SlideShare a Scribd company logo
1 of 51
Don’t Get Hit by the
HIPAA Omnibus:
Are You Ready for Sept 23?
Disclaimers
The material in this presentation and/or any
remarks made by HealthCare Too, LLC personnel
are NOT meant to provide legal advice or counsel.
We intend this session to provide you with
highlights of the new HIPAA Omnibus for your
edification and for your own use at your own
professional discretion.
8/6/13HealthCareToo,LLCProprietary
2
Scope
45 CFR Parts 160 and 164
Modifications to the HIPAA
Privacy, Security, Enforcement, and Breach
Notification Rules Under the Health Information
Technology for Economic and Clinical Health Act
and the Genetic Information Nondiscrimination Act
Or “The HIPAA Omnibus” was 138 pages when
released on Jan 25, 2013. This presentation
introduces several major changes at a high level
but does not present all changes.
8/6/13HealthCareToo,LLCProprietary
3
Your Presenters
• Tim Perry, MPA, CHTS-IS
• Chief Information Officer, HealthCare Too, LLC
• 25+ years of Health Information Technology and
Compliance experience
• Chief Technology Officer, Ecommerce, LLC (Cloud & Hosting)
• Senior Vice President of Infrastructure Services, Reed Elsevier
• Global IT Director, Johnson & Johnson
• Consulting engagements at SmithKline Beecham, Merck
• Education
• Master of Technology Management, Univ of Pennsylvania
• Master of Public Administration, The Ohio State University
• Bachelor of Arts, The Ohio State University
8/6/13HealthCareToo,LLCProprietary
4
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
5
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
6
8/6/13
7
8/6/13HealthCareToo,LLCProprietary
8
http://www.hhs.gov/ocr/privacy/hipaa/enforcement/process/index.html
8/6/13HealthCareToo,LLCProprietary
9
8/6/13HealthCareToo,LLCProprietary
10
HIPAA Resolutions by Type and Year (based on OCR data)
Reported 500+ Breaches in OH
8/6/13HealthCareToo,LLCProprietary
11
Patients
Affected
Date of
Breach Type of Breach Location of Breach
60998 3/27/10 Theft Laptop
1001 4/22/10 Unauthorized Access/Disclosure Email
1200 6/13/10 Improper Disposal Paper
1309 6/11/10 Loss Laptop
13867 6/7/10 Theft Laptop
2123 7/29/10 Improper Disposal Paper
1000 11/15/10 Improper Disposal Paper
501 11/5/10 Theft Laptop, Computer
78,042 6/3/11 Theft Laptop
500 10/1/10 Improper Disposal Other (X-ray film)
15,000
10/01/2010
- 03/21/2012 Unauthorized Access/Disclosure Other
15000
10/1/2010
- 03/21/2012 Unauthorized Access/Disclosure Other
850 12/2/12 Theft Laptop, Network Server
2500 3/19/13 Theft Other
500
04/14/2013
- 04/19/2013 Loss Laptop
2203 5/29/13 Other Paper
78542 TOTAL
Notable Settlements
Entity Amount Year
WellPoint, Inc. $1.7 million July 2013
Walgreens $1.44 million July 2013
MN AG & Accretive Health
(started from July 2011 lost laptop)
$2.5 million July 2013
Shasta Regional Med Center $275,000 June 2013
Idaho State University $400,000 May 2013
Goldthwait Associates & 4 Pathology Groups $140,000 January 2013
8/6/13HealthCareToo,LLCProprietary
12
What’s in
a Name?
• Mega Rule
• Omnibus
• Final Rule
8/6/13HealthCareToo,LLCProprietary
13
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
14
Compliance Deadline
Omnibus HIPAA Final Rule
• Published in Federal Register – January 25, 2013
• Effective Date – March 26, 2013
• Compliance Date – September 23, 2013
• Transition Period to Conform BA Contracts – Up
to September 22, 2014, for Qualifying Contracts
8/6/13HealthCareToo,LLCProprietary
15
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
16
Covered Entities, Business
Associates, and
Subcontractors, Oh My!
8/6/13HealthCareToo,LLCProprietary
17
Who – “Covered Entity”
• (1) A health plan.
• (2) A health care clearinghouse.
• (3) A health care provider who transmits any
health information in electronic form in
connection with a transaction covered by this
subchapter.
• Note: if an electronic transaction is made on a
provider’s behalf… it is considered the provider’s
8/6/13HealthCareToo,LLCProprietary
18
Business Associate
What it says What it means
“functions, activities or services on
behalf of covered entities”
“Create, receive, maintain, or transmit
PHI”
An employee of a CE is NOT a BA.
Clarifies definition of BA to include:
• Patient Safety Organizations,
• Health Information Exchanges,
