SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Data Breach Lifeline: 1-866-726-4271
SIDEBAR HEADLINE GOES HERE
Sidebar copy will go here. Could be
used for short callouts explaining prod-
ucts or sharing interesting statistics.
May not be present on every page.
“Optional spot for callout quote. Does
not need to be present on every
page. Nis et escipsam int evel mo.
— Attribute Name, Title, Company
HIPAA Final Omnibus
Rule Playbook
Your Ticket to Winning the
Compliance Game
Offensive Plays
HIPAA Privacy Rule
Special Team Plays
Breach notification Rule
Defensive Plays
HIPAA Security Rule
Business Associate Plays
www2.IDExpertsCorp.com
“This Final Omnibus Rule marks the
most sweeping changes to the HIPAA
Privacy and Security Rules since
they were first implemented. These
changes
strengthen the ability
of my office to vigorously enforce
the HIPAA privacy and security
protections, regardless of whether the
information is being held by a health
plan, a health care provider, or one of
their business associates.”2
Leon Rodriguez
Director of HHS Office for Civil Rights
Data breaches risk the medical and financial well-being of your patients (or members if you are a health plan), and the credi-
bility and future business of healthcare organizations.
At the same time, federal and state governments are issuing even more regulations in response to the growing public
concern and eroding public trust over the protected health information (PHI) breach epidemic. The most sweeping of
these regulations is the long-awaited HIPAA Final Omnibus Rule.
Published in the Federal Register on January 25, 2013, by the U.S. Department of Health and Human Services (HHS) Office
for Civil Rights (OCR), the HIPAA Final Omnibus Rule reflects landmark legislation that affects nearly every aspect of patient
privacy and data security. It encompasses a number of changes, including:
1.	Modification of the HIPAA Privacy, Security, and Enforcement Rules to include HITECH requirements
2.	Modification of the Breach Notification Rule
3.	Modification of the HIPAA Privacy Rule regarding the Genetic Information Discrimination Act of 2008
4.	Additional modifications to the HIPAA Rules
HIPAA covered entities (CEs) must overcome daunting challenges — lack of time, resources, and expertise — to win the
compliance game. With HHS Office for Civil Rights imposing more severe penalties for violations, covered entities need to
take the offensive and plan for victory now. The coaching staff at ID Experts assembled this comprehensive playbook to
guide privacy and information security professionals to compliance. The “plays” we’ve developed encompass all major as-
pects of the Final Rule — HIPAA-HITECH Privacy, Security, and Breach Notification Rules — and how you need to manage
your business associates based on new guidelines.
We’ve chosen these plays to help covered entities with limited time and resources identify key aspects of the Final Rule
and plan for compliance by the September 23, 2013, deadline—and beyond. The checklist below outlines the require-
ments of the Final Rule and the plays you should make to protect your team, avoid penalties, and win the compliance
championship.
1 See “Health data breach trends from HCCA, SCCE survey, “
January 25, 2013, HealthITSecurity.com.
2 “BREAKING: HHS Releases HIPAA Update,” Healthcare Infor-
matics, January, 17 2013
Let the games begin!
Data breaches in
past year
1 4+
1
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
SIDEBAR HEADLINE GOES HERE
Sidebar copy will go here. Could be
used for short callouts explaining prod-
ucts or sharing interesting statistics.
May not be present on every page.
HIPAA Final Omnibus Rule Playbook
Offensive Plays — HIPAA Privacy Rule
Use the list of requirements below to strategize your compliance with the HIPAA Privacy Rule.
Background
To help protect against the breach of personal medical information, the Health Insurance Portability and Accountabil-
ity Act (HIPAA), enacted in 1996, set standards for medical privacy that went into effect over the next 10 years. Title
XIII of ARRA, the Health Information Technology for Economic and Clinical Health (HITECH) Act, sought to streamline
healthcare and reduce costs through the use of health information technology. It imposed new requirements, in-
cluding extension of the HIPAA Privacy and Security Rules to include business associates, a tiered increase in penal-
ties for violations of these rules, and mandatory audits by HHS. The HIPAA Final Omnibus Rule implements certain
provisions of the HITECH Act to “strengthen” the protections of the Privacy and Security Rules.
HIPAA Privacy Rule
According to HHS, “a major goal of the [HIPAA] Privacy Rule is to assure that individuals’ health information is properly
protected while allowing the flow of health information needed to provide and promote high quality healthcare and
to protect the public’s health and well-being.”3
Training
HHS requires periodic privacy and security training for all employees of healthcare organizations. This is critical,
given that the HCCA/SCCE survey found that the leading source (38 percent) of breach incidents is due to lost
paper files and that the leading source of discovery of these incidents is from non-IT employees. This suggests
that data security and patient privacy issues are closely linked to policies and procedures, and employee training.
Data Breaches: The Everyday
Disaster
According to the Third Annual Bench-
mark Study on Patient Privacy  Data
Security by Ponemon Institute, 94% of
healthcare organizations suffered data
breaches, costing the healthcare indus-
try an average of $7 billion a year.
3 “Summary of the HIPAA Privacy Rule,” Department of
Health and Human Services (hhs.gov).
Workforce training
Completed but Not Documented
Not Completed
Completed and Documented
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
“If you handle protected health in-
formation, you may be able to get by
without understanding the details of
health reform, but you cannot survive
in your job if you do not understand
and comply with the HIPAA/HITECH
rules. Anyone involved in the health
care business who does not comply
with these laws is a walking liability.”
James C. Pyles
Principle, Powers, Pylers, Sutter  Verville PC
Fundraising
New categories of PHI may be used or disclosed for fundraising, enabling covered entities to better
target fundraising efforts.
Marketing
The Final Rule redefines marketing to include receiving remuneration from a third party for
describing their product or service. CEs must obtain authorization for third-party marketing.
Designated third-party receipt of PHI
Requests must be made in writing, and clearly identify the recipient and where to send the PHI.
Ban on sale of PHI
The Final Rule prohibits, with exceptions, the sale of PHI without authorization. This ban
applies to limited data sets.
Restrictions on disclosure when paid in full
CEs must agree to an individual’s request to restrict disclosure to a health plan if the
individual pays in full for a service or item.
Disclosure of genetic information for underwriting purposes
Health plans may not use or disclose genetic health information for underwriting purposes.
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Use and Disclosure of PHI
The Final Rule reiterates the importance that healthcare providers meet stringent requirements for patient privacy
and data security. OCR has aggressively increased its enforcement toward organizations with lax privacy and security,
with stiff penalties for noncompliance. Some of the new requirements favor increased access to PHI, while others
restrict access. Either way, covered entities must update their policies and procedures to reflect the Final Rule’s man-
dates regarding the use and disclosure of PHI.
Update policies and procedures regarding the use and disclosure of PHI for the following:
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
Prohibition of sale of PHI
Duty to notify in case of a breach
Right to opt out of fundraising
Right to disclosure restrictions when paid in full
Limit on use of genetic information
School immunizations
CEs may release immunization records to schools without an authorization if done pursuant
to HIPAA standards.
Decendent Information
Decedents’ PHI is under HIPAA protection for 50 years after death. The Final Rule enables CEs
to continue communicating with relevant family and friends after an individual’s death.
Completed but Not Documented
Completed and Documented
Not Completed
Privacy Notices
