SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
What Covered Entities Need to
Know About OCR HIPAA Audits
Calls for additional guidance:
• Accessing and sharing PHI for research purposes, including prep
to research
• w/ONC, common legal, governance and security barriers that
prevent trusted exchange of health info
• w/ONC, improving individual access to health information,
including from BAs
• Ability to disclose treatment-related information about persons
with mental health disorders, such as with close friends and
family
21st Century Cures Act
• HITECH provision re: providing individuals harmed by
violations of the HIPAA regulations with a percentage of
any civil monetary penalties or settlements collected.
• HITECH provisions re: changes to HIPAAAccounting
of Disclosure provisions.
Long-term Regulatory Agenda
• Ransomware:
– http://www.hhs.gov/hipaa/for-
professionals/security/guidance/index.html
• Cloud Computing:
– https://www.hhs.gov/hipaa/for-professionals/special-
topics/cloud-computing/index.html
Recent Guidance:
Ransomware and Cloud Computing
5
• HHS OCR has launched a Cyber Security Guidance Material
webpage, including a Cyber Security Checklist and Infographic,
which explain the steps for a HIPAA covered entity or its business
associate to take in response to a cyber-related security incident.
– Cyber Security Checklist - PDF
– Cyber Security Infographic [GIF 802 KB]
• NIST Cybersecurity Crosswalk with HIPAA Mapping:
– https://www.hhs.gov/sites/default/files/nist-csf-to-hipaa-
security-rule-crosswalk-02-22-2016-final.pdf?language=es
Cyber Security Guidance Webpage
6
https://www.hhs.gov/hipaa/for-
professionals/security/guidance/cybersecurity/index.html
Monthly Guidance:
Cybersecurity Newsletters
February 2016 Ransomware, “Tech Support” Scam, New BBB Scam Tracker
March 2016 Keeping PHI safe, Malware and Medical Devices
April 2016 New Cyber Threats and Attacks on the Healthcare Sector
May 2016 Is Your Business Associate Prepared for a Security Incident
June 2016 What’s in Your Third-Party Application Software
September 2016 Cyber Threat Information Sharing
October 2016 Mining More than Gold (FTP)
November 2016 What Type of Authentication is Right for you?
December 2016 Understanding DoS and DDoS Attacks
January 2017 Understanding the Importance of Audit Controls
February 2017 Reporting and Monitoring Cyber Threats
April 2017 Man-in-the-Middle Attacks and “HTTPS Inspection Products”
May 2017 Cybersecurity Incidents will happen…Remember to Plan, Respond, and Report!
June 2017 File Sharing and Cloud Computing: What to Consider?
July 2017 Train Your Workforce, so They Don’t Get Caught by a Phish!
August 2017 Protecting yourself from potential scammers while being charitable
http://www.hhs.gov/hipaa/for-professionals/security/guidance/index.html
https://www.hhs.gov/hipaa/for-
professionals/security/guidance/cybersecurity/index.html
7
• Identify best practices; uncover risks & vulnerabilities; detect
areas for technical assistance; encourage consistent attention to
compliance
– Intended to be non-punitive, but OCR can open up compliance
review (for example, if significant concerns are raised during
an audit or an entity fails to respond)
• Learn from this next phase in structuring permanent audit program
• Develop tools and guidance for industry self-evaluation and
breach prevention
Audit Purpose:
Support Improved Compliance
• Desk audits underway
ü 166 Covered Entities
ü 43 Business Associates
• Business Associate selection pool largely drawn from over
20,000 entities identified by audited CEs
• On-site audits of both CEs and BAs in 2017, after completion of
the desk audit process, to evaluate against a comprehensive
selection of controls in protocols
• A desk audit subject may be subject to on-site audit
• OCR beginning distribution of draft findings
AHIP
Audit Program Status
Desk Audit Reporting: Process
After review of submitted documentation:
• Draft findings shared with the entity
• Entity may respond in writing
Final audit reports will:
• Describe how the audit was conducted
• Present any findings, and
• Contain any written entity responses to the draft
Covered Entity Desk Audit Controls
Privacy Rule Controls
Notice of Privacy Practices & Content Requirements
[§164.520(a)(1) & (b)(1)]
Provision of Notice – Electronic Notice
[§164.520(c)(3)]
Right to Access
[§164.524(a)(1), (b)(1), (b)(2), (c)(2), (c)(3), (c)(4), (d)(1),
(d)(3)]
Breach Notification
Rule Controls
Timeliness of Notification
[§164.404(b)]
Content of Notification
[§164.404(c)(1)]
Security Rule Controls
Security Management Process -- Risk Analysis
[§164.308(a)(1)(ii)(A)]
Security Management Process -- Risk Management
[§164.308(a)(1)(ii)(B)]
Business Associate Desk Audit Controls
Breach Notification Rule
Controls
Notification by a Business Associate
[§164.410, with reference to Content of Notification
§164.404(c)(1)]
Security Rule Controls
Security Management Process -- Risk Analysis
[§164.308(a)(1)(ii)(A)]
Security Management Process -- Risk Management
[§164.308(a)(1)(ii)(B)]
Audit Guidance
OCR Website:
http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/index.html
Selected protocol
elements with
associated
document
submission requests
and related Q&As
Slides from audited
entity webinar held
July 13, 2016
Comprehensive
question and
answer listing
HIPAA Breach Highlights
September 2009 through July 31, 2017
• Approximately 2,017 reports involving a breach of PHI affecting
500 or more individuals
• Theft and Loss are 48% of large breaches
