SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Supporting HIPAA Compliance
Through Managed Hosting
Agenda
 HIPAA Defined
 HIPAA Compliance and Non-Compliance
 Managed Hosting and HIPAA Compliance
 Connectria’s HIPAA Solutions
2
Disclaimer
As you will see throughout this presentation, it is the customer’s sole
responsibility to assure that it takes appropriate steps to achieve
compliance with its HIPAA obligations.
Connectria makes no representations or warranties of any kind that
customers will be HIPAA compliant by solely utilizing Connectria’s
services.
3
What is HIPAA?
 Health Insurance Portability & Accountability Act
 Designed to improve the efficiency and effectiveness of the
American health care system
1. Group and individual insurance reform
2. Accountability
3. Administrative Simplification
4
The Broad HIPAA Legislation
 HIPAA legislation consists of five titles:
Title I Health care access, portability and renewability
Title II
Preventing health care fraud and abuse; administrative
simplification; medical liability reform
Title III Tax-related health provisions
Title IV
Application and enforcement of group health plan
requirements
Title V Revenue offsets
5
More on Title II
 Administrative Simplification requires:
 Improved efficiencies through standardized EDI (electronic data
interchange)
 Privacy and security of health data through standards
enforcement
In 2009, the Health Information Technology for Economic
and Clinical Health Act (HITECH) extended HIPAA privacy
and security requirements as well as increased enforcement
6
Electronic Information and HIPAA
 HIPAA applies to all forms of
information, however electronic
data raises a distinct set of
guidelines, particular for security
 Protected Health Information (PHI or EPHI) is
individually identifiable health information
(e.g.name, phone#, email, SS#, etc.) that is
transmitted by, or maintained in, electronic
media or any form or medium
HIPAA Security Safeguards
Source: Gartner
8
Administrative
Physical
 Facility Access Controls
 Workstation Use
 Workstation Security
 Device and Media Controls
Technical
 Access Control
 Audit Controls
 Integrity
 Person or Entity Authentication
 Transmission Security
Security Management Process
 Assigned Security Responsibility
 Workforce Security
 Information Access
Management
 Security Awareness and Training
 Security Incident Procedures
 Contingency Plan
 Evaluation
Business Associate Contracts and
Other Arrangements
HIPAA Applies to “Covered Entities”
• Doctors
• Clinics
• Psychologists
• Dentists
• Chiropractors
• Nursing Homes
• Pharmacies
…but only if they transmit any
information in an electronic
form in connection with a
transaction for which HHS has
adopted a standard.
Source: US Dept of Health and Human Services, HHS.gov
A Health Care Provider
• Health insurance
companies
• HMOs
• Company health plans
• Government programs
that pay for healthcare,
such as Medicare,
Medicaid, and military
and veterans health care
programs
A Health Plan
• Entities that process
non- standard health
information they receive
from another entity into
a standards
(i.e., standard electronic
format or data
content), or vice versa.
A Health Care
Clearinghouse
A Covered Entity is One of the Following:
9
Achieving Compliance
 Understand the laws and compliance
 Seek outside counsel if necessary
 The security rule is expressed as a set of standards and
implementation specifications, with some flexibility built into the
law
STANDARDS
• Are required, must be met,
however…
• …can be met in any fashion that
is reasonable and appropriate for a
given organization
IMPLEMENTATION SPECIFICATIONS
• Are required or addressable (but
not optional)
• Organizations must document any
addressable specification deemed
not reasonable or appropriate
Source: Gartner
10
Potential Cost of Non-Compliance
 Civil and criminal penalties
for privacy and security
violations
 HITECH Act strengthened
enforcement
 Fines up to $25,000 for multiple violations
of the same standard in a calendar year
 Fines up to $250,000 and/or imprisonment
up to 10 years for knowing misuse of
individually identifiable health information
11
Breaches and Penalties are Real
12
The HIPAA Solution Misconception
 There is no such thing as a HIPAA
Compliant Managed Hosting
Solution
HIPAA Compliance Extends well beyond securing electronic data (Titles I-V)1
Managed Hosting Companies are not “Covered Entities”2
Managed Hosting Companies can support but not guarantee compliance3
13
Connectria’s HIPAA Solutions
 Connectria has a HIPAA solution for any type of covered entity
 Supports a wide range of mission critical systems including:
 Solutions for healthcare related software companies (e.g. SaaS)
 Packaged and customized HIPAA Solutions
 Extranets/Intranets
 Email environments
 Disaster recovery environments
 e-learning systems
 Electronic Medical Records (EMR) systems
 Patient management systems
 Billing systems,
 e-Commerce websites
14
Connectria’s HIPAA Solutions
15
Administrative Physical
 Facility Access Controls
 Workstation Use
 Workstation Security
 Device and Media Controls
Technical
 Access Control
 Audit Controls
 Integrity
 Person or Entity Authentication
 Transmission Security
15
Security Management Process
 Assigned Security Responsibility
 Workforce Security
 Information Access
Management
 Security Awareness and Training
 Security Incident Procedures
 Contingency Plan
 Evaluation
Business Associate Contracts and
Other Arrangements
A Few of Our Customers…
16
For more information
 Interested in learning more about Connectria’s HIPAA
Solutions?
Call us at:
1-800-781-7820 or 314-587-7000
Email us at:
info@connectria.com
Visit us at:
www.connectria.com
17

Weitere ähnliche Inhalte

Was ist angesagt?

Baker HIMSS Staffers Final
Baker HIMSS Staffers FinalBaker HIMSS Staffers Final
Baker HIMSS Staffers Finalbakerdb
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health recordssamuelerie
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare softwareConcetto Labs
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
Cimo7e ppt ch02 (1)
Cimo7e ppt ch02 (1)Cimo7e ppt ch02 (1)
Cimo7e ppt ch02 (1)joshua_11111
 

Was ist angesagt? (19)

HIPAA Compliance
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Baker HIMSS Staffers Final
Baker HIMSS Staffers FinalBaker HIMSS Staffers Final
Baker HIMSS Staffers Final
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
HIPAA Tittle II
HIPAA Tittle IIHIPAA Tittle II
HIPAA Tittle II
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
HIPAA Security 2019
HIPAA Security 2019HIPAA Security 2019
HIPAA Security 2019
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare software
 
Claim Depot
Claim DepotClaim Depot
Claim Depot
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Louise bailey ppt
Louise bailey pptLouise bailey ppt
Louise bailey ppt
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
Cimo7e ppt ch02 (1)
Cimo7e ppt ch02 (1)Cimo7e ppt ch02 (1)
Cimo7e ppt ch02 (1)
 
Cimo7e ppt ch02
Cimo7e ppt ch02Cimo7e ppt ch02
Cimo7e ppt ch02
 

Ähnlich wie Connectria Hosting- HIPAA Compliant Hosting Services

HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit ImplementationValency Networks
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxMocDoc
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxcravennichole326
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfSuccessiveDigital
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfOmniMD Healthcare
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliancePrince George
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law TestSachiko Hurst
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion Dan Wellisch
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfSeasiaInfotech2
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalslee5lee
 
Navigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationNavigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationShyamMishra72
 

Ähnlich wie Connectria Hosting- HIPAA Compliant Hosting Services (20)

HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
 
HIPAA
HIPAAHIPAA
HIPAA
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdf
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionals
 
Navigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationNavigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA Certification
 

Kürzlich hochgeladen

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Kürzlich hochgeladen (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

Connectria Hosting- HIPAA Compliant Hosting Services

  • 2. Agenda  HIPAA Defined  HIPAA Compliance and Non-Compliance  Managed Hosting and HIPAA Compliance  Connectria’s HIPAA Solutions 2
  • 3. Disclaimer As you will see throughout this presentation, it is the customer’s sole responsibility to assure that it takes appropriate steps to achieve compliance with its HIPAA obligations. Connectria makes no representations or warranties of any kind that customers will be HIPAA compliant by solely utilizing Connectria’s services. 3
  • 4. What is HIPAA?  Health Insurance Portability & Accountability Act  Designed to improve the efficiency and effectiveness of the American health care system 1. Group and individual insurance reform 2. Accountability 3. Administrative Simplification 4
  • 5. The Broad HIPAA Legislation  HIPAA legislation consists of five titles: Title I Health care access, portability and renewability Title II Preventing health care fraud and abuse; administrative simplification; medical liability reform Title III Tax-related health provisions Title IV Application and enforcement of group health plan requirements Title V Revenue offsets 5
  • 6. More on Title II  Administrative Simplification requires:  Improved efficiencies through standardized EDI (electronic data interchange)  Privacy and security of health data through standards enforcement In 2009, the Health Information Technology for Economic and Clinical Health Act (HITECH) extended HIPAA privacy and security requirements as well as increased enforcement 6
  • 7. Electronic Information and HIPAA  HIPAA applies to all forms of information, however electronic data raises a distinct set of guidelines, particular for security  Protected Health Information (PHI or EPHI) is individually identifiable health information (e.g.name, phone#, email, SS#, etc.) that is transmitted by, or maintained in, electronic media or any form or medium
  • 8. HIPAA Security Safeguards Source: Gartner 8 Administrative Physical  Facility Access Controls  Workstation Use  Workstation Security  Device and Media Controls Technical  Access Control  Audit Controls  Integrity  Person or Entity Authentication  Transmission Security Security Management Process  Assigned Security Responsibility  Workforce Security  Information Access Management  Security Awareness and Training  Security Incident Procedures  Contingency Plan  Evaluation Business Associate Contracts and Other Arrangements
  • 9. HIPAA Applies to “Covered Entities” • Doctors • Clinics • Psychologists • Dentists • Chiropractors • Nursing Homes • Pharmacies …but only if they transmit any information in an electronic form in connection with a transaction for which HHS has adopted a standard. Source: US Dept of Health and Human Services, HHS.gov A Health Care Provider • Health insurance companies • HMOs • Company health plans • Government programs that pay for healthcare, such as Medicare, Medicaid, and military and veterans health care programs A Health Plan • Entities that process non- standard health information they receive from another entity into a standards (i.e., standard electronic format or data content), or vice versa. A Health Care Clearinghouse A Covered Entity is One of the Following: 9
  • 10. Achieving Compliance  Understand the laws and compliance  Seek outside counsel if necessary  The security rule is expressed as a set of standards and implementation specifications, with some flexibility built into the law STANDARDS • Are required, must be met, however… • …can be met in any fashion that is reasonable and appropriate for a given organization IMPLEMENTATION SPECIFICATIONS • Are required or addressable (but not optional) • Organizations must document any addressable specification deemed not reasonable or appropriate Source: Gartner 10
  • 11. Potential Cost of Non-Compliance  Civil and criminal penalties for privacy and security violations  HITECH Act strengthened enforcement  Fines up to $25,000 for multiple violations of the same standard in a calendar year  Fines up to $250,000 and/or imprisonment up to 10 years for knowing misuse of individually identifiable health information 11
  • 12. Breaches and Penalties are Real 12
  • 13. The HIPAA Solution Misconception  There is no such thing as a HIPAA Compliant Managed Hosting Solution HIPAA Compliance Extends well beyond securing electronic data (Titles I-V)1 Managed Hosting Companies are not “Covered Entities”2 Managed Hosting Companies can support but not guarantee compliance3 13
  • 14. Connectria’s HIPAA Solutions  Connectria has a HIPAA solution for any type of covered entity  Supports a wide range of mission critical systems including:  Solutions for healthcare related software companies (e.g. SaaS)  Packaged and customized HIPAA Solutions  Extranets/Intranets  Email environments  Disaster recovery environments  e-learning systems  Electronic Medical Records (EMR) systems  Patient management systems  Billing systems,  e-Commerce websites 14
  • 15. Connectria’s HIPAA Solutions 15 Administrative Physical  Facility Access Controls  Workstation Use  Workstation Security  Device and Media Controls Technical  Access Control  Audit Controls  Integrity  Person or Entity Authentication  Transmission Security 15 Security Management Process  Assigned Security Responsibility  Workforce Security  Information Access Management  Security Awareness and Training  Security Incident Procedures  Contingency Plan  Evaluation Business Associate Contracts and Other Arrangements
  • 16. A Few of Our Customers… 16
  • 17. For more information  Interested in learning more about Connectria’s HIPAA Solutions? Call us at: 1-800-781-7820 or 314-587-7000 Email us at: info@connectria.com Visit us at: www.connectria.com 17