Covered entities must change their privacy notices to reflect new privacy practices and patient rights.
Update notice of privacy practices to include:
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
Professional Risk Assessments:
Worth the Investment
An expert risk assessment costs less
than 1% of the average cost of a data
breach. Yet, many healthcare organiza-
tions lack the resources and expertise to
conduct their own risk assessment.
Learn more about ID Experts risk
assessment services »
Allow for combined “unconditioned” and “conditioned” authorizations.
Allow for authorizations for future research, with notice, to individuals.
Provide a method for patients to receive electronic copies of electronic PHI.
Electronic Copies of PHI
Patients now have the right to get electronic copies of all of their electronic medical records upon request, rather
than a hard copy, even if the electronic copy is not readily reproducible. Patients can also direct that a designated
third party receive copies.
Research
HHS finalized its proposal to allow a blending of “conditioned” and “unconditioned” authorizations for research into a
single document, where individuals can simply opt-in to the unconditioned authorization.
In addition, one-time authorization may be applied, with notice, for future research. “The language of the authoriza-
tion must adequately inform the individual that the individual’s PHI may be used in future research studies,” says
Adam Greene, a partner at Davis, Wright, and Tremaine, a firm that specializes in privacy and security matters.
Update research authorization policies/paperwork to:
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
Perform a HIPAA security compliance assessment.
A HIPAA security compliance assessment evaluates a CE’s regulatory obligations; existing
administrative, technical and physical safeguards; and gaps along with recommendations
for ensuring regulatory compliance and best practices.
Conduct a security risk analysis.
A risk analysis is a prospective and in-depth analysis of the risks to a covered entity’s
information assets involving electronic PHI and recommendations to meet the
requirements of the HIPAA Security Rule — including updated requirements in the Final
Rule. This is also a requirement for meaningful-use attestation by covered entities.
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Defensive Plays — HIPAA Security Rule
Use the list of requirements below to strategize your compliance with the HIPAA Security Rule.
Background
According to HHS, “the HIPAA Security Rule establishes national standards to protect individuals’ electronic personal
health information that is created, received, used, or maintained by a covered entity. The Security Rule requires ap-
propriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of
electronic protected health information.”4
Under the Final Rule, business associates are also bound to provisions of the
HIPAA Security Rule.
Assessment of Security Risks
Assess and document risks to PHI relative to regulatory obligations, and develop and implement mitigation strategies
for achieving compliance.
Ensure Your HIPAA Compliance
HIPAA compliance assessments evalu-
ate your regulatory obligations, current
level of compliance, and gaps with re-
spect to HIPAA-HITECH Privacy, Security,
and Breach Notification Rules, as well as
states laws.
Our HIPAA Compliance Assessment
service provides an efficient and credible
evaluation of your compliance gaps, a
priority ranking of your risks, and recom-
mendations for mitigating those risks.
Best practice suggests a HIPAA compli-
ance assessment should be conducted
annually.
Learn more about ID Experts HIPAA
Compliance Assessment service »
4 “The Security Rule,” Department of Health and Human
Services (hhs.gov)
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
Mitigation and Action
Take proper steps to mitigate the likelihood and impact of a data breach based on the assessment of your
organization’s security risks.
Develop risk mitigation scope.
Review and prioritize the risks revealed by your risk analysis based on their business impact
and likelihood of occurrence.
Create a mitigation plan.
Develop a risk mitigation plan including prospective schedules for addressing security
vulnerabilities and required budgets and resources.
Update relevant security policies and procedures.
Revisit and update security policies and procedures for these high-risk items.
Evaluate and implement security technologies.
Based on the risk analysis, implement or update safeguards and technologies to protect
PHI. Pay special attention to encrypting PHI in all modes — in motion, at rest, etc. according
to NIST specifications. Doing so provides a safe harbor from data breach notification
requirements in many cases.
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Consider Cyber Insurance
Cyber insurance helps offset the unpre-
dictable costs of data breach response,
such as legal liabilities and other “non-
tangible” expenses. But not all policies
are the same. Find the right coverage
for you.
Download the Cyber Insurance
Checklist »
Special Team Plays — Breach Notification Rule
Use the list of requirements below to strategize your compliance with the Breach Notification Rule.
Background
Under the interim final rule, a breach crossed the harm threshold if it “pose[d] a significant risk of financial, reputa-
tional, or other harm to the individual.” The HIPAA Final Omnibus Rule removes the harm standard, replacing it with
a new compromise standard. However, the Final Rule does not explicitly define the term “compromise.” Covered
entities must still conduct an incident risk assessment for every data security incident that involves PHI. Rather than
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
determine the risk of harm, however, the risk assessment determines the probability that PHI has been compromised.
The risk assessment must include a minimum of these four factors:
1.	The nature and extent of the protected health information involved, including the types of identifiers and the
likelihood of re-identification
2.	The unauthorized person who used the protected health information or to whom the disclosure was made
3.	Whether the protected health information was actually acquired or viewed
4.	The extent to which the risk to the protected health information has been mitigated
If your organization has a security or privacy incident involving PHI, and your risk assessment concludes there was
a very low probability that PHI was compromised, you may choose to not notify the affected individuals or OCR.
However, the Final Rule requires that your organization maintain a burden of proof if your conclusions are called into
question — or demonstrate that one of the existing exceptions to the definition of breach applies.
Policies and Procedures
Update policies and procedures to enable you to:
Detect and escalate a potential breach to your incident response team.
Conduct incident risk assessments per the Final Rule.
Provide supporting documentation to meet your burden of proof, including your incident
risk assessment methodology.
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
Incident Assessment that’s
Final Rule-Compliant
The Final Rule requires that you carry
out an incident risk assessment follow-
ing every PHI privacy or security assess-
ment. At the same time, the Final Rule
removed the controversial “harm stan-
dard” and replaced it with what is being
called the “compromise standard.”
ID Experts RADAR is HIPAA and States
data breach risk assessment and in-
cident management software that is
compliant with the Final Rule and the
new compromise standard. 
Learn more about the award-winning
ID Experts RADAR »
Incident Response Planning  Testing
Prepare, document, and test the proper steps for a breach response following a data security or privacy incident that
complies with the new breach definition outlined in the Final Rule.
Incident Risk Assessment
Define and document a method for consistent incident risk assessment using the four factors required by the Final
Rule. Ensure that your method provides the necessary decision support to determine if an incident is a reportable
breach or not and meets your burden of proof obligations under the Final Rule.
Planning
‱	Update your incident response plan by incorporating your new incident risk assessment
methodology and associated updates to your policies and procedures.
‱	Identify methods for detecting a breach.
‱	Determine types of notification based on the level of risk.
‱	Identify the response team and designate roles and responsibilities.
