SlideShare ist ein Scribd-Unternehmen logo
1 von 38
HIPAA/HITECH Security
Assessment
Webinar Objectives

 • Understand HIPAA/HITECH security principles

 • Learn HIPAA security safeguards

 • Learn tools and methodologies for
   HIPAA/HITECH Assessment




                                             2
Who we are …
EHR 2.0 Mission: To assist healthcare
organizations develop and implement
practices to secure IT systems and comply
with HIPAA/HITECH regulations.
 Education

 Consulting

 Toolkit(Tools, Best Practices & Checklist)
Goal: To make compliance an enjoyable and
painless experience, while building capability
and confidence.
Glossary

1.   PHI: Protected Health Information

2.   HHS: Health and Human Services

3.   OCR: Office for Civil Rights

4.   HIPAA: Health Insurance Portability and Accountability
     Act

5.   HITECH: Health Information Technology for Economic
     and Clinical Health Act
                                                              4
The American Recovery and
Reinvestment Act of 2009 and HITECH




                                      5
HITECH modifications to HIPAA

   Creating incentives for developing a meaningful use of
    electronic health records
   Changing the liability and responsibilities of Business
    Associates
   Redefining what a breach is
   Creating stricter notification standards
   Tightening enforcement
   Raising the penalties for a violation
   Creating new code and transaction sets (HIPAA 5010,
    ICD10)

                                                              6
Business Associate Cycle



 Covered
                             BA                           HHS/OCR
  Entity

    • BA Contract                         • HIPAA Privacy and
    • Breach Notification                 Security Rule
                                          • Minimum Necessary
                                          • Breach Notification

                               Sub-
                            contractors


                                                                    7
HIPAA Titles - Overview




                          8
HIPAA
The two main rules of HIPAA are:

   Privacy Rule: Organizations must identify the uses and
    disclosures of protected health information (PHI) and put
    into effect appropriate safeguards to protect against an
    unauthorized use or disclosure of that PHI. When
    material breaches or violations of privacy are identified,
    the organizations must take reasonable steps to solve
    those problems in order to limit exposure of PHI.

   Security Rule: Defines the administrative, physical and
    technical safeguards to protect the confidentiality,
    integrity and availability of electronic protected health
    information.
    (45 CFR Part 160 and Subparts A and C of Part 164)           9
HIPAA Security Rule




                      10
Information Security Model

                   Confidentiality
                   Limiting information access and
                   disclosure to authorized users (the right
                   people)

                   Integrity
                   Trustworthiness of information
                   resources (no inappropriate changes)

                   Availability
                   Availability of information resources (at
                   the right time)

                                                        11
Protected Health Information(PHI)


                  Health
               Information



               Individually
               Identifiable
                  Health
               Information




                   PHI



                                    12
ePHI – 18 Elements
                 Elements                                             Examples
Name                                           Max Bialystock
                                                1355 Seasonal Lane
Address                                         (all geographic subdivisions smaller than state,
                                               including street address, city, county, or ZIP code)
Dates related to an individual                 Birth, death, admission, discharge
                                               212 555 1234, home, office, mobile etc.,
Telephone numbers
                                               212 555 1234
Fax number
Email address                                  LeonT@Hotmail.com, personal, official
Social Security number                         239-68-9807
Medical record number                          189-88876
Health plan beneficiary number                 123-ir-2222-98
Account number                                 333389
Certificate/license number                     3908763 NY
Any vehicle or other device serial number      SZV4016
Device identifiers or serial numbers           Unique Medical Devices
Web URL                                        www.rickymartin.com
Internet Protocol (IP) address numbers         19.180.240.15
Finger or voice prints                          finger.jpg
Photographic images                             mypicture.jpg
Any other characteristic that could uniquely                                                          13
identify the individual
Examples of ePHI (and not ePHI)
Examples of ePHI:               Examples of NOT ePHI:

   magnetic tape                  paper files
   disk or optical disk           “paper to paper” faxes
   computerized information       person-to-person
   internet transmission           telephone calls
   network information            video teleconferencing
   telephone response and         voicemail messages
    “fax back” (a request for
    information from a
    computer made via voice
    or telephone keypad input
    with the requested
    information returned as a                                14

    fax)
Security Standards: General Rules
§ 164.306
What are “Required” Standards?