• Personal Health Records
Must have BAA in place
Clarification that BAs are liable whether
or not they have an agreement in place
with the CE .
(Marissa Gordon-Nguyen, JD, MPH Office for Civil Rights)
8/6/13HealthCareToo,LLCProprietary
19
Who – “Subcontractors”
What it says What it means
"a person to whom a business associate
delegates a function, activity, or service,
other than in the capacity of a member
of the workforce of such business
associate." (45 CFR 160.103)
"under the final rule, covered entities
must ensure that they obtain
satisfactory assurances required by the
Rules from their BAs, and BAs must do
the same with regard to subcontractors,
and so on, no matter how far 'down the
chain' the information flows."
Subcontractors are BAs:
• Subject to HIPAA provisions
• Directly liable for HIPAA violations
• BA must have BAA with every
subcontractor
• Subcontractor must have BAA with its
subcontractors, who are also BAs
8/6/13HealthCareToo,LLCProprietary
20
Agency
• Covered Entities can be held liable for the
violations caused by their Business Associates.
• Business Associates can be held liable for the
violations caused by their sub-contractors.
• Federal common law of Agency will govern
whether an agency relationship exists between
the parties - regardless of what the contract
actually says.
(WEDI presentation by Joseph R. McClure, Esq. Legal Counsel, Siemens Medical Solutions USA WEDI
Privacy & Security Co-Chair)
8/6/13HealthCareToo,LLCProprietary
21
Your PHI Ecosystem is Explicit
8/6/13HealthCareToo,LLCProprietary
22
8/6/13HealthCareToo,LLCProprietary
WEDI Privacy & Security Workgroup, Business Associate Sub-Workgroup
23
8/6/13HealthCareToo,LLCProprietary
WEDI Privacy & Security Workgroup, Business Associate Sub-Workgroup
24
Typical BA Functions (Again)
• Claims processing or
administration
• Data analysis, processing or
administration
• Utilization review
• Quality assurance billing
• Benefit management
• Practice management
• Repricing
8/6/13HealthCareToo,LLCProprietary
• Legal
• Actuarial
• Accounting
• Consulting
• Data
aggregation
• Management
• Administrative
• Accreditation
• Financial 25
Business Associates Must:
1. Comply with the HIPAA Security Rule
2. Report to Covered Entity any breach of
unsecured PHI
3. Enter into BAAs with subcontractors imposing
the same obligations that apply to the Business
Associate
4. Comply with the HIPAA Privacy Rule to the
extent Business Associate is carrying out a
Covered Entity’s Privacy Rule obligations
8/6/13HealthCareToo,LLCProprietary
(WEDI presentation by Joseph R. McClure, Esq. Legal Counsel, Siemens Medical
Solutions USA WEDI Privacy & Security Co-Chair)
26
Leon Rodriguez
“I am the first Director of the
Office of Civil Rights to come to
the Office with
experience, extensive
experience, both in law
enforcement and a healthcare
provider lawyer and its my
commitment to ramp up the
enforcement of the Office.”
8/6/13HealthCareToo,LLCProprietary
Oral Testimony to Senate Judiciary Subcommittee on Privacy, Technology, and Law “Your
Health and Your Privacy: Protecting Health Information in a Digital World.”, Nov 2, 2011.
27
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
28
Business Associate Agreements
8/6/13HealthCareToo,LLCProprietary
29
Protected Health Information
(PHI)
8/6/13HealthCareToo,LLCProprietary
Individually identifiable Health Information
List of 18 Identifiers
• Names
• All geographic subdivisions smaller than state
• All elements of dates except year
• Phone numbers
• Fax numbers
• Electronic mail addresses
• Social Security numbers
• Medical record numbers
• Health plan beneficiary numbers
• Account numbers
• Certificate/license numbers
• Vehicle identifiers and serial numbers
• Device identifiers and serial numbers;
• Web Universal Resource Locators (URLs);
• Internet Protocol (IP) address numbers;
• Biometric identifiers
• Full face photographic images
• Any other unique identifying number
Health information means any information,
including genetic information, whether oral or
recorded in any form or medium, that:
(1) Is created or received by a health care
provider, health plan, public health authority,
employer, life insurer, school or university, or
health care clearinghouse;
and