Testing
‱	Retrain your incident response team and workforce members on incident reporting protocol.
‱	Periodically conduct a tabletop or full-scale test and make needed adjustments.
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Method uses the four factors required by the Final Rule.
Method provides decision support and meets your burden of proof obligations under the
Final Rule.
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
www2.IDExpertsCorp.com
Business Associate Plays
Use the list of plays below to ensure compliance with your business associate contracts.
Background
The HIPAA Final Omnibus Rule extends the definition of a business associate as one that “creates, receives, maintains,
or transmits” PHI on behalf of a covered entity. This definition now also encompasses subcontractors that manage PHI
and specific categories of organizations, namely:
‱	 Health information organizations (HIOs)
‱	 E-prescribing gateways
‱	 Patient safety organizations
‱	 Vendors of PHI that provide services on behalf of a covered entity
‱	 Data storage vendors that maintain PHI even if their access to PHI is limited or nonexistent
Covered entities should review their roster of vendors, service providers, and other third parties and enter into con-
tracts (that include the BA Definition Scope Expansion) with these “new” business associates.
In addition, covered entities must enter into a contract with all business associates, but they are not required to enter
into direct contracts with subcontractors of their business associates and other downstream entities. The same chain
of contracts applies. These contracts must specify compliance with the Breach Notification Rule. If a covered entity
designates HIPAA responsibility to a business associate, the contract must also specify that the business associate will
comply with HIPAA regulations.
New Definition of Business Associates
Prepare, document, and test the proper steps for a breach response following a data security or privacy incident that
complies with the new breach definition outlined in the Final Rule.
OCR to Focus on Business
Associates
According to Leon Rodriguez,
Director of HHS Office for Civil
Rights, 63% of those affected by
healthcare data breaches reported
to OCR were a result of a security
breach at a business associate rather
than a covered entity.5
Create new contracts with entities that fit the new definition of a business associate.
Completed but Not Documented
Completed and Documented
Not Completed
5 “Office for Civil Rights to Focus on Business Associate
Security Risks,” ID Experts Blog, March 8, 2012
www2.IDExpertsCorp.com
Compliance with the Breach Notification Rule
Liability for HIPAA compliance
Assurances that they and subcontractors will safeguard PHI
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Completed but Not Documented
Completed and Documented
Not Completed
Update Business Associates Contracts
These contracts must specify:
The HIPAA Final Omnibus Rule impacts nearly every aspect of a covered entity’s patient privacy and data security
measures. But with this playbook, winning the compliance game doesn’t have to be daunting. And you don’t
have to go it alone. Your coaching staff at ID Experts will be on the sidelines guiding you to victory, every step of
the way.
Talk to an expert today: 866.726.4271 ‱ info@idexpertscorp.com
www2.IDExpertsCorp.com
Blogs
Text of the HIPAA Final Omnibus Rule
www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.
pdf
Protected Health Information (PHI) Project
ANSI/Shared Assessments/Internet Security Alliance
webstore.ansi.org/phi
HHS/OCR Data Breach Site (Known informally as the
“Wall of Shame”)
www.hhs.gov/ocr/privacy/hipaa/administrative/
breachnotificationrule/breachtool.html
HIPAA/HITECH Privacy/Security  Breach Notification
HHS/OCR Administrative Simplification Statue and Rules
www.hhs.gov/ocr/privacy/hipaa/administrative/index.html
ID Experts Corporate Blog
Data Breach Privacy, Security and Notification
www2.idexpertscorp.com/blog
PHI Privacy Blog
How Private is your Health Information?
www.phiprivacy.net
All Things HITECH — LinkedIn Group
Join the conversation about privacy, healthcare, and com-
pliance in the All Things HITECH Group.
www.linkedin.com/groups/All-Things-HITECH-3873240
Research/Papers
Third Annual Benchmark Study on Patient Privacy 
Data Security
Ponemon Institute, December 2012
www2.idexpertscorp.com/ponemon2012
The HIPAA Final Omnibus Rule: An Analysis of The
Changes Impacting Healthcare Covered Entities and
Business Associates
February 2013
www2.idexpertscorp.com/omnibus-hipaa-final-rule-
whitepaper/
Third Annual Survey on Medical Identity Theft
Ponemon Institute, June 2012
www.ponemon.org/local/upload/file/Third_Annual_
Survey_on_Medical_Identity_Theft_FINAL.pdf
2012 Data Breach Investigations Report
Verizon Business
www.verizonenterprise.com/resources/reports/rp_data-
breach-investigations-report-2012_en_xg.pdf
Products  Services
Breach HealthCheckÂź
This online tool measures both your organization’s
exposure to data breaches and your current protection
level against them — information to help you increase
the effectiveness of your organization’s data breach
protection programs.
www2.idexpertscorp.com/data-breach-tools/breach-
healthcheck/
RADARℱ
ID Experts RADAR is a highly intuitive and secure online
tool that helps hospitals, clinics, and health plans comply
with both HIPAA/HITECH and states data breach regula-
tions. Now HIPAA Final Rule ready.
www2.idexpertscorp.com/radar
Risk Assessment Services
Our team of CIPP, CHPC, and CISSP-certified experts will
plan and conduct risk assessments for your organization
that include a HIPAA compliance assessment, HIPAA se-
curity risk analysis, and incident response planning—ev-
erything to learn your vulnerabilities, and how to mitigate
them and achieve compliance.
www2.idexpertscorp.com/data-breach-solutions/health-
care/breach-prevention-healthcare/risk-assessment-
healthcare
Healthcare Data Breach Solutions
Protect your patients and your organization with our
comprehensive breach prevention and response services.
www2.idexpertscorp.com/data-breach-solutions/health-
care
Cyber Insurance Checklist
www2.idexpertscorp.com/checklist
Helpful Resources  Information
www2.IDExpertsCorp.com
About ID Experts
ID Experts delivers complete data breach care. The company’s solutions in data breach prevention, analysis and
response are endorsed by the American Hospital Association, meet regulatory compliance and achieve the most
positive out- comes for its customers. ID Experts is a leading advocate for privacy as a contributor to legislation,
a corporate and active member in both the IAPP and HIMSS, a corporate member of HCCA and chairs the ANSI
Identity Management Standards Panel PHI Project.
Our Healthcare Expertise
Healthcare is the industry third most frequently victimized by data breaches. Data breach issues and risks are dif-
ferent in the healthcare sector — the data (both PHI and PII) and victims are diverse, regulations are more complex
and financial risks are extreme. ID Experts is trusted by many prominent healthcare providers, payers and other
industry participants to provide a full spectrum of data privacy and breach solutions – before, during and after an
incident.
ID Experts has the focused expertise to deliver industry-specific products and services that best protect healthcare
organizations and the patients they serve. Our certified professionals, industry experience and our focus on “full re-
covery” help demonstrate your commitment to breach victims first hand — as well as exhibit credibility and compli-
ance to regulators and other relevant audiences.
With ID Experts as your partner, your organization will minimize the reputational, legal and financial risks of a
data breach, and help ensure positive outcomes for everyone involved.
ABOUT THIS DOCUMENT
Please realize that the HIPAA Final Omnibus
Rule is very lengthy and detailed. While this
document and its checklists are intended
to provide you with guidance as to general,
high-impact best practices that will assist
in preparing for compliance, they are not
intended to be exhaustive as far as all of
your privacy, security, and breach notifica-
tion obligations under the Final Rule. This
information is not intended to be or replace
legal advice. Please seek out your legal
counsel for such advice.
Talk to an expert today:
866.726.4271
info@idexpertscorp.com
www2.IDExpertsCorp.com/blog
@IDExperts
All Things HITECH
All Things Data Breach
www2.IDExpertsCorp.com