  If the standard is stated as “Required” , A covered entity and
  business associate must comply with that standard.


What are “Addressable” standards?

  If the standard is stated as “Addressable”, the covered entity or
  business associate must assess if the implementation specification
  is a reasonable and appropriate safeguard in its environment with
  reference to e-PHI. If application then take measures to implement
  it.
                                                                   15
Security Standards: General Rules
§ 164.306
What if “Addressable” standards are not applicable to the
covered entities environment?

Document why it is not applicable and implement an equivalent
alternative measure if reasonable and appropriate.


How often the security should be reviewed?

Security standard mentioned under HIPAA should be reviewed and
modified as needed to continue provision of reasonable and
appropriate protection of electronic protected health information.

                                                                     16
HIPAA Security Rule




                      17
HIPAA Security Rule – Administrative
Safeguards § 164.308




                                       18
HIPAA Security Rule – Administrative
Safeguards § 164.308 ( Contd.)




                                       19
HIPAA Act




            20
HIPAA Security Rule – Physical
Safeguards § 164.310




                                 21
HIPAA Security Rule




                      22
HIPAA Security Rule – Technical
Safeguards § 164.312




                                  23
Healthcare Infrastructure
                              Computers
                              Storage Devices
                              Networking devices (Routers,
                               Switches & Wireless)
                              Medical Devices
                              Scanners, fax and
Any device that                photocopiers
electronically stores or      VoIP
transmits information         Smart-phones, Tablets (ipad,
using a software
                                PDAs)
program                                                 24
                              Cloud-based services
Trends in Healthcare IT


        Informatics   Collaboration




         Mobile           EHR
        Computing         HIE

                                      25
Handheld Usage in Healthcare

• 25% usage with providers

• Another 21% expected to use

• 38% physicians use medical
  apps

• 70% think it is a high priority

• 1/3 use hand-held for accessing EMR/EHR
                                            26

compTIA 2011 Survey
EMR and EHR systems




                      27
Health Information Exchange (HIE)




                                    28
Social Media
   How does your practice use it?

   How do your employees use it?

   Do you have policies?




                                     29
Cloud-based services
                                 Public Cloud
                                     EHR Applications
    HIPAA regulations                Private-label e-mail
    remain barriers to full
    cloud adoption
                                 Private Cloud
                                     Archiving of Images
                                     File Sharing
Cloud Computing is taking
all batch processing, and            On-line Backups
farming it out to a huge
central or virtualized
                                 Hybrid                     30

computers.
Informatics




              31
Sample Risk Analysis Template
                                      Likelihood
                        High             Medium                 Low

          High      Unencrypted     Lack of auditing on    Missing security
                    laptop ePHI        EHR systems      patches on web server
                                                           hosting patient
                                                             information
Impact




         Medium       Unsecured      Outdated anti-virus External hard drives
                  wireless network       software        not being backed up
                  in doctor’s office



                  Sales presentation Web server backup   Weak password on
          Low       on USB thumb tape not stored in a    internal document
                         drive        secured location         server
                                                                                32
HIPAA Security Rule Standard                Implementati                                                                                         Yes/No/Comm
HIPAA Sections Implementation Specification                on           Requirement Description                       Solution                                  ents

                                                                         Policies and procedures to manage
164.308(a)(1)(i) Security Management Process               Required      security violations
164.308(a)(1)(ii)(                                                                                                    Penetration test, vulnerability
A)                 Risk Analysis                           Required      Conduct vulnerability assessment             assessment
                                                                                                                      SIM/SEM, patch management,
164.308(a)(1)(ii)(                                                       Implement security measures to reduce        vulnerability management, asset
B)                    Risk Management                      Required      risk of security breaches                    management, helpdesk