• Hacking/IT now account for 17% of incidents
• Laptops and other portable storage devices account for 26% of
large breaches
• Paper records are 21% of large breaches
• Individuals affected are approximately 174,974,489
• Approximately 293,288 reports of breaches of PHI affecting fewer
than 500 individuals
14
15
500+ Breaches by Type of Breach as of July 31, 2017
Theft
40%
Loss
8%
Unauthorized
Access/Disclosure
27%
Hacking/IT
17%
Improper
Disposal
3%
Other
5%
Unknown
1%
500+ Breaches by Location of Breach as of July 31, 2017
16
Paper Records
21%
Desktop
Computer
10%
Laptop
17%
Portable
Electronic
Device
9%
Network Server
17%
Email
10%
EMR
6%
Other
10%
Complaints Received and Cases Resolved
• Over 158,293 complaints received to date
• Over 25,312 cases resolved with corrective action and/or
technical assistance
• Expect to receive 17,000 complaints this year
Enforcement Guidance:
How OCR Closes Cases
• https://www.hhs.gov/hipaa/for-professionals/compliance-
enforcement/data/index.html
• Cases that OCR closes fall into five categories:
– Resolved after intake & review (no investigation)
– Technical Assistance (no investigation)
– No Violation (investigated)
– Corrective Action Obtained (investigated; includes Resolution Agreements)
• OCR may decide not to investigate a case further if :
• The case is referred to the Department of Justice for prosecution.
• The case involved a natural disaster.
• The case was pursued, prosecuted, and resolved by state authorities.
• The covered entity or business associate has taken steps to comply with the HIPAA Rules and
OCR determines enforcement resources are better/more effectively deployed in other cases.
Recent Enforcement Actions
• https://www.hhs.gov/hipaa/for-professionals/compliance-
enforcement/agreements/index.html
• 5/23/2017: Careless handling of HIV information jeopardizes patient’s privacy
• 5/10/2017: Texas health system settles potential HIPAA violations for disclosing
patient information
• 4/24/2017: Settlement shows that not understanding HIPAA requirements
creates risk
• 4/20/2017: No Business Associate Agreement?
• 4/12/2017: Overlooking risks leads to breach
• 2/16/2017: HIPAA settlement shines light on the importance of audit controls
• 2/1/2017: Lack of timely action risks security and costs money
• 1/18/2017: HIPAA settlement demonstrates importance of implementing
safeguards for ePHI
Continuing Enforcement Issue:
Affirmative Disclosures Not Permitted
The HIPAA Privacy Rule provides that Covered Entities or Business Associates
may not use or disclose PHI except as permitted or required. See 45 C.F.R. §
164.502(a). Examples of Potential Violations:
• Covered Entity permits news media to film individuals in its facility prior to
obtaining their authorization.
• Covered Entity publishes PHI on its website or on social media without an
authorization from the individual(s).
• Covered Entity confirms that an individual is a patient and provides other PHI
to reporter(s) without authorization from the individual.
• Covered Entity faxes PHI to an individual’s employer without authorization
from the individual.
Continuing Enforcement Issue:
Lack of Business Associate Agreements
HIPAA generally requires that covered entities and business associates enter into
agreements with their business associates to ensure that the business associates will
appropriately safeguard protected health information. See 45 C.F.R. § 164.308(b).
Examples of Potential Business Associates:
• A collections agency providing debt collection services to a health care provider
which involves access to protected health information.
• An independent medical transcriptionist that provides transcription services to a
physician.
• A subcontractor providing remote backup services of PHI data for an IT
contractor-business associate of a health care provider.
Continuing Enforcement Issue:
Incomplete or Inaccurate Risk Analysis
• Conduct an accurate and thorough assessment of the potential risks and
vulnerabilities to the confidentiality, integrity, and availability of electronic
protected health information held by the [organization]. See 45 C.F.R. §
164.308(a)(1)(ii)(A).
• Organizations frequently underestimate the proliferation of ePHI within
their environments. When conducting a risk analysis, an organization must
identify all of the ePHI created, maintained, received or transmitted by the
organization.
• Examples: Applications like EHR, billing systems; documents and
spreadsheets; database systems and web servers; fax servers, backup
servers; etc.); Cloud based servers; Medical Devices Messaging Apps
(email, texting, ftp); Media
• http://www.hhs.gov/ocr/priva
cy/hipaa/administrative/securi
tyrule/rafinalguidance.html
• http://scap.nist.gov/hipaa/
• http://www.healthit.gov/provi
ders-professionals/security-
risk-assessment
Risk Analysis Guidance
Continuing Enforcement Issue:
Failure to Manage Identified Risk
• The Risk Management Standard requires the “[implementation of] security
measures sufficient to reduce risks and vulnerabilities to a reasonable and
appropriate level to comply with [the Security Rule].” See 45 C.F.R. §
164.308(a)(1)(ii)(B).
• Investigations conducted by OCR regarding several instances of breaches
uncovered that risks attributable to a reported breach had been previously
identified as part of a risk analysis, but that the breaching organization failed to
act on its risk analysis and implement appropriate security measures.
• In some instances, encryption was included as part of a remediation plan;