(2) Relates to the past, present, or future
physical or mental health or condition of an
individual; the provision of health care to an
individual; or the past, present, or future
payment for the provision of health care to an
individual.
30
Breach
Unauthorized acquisition, access, use or disclosure
that compromises the security or privacy of the
protected health information such that the use or
disclosure poses a significant risk of financial,
reputational, or other harm to the affected
individual.
8/6/13HealthCareToo,LLCProprietary
31
Four-Factor PHI Breach
Assessment
1. Nature and extent of PHI involved
2. Unauthorized person who used PHI or to
whom disclosure was made
3. Whether PHI was actually acquired or viewed
4. Extent to which risk to PHI has been mitigated
8/6/13HealthCareToo,LLCProprietary
“Guilty until proven innocent”
Breach is now presumed
32
Breach Notification
Less Than 500 Patient Records 500+ Patient Records
Individual notifications must be
provided without unreasonable delay
and in no case later than 60 days
following the discovery of a breach
Notify HHS on an annual basis.
Individual notifications must be
provided without unreasonable delay
and in no case later than 60 days
following the discovery of a breach
Notify the Secretary without
unreasonable delay and in no case
later than 60 days following a breach.
Provide notice to prominent media
outlets serving the State or jurisdiction
8/6/13HealthCareToo,LLCProprietary
HHS provides “safe harbor” for PHI that is encrypted or properly disposed of
in keeping with early guidance.
Note: When you notify of a breach, you are self-reporting a HIPAA violation
and should make your counsel aware as well as conduct a new risk analysis
with corrective actions.
33
8/6/13HealthCareToo,LLCProprietary
Breach
Discovered
Risk
Assessment
1. Nature and extent of PHI involved
2. Unauthorized person who used PHI or to
whom disclosure was made
3. Whether PHI was actually acquired or
viewed
4. Extent to which risk to PHI has been
mitigated
Document
& Done
No
Breach
Less Than
500?
Notify Individuals
Notify HHS Annually
Notify Individuals
Notify HHS w/i 60 days
Notify Media
Breach
Yes
No
34
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
35
Where?
• Privacy Rule applies to any form of PHI
• It’s about disclosures
• Security Rule applies to electronic forms of PHI
• Desktop
• Laptop
• Tablet Computer
• Smart Phone
• Cloud
• USB “thumb drive”
• CD / DVD
• Floppy disk (if those even still exist)
• ….
8/6/13HealthCareToo,LLCProprietary
36
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
37
Privacy Rule
Privacy Rule
Covered Entity • Marketing & Fundraising
• Sale of protected health information (PHI)
• Right to request restrictions
• Electronic access for patient
• Delegates
• Genetic info for underwriting prohibited
• Immunization records with parent approval
• Decedent PHI protected for 50 years
Business Associate BAA at least as strict as CE
Subcontractor BAA at least as strict as BA
8/6/13HealthCareToo,LLCProprietary
38
Security Rule: Phys Safeguards
Required Addressable
Workstation Use (R)
Workstation Security (R)
Disposal (R)
Media Re-use (R)
Contingency Operations (A)
Facility Security Plan (A)
Access Control and Validation
Procedures (A)
Maintenance Records (A)
Accountability (A)
Data Backup and Storage (A)
8/6/13HealthCareToo,LLCProprietary
39
Applies to: Covered Entity, Business Associates, and Subcontractors
Security Rule: Admin Safeguards
Required Addressable
Risk Analysis (R)
Risk Management (R)
Sanction Policy (R)
Information System Activity Review (R)
Assigned Security Responsibility (R)
Isolating Health Care Clearinghouse
Function (R)
Response and Reporting (R)
Data Backup Plan (R)
Disaster Recovery Plan (R)
Emergency Mode Operation Plan (R)
Evaluation (R)
Written Contract or Other
Arrangement (R)
Authorization and/or Supervision (A)
Workforce Clearance Procedure (A)
Termination Procedures (A)
Access Authorization (A)
Access Establishment and
Modification (A)
Security Reminders (A)
Protection from Malicious Software (A)
Log-in Monitoring (A)
Password Management (A)
Testing and Revision Procedure (A)
Applications and Data Criticality
Analysis (A)
8/6/13HealthCareToo,LLCProprietary
40
Applies to: Covered Entity, Business Associates, and Subcontractors
