity and Disaster recovery.** The health facility shall implement policies for business continuity and disaster recovery.\\ 
 + 
 +**5.1. Physical backup.**A data backup plan has to be implemented to create and maintain exact copies of the system for handling health information. The backup medium must be defined, and the interval of backup stated. The backup must also be tested for data validity and integrity. Physical backups shall be encrypted and stored outside the health facility and additional physical security measures shall be in place for accessing and securing the physical backups. In such case that a disaster occurs, the privacy officer shall have a disaster recovery team that can be organized quickly and have a protocol in place for data recovery. \\ 
 + 
 +**5.2. Business Continuity.** Business continuity has to be ensured even in place of disasters. The privacy officer shall have identified a minimum set of data requirements for maintaining the health facility processes for their services. The health facility shall also have the ability to transition from “emergency-mode” services, to full services. Hence, the policies for encoding data outside the full services mode shall be in place. \\ 
 + 
 +Events that took place in times of disaster recovery and business continuity shall be documented and reviewed, with updates implemented according to best practices and lessons learned during the disaster period.\\
  
 ##See Also ##See Also
   * [[consolidated_workshop_outputs|Consolidated Workshop Outputs]]   * [[consolidated_workshop_outputs|Consolidated Workshop Outputs]]