however, activities to implement encryption were not carried out or were not
implemented within a reasonable timeframe as established in a remediation
plan.
http://www.healthit.gov/
mobiledevices
Mobile Device Security
Continuing Enforcement Issue:
Lack of Transmission Security
• When electronically transmitting ePHI, a mechanism to encrypt the ePHI must
be implemented whenever deemed appropriate. See 45 C.F.R. §
164.312(e)(2)(ii).
• Applications for which encryption should be considered when transmitting
ePHI may include:
o Email
o Texting
o Application sessions
o File transmissions (e.g., ftp)
o Remote backups
o Remote access and support sessions (e.g., VPN)
Continuing Enforcement Issue:
Lack of Appropriate Auditing
• The HIPAA Rules require the “[implementation] of hardware, software, and/or
procedural mechanisms that record and examine activity in information
systems that contain or use electronic protected health information.” See 45
C.F.R. § 164.312(b).
• Once audit mechanisms are put into place on appropriate information systems,
procedures must be implemented to “regularly review records of information
system activity, such as audit logs, access reports, and security incident
tracking reports.” See 45 C.F.R. § 164.308(a)(1)(ii)(D).
• Activities which could warrant additional investigation:
o Access to PHI during non-business hours or during time off
o Access to an abnormally high number of records containing PHI
o Access to PHI of persons for which media interest exists
o Access to PHI of employees
Continuing Enforcement Issue:
Patching of Software
• The use of unpatched or unsupported software on systems which access ePHI
could introduce additional risk into an environment.
• Continued use of such systems must be included within an organization's risk
analysis and appropriate mitigation strategies implemented to reduce risk to a
reasonable and appropriate level.
• In addition to operating systems, EMR/PM systems, and office productivity
software, software which should be monitored for patches and vendor end-of-
life for support include:
o Router and firewall firmware
o Anti-virus and anti-malware software
o Multimedia and runtime environments (e.g., Adobe Flash, Java, etc.)
Continuing Enforcement Issue:
Insider Threat
• Organizations must “[i]mplement policies and procedures to ensure that all
members of its workforce have appropriate access to electronic protected health
information … and to prevent those workforce members who do not have access
… from obtaining access to electronic protected health information,” as part of
its Workforce Security plan. See 45 C.F.R. § 164.308(a)(3).
• Appropriate workforce screening procedures could be included as part of an
organization’s Workforce Clearance process (e.g., background and OIG LEIE
checks). See 45 C.F.R. § 164.308(a)(3)(ii)(B).
• Termination Procedures should be in place to ensure that access to PHI is
revoked as part of an organization’s workforce exit or separation process. See 45
C.F.R. § 164.308(a)(3)(ii)(C).
Continuing Enforcement Issue:
Disposal of PHI
• When an organization disposes of electronic media which may contain ePHI, it
must implement policies and procedures to ensure that proper and secure
disposal processes are used. See 45 C.F.R. § 164.310(d)(2)(i).
• The implemented disposal procedures must ensure that “[e]lectronic media have
been cleared, purged, or destroyed consistent with NIST Special Publication
800–88: Guidelines for Media Sanitization, such that the PHI cannot be
retrieved.”
• Electronic media and devices identified for disposal should be disposed of in a
timely manner to avoid accidental improper disposal.
• Organizations must ensure that all electronic devices and media containing PHI
are disposed of securely; including non-computer devices such as copier systems
and medical devices.
Continuing Enforcement Issue:
Insufficient Backup and Contingency Planning
• Organizations must ensure that adequate contingency plans (including data
backup and disaster recovery plans) are in place and would be effective when
implemented in the event of an actual disaster or emergency situation. See 45
C.F.R. § 164.308(a)(7).
• Leveraging the resources of cloud vendors may aid an organization with its
contingency planning regarding certain applications or computer systems, but
may not encompass all that is required for an effective contingency plan.
• As reasonable and appropriate, organizations must periodically test their
contingency plans and revise such plans as necessary when the results of the
contingency exercise identify deficiencies. See 164.308(a)(7)(ii)(D).
Connect with OCR
• http://www.hhs.gov/hipaa
• Join us on Twitter @hhsocr
Effective
technology is
the key to
balancing
scope with
available
resources.
Partner Risk Manager™
• Provides an efficient, automated process for
Vendor Risk Assessment
• Stores and maintains all relevant Vendor,
Agreement, and Risk Documentation
• Allows for creation of customized
Reports and Deliverables
Protects patient
privacy and meets
OCR Phase 2
Objectives
• Receive and consolidate audit log data from multiple sources
• Conduct quick and thorough privacy investigations
• Proactively monitor for privacy violations
• Leverage analytics to rank and prioritize audit findings
• Document and report incidents and breaches as they are identified
Security Audit Manager™
Patient Privacy Blog
http://blog.iatric.com/patient-privacy-blog
info@iatric.com
www.iatric.com
978-805-4100
Contact Us Follow Us
Questions?
Thanks to Our Sponsor