Security Rule: Tech Safeguards
Required Addressable
Unique User Identification (R)
Emergency Access Procedure (R)
Audit Controls (R)
Person or Entity Authentication (R)
Automatic Logoff (A)
Encryption and Decryption (A)
Mechanism to Authenticate Electronic
PHI (A)
Integrity Controls (A)
Encryption (A)
8/6/13HealthCareToo,LLCProprietary
41
Applies to: Covered Entity, Business Associates, and Subcontractors
2007
Original Omnibus
8/6/13HealthCareToo,LLCProprietary
42
Fine Structure
8/6/13HealthCareToo,LLCProprietary
Violation Category Per Violation Per Calendar Year
Did Not Know $100 - $50,000 $1,500,000
Reasonable Cause $1,000 - $50,000 $1,500,000
Willful Neglect –
Corrected
$10,000 - $50,000 $1,500,000
Willful Neglect –
Not Corrected
$50,000 $1,500,000
43
Last year we had a $1.5M settlement with BCBS TN
that had 57 hard drives stolen from a storage facility.
The citation that drove the penalty was NOT the
breach. Rather, the penalty was applied because of the
failure to implement appropriate administrative
safeguards, not performing a risk assessment, and
failure to implement access controls for physical
safeguards. They could have turned that storage
facility into Fort Knox, and it might have still been
breached. But the problem was they didn’t implement
any preventive policies or procedures or appropriate
administrative or physical safeguards. This is a great
example of the lack of ongoing attention to
compliance.
8/6/13HealthCareToo,LLCProprietary
HIPAA in a HITECH World: HIPAA Violations on the Rise, According to Director of OCR
Posted on March 22, 2013 by April Sage
Leon Rodriguez, Director Office for Civil Rights
44
Another Real Life Example
Breach of less than 500 patients' PHI
• Hospice of North Idaho fined $50,000
• Unencrypted laptop was stolen from an
employee's car.
• OCR found that HONI (1) did not conduct a risk
analysis to safeguard ePHI and (2) did not have
policies/procedures in place to address mobile
device security.
8/6/13HealthCareToo,LLCProprietary
45
HIPAA Omnibus
• History / Definitions
• Omnibus – Major Changes
• When
• Who
• What
• Where
• How
• Why
• Question / Answers
8/6/13HealthCareToo,LLCProprietary
46
Patient Rights over PHI
What it says What it means
In this final rule, we strengthen an
individual’s right to receive an
electronic copy of his or her protected
health information.
The final rule requires that a covered
health care provider agree in most cases
to an individual’s request to restrict
disclosure to a health plan of the
individual’s protected health
information that pertains to a health
care service for which the individual
has paid the health care provider in full
out of pocket.
If you use an EHR, you must provide an
e-copy of PHI to patients upon request,
within timeframe and costs of Final Rule.
Patients may pay for treatment and ask
provider to withhold PHI from insurer.
8/6/13HealthCareToo,LLCProprietary
47
Greater Use of Health
Information Technology
8/6/13HealthCareToo,LLCProprietary
48
Street Value of Medical Records
A thief downloading and stealing data can get $50
on the street for a medical identification number
compared to just $1 for a Social Security number.
For those receiving the medical ID number and
using it to defraud a health care organization, the
average payout is more than $20,000,” according
to Pam Dixon, executive director of the World
Privacy Forum. "Compare that to just $2,000 for
the average payout for regular ID theft.
8/6/13HealthCareToo,LLCProprietary
“Protected Health Information (PHI): High Value to Hackers: Medical Facilities at
Risk”, http://www.prweb.com/releases/2013/2/prweb10412883.htm
49
Resources
• Jan 17, 2013 New Release on Omnibus
http://www.hhs.gov/news/press/2013pres/01/20130117
b.html
• Poyner Spruill Summary of HIPAA Omnibus
http://www.poynerspruill.com/publications/Pages/sum
maryofNewHIPAARules.aspx
• Health Information Privacy
http://www.hhs.gov/ocr/privacy/hipaa/understanding/in
dex.html
• Enforcement Examples
http://www.hhs.gov/ocr/privacy/hipaa/enforcement/exa
mples/index.html
• HHS “Wall of Shame”
http://www.hhs.gov/ocr/privacy/hipaa/administrative/br
eachnotificationrule/breachtool.html
8/6/13HealthCareToo,LLCProprietary
50
info@healthcaretoo.com
8/6/13HealthCareToo,LLCProprietary
51