164.308(a)(1)(ii)(                                                       Worker sanction for policies and             Security policy document
C)                    Sanction Policy                      Required      procedures violations                        management

164.308(a)(1)(ii)(                                                                                                    Log aggregation, log analysis, security
D)                    Information System Activity Review   Required      Procedures to review system activity         event management, host IDS

                                                                         Identify security official responsible for
164.308(a)(2)        Assigned Security Responsibility      Required      policies and procedures

                                                                         Implement policies and procedures to
164.308(a)(3)(i) Workforce Security                        Required      ensure appropriate PHI access
                                                                                                                Mandatory, discretionary and role-
164.308(a)(3)(ii)(                                                                                              based access control: ACL, native OS
A)                    Authorization and/or Supervision     Addressable Authorization/supervision for PHI access policy enforcement
164.308(a)(3)(ii)(                                                     Procedures to ensure appropriate PHI
B)                    Workforce Clearance Procedure        Addressable access                                   Background checks

164.308(a)(3)(ii)(                                                     Procedures to terminate PHI access             Single sign-on, identity management,
C)                    Termination Procedures               Addressable security policy document management            access controls
                                                                       Policies and procedures to authorize
164.308(a)(4)(i) Information Access Management             Required    access to PHI

164.308(a)(4)(ii)( Isolation Health Clearinghouse                        Policies and procedures to separate PHI Application proxy, firewall, mandatory
A)                Functions                                Required      from other operations                   UPN, SOCKS

164.308(a)(4)(ii)(                                                     Policies and procedures to authorize           Mandatory, discretionary and role-
B)                  Access Authorization                   Addressable access to PHI                                  based access control
164.308(a)(4)(ii)( Access Establishment and                            Policies and procedures to grant access        Security policy document
C)                 Modification                            Addressable to PHI                                         management
                                                                       Training program for workers and
164.308(a)(5)(i) Security Awareness Training               Required    managers

164.308(a)(5)(ii)(                                                                                                    Sign-on screen, screen savers,
A)                    Security Reminders                   Addressable Distribute periodic security updates           monthly memos, e-mail, banners
Key Takeaways

   ePHI - Focus of HIPAA/HITECH Security &
    Compliance
   HIPAA program secures technology
    environments focusing on CIA
   HIPAA security assessment includes
    administrative, technical and physical
    safeguards
   The key HIPAA security requirement is to
    conduct technical security analysis
                                               34
Additional Resources


   Resources Section: ehr20.com/resources
   NIST toolkit
   HHS Website:
    http://www.hhs.gov/ocr/privacy/hipaa/administrat
    ive/securityrule/index.html




                                                   35
Next Steps
   Follow-us on social media
    facebook.com/ehr20 (Like)
    linkedin.com/company/ehr-2-0 (Follow us)
    https://twitter.com/#!/EHR_20 (Follow)

   Next Live Webinars:
       OCR/HHS HIPAA/HITECH Audit Preparation ( 4/4/2012)
       Social Media Compliance for Healthcare Professionals(4/11/2012)
    Sign-up at ehr20.com/webinars



   http://ehr20.com/services/
                                                                          36
Questions?
E-mail: info@ehr20.com

                         37
Thank you!!


              38

Weitere ähnliche Inhalte

Was ist angesagt?

CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxforam74
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know➲ Stella Bridges
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsBSides Delhi
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 

Was ist angesagt? (20)

CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
8. operations security
8. operations security8. operations security
8. operations security
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Andere mochten auch

Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin, Inc.
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisCharles McNeil
 
OCR HHS HIPAA HITECH Audit Advisory Template
OCR HHS HIPAA HITECH Audit Advisory TemplateOCR HHS HIPAA HITECH Audit Advisory Template
OCR HHS HIPAA HITECH Audit Advisory Templatedata brackets
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAAManas Deep
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterSAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterDavid Sweigert
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 
Sujobinterview 090508185333 Phpapp01
Sujobinterview 090508185333 Phpapp01Sujobinterview 090508185333 Phpapp01
Sujobinterview 090508185333 Phpapp01Wlovelady
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceTrueVault
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...Quinnipiac University
 
Webinar: Your HIPAA Omnibus Rule Compliance Checklist
Webinar: Your HIPAA Omnibus Rule Compliance ChecklistWebinar: Your HIPAA Omnibus Rule Compliance Checklist
Webinar: Your HIPAA Omnibus Rule Compliance ChecklistBridge Front
 
Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...chshanah
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunellesjbusnpa
 
Skapa värden med kundmötet
Skapa värden med kundmötetSkapa värden med kundmötet
Skapa värden med kundmötetMartin Moström
 

Andere mochten auch (20)

HIPAA security risk assessments
HIPAA security risk assessmentsHIPAA security risk assessments
HIPAA security risk assessments
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
 
OCR HHS HIPAA HITECH Audit Advisory Template
OCR HHS HIPAA HITECH Audit Advisory TemplateOCR HHS HIPAA HITECH Audit Advisory Template
OCR HHS HIPAA HITECH Audit Advisory Template
 
Hipaa risk analysis_1.4
Hipaa risk analysis_1.4Hipaa risk analysis_1.4
Hipaa risk analysis_1.4
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterSAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
Sujobinterview 090508185333 Phpapp01
Sujobinterview 090508185333 Phpapp01Sujobinterview 090508185333 Phpapp01
Sujobinterview 090508185333 Phpapp01
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
 
Sap template 050312
Sap template 050312Sap template 050312
Sap template 050312
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
 
Webinar: Your HIPAA Omnibus Rule Compliance Checklist
Webinar: Your HIPAA Omnibus Rule Compliance ChecklistWebinar: Your HIPAA Omnibus Rule Compliance Checklist
Webinar: Your HIPAA Omnibus Rule Compliance Checklist
 
Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...Implementation of Electronic Screening & Clinical Support into General Outpat...
Implementation of Electronic Screening & Clinical Support into General Outpat...
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunelle
 
Skapa värden med kundmötet
Skapa värden med kundmötetSkapa värden med kundmötet
Skapa värden med kundmötet
 

Ähnlich wie HIPAA HiTech Security Assessment

Meaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis WebinarMeaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis Webinardata brackets
 
Business Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to KnowBusiness Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to Knowdata brackets
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirementsdata brackets
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containersAbhishek Sood
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 
Explain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfExplain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfarjunenterprises1978
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associatesgppcpa
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5ProductNation/iSPIRT
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations OnRamp
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...Ajeet Singh
 
Social Media Compliance for Healthcare Professionals
Social Media Compliance for Healthcare ProfessionalsSocial Media Compliance for Healthcare Professionals
Social Media Compliance for Healthcare Professionalsdata brackets
 
Health information security system
Health information security systemHealth information security system
Health information security systemDiana Fernandez
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 

Ähnlich wie HIPAA HiTech Security Assessment (20)

Meaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis WebinarMeaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis Webinar
 
Business Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to KnowBusiness Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to Know
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirements
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Explain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfExplain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdf
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
 
Social Media Compliance for Healthcare Professionals
Social Media Compliance for Healthcare ProfessionalsSocial Media Compliance for Healthcare Professionals
Social Media Compliance for Healthcare Professionals
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 

Mehr von data brackets

Presence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRPresence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRdata brackets
 
Oregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA FinesOregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA Finesdata brackets
 
Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement data brackets
 
NYP RA and Cap april 2016
NYP RA and Cap april 2016 NYP RA and Cap april 2016
NYP RA and Cap april 2016 data brackets
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016 data brackets
 
Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016data brackets
 
HIPAA Violation Fines: North memorial Hospistal Settlement
 HIPAA Violation Fines: North memorial Hospistal Settlement  HIPAA Violation Fines: North memorial Hospistal Settlement
HIPAA Violation Fines: North memorial Hospistal Settlement data brackets
 
Prepayment Audit Suggested Documentation
Prepayment Audit Suggested DocumentationPrepayment Audit Suggested Documentation
Prepayment Audit Suggested Documentationdata brackets
 
Lincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgeLincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgedata brackets
 
Lincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediatedLincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediateddata brackets
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...data brackets
 
Office of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programOffice of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programdata brackets
 
Cancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement AgreementCancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement Agreementdata brackets
 
Parkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution AgreementParkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution Agreementdata brackets
 
HIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia UniverstiyHIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia Universtiydata brackets
 
Skagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSSkagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSdata brackets
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
Adult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action PlanAdult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action Plandata brackets
 

Mehr von data brackets (20)

Presence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRPresence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCR
 
Oregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA FinesOregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA Fines
 
Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement
 
NYP RA and Cap april 2016
NYP RA and Cap april 2016 NYP RA and Cap april 2016
NYP RA and Cap april 2016
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016
 
Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016
 
HIPAA Violation Fines: North memorial Hospistal Settlement
 HIPAA Violation Fines: North memorial Hospistal Settlement  HIPAA Violation Fines: North memorial Hospistal Settlement
HIPAA Violation Fines: North memorial Hospistal Settlement
 
Prepayment Audit Suggested Documentation
Prepayment Audit Suggested DocumentationPrepayment Audit Suggested Documentation
Prepayment Audit Suggested Documentation
 
Lincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgeLincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judge
 
Lincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediatedLincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediated
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
 
Office of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programOffice of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit program
 
Cancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement AgreementCancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement Agreement
 
Parkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution AgreementParkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution Agreement
 
HIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia UniverstiyHIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia Universtiy
 
Qca agreement
Qca agreementQca agreement
Qca agreement
 
Concentra agreement
Concentra agreementConcentra agreement
Concentra agreement
 
Skagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSSkagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHS
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Adult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action PlanAdult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action Plan
 

Kürzlich hochgeladen

Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Dipal Arora
 
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Call Girls in Nagpur High Profile
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiAlinaDevecerski
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...narwatsonia7
 
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomdiscovermytutordmt
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋TANUJA PANDEY
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Dipal Arora
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...parulsinha
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Servicevidya singh
 

Kürzlich hochgeladen (20)

Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
 
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
 
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...
 
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
 
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
 
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
 

HIPAA HiTech Security Assessment

  • 2. Webinar Objectives • Understand HIPAA/HITECH security principles • Learn HIPAA security safeguards • Learn tools and methodologies for HIPAA/HITECH Assessment 2
  • 3. Who we are … EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations.  Education  Consulting  Toolkit(Tools, Best Practices & Checklist) Goal: To make compliance an enjoyable and painless experience, while building capability and confidence.
  • 4. Glossary 1. PHI: Protected Health Information 2. HHS: Health and Human Services 3. OCR: Office for Civil Rights 4. HIPAA: Health Insurance Portability and Accountability Act 5. HITECH: Health Information Technology for Economic and Clinical Health Act 4
  • 5. The American Recovery and Reinvestment Act of 2009 and HITECH 5
  • 6. HITECH modifications to HIPAA  Creating incentives for developing a meaningful use of electronic health records  Changing the liability and responsibilities of Business Associates  Redefining what a breach is  Creating stricter notification standards  Tightening enforcement  Raising the penalties for a violation  Creating new code and transaction sets (HIPAA 5010, ICD10) 6
  • 7. Business Associate Cycle Covered BA HHS/OCR Entity • BA Contract • HIPAA Privacy and • Breach Notification Security Rule • Minimum Necessary • Breach Notification Sub- contractors 7
  • 8. HIPAA Titles - Overview 8
  • 9. HIPAA The two main rules of HIPAA are:  Privacy Rule: Organizations must identify the uses and disclosures of protected health information (PHI) and put into effect appropriate safeguards to protect against an unauthorized use or disclosure of that PHI. When material breaches or violations of privacy are identified, the organizations must take reasonable steps to solve those problems in order to limit exposure of PHI.  Security Rule: Defines the administrative, physical and technical safeguards to protect the confidentiality, integrity and availability of electronic protected health information. (45 CFR Part 160 and Subparts A and C of Part 164) 9
  • 11. Information Security Model Confidentiality Limiting information access and disclosure to authorized users (the right people) Integrity Trustworthiness of information resources (no inappropriate changes) Availability Availability of information resources (at the right time) 11
  • 12. Protected Health Information(PHI) Health Information Individually Identifiable Health Information PHI 12
  • 13. ePHI – 18 Elements Elements Examples Name Max Bialystock 1355 Seasonal Lane Address (all geographic subdivisions smaller than state, including street address, city, county, or ZIP code) Dates related to an individual Birth, death, admission, discharge 212 555 1234, home, office, mobile etc., Telephone numbers 212 555 1234 Fax number Email address LeonT@Hotmail.com, personal, official Social Security number 239-68-9807 Medical record number 189-88876 Health plan beneficiary number 123-ir-2222-98 Account number 333389 Certificate/license number 3908763 NY Any vehicle or other device serial number SZV4016 Device identifiers or serial numbers Unique Medical Devices Web URL www.rickymartin.com Internet Protocol (IP) address numbers 19.180.240.15 Finger or voice prints finger.jpg Photographic images mypicture.jpg Any other characteristic that could uniquely 13 identify the individual
  • 14. Examples of ePHI (and not ePHI) Examples of ePHI: Examples of NOT ePHI:  magnetic tape  paper files  disk or optical disk  “paper to paper” faxes  computerized information  person-to-person  internet transmission telephone calls  network information  video teleconferencing  telephone response and  voicemail messages “fax back” (a request for information from a computer made via voice or telephone keypad input with the requested information returned as a 14 fax)
  • 15. Security Standards: General Rules § 164.306 What are “Required” Standards? If the standard is stated as “Required” , A covered entity and business associate must comply with that standard. What are “Addressable” standards? If the standard is stated as “Addressable”, the covered entity or business associate must assess if the implementation specification is a reasonable and appropriate safeguard in its environment with reference to e-PHI. If application then take measures to implement it. 15
  • 16. Security Standards: General Rules § 164.306 What if “Addressable” standards are not applicable to the covered entities environment? Document why it is not applicable and implement an equivalent alternative measure if reasonable and appropriate. How often the security should be reviewed? Security standard mentioned under HIPAA should be reviewed and modified as needed to continue provision of reasonable and appropriate protection of electronic protected health information. 16
  • 18. HIPAA Security Rule – Administrative Safeguards § 164.308 18
  • 19. HIPAA Security Rule – Administrative Safeguards § 164.308 ( Contd.) 19
  • 20. HIPAA Act 20
  • 21. HIPAA Security Rule – Physical Safeguards § 164.310 21
  • 23. HIPAA Security Rule – Technical Safeguards § 164.312 23
  • 24. Healthcare Infrastructure  Computers  Storage Devices  Networking devices (Routers, Switches & Wireless)  Medical Devices  Scanners, fax and Any device that photocopiers electronically stores or  VoIP transmits information  Smart-phones, Tablets (ipad, using a software PDAs) program 24  Cloud-based services
  • 25. Trends in Healthcare IT Informatics Collaboration Mobile EHR Computing HIE 25
  • 26. Handheld Usage in Healthcare • 25% usage with providers • Another 21% expected to use • 38% physicians use medical apps • 70% think it is a high priority • 1/3 use hand-held for accessing EMR/EHR 26 compTIA 2011 Survey
  • 27. EMR and EHR systems 27
  • 29. Social Media  How does your practice use it?  How do your employees use it?  Do you have policies? 29
  • 30. Cloud-based services  Public Cloud  EHR Applications HIPAA regulations  Private-label e-mail remain barriers to full cloud adoption  Private Cloud  Archiving of Images  File Sharing Cloud Computing is taking all batch processing, and  On-line Backups farming it out to a huge central or virtualized  Hybrid 30 computers.
  • 32. Sample Risk Analysis Template Likelihood High Medium Low High Unencrypted Lack of auditing on Missing security laptop ePHI EHR systems patches on web server hosting patient information Impact Medium Unsecured Outdated anti-virus External hard drives wireless network software not being backed up in doctor’s office Sales presentation Web server backup Weak password on Low on USB thumb tape not stored in a internal document drive secured location server 32
  • 33. HIPAA Security Rule Standard Implementati Yes/No/Comm HIPAA Sections Implementation Specification on Requirement Description Solution ents Policies and procedures to manage 164.308(a)(1)(i) Security Management Process Required security violations 164.308(a)(1)(ii)( Penetration test, vulnerability A) Risk Analysis Required Conduct vulnerability assessment assessment SIM/SEM, patch management, 164.308(a)(1)(ii)( Implement security measures to reduce vulnerability management, asset B) Risk Management Required risk of security breaches management, helpdesk 164.308(a)(1)(ii)( Worker sanction for policies and Security policy document C) Sanction Policy Required procedures violations management 164.308(a)(1)(ii)( Log aggregation, log analysis, security D) Information System Activity Review Required Procedures to review system activity event management, host IDS Identify security official responsible for 164.308(a)(2) Assigned Security Responsibility Required policies and procedures Implement policies and procedures to 164.308(a)(3)(i) Workforce Security Required ensure appropriate PHI access Mandatory, discretionary and role- 164.308(a)(3)(ii)( based access control: ACL, native OS A) Authorization and/or Supervision Addressable Authorization/supervision for PHI access policy enforcement 164.308(a)(3)(ii)( Procedures to ensure appropriate PHI B) Workforce Clearance Procedure Addressable access Background checks 164.308(a)(3)(ii)( Procedures to terminate PHI access Single sign-on, identity management, C) Termination Procedures Addressable security policy document management access controls Policies and procedures to authorize 164.308(a)(4)(i) Information Access Management Required access to PHI 164.308(a)(4)(ii)( Isolation Health Clearinghouse Policies and procedures to separate PHI Application proxy, firewall, mandatory A) Functions Required from other operations UPN, SOCKS 164.308(a)(4)(ii)( Policies and procedures to authorize Mandatory, discretionary and role- B) Access Authorization Addressable access to PHI based access control 164.308(a)(4)(ii)( Access Establishment and Policies and procedures to grant access Security policy document C) Modification Addressable to PHI management Training program for workers and 164.308(a)(5)(i) Security Awareness Training Required managers 164.308(a)(5)(ii)( Sign-on screen, screen savers, A) Security Reminders Addressable Distribute periodic security updates monthly memos, e-mail, banners
  • 34. Key Takeaways  ePHI - Focus of HIPAA/HITECH Security & Compliance  HIPAA program secures technology environments focusing on CIA  HIPAA security assessment includes administrative, technical and physical safeguards  The key HIPAA security requirement is to conduct technical security analysis 34
  • 35. Additional Resources  Resources Section: ehr20.com/resources  NIST toolkit  HHS Website: http://www.hhs.gov/ocr/privacy/hipaa/administrat ive/securityrule/index.html 35
  • 36. Next Steps  Follow-us on social media facebook.com/ehr20 (Like) linkedin.com/company/ehr-2-0 (Follow us) https://twitter.com/#!/EHR_20 (Follow)  Next Live Webinars:  OCR/HHS HIPAA/HITECH Audit Preparation ( 4/4/2012)  Social Media Compliance for Healthcare Professionals(4/11/2012) Sign-up at ehr20.com/webinars  http://ehr20.com/services/ 36