Weitere ähnliche Inhalte

Was ist angesagt?

UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
Bryan Cline, Ph.D.
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
RightScale
 

Was ist angesagt? (20)

HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
Hipaa changes 2018 and how to comply
Hipaa changes 2018 and how to complyHipaa changes 2018 and how to comply
Hipaa changes 2018 and how to comply
 
Red7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data ProtectionRed7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data Protection
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
Common Security Framework Summary
Common Security Framework SummaryCommon Security Framework Summary
Common Security Framework Summary
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
HHS Issues HIPAA Cyber Attack Response Checklist
HHS Issues HIPAA Cyber Attack Response ChecklistHHS Issues HIPAA Cyber Attack Response Checklist
HHS Issues HIPAA Cyber Attack Response Checklist
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
 
The HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemThe HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your Problem
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
HNI U: HIPAA Essentials
HNI U: HIPAA EssentialsHNI U: HIPAA Essentials
HNI U: HIPAA Essentials
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
Managing HIPAA Business Associate Relationships - April 24, 2018
Managing HIPAA Business Associate Relationships  -  April 24, 2018  Managing HIPAA Business Associate Relationships  -  April 24, 2018
Managing HIPAA Business Associate Relationships - April 24, 2018
 

Ähnlich wie What Covered Entities Need to Know about OCR HIPAA Audit​s

Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
geeksikh
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
supportc2go
 
Hipaa audits and enforcement
Hipaa audits and enforcementHipaa audits and enforcement
Hipaa audits and enforcement
supportc2go
 

Ähnlich wie What Covered Entities Need to Know about OCR HIPAA Audit​s (20)

Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
 
HIPAA Audits Are Here to Stay – Key Preparation Strategies for Business Assoc...
HIPAA Audits Are Here to Stay – Key Preparation Strategies for Business Assoc...HIPAA Audits Are Here to Stay – Key Preparation Strategies for Business Assoc...
HIPAA Audits Are Here to Stay – Key Preparation Strategies for Business Assoc...
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
HIPAA Security 2019
HIPAA Security 2019HIPAA Security 2019
HIPAA Security 2019
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Preparing & Responding to an OCR HIPAA Audit
Preparing & Responding to an OCR HIPAA AuditPreparing & Responding to an OCR HIPAA Audit
Preparing & Responding to an OCR HIPAA Audit
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information Technology
 
PSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS CommunityPSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS Community
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
Performing an ocr hipaa audit
Performing an ocr hipaa auditPerforming an ocr hipaa audit
Performing an ocr hipaa audit
 
OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
 
Hipaa audits and enforcement
Hipaa audits and enforcementHipaa audits and enforcement
Hipaa audits and enforcement
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 

Mehr von Iatric Systems

Mehr von Iatric Systems (20)

Macra and Hospitalists: Get Your Questions Answered
Macra and Hospitalists: Get Your Questions AnsweredMacra and Hospitalists: Get Your Questions Answered
Macra and Hospitalists: Get Your Questions Answered
 
How MEDITECH Hospitals Can Meet The New eCQM Reporting Requirements using QRDA
How MEDITECH Hospitals Can Meet The New eCQM Reporting Requirements using QRDAHow MEDITECH Hospitals Can Meet The New eCQM Reporting Requirements using QRDA
How MEDITECH Hospitals Can Meet The New eCQM Reporting Requirements using QRDA
 
Learn How to Overcome Patient Identity Challenges
Learn How to Overcome Patient Identity ChallengesLearn How to Overcome Patient Identity Challenges
Learn How to Overcome Patient Identity Challenges
 
How To Get a Handle on Your Patient Identity Challenges
How To Get a Handle on Your Patient Identity ChallengesHow To Get a Handle on Your Patient Identity Challenges
How To Get a Handle on Your Patient Identity Challenges
 
