CDA Journal-JUNE 2022: Oral Health Care for People With Special Health Care Needs: A Call to Action

Page 73

Regulatory Compliance

C D A J O U R N A L , V O L 5 0 , Nº 6

OCR Cybersecurity Newsletter: Securing Your Legacy (System Security) U.S. Department of Health and Human Services October is Cyber Security Awareness Month and now is a great time for organizations to revisit the protections they have in place for their legacy systems. Health care organizations rely on many technical systems to deliver their services. The HIPAA Security Rule1 requires covered entities and their business associates to implement safeguards that reasonably and appropriately secure the electronic protected health information (ePHI) that these organizations create, receive, maintain or transmit. As health care entities’ technological footprint grows, the number of systems these organizations need to identify, assess and maintain grows as well. Many health care organizations rely on legacy systems, which is a term for an information system with one or more components that have been supplanted by newer technology and for which the manufacturer is no longer offering support. But despite their common use, the unique security considerations applicable to legacy systems in an organization’s IT environment are often overlooked. Ideally, all organizations would only use information systems that are fully patched and up to date. However, in reality, health care organizations must balance competing priorities and obligations. There are many reasons why a health care organization may elect to keep using a legacy system, such as: ■ The organization may not be able to replace the legacy system without sacrificing availability of data, disrupting critical services or compromising data integrity.

For health care providers, this can apply to medical devices, electronic health records and other systems offering critical services. The organization is reluctant to tinker with technology that appears to be working or to deploy a new and unfamiliar system that may reduce efficiency or lead to increased user errors.

The organization is reluctant to replace a system that is well-tailored to its business model or with which it has a high degree of competence. The organization’s other systems depend on the legacy system or are incompatible with newer systems. The organization is unable to dedicate the time, funds or human resources needed to retire and

JUNE 2 0 2 2 LDM_CDA_Journal_1.3_Square_LindaBrown_05_23_17.indd 1

375

5/24/2017 9:21:40 PM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.