Weitere Àhnliche Inhalte

Was ist angesagt?

HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
Rebecca Norman
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
kkurapat
 
HIPAA
HIPAAHIPAA
HIPAA
Karna *
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
Polsinelli PC
 

Was ist angesagt? (20)

Hipaa omnibus
Hipaa omnibusHipaa omnibus
Hipaa omnibus
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
 
HIPAA
HIPAAHIPAA
HIPAA
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Hitech Act
Hitech ActHitech Act
Hitech Act
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
 

Ähnlich wie HIPAA Final Omnibus Rule Playbook

Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
mohammedfootwear
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
supportc2go
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
cravennichole326
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
vrgill22
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
susmitaghosh93
 

Ähnlich wie HIPAA Final Omnibus Rule Playbook (20)

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docx
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
Does your Mobile App require HIPAA Compliance.pdf
Does your Mobile App require HIPAA Compliance.pdfDoes your Mobile App require HIPAA Compliance.pdf
Does your Mobile App require HIPAA Compliance.pdf
 
HITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAAHITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAA
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Privacy-Security-Training-Session-Template-4.6.21.pptx
Privacy-Security-Training-Session-Template-4.6.21.pptxPrivacy-Security-Training-Session-Template-4.6.21.pptx
Privacy-Security-Training-Session-Template-4.6.21.pptx
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 

Mehr von Elizabeth Dimit

Mehr von Elizabeth Dimit (12)

An HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
An HR’s Guide to Identity & Privacy Benefits for Employees of All AgesAn HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
An HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
HR’s Guide to Identity and Privacy Benefits for Employees of All Ages
HR’s Guide to Identity and Privacy Benefits for Employees of All AgesHR’s Guide to Identity and Privacy Benefits for Employees of All Ages
HR’s Guide to Identity and Privacy Benefits for Employees of All Ages
 
ESET Case Study
ESET Case StudyESET Case Study
ESET Case Study
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
The Coffee Shop POS Buyer's Guide
The Coffee Shop POS Buyer's GuideThe Coffee Shop POS Buyer's Guide
The Coffee Shop POS Buyer's Guide
 
How to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
How to Remedy the Dangers of Prescription Fraud, Waste, and AbuseHow to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
How to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
 
A Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
A Nation in Crisis: Causes and Effects of the Ongoing Opioid EpidemicA Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
A Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
 
The 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party Risk
 
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterHow a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 

KĂŒrzlich hochgeladen

❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...
❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...
❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...
Sheetaleventcompany
 
Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...
Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...
Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...
Sheetaleventcompany
 
Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...
Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...
Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...
Sheetaleventcompany
 
Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...
Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...
Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...
Sheetaleventcompany
 
💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
Sheetaleventcompany
 
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Sheetaleventcompany
 
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
amritaverma53
 

KĂŒrzlich hochgeladen (20)

Kolkata Call Girls Shobhabazar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Gir...
Kolkata Call Girls Shobhabazar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Gir...Kolkata Call Girls Shobhabazar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Gir...
Kolkata Call Girls Shobhabazar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Gir...
 