More Related Content

What's hot

Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your companyguest61ff5a
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008guestabd20
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909julchap
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse Systemoldshaman
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
Establishing CCPA Compliance in Legacy PeopleSoft Systems
Establishing CCPA Compliance in Legacy PeopleSoft SystemsEstablishing CCPA Compliance in Legacy PeopleSoft Systems
Establishing CCPA Compliance in Legacy PeopleSoft SystemsAppsian
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsPYA, P.C.
 
Milliman Payor E Savings Report Final
Milliman Payor E Savings Report FinalMilliman Payor E Savings Report Final
Milliman Payor E Savings Report FinalMark Bergen
 
MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...
MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...
MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...Colin Zick
 
Protecting phi and pii - hipaa challenges and solutions - privacy vs cost
Protecting phi and pii -  hipaa challenges and solutions - privacy vs costProtecting phi and pii -  hipaa challenges and solutions - privacy vs cost
Protecting phi and pii - hipaa challenges and solutions - privacy vs costUlf Mattsson
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013- Mark - Fullbright
 

What's hot (19)

Key Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends ReportKey Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends Report
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
 
Personal data eng
Personal data engPersonal data eng
Personal data eng
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
Establishing CCPA Compliance in Legacy PeopleSoft Systems
Establishing CCPA Compliance in Legacy PeopleSoft SystemsEstablishing CCPA Compliance in Legacy PeopleSoft Systems
Establishing CCPA Compliance in Legacy PeopleSoft Systems
 
Adrs2
Adrs2Adrs2
Adrs2
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Milliman Payor E Savings Report Final
Milliman Payor E Savings Report FinalMilliman Payor E Savings Report Final
Milliman Payor E Savings Report Final
 
MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...
MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...
MichBIO_-_HIPAA__Industry-Provider_Interactions__and_Related_Compliance_Matte...
 
Protecting phi and pii - hipaa challenges and solutions - privacy vs cost
Protecting phi and pii -  hipaa challenges and solutions - privacy vs costProtecting phi and pii -  hipaa challenges and solutions - privacy vs cost
Protecting phi and pii - hipaa challenges and solutions - privacy vs cost
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
 

Similar to HIPAA Overview

HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookElizabeth Dimit
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleJames Pekarek
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleMichigan Primary Care Association
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityThe 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityKegler Brown Hill + Ritter
 
Future-Proof Your Workplace Privacy Approach for CPRA and Beyond
Future-Proof Your Workplace Privacy Approach for CPRA and BeyondFuture-Proof Your Workplace Privacy Approach for CPRA and Beyond
Future-Proof Your Workplace Privacy Approach for CPRA and BeyondTrustArc
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013RightScale
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirementsdata brackets
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3hRaj Goel
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowShred-it
 

Similar to HIPAA Overview (20)

HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy Rule
 
Hipaa Goes Hitech
Hipaa Goes HitechHipaa Goes Hitech
Hipaa Goes Hitech
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
HIPAA vs GDPR The How, What, and Why ?
HIPAA vs GDPR The How, What, and Why ? HIPAA vs GDPR The How, What, and Why ?
HIPAA vs GDPR The How, What, and Why ?
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data SecurityThe 5 Things All In-House Counsel Need to Know about Privacy + Data Security
The 5 Things All In-House Counsel Need to Know about Privacy + Data Security
 
Future-Proof Your Workplace Privacy Approach for CPRA and Beyond
Future-Proof Your Workplace Privacy Approach for CPRA and BeyondFuture-Proof Your Workplace Privacy Approach for CPRA and Beyond
Future-Proof Your Workplace Privacy Approach for CPRA and Beyond
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirements
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 

Recently uploaded

Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...jageshsingh5554
 
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsBangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsGfnyt
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableDipal Arora
 
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service KochiLow Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service KochiSuhani Kapoor
 
Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...
Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...
Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...narwatsonia7
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...Taniya Sharma
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...narwatsonia7
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Servicevidya singh
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...Taniya Sharma
 
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoybabeytanya
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...aartirawatdelhi
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiAlinaDevecerski
 
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...narwatsonia7
 
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableVip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableNehru place Escorts
 
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore EscortsCall Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escortsvidya singh
 

Recently uploaded (20)

Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
 
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsBangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD available
 
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service KochiLow Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
 
Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...
Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...
Top Rated Bangalore Call Girls Mg Road ⟟ 8250192130 ⟟ Call Me For Genuine Sex...
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
 
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
 
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
 
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableVip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
 
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore EscortsCall Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
 