Mac McMillan on how to prepare your organization for an OCR HIPAA Audit
Mac McMillan on how to prepare your organization for an OCR HIPAA AuditMac McMillan on how to prepare your organization for an OCR HIPAA Audit
Mac McMillan on how to prepare your organization for an OCR HIPAA Audit
 
Meet Your Interoperability Goals and Realize Your Vision
Meet Your Interoperability Goals and Realize Your VisionMeet Your Interoperability Goals and Realize Your Vision
Meet Your Interoperability Goals and Realize Your Vision
 
Top Challenges in Healthcare IT that Keep CIOs up at Night
Top Challenges in Healthcare IT that Keep CIOs up at Night Top Challenges in Healthcare IT that Keep CIOs up at Night
Top Challenges in Healthcare IT that Keep CIOs up at Night
 
Portals, Mobile Devices, and Patient Engagement
Portals, Mobile Devices, and Patient EngagementPortals, Mobile Devices, and Patient Engagement
Portals, Mobile Devices, and Patient Engagement
 
Using FHIR for Interoperability
Using FHIR for InteroperabilityUsing FHIR for Interoperability
Using FHIR for Interoperability
 
Learn Best Practices for Joining an HIE
Learn Best Practices for Joining an HIELearn Best Practices for Joining an HIE
Learn Best Practices for Joining an HIE
 
How to get Prepared and Find Success with Meaningful Use Stage 2 and 3
How to get Prepared and Find Success with Meaningful Use Stage 2 and 3How to get Prepared and Find Success with Meaningful Use Stage 2 and 3
How to get Prepared and Find Success with Meaningful Use Stage 2 and 3
 
Successfully Navigate an EHR System Migration Webcast
Successfully Navigate an EHR System Migration WebcastSuccessfully Navigate an EHR System Migration Webcast
Successfully Navigate an EHR System Migration Webcast
 
Understanding HL7 version 2.5.1 and Meaningful Use data considerations
Understanding HL7 version 2.5.1 and Meaningful Use data considerationsUnderstanding HL7 version 2.5.1 and Meaningful Use data considerations
Understanding HL7 version 2.5.1 and Meaningful Use data considerations
 
Get Prepared and Find Success with Meaningful Use Stage 2 and 3
Get Prepared and Find Success with Meaningful Use Stage 2 and 3Get Prepared and Find Success with Meaningful Use Stage 2 and 3
Get Prepared and Find Success with Meaningful Use Stage 2 and 3
 
Improving the Patient Experience with HIT Webcast
Improving the Patient Experience with HIT WebcastImproving the Patient Experience with HIT Webcast
Improving the Patient Experience with HIT Webcast
 
3 Ways to Overcome Your Interface Challenges
3 Ways to Overcome Your Interface Challenges3 Ways to Overcome Your Interface Challenges
3 Ways to Overcome Your Interface Challenges
 
Stay on Track with Meaningful Use in 2015
Stay on Track with Meaningful Use in 2015Stay on Track with Meaningful Use in 2015
Stay on Track with Meaningful Use in 2015
 
5 Ways to Keep Your Interface Projects Under Control
5 Ways to Keep Your Interface Projects Under Control5 Ways to Keep Your Interface Projects Under Control
5 Ways to Keep Your Interface Projects Under Control
 
How to Interpret and Plan for the 2014 CMS CEHRT Rule
How to Interpret and Plan for the 2014 CMS CEHRT Rule How to Interpret and Plan for the 2014 CMS CEHRT Rule
How to Interpret and Plan for the 2014 CMS CEHRT Rule
 
Preparation is the Key to Meaningful Use Success
Preparation is the Key to Meaningful Use SuccessPreparation is the Key to Meaningful Use Success
Preparation is the Key to Meaningful Use Success
 

Kürzlich hochgeladen

Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Sheetaleventcompany
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
dilpreetentertainmen
 
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
Sheetaleventcompany
 
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCEscience quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
maricelsampaga
 
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Sheetaleventcompany
 
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Sheetaleventcompany
 
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Sheetaleventcompany
 
DME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptxDME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptx
mcrdalialsayed
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
Sheetaleventcompany
 

Kürzlich hochgeladen (20)

❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
 
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
 
❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...
❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...
❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
 
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
 
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
 
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
 
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
 
The Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramThe Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's Diagram
 
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCEscience quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
 
❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...
❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...
❤️ Call Girls service In Panchkula☎️9815457724☎️ Call Girl service in Panchku...
 
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
 
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
 
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
 
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
 
DME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptxDME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptx
 
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
 
💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...
💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...
💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
 
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
 

What Covered Entities Need to Know about OCR HIPAA Audit​s

  • 1. What Covered Entities Need to Know About OCR HIPAA Audits
  • 2.
  • 3. Calls for additional guidance: • Accessing and sharing PHI for research purposes, including prep to research • w/ONC, common legal, governance and security barriers that prevent trusted exchange of health info • w/ONC, improving individual access to health information, including from BAs • Ability to disclose treatment-related information about persons with mental health disorders, such as with close friends and family 21st Century Cures Act
  • 4. • HITECH provision re: providing individuals harmed by violations of the HIPAA regulations with a percentage of any civil monetary penalties or settlements collected. • HITECH provisions re: changes to HIPAAAccounting of Disclosure provisions. Long-term Regulatory Agenda
  • 5. • Ransomware: – http://www.hhs.gov/hipaa/for- professionals/security/guidance/index.html • Cloud Computing: – https://www.hhs.gov/hipaa/for-professionals/special- topics/cloud-computing/index.html Recent Guidance: Ransomware and Cloud Computing 5
  • 6. • HHS OCR has launched a Cyber Security Guidance Material webpage, including a Cyber Security Checklist and Infographic, which explain the steps for a HIPAA covered entity or its business associate to take in response to a cyber-related security incident. – Cyber Security Checklist - PDF – Cyber Security Infographic [GIF 802 KB] • NIST Cybersecurity Crosswalk with HIPAA Mapping: – https://www.hhs.gov/sites/default/files/nist-csf-to-hipaa- security-rule-crosswalk-02-22-2016-final.pdf?language=es Cyber Security Guidance Webpage 6 https://www.hhs.gov/hipaa/for- professionals/security/guidance/cybersecurity/index.html
  • 7. Monthly Guidance: Cybersecurity Newsletters February 2016 Ransomware, “Tech Support” Scam, New BBB Scam Tracker March 2016 Keeping PHI safe, Malware and Medical Devices April 2016 New Cyber Threats and Attacks on the Healthcare Sector May 2016 Is Your Business Associate Prepared for a Security Incident June 2016 What’s in Your Third-Party Application Software September 2016 Cyber Threat Information Sharing October 2016 Mining More than Gold (FTP) November 2016 What Type of Authentication is Right for you? December 2016 Understanding DoS and DDoS Attacks January 2017 Understanding the Importance of Audit Controls February 2017 Reporting and Monitoring Cyber Threats April 2017 Man-in-the-Middle Attacks and “HTTPS Inspection Products” May 2017 Cybersecurity Incidents will happen…Remember to Plan, Respond, and Report! June 2017 File Sharing and Cloud Computing: What to Consider? July 2017 Train Your Workforce, so They Don’t Get Caught by a Phish! August 2017 Protecting yourself from potential scammers while being charitable http://www.hhs.gov/hipaa/for-professionals/security/guidance/index.html https://www.hhs.gov/hipaa/for- professionals/security/guidance/cybersecurity/index.html 7
  • 8. • Identify best practices; uncover risks & vulnerabilities; detect areas for technical assistance; encourage consistent attention to compliance – Intended to be non-punitive, but OCR can open up compliance review (for example, if significant concerns are raised during an audit or an entity fails to respond) • Learn from this next phase in structuring permanent audit program • Develop tools and guidance for industry self-evaluation and breach prevention Audit Purpose: Support Improved Compliance
  • 9. • Desk audits underway ü 166 Covered Entities ü 43 Business Associates • Business Associate selection pool largely drawn from over 20,000 entities identified by audited CEs • On-site audits of both CEs and BAs in 2017, after completion of the desk audit process, to evaluate against a comprehensive selection of controls in protocols • A desk audit subject may be subject to on-site audit • OCR beginning distribution of draft findings AHIP Audit Program Status
  • 10. Desk Audit Reporting: Process After review of submitted documentation: • Draft findings shared with the entity • Entity may respond in writing Final audit reports will: • Describe how the audit was conducted • Present any findings, and • Contain any written entity responses to the draft
  • 11. Covered Entity Desk Audit Controls Privacy Rule Controls Notice of Privacy Practices & Content Requirements [§164.520(a)(1) & (b)(1)] Provision of Notice – Electronic Notice [§164.520(c)(3)] Right to Access [§164.524(a)(1), (b)(1), (b)(2), (c)(2), (c)(3), (c)(4), (d)(1), (d)(3)] Breach Notification Rule Controls Timeliness of Notification [§164.404(b)] Content of Notification [§164.404(c)(1)] Security Rule Controls Security Management Process -- Risk Analysis [§164.308(a)(1)(ii)(A)] Security Management Process -- Risk Management [§164.308(a)(1)(ii)(B)]
  • 12. Business Associate Desk Audit Controls Breach Notification Rule Controls Notification by a Business Associate [§164.410, with reference to Content of Notification §164.404(c)(1)] Security Rule Controls Security Management Process -- Risk Analysis [§164.308(a)(1)(ii)(A)] Security Management Process -- Risk Management [§164.308(a)(1)(ii)(B)]