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
 
❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...
❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...
❀Amritsar Escorts Service☎9815674956☎ Call Girl service in Amritsar☎ Amri...
 
Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...
Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...
Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...
 
Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...
Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...
Kolkata Call Girls Service â€ïžđŸ‘ 9xx000xx09 đŸ‘„đŸ«Š Independent Escort Service Kolka...
 
Cardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their RegulationCardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their Regulation
 
Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...
Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...
Low Cost Call Girls Bangalore {9179660964} ❀VVIP NISHA Call Girls in Bangalo...
 
(RIYA)🎄Airhostess Call Girl Jaipur Call Now 8445551418 Premium Collection Of ...
(RIYA)🎄Airhostess Call Girl Jaipur Call Now 8445551418 Premium Collection Of ...(RIYA)🎄Airhostess Call Girl Jaipur Call Now 8445551418 Premium Collection Of ...
(RIYA)🎄Airhostess Call Girl Jaipur Call Now 8445551418 Premium Collection Of ...
 
Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...
 
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service AvailableCall Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
 
Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...
Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...
Goa Call Girl Service 📞9xx000xx09📞Just Call DivyađŸ“Č Call Girl In Goa No💰Advanc...
 
Call Girls in Lucknow Just Call 👉👉 8875999948 Top Class Call Girl Service Ava...
Call Girls in Lucknow Just Call 👉👉 8875999948 Top Class Call Girl Service Ava...Call Girls in Lucknow Just Call 👉👉 8875999948 Top Class Call Girl Service Ava...
Call Girls in Lucknow Just Call 👉👉 8875999948 Top Class Call Girl Service Ava...
 
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
 
💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi đŸ“Č🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
 
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
 
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
 
Call Girl In Chandigarh 📞9809698092📞 JustđŸ“Č Call Inaaya Chandigarh Call Girls ...
Call Girl In Chandigarh 📞9809698092📞 JustđŸ“Č Call Inaaya Chandigarh Call Girls ...Call Girl In Chandigarh 📞9809698092📞 JustđŸ“Č Call Inaaya Chandigarh Call Girls ...
Call Girl In Chandigarh 📞9809698092📞 JustđŸ“Č Call Inaaya Chandigarh Call Girls ...
 
Chandigarh Call Girls Service â€ïžđŸ‘ 9809698092 đŸ‘„đŸ«ŠIndependent Escort Service Cha...
Chandigarh Call Girls Service â€ïžđŸ‘ 9809698092 đŸ‘„đŸ«ŠIndependent Escort Service Cha...Chandigarh Call Girls Service â€ïžđŸ‘ 9809698092 đŸ‘„đŸ«ŠIndependent Escort Service Cha...
Chandigarh Call Girls Service â€ïžđŸ‘ 9809698092 đŸ‘„đŸ«ŠIndependent Escort Service Cha...
 
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service AvailableCall Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
 