HIPAA Overview

  • 1. Don’t Get Hit by the HIPAA Omnibus: Are You Ready for Sept 23?
  • 2. Disclaimers The material in this presentation and/or any remarks made by HealthCare Too, LLC personnel are NOT meant to provide legal advice or counsel. We intend this session to provide you with highlights of the new HIPAA Omnibus for your edification and for your own use at your own professional discretion. 8/6/13HealthCareToo,LLCProprietary 2
  • 3. Scope 45 CFR Parts 160 and 164 Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act Or “The HIPAA Omnibus” was 138 pages when released on Jan 25, 2013. This presentation introduces several major changes at a high level but does not present all changes. 8/6/13HealthCareToo,LLCProprietary 3
  • 4. Your Presenters • Tim Perry, MPA, CHTS-IS • Chief Information Officer, HealthCare Too, LLC • 25+ years of Health Information Technology and Compliance experience • Chief Technology Officer, Ecommerce, LLC (Cloud & Hosting) • Senior Vice President of Infrastructure Services, Reed Elsevier • Global IT Director, Johnson & Johnson • Consulting engagements at SmithKline Beecham, Merck • Education • Master of Technology Management, Univ of Pennsylvania • Master of Public Administration, The Ohio State University • Bachelor of Arts, The Ohio State University 8/6/13HealthCareToo,LLCProprietary 4
  • 5. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 5
  • 6. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 6
  • 11. Reported 500+ Breaches in OH 8/6/13HealthCareToo,LLCProprietary 11 Patients Affected Date of Breach Type of Breach Location of Breach 60998 3/27/10 Theft Laptop 1001 4/22/10 Unauthorized Access/Disclosure Email 1200 6/13/10 Improper Disposal Paper 1309 6/11/10 Loss Laptop 13867 6/7/10 Theft Laptop 2123 7/29/10 Improper Disposal Paper 1000 11/15/10 Improper Disposal Paper 501 11/5/10 Theft Laptop, Computer 78,042 6/3/11 Theft Laptop 500 10/1/10 Improper Disposal Other (X-ray film) 15,000 10/01/2010 - 03/21/2012 Unauthorized Access/Disclosure Other 15000 10/1/2010 - 03/21/2012 Unauthorized Access/Disclosure Other 850 12/2/12 Theft Laptop, Network Server 2500 3/19/13 Theft Other 500 04/14/2013 - 04/19/2013 Loss Laptop 2203 5/29/13 Other Paper 78542 TOTAL
  • 12. Notable Settlements Entity Amount Year WellPoint, Inc. $1.7 million July 2013 Walgreens $1.44 million July 2013 MN AG & Accretive Health (started from July 2011 lost laptop) $2.5 million July 2013 Shasta Regional Med Center $275,000 June 2013 Idaho State University $400,000 May 2013 Goldthwait Associates & 4 Pathology Groups $140,000 January 2013 8/6/13HealthCareToo,LLCProprietary 12
  • 13. What’s in a Name? • Mega Rule • Omnibus • Final Rule 8/6/13HealthCareToo,LLCProprietary 13
  • 14. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 14
  • 15. Compliance Deadline Omnibus HIPAA Final Rule • Published in Federal Register – January 25, 2013 • Effective Date – March 26, 2013 • Compliance Date – September 23, 2013 • Transition Period to Conform BA Contracts – Up to September 22, 2014, for Qualifying Contracts 8/6/13HealthCareToo,LLCProprietary 15
  • 16. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 16
  • 17. Covered Entities, Business Associates, and Subcontractors, Oh My! 8/6/13HealthCareToo,LLCProprietary 17
  • 18. Who – “Covered Entity” • (1) A health plan. • (2) A health care clearinghouse. • (3) A health care provider who transmits any health information in electronic form in connection with a transaction covered by this subchapter. • Note: if an electronic transaction is made on a provider’s behalf… it is considered the provider’s 8/6/13HealthCareToo,LLCProprietary 18
  • 19. Business Associate What it says What it means “functions, activities or services on behalf of covered entities” “Create, receive, maintain, or transmit PHI” An employee of a CE is NOT a BA. Clarifies definition of BA to include: • Patient Safety Organizations, • Health Information Exchanges, • Personal Health Records Must have BAA in place Clarification that BAs are liable whether or not they have an agreement in place with the CE . (Marissa Gordon-Nguyen, JD, MPH Office for Civil Rights) 8/6/13HealthCareToo,LLCProprietary 19
  • 20. Who – “Subcontractors” What it says What it means "a person to whom a business associate delegates a function, activity, or service, other than in the capacity of a member of the workforce of such business associate." (45 CFR 160.103) "under the final rule, covered entities must ensure that they obtain satisfactory assurances required by the Rules from their BAs, and BAs must do the same with regard to subcontractors, and so on, no matter how far 'down the chain' the information flows." Subcontractors are BAs: • Subject to HIPAA provisions • Directly liable for HIPAA violations • BA must have BAA with every subcontractor • Subcontractor must have BAA with its subcontractors, who are also BAs 8/6/13HealthCareToo,LLCProprietary 20
  • 21. Agency • Covered Entities can be held liable for the violations caused by their Business Associates. • Business Associates can be held liable for the violations caused by their sub-contractors. • Federal common law of Agency will govern whether an agency relationship exists between the parties - regardless of what the contract actually says. (WEDI presentation by Joseph R. McClure, Esq. Legal Counsel, Siemens Medical Solutions USA WEDI Privacy & Security Co-Chair) 8/6/13HealthCareToo,LLCProprietary 21