Hinweis der Redaktion

  1. Thank you for joining Connectria’s on-demand presentation, “Supporting HIPAA Compliance Through Managed Hosting .”
  2. Throughout this presentation, we will provide an overview of Connectria Hosting, including our hosting experience across a wide range of technologies. We’ll also touch upon the strength of word of mouth marketing and how it relates to our Referral Partner Program. Finally, we’ll review our Referral Partner Program along with its benefits and show you how to sign up for the program.
  3. HIPAA is an acronym for the Health Insurance Portability and Accountability Act. Though passed by Congress in 1996, HIPAA was not fully implemented until 2003. Simply put, the intent of HIPAA is to improve the efficiency and effectiveness of the American health care system. Its focus is reforming group and individual insurance so that those who change or lose jobs will retain coverage; it attempts to reduce waste, fraud, and abuse, with penalties and sanctions for those in violation; HIPAA also aims to simplify health care administration by mandating uniform standards surrounding electronic data transactions as well as protecting and securing private health care information.
  4. The overall HIPAA legislation consists of five titles:Title I, "Health care access, portability and renewability," employers and health plans must allow a new employee's medical insurance coverage to remain continuous without regard to pre-existing conditions.Title II, "Preventing health care fraud and abuse; administrative simplification; medical liability reform" defines new requirements for privacy and security of individually identifiable patient information.Title III, "Tax-related health provisions" standardizes the amount you can save per person in a pre-tax medical savings account.Title IV, "Application and enforcement of group health plan requirements" broadened information on insurance reform provisions and provide detailed explanations. Title V, "Revenue offsets" are regulations on how employers can deduct company-owned life insurance premiums for income tax purposes. Our focus upon HIPAA compliance and managed hosting that supports HIPAA compliance is related specifically to Title II.
  5. The Administrative Simplification section within Title II requires improved efficiency in healthcaredelivery by the standardization of electronic data interchange (EDI) and the protection ofconfidentiality and security of health data through setting and enforcing standards. On February 17, 2009, the Health Information Technology for Economic and Clinical Health Act(HITECH) was signed into law as part of the American Recovery and Reinvestment Act(ARRA), significantly extending certain HIPAA security and privacy requirements as wellas setting the stage for increased enforcement.
  6. HIPAA security for protecting health data is divided into three categories, administrative safeguards, physical safeguards and technical safeguards. The administrative safeguards contain 9 standards surrounding the conduct of personnel in relation to the protection of data. Four categories within the physical safeguards are intended to ensure necessary physical measures, policies and procedures are in place that protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards as well as unauthorized access. Finally, technical safeguards are designed to prevent unauthorized access to data that is transmitted over a communications network.
  7. The HIPAA Privacy Rule pertains to three categories of "covered entities" - health care providers, health plans, and health care clearinghouses.Health care providers are covered if they transmit health information electronically. Even a doctor in a small practice who keeps only paper records will almost certainly use a billing service that transmits information electronically. In short, it is nearly impossible to provide health care today without using electronic means in some way.As long as information is transmitted electronically, "health care provider" includes your doctors, hospitals, staff involved in your treatment, laboratories, pharmacists, dentists, and many others that provide medical, dental, and mental health care or treatment. In short, a provider is almost anyone in the business of providing health care who is licensed or regulated by the states.Health plan means almost anyone that pays for the cost of medical care. This includes: health insurance companies, HMOs (health maintenance organizations), group health plans sponsored by your employer, Medicare and Medicaid, and virtually any other company or arrangement that pays for your health care.Health care clearinghouses can be any number of organizations that work as a go-between for health care providers and health plans. An example of this would be a billing service that takes information from a doctor and puts it into a standard coded format. Patients rarely deal directly with clearinghouses.An organization may also be what is called a hybrid entity. A hybrid entity provides health care as only part of its business. A large corporation that has a self-insured health plan for its employees is one example of a hybrid entity. Only the portion of the company that processes claims and makes payments to health care providers is subject to the HIPAA Privacy Rule.