  • 13. Audit Guidance OCR Website: http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/index.html Selected protocol elements with associated document submission requests and related Q&As Slides from audited entity webinar held July 13, 2016 Comprehensive question and answer listing
  • 14. HIPAA Breach Highlights September 2009 through July 31, 2017 • Approximately 2,017 reports involving a breach of PHI affecting 500 or more individuals • Theft and Loss are 48% of large breaches • Hacking/IT now account for 17% of incidents • Laptops and other portable storage devices account for 26% of large breaches • Paper records are 21% of large breaches • Individuals affected are approximately 174,974,489 • Approximately 293,288 reports of breaches of PHI affecting fewer than 500 individuals 14
  • 15. 15 500+ Breaches by Type of Breach as of July 31, 2017 Theft 40% Loss 8% Unauthorized Access/Disclosure 27% Hacking/IT 17% Improper Disposal 3% Other 5% Unknown 1%
  • 16. 500+ Breaches by Location of Breach as of July 31, 2017 16 Paper Records 21% Desktop Computer 10% Laptop 17% Portable Electronic Device 9% Network Server 17% Email 10% EMR 6% Other 10%
  • 17. Complaints Received and Cases Resolved • Over 158,293 complaints received to date • Over 25,312 cases resolved with corrective action and/or technical assistance • Expect to receive 17,000 complaints this year
  • 18. Enforcement Guidance: How OCR Closes Cases • https://www.hhs.gov/hipaa/for-professionals/compliance- enforcement/data/index.html • Cases that OCR closes fall into five categories: – Resolved after intake & review (no investigation) – Technical Assistance (no investigation) – No Violation (investigated) – Corrective Action Obtained (investigated; includes Resolution Agreements) • OCR may decide not to investigate a case further if : • The case is referred to the Department of Justice for prosecution. • The case involved a natural disaster. • The case was pursued, prosecuted, and resolved by state authorities. • The covered entity or business associate has taken steps to comply with the HIPAA Rules and OCR determines enforcement resources are better/more effectively deployed in other cases.
  • 19. Recent Enforcement Actions • https://www.hhs.gov/hipaa/for-professionals/compliance- enforcement/agreements/index.html • 5/23/2017: Careless handling of HIV information jeopardizes patient’s privacy • 5/10/2017: Texas health system settles potential HIPAA violations for disclosing patient information • 4/24/2017: Settlement shows that not understanding HIPAA requirements creates risk • 4/20/2017: No Business Associate Agreement? • 4/12/2017: Overlooking risks leads to breach • 2/16/2017: HIPAA settlement shines light on the importance of audit controls • 2/1/2017: Lack of timely action risks security and costs money • 1/18/2017: HIPAA settlement demonstrates importance of implementing safeguards for ePHI
  • 20. Continuing Enforcement Issue: Affirmative Disclosures Not Permitted The HIPAA Privacy Rule provides that Covered Entities or Business Associates may not use or disclose PHI except as permitted or required. See 45 C.F.R. § 164.502(a). Examples of Potential Violations: • Covered Entity permits news media to film individuals in its facility prior to obtaining their authorization. • Covered Entity publishes PHI on its website or on social media without an authorization from the individual(s). • Covered Entity confirms that an individual is a patient and provides other PHI to reporter(s) without authorization from the individual. • Covered Entity faxes PHI to an individual’s employer without authorization from the individual.
  • 21. Continuing Enforcement Issue: Lack of Business Associate Agreements HIPAA generally requires that covered entities and business associates enter into agreements with their business associates to ensure that the business associates will appropriately safeguard protected health information. See 45 C.F.R. § 164.308(b). Examples of Potential Business Associates: • A collections agency providing debt collection services to a health care provider which involves access to protected health information. • An independent medical transcriptionist that provides transcription services to a physician. • A subcontractor providing remote backup services of PHI data for an IT contractor-business associate of a health care provider.
  • 22. Continuing Enforcement Issue: Incomplete or Inaccurate Risk Analysis • Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the [organization]. See 45 C.F.R. § 164.308(a)(1)(ii)(A). • Organizations frequently underestimate the proliferation of ePHI within their environments. When conducting a risk analysis, an organization must identify all of the ePHI created, maintained, received or transmitted by the organization. • Examples: Applications like EHR, billing systems; documents and spreadsheets; database systems and web servers; fax servers, backup servers; etc.); Cloud based servers; Medical Devices Messaging Apps (email, texting, ftp); Media
  • 23. • http://www.hhs.gov/ocr/priva cy/hipaa/administrative/securi tyrule/rafinalguidance.html • http://scap.nist.gov/hipaa/ • http://www.healthit.gov/provi ders-professionals/security- risk-assessment Risk Analysis Guidance
  • 24. Continuing Enforcement Issue: Failure to Manage Identified Risk • The Risk Management Standard requires the “[implementation of] security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with [the Security Rule].” See 45 C.F.R. § 164.308(a)(1)(ii)(B). • Investigations conducted by OCR regarding several instances of breaches uncovered that risks attributable to a reported breach had been previously identified as part of a risk analysis, but that the breaching organization failed to act on its risk analysis and implement appropriate security measures. • In some instances, encryption was included as part of a remediation plan; however, activities to implement encryption were not carried out or were not implemented within a reasonable timeframe as established in a remediation plan.
  • 26. Continuing Enforcement Issue: Lack of Transmission Security • When electronically transmitting ePHI, a mechanism to encrypt the ePHI must be implemented whenever deemed appropriate. See 45 C.F.R. § 164.312(e)(2)(ii). • Applications for which encryption should be considered when transmitting ePHI may include: o Email o Texting o Application sessions o File transmissions (e.g., ftp) o Remote backups o Remote access and support sessions (e.g., VPN)
  • 27. Continuing Enforcement Issue: Lack of Appropriate Auditing • The HIPAA Rules require the “[implementation] of hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.” See 45 C.F.R. § 164.312(b). • Once audit mechanisms are put into place on appropriate information systems, procedures must be implemented to “regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.” See 45 C.F.R. § 164.308(a)(1)(ii)(D). • Activities which could warrant additional investigation: o Access to PHI during non-business hours or during time off o Access to an abnormally high number of records containing PHI o Access to PHI of persons for which media interest exists o Access to PHI of employees
  • 28. Continuing Enforcement Issue: Patching of Software • The use of unpatched or unsupported software on systems which access ePHI could introduce additional risk into an environment. • Continued use of such systems must be included within an organization's risk analysis and appropriate mitigation strategies implemented to reduce risk to a reasonable and appropriate level. • In addition to operating systems, EMR/PM systems, and office productivity software, software which should be monitored for patches and vendor end-of- life for support include: o Router and firewall firmware o Anti-virus and anti-malware software o Multimedia and runtime environments (e.g., Adobe Flash, Java, etc.)
  • 29. Continuing Enforcement Issue: Insider Threat • Organizations must “[i]mplement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information … and to prevent those workforce members who do not have access … from obtaining access to electronic protected health information,” as part of its Workforce Security plan. See 45 C.F.R. § 164.308(a)(3). • Appropriate workforce screening procedures could be included as part of an organization’s Workforce Clearance process (e.g., background and OIG LEIE checks). See 45 C.F.R. § 164.308(a)(3)(ii)(B). • Termination Procedures should be in place to ensure that access to PHI is revoked as part of an organization’s workforce exit or separation process. See 45 C.F.R. § 164.308(a)(3)(ii)(C).
  • 30. Continuing Enforcement Issue: Disposal of PHI • When an organization disposes of electronic media which may contain ePHI, it must implement policies and procedures to ensure that proper and secure disposal processes are used. See 45 C.F.R. § 164.310(d)(2)(i). • The implemented disposal procedures must ensure that “[e]lectronic media have been cleared, purged, or destroyed consistent with NIST Special Publication 800–88: Guidelines for Media Sanitization, such that the PHI cannot be retrieved.” • Electronic media and devices identified for disposal should be disposed of in a timely manner to avoid accidental improper disposal. • Organizations must ensure that all electronic devices and media containing PHI are disposed of securely; including non-computer devices such as copier systems and medical devices.
  • 31. Continuing Enforcement Issue: Insufficient Backup and Contingency Planning • Organizations must ensure that adequate contingency plans (including data backup and disaster recovery plans) are in place and would be effective when implemented in the event of an actual disaster or emergency situation. See 45 C.F.R. § 164.308(a)(7). • Leveraging the resources of cloud vendors may aid an organization with its contingency planning regarding certain applications or computer systems, but may not encompass all that is required for an effective contingency plan. • As reasonable and appropriate, organizations must periodically test their contingency plans and revise such plans as necessary when the results of the contingency exercise identify deficiencies. See 164.308(a)(7)(ii)(D).
  • 32. Connect with OCR • http://www.hhs.gov/hipaa • Join us on Twitter @hhsocr
  • 33. Effective technology is the key to balancing scope with available resources.
  • 34. Partner Risk Manager™ • Provides an efficient, automated process for Vendor Risk Assessment • Stores and maintains all relevant Vendor, Agreement, and Risk Documentation • Allows for creation of customized Reports and Deliverables Protects patient privacy and meets OCR Phase 2 Objectives
  • 35. • Receive and consolidate audit log data from multiple sources • Conduct quick and thorough privacy investigations • Proactively monitor for privacy violations • Leverage analytics to rank and prioritize audit findings • Document and report incidents and breaches as they are identified Security Audit Manager™
  • 38. Thanks to Our Sponsor