  • 22. Your PHI Ecosystem is Explicit 8/6/13HealthCareToo,LLCProprietary 22
  • 23. 8/6/13HealthCareToo,LLCProprietary WEDI Privacy & Security Workgroup, Business Associate Sub-Workgroup 23
  • 24. 8/6/13HealthCareToo,LLCProprietary WEDI Privacy & Security Workgroup, Business Associate Sub-Workgroup 24
  • 25. Typical BA Functions (Again) • Claims processing or administration • Data analysis, processing or administration • Utilization review • Quality assurance billing • Benefit management • Practice management • Repricing 8/6/13HealthCareToo,LLCProprietary • Legal • Actuarial • Accounting • Consulting • Data aggregation • Management • Administrative • Accreditation • Financial 25
  • 26. Business Associates Must: 1. Comply with the HIPAA Security Rule 2. Report to Covered Entity any breach of unsecured PHI 3. Enter into BAAs with subcontractors imposing the same obligations that apply to the Business Associate 4. Comply with the HIPAA Privacy Rule to the extent Business Associate is carrying out a Covered Entity’s Privacy Rule obligations 8/6/13HealthCareToo,LLCProprietary (WEDI presentation by Joseph R. McClure, Esq. Legal Counsel, Siemens Medical Solutions USA WEDI Privacy & Security Co-Chair) 26
  • 27. Leon Rodriguez “I am the first Director of the Office of Civil Rights to come to the Office with experience, extensive experience, both in law enforcement and a healthcare provider lawyer and its my commitment to ramp up the enforcement of the Office.” 8/6/13HealthCareToo,LLCProprietary Oral Testimony to Senate Judiciary Subcommittee on Privacy, Technology, and Law “Your Health and Your Privacy: Protecting Health Information in a Digital World.”, Nov 2, 2011. 27
  • 28. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 28
  • 30. Protected Health Information (PHI) 8/6/13HealthCareToo,LLCProprietary Individually identifiable Health Information List of 18 Identifiers • Names • All geographic subdivisions smaller than state • All elements of dates except year • Phone numbers • Fax numbers • Electronic mail addresses • Social Security numbers • Medical record numbers • Health plan beneficiary numbers • Account numbers • Certificate/license numbers • Vehicle identifiers and serial numbers • Device identifiers and serial numbers; • Web Universal Resource Locators (URLs); • Internet Protocol (IP) address numbers; • Biometric identifiers • Full face photographic images • Any other unique identifying number Health information means any information, including genetic information, whether oral or recorded in any form or medium, that: (1) Is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and (2) Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual. 30
  • 31. Breach Unauthorized acquisition, access, use or disclosure that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. 8/6/13HealthCareToo,LLCProprietary 31
  • 32. Four-Factor PHI Breach Assessment 1. Nature and extent of PHI involved 2. Unauthorized person who used PHI or to whom disclosure was made 3. Whether PHI was actually acquired or viewed 4. Extent to which risk to PHI has been mitigated 8/6/13HealthCareToo,LLCProprietary “Guilty until proven innocent” Breach is now presumed 32
  • 33. Breach Notification Less Than 500 Patient Records 500+ Patient Records Individual notifications must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach Notify HHS on an annual basis. Individual notifications must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach Notify the Secretary without unreasonable delay and in no case later than 60 days following a breach. Provide notice to prominent media outlets serving the State or jurisdiction 8/6/13HealthCareToo,LLCProprietary HHS provides “safe harbor” for PHI that is encrypted or properly disposed of in keeping with early guidance. Note: When you notify of a breach, you are self-reporting a HIPAA violation and should make your counsel aware as well as conduct a new risk analysis with corrective actions. 33
  • 34. 8/6/13HealthCareToo,LLCProprietary Breach Discovered Risk Assessment 1. Nature and extent of PHI involved 2. Unauthorized person who used PHI or to whom disclosure was made 3. Whether PHI was actually acquired or viewed 4. Extent to which risk to PHI has been mitigated Document & Done No Breach Less Than 500? Notify Individuals Notify HHS Annually Notify Individuals Notify HHS w/i 60 days Notify Media Breach Yes No 34
  • 35. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 35
  • 36. Where? • Privacy Rule applies to any form of PHI • It’s about disclosures • Security Rule applies to electronic forms of PHI • Desktop • Laptop • Tablet Computer • Smart Phone • Cloud • USB “thumb drive” • CD / DVD • Floppy disk (if those even still exist) • …. 8/6/13HealthCareToo,LLCProprietary 36
  • 37. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 37
  • 38. Privacy Rule Privacy Rule Covered Entity • Marketing & Fundraising • Sale of protected health information (PHI) • Right to request restrictions • Electronic access for patient • Delegates • Genetic info for underwriting prohibited • Immunization records with parent approval • Decedent PHI protected for 50 years Business Associate BAA at least as strict as CE Subcontractor BAA at least as strict as BA 8/6/13HealthCareToo,LLCProprietary 38
  • 39. Security Rule: Phys Safeguards Required Addressable Workstation Use (R) Workstation Security (R) Disposal (R) Media Re-use (R) Contingency Operations (A) Facility Security Plan (A) