ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Local Encryption ... Why Not?

    IT Discussion
    15
    357
    173.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • BRRABillB
      BRRABill
      last edited by

      In your "all on the cloud" example...

      Let's say a covered entity transfers a file of mailing addresses (PHI, obviously) to me. It stored on a HIPAA-compliant cloud service, so no issues there. I want to bring down the file to locally make labels and print on my machine.

      How does this work? I assume you'd download it, do your work, and then delete all instances?

      I guess in this scenario, I could use a product like "Deep Freeze" so there is NEVER any data on there. But that is a very limited case.

      DashrenderD scottalanmillerS 2 Replies Last reply Reply Quote 0
      • BRRABillB
        BRRABill @scottalanmiller
        last edited by

        @scottalanmiller said:

        Why would you by syncing? Again, the point is not to do these things.

        Usage on a laptop when there is not WiFi?

        Or if they are very large files, so as to not have to wait to work with them?

        Or if they are files for which there is no cloud-version available. Such as a lot of the third party software we've been discussing. And while products such as QuickBooks or Lacerte might have better alternatives, a lot of the proprietary stuff you'd see in a doctor's office, or financial planner's office might not.

        scottalanmillerS 1 Reply Last reply Reply Quote 1
        • DashrenderD
          Dashrender @BRRABill
          last edited by

          @BRRABill said:

          @scottalanmiller said:

          So if that one password was to be compromised, all encryption would be useless? And if that one password is not available, all of that data is at risk? I don't like the sounds of those odds. I can see cases where that would make sense, but I'd feel pretty worried in any situation where I felt the need to deploy it.

          If it was compromised the encryption wouldn't be useless, the person with the compromised password could just access the data. So they would have to have somehow gained access to my very complex password AND stolen the machine with the SED.

          The password is always available, unless I am dead. And even in that instance, the user still have their password so they could get in, and the data on these systems are all backed up. (Also with encryption both locally and in the cloud.)

          I think the switchover point is around machines, where they recommend central management. But for a one-off here and there it wouldn't make sense.

          Unless the encryption system has some type of OS that boots before windows, how does that part work?

          BRRABillB 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @BRRABill
            last edited by

            @BRRABill said:

            In your "all on the cloud" example...

            Let's say a covered entity transfers a file of mailing addresses (PHI, obviously) to me. It stored on a HIPAA-compliant cloud service, so no issues there. I want to bring down the file to locally make labels and print on my machine.

            How does this work? I assume you'd download it, do your work, and then delete all instances?

            I guess in this scenario, I could use a product like "Deep Freeze" so there is NEVER any data on there. But that is a very limited case.

            Well, if you are working with something like O365 and ODfB and SharePoint, you don't download it in the traditional sense. it's downloaded to your application where you do what you need.. when you close it.. the temp files are deleted by default and the file is saved back to the cloud where you go it, all automagically.

            BRRABillB scottalanmillerS 2 Replies Last reply Reply Quote 1
            • BRRABillB
              BRRABill @Dashrender
              last edited by

              @Dashrender said:

              Unless the encryption system has some type of OS that boots before windows, how does that part work?

              It is built into the drive.

              Once the machine boots past the DELL logo, a WAVE screen comes up asking for a password.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @BRRABill
                last edited by

                @BRRABill said:

                @scottalanmiller said:

                So if that one password was to be compromised, all encryption would be useless? And if that one password is not available, all of that data is at risk? I don't like the sounds of those odds. I can see cases where that would make sense, but I'd feel pretty worried in any situation where I felt the need to deploy it.

                If it was compromised the encryption wouldn't be useless, the person with the compromised password could just access the data. So they would have to have somehow gained access to my very complex password AND stolen the machine with the SED.

                The password is always available, unless I am dead. And even in that instance, the user still have their password so they could get in, and the data on these systems are all backed up. (Also with encryption both locally and in the cloud.)

                I think the switchover point is around machines, where they recommend central management. But for a one-off here and there it wouldn't make sense.

                I don't know, the bigger the scale the bigger the risk and the more important that it is to keep the data off of the machines completely. The bigger you get, the more this kind of stuff costs in raw numbers.

                Also, keep in mind your number one thread is end users themselves and social engineering both of which bypass encryption automatically.