  8. Now that you have a better idea of HIPAA laws and its applicability, how does one become compliant? First, become familiar with the body of HIPAA laws, including but not limited to privacy and security. This presentation only provides a cursory introduction into HIPAA compliance. You may wish to seek the advice and counsel of a third party source. They are many consulting companies that provide these services. Given our focus is surrounding the privacy and security of individually identifiable information in electronic form, you should be aware that the security rule is a set of standards and implementation specifications. It should also be known that there is some flexibility built into the law as it pertains to its compliance. For standards, each must be met, however it takes into account that each organization may be different so it requires compliance that is reasonable and appropriate for your given organization. Implementation specifications may be required or addressable. Note addressable does not mean optional. If your organization deems a certain specification as not reasonable or appropriate, you must clearly document a defensible position.
  9. The cost or non-compliance with HIPAA laws are real. Violation complaints have steadily risen. For those in violation of privacy and security laws, civil and criminal penalties may result. And the introduction of the HITECH Act has strengthened HIPAA enforcement, with fines now ranging up to $250,000 and incarceration up to 10 years for those who knowingly misuse individually identifiable health information.
  10. So what do you do when you want to be HIPAA compliant? Simply outsource compliance to a managed hosting provider? Not quite.There are many misconceptions surrounding Managed Hosting and HIPAA compliance. Perhaps the biggest misconception is that you can become HIPAA compliant solely through outsourcing a HIPAA Compliant Managed Hosting Solution. Despite claims of many other vendors, you cannot achieve compliance through a managed hosting service alone. As referenced earlier in this presentation, there is much more to HIPAA compliance beyond securing electronic data. This is just one piece of the puzzle. Managed Hosting Companies are not covered entities, and cannot achieve compliance in and of themselves. Managed hosting companies can, however, significantly support efforts to achieve HIPAA compliance. They do so since the very nature of their businesses adhere to security standards through best practices. And additionally, many hosting companies provide HIPAA specific measures and solutions to better assist in protecting electronic data.
  11. So what do you do when you want to be HIPAA compliant? Simply outsource compliance to a managed hosting provider? Not quite.There are many misconceptions surrounding Managed Hosting and HIPAA compliance. Perhaps the biggest misconception is that you can become HIPAA compliant solely through outsourcing a HIPAA Compliant Managed Hosting Solution. Despite claims of many other vendors, you cannot achieve compliance through a managed hosting service alone. As referenced earlier in this presentation, there is much more to HIPAA compliance beyond securing electronic data. This is just one piece of the puzzle. Managed Hosting Companies are not covered entities, and cannot achieve compliance in and of themselves. Managed hosting companies can, however, significantly support efforts to achieve HIPAA compliance. They do so since the very nature of their businesses adhere to security standards through best practices. And additionally, many hosting companies provide HIPAA specific measures and solutions to better assist in protecting electronic data.
  12. Connectria’s HIPAA solutions may support any covered entity’s requirement for compliance. Our HIPAA solutions support a wide range of mission critical systems including EMR, patient management, billing, ecommerce, email, backup and disaster recovery and more. We also support HIPAA compliance for healthcare related software companies seeking a hosted solution, including Software as a Service platforms. Connectria provides packaged and customized HIPAA solutions to ensure each customer has the right solution for their organization….all at a predictable, fixed monthly price.
  13. No one expects healthcare organizations to be experts in securing electronic data….for instance, not many healthcare organizations can provide their own off-site encrypted backups…that’s where Connectria comes in. Connectria’s HIPAA solutions address most all elements of the security rule, allowing covered entities to focus upon their business and do what they do best, whether delivering, administering or supporting healthcare.
  14. Thank you for listening to our presentation, “Supporting HIPAA Compliance Through Managed Hosting.” We hope you found it worthwhile. If you are interested in learning more about Connectria, our managed hosting and HIPAA solutions, please call us at 1-800-781-7820 or 314-587-7000. Alternatively, email us at info.connectria.com or visit us at www.connectria.com. We hope to hear from you soon.