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
 

HIPAA Final Omnibus Rule Playbook

  • 1. Data Breach Lifeline: 1-866-726-4271 SIDEBAR HEADLINE GOES HERE Sidebar copy will go here. Could be used for short callouts explaining prod- ucts or sharing interesting statistics. May not be present on every page. “Optional spot for callout quote. Does not need to be present on every page. Nis et escipsam int evel mo. — Attribute Name, Title, Company HIPAA Final Omnibus Rule Playbook Your Ticket to Winning the Compliance Game Offensive Plays HIPAA Privacy Rule Special Team Plays Breach notification Rule Defensive Plays HIPAA Security Rule Business Associate Plays www2.IDExpertsCorp.com
  • 2. “This Final Omnibus Rule marks the most sweeping changes to the HIPAA Privacy and Security Rules since they were first implemented. These changes
strengthen the ability of my office to vigorously enforce the HIPAA privacy and security protections, regardless of whether the information is being held by a health plan, a health care provider, or one of their business associates.”2 Leon Rodriguez Director of HHS Office for Civil Rights Data breaches risk the medical and financial well-being of your patients (or members if you are a health plan), and the credi- bility and future business of healthcare organizations. At the same time, federal and state governments are issuing even more regulations in response to the growing public concern and eroding public trust over the protected health information (PHI) breach epidemic. The most sweeping of these regulations is the long-awaited HIPAA Final Omnibus Rule. Published in the Federal Register on January 25, 2013, by the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR), the HIPAA Final Omnibus Rule reflects landmark legislation that affects nearly every aspect of patient privacy and data security. It encompasses a number of changes, including: 1. Modification of the HIPAA Privacy, Security, and Enforcement Rules to include HITECH requirements 2. Modification of the Breach Notification Rule 3. Modification of the HIPAA Privacy Rule regarding the Genetic Information Discrimination Act of 2008 4. Additional modifications to the HIPAA Rules HIPAA covered entities (CEs) must overcome daunting challenges — lack of time, resources, and expertise — to win the compliance game. With HHS Office for Civil Rights imposing more severe penalties for violations, covered entities need to take the offensive and plan for victory now. The coaching staff at ID Experts assembled this comprehensive playbook to guide privacy and information security professionals to compliance. The “plays” we’ve developed encompass all major as- pects of the Final Rule — HIPAA-HITECH Privacy, Security, and Breach Notification Rules — and how you need to manage your business associates based on new guidelines. We’ve chosen these plays to help covered entities with limited time and resources identify key aspects of the Final Rule and plan for compliance by the September 23, 2013, deadline—and beyond. The checklist below outlines the require- ments of the Final Rule and the plays you should make to protect your team, avoid penalties, and win the compliance championship. 1 See “Health data breach trends from HCCA, SCCE survey, “ January 25, 2013, HealthITSecurity.com. 2 “BREAKING: HHS Releases HIPAA Update,” Healthcare Infor- matics, January, 17 2013 Let the games begin! Data breaches in past year 1 4+ 1 www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 3. SIDEBAR HEADLINE GOES HERE Sidebar copy will go here. Could be used for short callouts explaining prod- ucts or sharing interesting statistics. May not be present on every page. HIPAA Final Omnibus Rule Playbook Offensive Plays — HIPAA Privacy Rule Use the list of requirements below to strategize your compliance with the HIPAA Privacy Rule. Background To help protect against the breach of personal medical information, the Health Insurance Portability and Accountabil- ity Act (HIPAA), enacted in 1996, set standards for medical privacy that went into effect over the next 10 years. Title XIII of ARRA, the Health Information Technology for Economic and Clinical Health (HITECH) Act, sought to streamline healthcare and reduce costs through the use of health information technology. It imposed new requirements, in- cluding extension of the HIPAA Privacy and Security Rules to include business associates, a tiered increase in penal- ties for violations of these rules, and mandatory audits by HHS. The HIPAA Final Omnibus Rule implements certain provisions of the HITECH Act to “strengthen” the protections of the Privacy and Security Rules. HIPAA Privacy Rule According to HHS, “a major goal of the [HIPAA] Privacy Rule is to assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide and promote high quality healthcare and to protect the public’s health and well-being.”3 Training HHS requires periodic privacy and security training for all employees of healthcare organizations. This is critical, given that the HCCA/SCCE survey found that the leading source (38 percent) of breach incidents is due to lost paper files and that the leading source of discovery of these incidents is from non-IT employees. This suggests that data security and patient privacy issues are closely linked to policies and procedures, and employee training. Data Breaches: The Everyday Disaster According to the Third Annual Bench- mark Study on Patient Privacy Data Security by Ponemon Institute, 94% of healthcare organizations suffered data breaches, costing the healthcare indus- try an average of $7 billion a year. 3 “Summary of the HIPAA Privacy Rule,” Department of Health and Human Services (hhs.gov). Workforce training Completed but Not Documented Not Completed Completed and Documented www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 4. “If you handle protected health in- formation, you may be able to get by without understanding the details of health reform, but you cannot survive in your job if you do not understand and comply with the HIPAA/HITECH rules. Anyone involved in the health care business who does not comply with these laws is a walking liability.” James C. Pyles Principle, Powers, Pylers, Sutter Verville PC Fundraising New categories of PHI may be used or disclosed for fundraising, enabling covered entities to better target fundraising efforts. Marketing The Final Rule redefines marketing to include receiving remuneration from a third party for describing their product or service. CEs must obtain authorization for third-party marketing. Designated third-party receipt of PHI Requests must be made in writing, and clearly identify the recipient and where to send the PHI. Ban on sale of PHI The Final Rule prohibits, with exceptions, the sale of PHI without authorization. This ban applies to limited data sets. Restrictions on disclosure when paid in full CEs must agree to an individual’s request to restrict disclosure to a health plan if the individual pays in full for a service or item. Disclosure of genetic information for underwriting purposes Health plans may not use or disclose genetic health information for underwriting purposes. Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Use and Disclosure of PHI The Final Rule reiterates the importance that healthcare providers meet stringent requirements for patient privacy and data security. OCR has aggressively increased its enforcement toward organizations with lax privacy and security, with stiff penalties for noncompliance. Some of the new requirements favor increased access to PHI, while others restrict access. Either way, covered entities must update their policies and procedures to reflect the Final Rule’s man- dates regarding the use and disclosure of PHI. Update policies and procedures regarding the use and disclosure of PHI for the following: www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 5. Prohibition of sale of PHI Duty to notify in case of a breach Right to opt out of fundraising Right to disclosure restrictions when paid in full Limit on use of genetic information School immunizations CEs may release immunization records to schools without an authorization if done pursuant to HIPAA standards. Decendent Information Decedents’ PHI is under HIPAA protection for 50 years after death. The Final Rule enables CEs to continue communicating with relevant family and friends after an individual’s death. Completed but Not Documented Completed and Documented Not Completed Privacy Notices Covered entities must change their privacy notices to reflect new privacy practices and patient rights. Update notice of privacy practices to include: Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 6. Professional Risk Assessments: Worth the Investment An expert risk assessment costs less than 1% of the average cost of a data breach. Yet, many healthcare organiza- tions lack the resources and expertise to conduct their own risk assessment. Learn more about ID Experts risk assessment services » Allow for combined “unconditioned” and “conditioned” authorizations. Allow for authorizations for future research, with notice, to individuals. Provide a method for patients to receive electronic copies of electronic PHI. Electronic Copies of PHI Patients now have the right to get electronic copies of all of their electronic medical records upon request, rather than a hard copy, even if the electronic copy is not readily reproducible. Patients can also direct that a designated third party receive copies. Research HHS finalized its proposal to allow a blending of “conditioned” and “unconditioned” authorizations for research into a single document, where individuals can simply opt-in to the unconditioned authorization. In addition, one-time authorization may be applied, with notice, for future research. “The language of the authoriza- tion must adequately inform the individual that the individual’s PHI may be used in future research studies,” says Adam Greene, a partner at Davis, Wright, and Tremaine, a firm that specializes in privacy and security matters. Update research authorization policies/paperwork to: Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 7. Perform a HIPAA security compliance assessment. A HIPAA security compliance assessment evaluates a CE’s regulatory obligations; existing administrative, technical and physical safeguards; and gaps along with recommendations for ensuring regulatory compliance and best practices. Conduct a security risk analysis. A risk analysis is a prospective and in-depth analysis of the risks to a covered entity’s information assets involving electronic PHI and recommendations to meet the requirements of the HIPAA Security Rule — including updated requirements in the Final Rule. This is also a requirement for meaningful-use attestation by covered entities. Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Defensive Plays — HIPAA Security Rule Use the list of requirements below to strategize your compliance with the HIPAA Security Rule. Background According to HHS, “the HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires ap- propriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.”4 Under the Final Rule, business associates are also bound to provisions of the HIPAA Security Rule. Assessment of Security Risks Assess and document risks to PHI relative to regulatory obligations, and develop and implement mitigation strategies for achieving compliance. Ensure Your HIPAA Compliance HIPAA compliance assessments evalu- ate your regulatory obligations, current level of compliance, and gaps with re- spect to HIPAA-HITECH Privacy, Security, and Breach Notification Rules, as well as states laws. Our HIPAA Compliance Assessment service provides an efficient and credible evaluation of your compliance gaps, a priority ranking of your risks, and recom- mendations for mitigating those risks. Best practice suggests a HIPAA compli- ance assessment should be conducted annually. Learn more about ID Experts HIPAA Compliance Assessment service » 4 “The Security Rule,” Department of Health and Human Services (hhs.gov) www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 8. Mitigation and Action Take proper steps to mitigate the likelihood and impact of a data breach based on the assessment of your organization’s security risks. Develop risk mitigation scope. Review and prioritize the risks revealed by your risk analysis based on their business impact and likelihood of occurrence. Create a mitigation plan. Develop a risk mitigation plan including prospective schedules for addressing security vulnerabilities and required budgets and resources. Update relevant security policies and procedures. Revisit and update security policies and procedures for these high-risk items. Evaluate and implement security technologies. Based on the risk analysis, implement or update safeguards and technologies to protect PHI. Pay special attention to encrypting PHI in all modes — in motion, at rest, etc. according to NIST specifications. Doing so provides a safe harbor from data breach notification requirements in many cases. Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Consider Cyber Insurance Cyber insurance helps offset the unpre- dictable costs of data breach response, such as legal liabilities and other “non- tangible” expenses. But not all policies are the same. Find the right coverage for you. Download the Cyber Insurance Checklist » Special Team Plays — Breach Notification Rule Use the list of requirements below to strategize your compliance with the Breach Notification Rule. Background Under the interim final rule, a breach crossed the harm threshold if it “pose[d] a significant risk of financial, reputa- tional, or other harm to the individual.” The HIPAA Final Omnibus Rule removes the harm standard, replacing it with a new compromise standard. However, the Final Rule does not explicitly define the term “compromise.” Covered entities must still conduct an incident risk assessment for every data security incident that involves PHI. Rather than www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 9. determine the risk of harm, however, the risk assessment determines the probability that PHI has been compromised. The risk assessment must include a minimum of these four factors: 1. The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification 2. The unauthorized person who used the protected health information or to whom the disclosure was made 3. Whether the protected health information was actually acquired or viewed 4. The extent to which the risk to the protected health information has been mitigated If your organization has a security or privacy incident involving PHI, and your risk assessment concludes there was a very low probability that PHI was compromised, you may choose to not notify the affected individuals or OCR. However, the Final Rule requires that your organization maintain a burden of proof if your conclusions are called into question — or demonstrate that one of the existing exceptions to the definition of breach applies. Policies and Procedures Update policies and procedures to enable you to: Detect and escalate a potential breach to your incident response team. Conduct incident risk assessments per the Final Rule. Provide supporting documentation to meet your burden of proof, including your incident risk assessment methodology. Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed www2.IDExpertsCorp.comwww2.IDExpertsCorp.com
  • 10. Incident Assessment that’s Final Rule-Compliant The Final Rule requires that you carry out an incident risk assessment follow- ing every PHI privacy or security assess- ment. At the same time, the Final Rule removed the controversial “harm stan- dard” and replaced it with what is being called the “compromise standard.” ID Experts RADAR is HIPAA and States data breach risk assessment and in- cident management software that is compliant with the Final Rule and the new compromise standard.  Learn more about the award-winning ID Experts RADAR » Incident Response Planning Testing Prepare, document, and test the proper steps for a breach response following a data security or privacy incident that complies with the new breach definition outlined in the Final Rule. Incident Risk Assessment Define and document a method for consistent incident risk assessment using the four factors required by the Final Rule. Ensure that your method provides the necessary decision support to determine if an incident is a reportable breach or not and meets your burden of proof obligations under the Final Rule. Planning ‱ Update your incident response plan by incorporating your new incident risk assessment methodology and associated updates to your policies and procedures. ‱ Identify methods for detecting a breach. ‱ Determine types of notification based on the level of risk. ‱ Identify the response team and designate roles and responsibilities. Testing ‱ Retrain your incident response team and workforce members on incident reporting protocol. ‱ Periodically conduct a tabletop or full-scale test and make needed adjustments. Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Method uses the four factors required by the Final Rule. Method provides decision support and meets your burden of proof obligations under the Final Rule. Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed www2.IDExpertsCorp.com
  • 11. Business Associate Plays Use the list of plays below to ensure compliance with your business associate contracts. Background The HIPAA Final Omnibus Rule extends the definition of a business associate as one that “creates, receives, maintains, or transmits” PHI on behalf of a covered entity. This definition now also encompasses subcontractors that manage PHI and specific categories of organizations, namely: ‱ Health information organizations (HIOs) ‱ E-prescribing gateways ‱ Patient safety organizations ‱ Vendors of PHI that provide services on behalf of a covered entity ‱ Data storage vendors that maintain PHI even if their access to PHI is limited or nonexistent Covered entities should review their roster of vendors, service providers, and other third parties and enter into con- tracts (that include the BA Definition Scope Expansion) with these “new” business associates. In addition, covered entities must enter into a contract with all business associates, but they are not required to enter into direct contracts with subcontractors of their business associates and other downstream entities. The same chain of contracts applies. These contracts must specify compliance with the Breach Notification Rule. If a covered entity designates HIPAA responsibility to a business associate, the contract must also specify that the business associate will comply with HIPAA regulations. New Definition of Business Associates Prepare, document, and test the proper steps for a breach response following a data security or privacy incident that complies with the new breach definition outlined in the Final Rule. OCR to Focus on Business Associates According to Leon Rodriguez, Director of HHS Office for Civil Rights, 63% of those affected by healthcare data breaches reported to OCR were a result of a security breach at a business associate rather than a covered entity.5 Create new contracts with entities that fit the new definition of a business associate. Completed but Not Documented Completed and Documented Not Completed 5 “Office for Civil Rights to Focus on Business Associate Security Risks,” ID Experts Blog, March 8, 2012 www2.IDExpertsCorp.com
  • 12. Compliance with the Breach Notification Rule Liability for HIPAA compliance Assurances that they and subcontractors will safeguard PHI Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Completed but Not Documented Completed and Documented Not Completed Update Business Associates Contracts These contracts must specify: The HIPAA Final Omnibus Rule impacts nearly every aspect of a covered entity’s patient privacy and data security measures. But with this playbook, winning the compliance game doesn’t have to be daunting. And you don’t have to go it alone. Your coaching staff at ID Experts will be on the sidelines guiding you to victory, every step of the way. Talk to an expert today: 866.726.4271 ‱ info@idexpertscorp.com www2.IDExpertsCorp.com
  • 13. Blogs Text of the HIPAA Final Omnibus Rule www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073. pdf Protected Health Information (PHI) Project ANSI/Shared Assessments/Internet Security Alliance webstore.ansi.org/phi HHS/OCR Data Breach Site (Known informally as the “Wall of Shame”) www.hhs.gov/ocr/privacy/hipaa/administrative/ breachnotificationrule/breachtool.html HIPAA/HITECH Privacy/Security Breach Notification HHS/OCR Administrative Simplification Statue and Rules www.hhs.gov/ocr/privacy/hipaa/administrative/index.html ID Experts Corporate Blog Data Breach Privacy, Security and Notification www2.idexpertscorp.com/blog PHI Privacy Blog How Private is your Health Information? www.phiprivacy.net All Things HITECH — LinkedIn Group Join the conversation about privacy, healthcare, and com- pliance in the All Things HITECH Group. www.linkedin.com/groups/All-Things-HITECH-3873240 Research/Papers Third Annual Benchmark Study on Patient Privacy Data Security Ponemon Institute, December 2012 www2.idexpertscorp.com/ponemon2012 The HIPAA Final Omnibus Rule: An Analysis of The Changes Impacting Healthcare Covered Entities and Business Associates February 2013 www2.idexpertscorp.com/omnibus-hipaa-final-rule- whitepaper/ Third Annual Survey on Medical Identity Theft Ponemon Institute, June 2012 www.ponemon.org/local/upload/file/Third_Annual_ Survey_on_Medical_Identity_Theft_FINAL.pdf 2012 Data Breach Investigations Report Verizon Business www.verizonenterprise.com/resources/reports/rp_data- breach-investigations-report-2012_en_xg.pdf Products Services Breach HealthCheckÂź This online tool measures both your organization’s exposure to data breaches and your current protection level against them — information to help you increase the effectiveness of your organization’s data breach protection programs. www2.idexpertscorp.com/data-breach-tools/breach- healthcheck/ RADARℱ ID Experts RADAR is a highly intuitive and secure online tool that helps hospitals, clinics, and health plans comply with both HIPAA/HITECH and states data breach regula- tions. Now HIPAA Final Rule ready. www2.idexpertscorp.com/radar Risk Assessment Services Our team of CIPP, CHPC, and CISSP-certified experts will plan and conduct risk assessments for your organization that include a HIPAA compliance assessment, HIPAA se- curity risk analysis, and incident response planning—ev- erything to learn your vulnerabilities, and how to mitigate them and achieve compliance. www2.idexpertscorp.com/data-breach-solutions/health- care/breach-prevention-healthcare/risk-assessment- healthcare Healthcare Data Breach Solutions Protect your patients and your organization with our comprehensive breach prevention and response services. www2.idexpertscorp.com/data-breach-solutions/health- care Cyber Insurance Checklist www2.idexpertscorp.com/checklist Helpful Resources Information www2.IDExpertsCorp.com
  • 14. About ID Experts ID Experts delivers complete data breach care. The company’s solutions in data breach prevention, analysis and response are endorsed by the American Hospital Association, meet regulatory compliance and achieve the most positive out- comes for its customers. ID Experts is a leading advocate for privacy as a contributor to legislation, a corporate and active member in both the IAPP and HIMSS, a corporate member of HCCA and chairs the ANSI Identity Management Standards Panel PHI Project. Our Healthcare Expertise Healthcare is the industry third most frequently victimized by data breaches. Data breach issues and risks are dif- ferent in the healthcare sector — the data (both PHI and PII) and victims are diverse, regulations are more complex and financial risks are extreme. ID Experts is trusted by many prominent healthcare providers, payers and other industry participants to provide a full spectrum of data privacy and breach solutions – before, during and after an incident. ID Experts has the focused expertise to deliver industry-specific products and services that best protect healthcare organizations and the patients they serve. Our certified professionals, industry experience and our focus on “full re- covery” help demonstrate your commitment to breach victims first hand — as well as exhibit credibility and compli- ance to regulators and other relevant audiences. With ID Experts as your partner, your organization will minimize the reputational, legal and financial risks of a data breach, and help ensure positive outcomes for everyone involved. ABOUT THIS DOCUMENT Please realize that the HIPAA Final Omnibus Rule is very lengthy and detailed. While this document and its checklists are intended to provide you with guidance as to general, high-impact best practices that will assist in preparing for compliance, they are not intended to be exhaustive as far as all of your privacy, security, and breach notifica- tion obligations under the Final Rule. This information is not intended to be or replace legal advice. Please seek out your legal counsel for such advice. Talk to an expert today: 866.726.4271 info@idexpertscorp.com www2.IDExpertsCorp.com/blog @IDExperts All Things HITECH All Things Data Breach www2.IDExpertsCorp.com