                BRRABillB 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @BRRABill
                  last edited by

                  @BRRABill said:

                  @scottalanmiller said:

                  HIPAA is about "reasonable efforts at security." And much of that will come down to expert witnesses and a judge making a determination. If I had a laptop stolen and it was encrypted and someone broke that encryption I'd hate to face an expert witness and a judge who ask me "so why did you have data on a laptop in the first place?"

                  But again, what are the odds of this?

                  As has been discussed in other threads, there is a still a lot of data on endpoints, right or wrong. Or at least, that is my feeling. Would love to hear other thoughts of people in the wild or this.

                  Sure, there is. But why does that matter? If we are discussing how to improve things and what we as IT do, what other people are doing is only useful for seeing if "everyone does it" then we know that that is probably wrong. But that's only so useful, sometimes the crowd does something useful or things are useful because of the network effect so the guide of "the crowd does things poorly" doesn't always mean that we should rule that thing out (TCP/IP might not be the best, but using something else is too impractical due to the needs of interoperability.)

                  Yes, lots of places have data on end points. But if we are the IT for those places, we can point out that that is a risk and that if we feel the need to protect those endpoints we need to rethink how they are being used and evaluate if data on end points makes sense.

                  1 Reply Last reply Reply Quote 0
                  • BRRABillB
                    BRRABill @scottalanmiller
                    last edited by

                    @scottalanmiller said:

                    Also, keep in mind your number one thread is end users themselves and social engineering both of which bypass encryption automatically.

                    Agreed.

                    But it also nice to know if the device gets lost/stolen, the data is probably safe.

                    We had an employee who lost their iPad. But we set them to erase after 10 tries. So while there is some chance that another person who found the iPad could have guessed their passcode (hoping it wasn't 1234), but the odds are the iPad got erased. The chance drops even more if they use a real password. Which of course they will hate, so there's that tradeoff.

                    scottalanmillerS 2 Replies Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @BRRABill
                      last edited by

                      @BRRABill said:

                      Let's say a covered entity transfers a file of mailing addresses (PHI, obviously) to me. It stored on a HIPAA-compliant cloud service, so no issues there. I want to bring down the file to locally make labels and print on my machine.

                      Issue here.... you are mixing "how" with your "goals."

                      Your goal, I assume, is to print labels NOT to store the file locally, right? So don't mention downloading the file because that's the problem. You've decided on the solution already and made it part of the goal and introduced the problem. Think at the goal, rather than the proximate level, and the problem presents a solution.

                      Goal: Print Labels

                      Solution: Pull data from the service to print labels. Why do you need all data pulled down locally to do that? If I am using an application like Spiceworks I don't need to do that. If I am using excel I don't need to do that. Sure, some apps don't work well for this, but that is what we are potentially looking to address, right?

                      BRRABillB 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @BRRABill
                        last edited by

                        @BRRABill said:

                        @scottalanmiller said:

                        Why would you by syncing? Again, the point is not to do these things.

                        Usage on a laptop when there is not WiFi?

                        Or if they are very large files, so as to not have to wait to work with them?

                        There are viable cases, but these should be generally the exception, not the rule. How often is this actually happening to people that they are needing to work offline in the modern world? I don't go completely offline and I work in the third world regularly. How would working Americans run into this with any regularity?

                        1 Reply Last reply Reply Quote 0
                        • BRRABillB
                          BRRABill @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          Goal: Print Labels

                          Solution: Pull data from the service to print labels. Why do you need all data pulled down locally to do that? If I am using an application like Spiceworks I don't need to do that. If I am using excel I don't need to do that. Sure, some apps don't work well for this, but that is what we are potentially looking to address, right?

                          We happen to use Sharefile for Healthcare for our PHI transfer.

                          I'd have to get the file from there to Excel somehow.

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • BRRABillB
                            BRRABill @Dashrender
                            last edited by

                            @Dashrender said:

                            Well, if you are working with something like O365 and ODfB and SharePoint, you don't download it in the traditional sense. it's downloaded to your application where you do what you need.. when you close it.. the temp files are deleted by default and the file is saved back to the cloud where you go it, all automagically.

                            Are we sure about that?

                            And if we were ever brought before a judge, are we sure "O365 said it deleted my files when i was done" is a better response than "My entire drive is encrypted"?

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @Dashrender
                              last edited by

                              @Dashrender said:

                              @BRRABill said:

                              In your "all on the cloud" example...

                              Let's say a covered entity transfers a file of mailing addresses (PHI, obviously) to me. It stored on a HIPAA-compliant cloud service, so no issues there. I want to bring down the file to locally make labels and print on my machine.

                              How does this work? I assume you'd download it, do your work, and then delete all instances?

                              I guess in this scenario, I could use a product like "Deep Freeze" so there is NEVER any data on there. But that is a very limited case.

                              Well, if you are working with something like O365 and ODfB and SharePoint, you don't download it in the traditional sense. it's downloaded to your application where you do what you need.. when you close it.. the temp files are deleted by default and the file is saved back to the cloud where you go it, all automagically.

                              And if it was important, in theory the app could be encrypting any local data too. Not saying that apps are doing that today, but no reason that they would not.

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @BRRABill
                                last edited by

                                @BRRABill said:

                                @Dashrender said:

                                Well, if you are working with something like O365 and ODfB and SharePoint, you don't download it in the traditional sense. it's downloaded to your application where you do what you need.. when you close it.. the temp files are deleted by default and the file is saved back to the cloud where you go it, all automagically.

                                Are we sure about that?

                                And if we were ever brought before a judge, are we sure "O365 said it deleted my files when i was done" is a better response than "My entire drive is encrypted"?

                                Much better, because one is your responsibility and one is not 😉

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  Remember HIPAA is about one thing and one thing only: covering your ass. It is not about actual security, it is not about specific tasks. It is all about doing things to cover your and your company's collective butts. Being more secure but carrying liability is very foolish compared to being less secure and shedding responsibility.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @BRRABill
                                    last edited by

                                    @BRRABill said:

                                    @scottalanmiller said:

                                    Goal: Print Labels

                                    Solution: Pull data from the service to print labels. Why do you need all data pulled down locally to do that? If I am using an application like Spiceworks I don't need to do that. If I am using excel I don't need to do that. Sure, some apps don't work well for this, but that is what we are potentially looking to address, right?

                                    We happen to use Sharefile for Healthcare for our PHI transfer.

                                    I'd have to get the file from there to Excel somehow.

                                    Well then consider switching to more practical applications that help to meet HIPAA and PHI security needs.

                                    1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @BRRABill
                                      last edited by

                                      @BRRABill said:

                                      But it also nice to know if the device gets lost/stolen, the data is probably safe.

                                      Are you sure?

                                      Judge: "If the system was secure, why was it encrypted?"
                                      You: "Just in case our users started storing data locally."
                                      Judge: "And you don't feel that encrypting the drive suggests that you support that action and enable it by making it seem like you intend for them to put PHI there?"
                                      You: "Ummm... but I didn't tell them to put it there."

                                      DashrenderD BRRABillB 2 Replies Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @BRRABill
                                        last edited by

                                        @BRRABill said:

                                        We had an employee who lost their iPad. But we set them to erase after 10 tries. So while there is some chance that another person who found the iPad could have guessed their passcode (hoping it wasn't 1234), but the odds are the iPad got erased. The chance drops even more if they use a real password. Which of course they will hate, so there's that tradeoff.

                                        You are assuming that this is someone after the hardware, not the data. If someone was after the data, they would disassemble the iPad and your data is probably compromised.

                                        BRRABillB 1 Reply Last reply Reply Quote 0
                                        • BRRABillB
                                          BRRABill @scottalanmiller
                                          last edited by

                                          @scottalanmiller said:

                                          You are assuming that this is someone after the hardware, not the data. If someone was after the data, they would disassemble the iPad and your data is probably compromised.

                                          We were discussing that the other day. If the data on the drive itself in encrypted.

                                          Did we ever come to a conclusion?

                                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @BRRABill
                                            last edited by

                                            @BRRABill said:

                                            @scottalanmiller said:

                                            You are assuming that this is someone after the hardware, not the data. If someone was after the data, they would disassemble the iPad and your data is probably compromised.

                                            We were discussing that the other day. If the data on the drive itself in encrypted.

                                            Did we ever come to a conclusion?

                                            I am assuming that it is encrypted.

                                            BRRABillB 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 10
                                            • 17
                                            • 18
                                            • 8 / 18
                                            • First post
                                              Last post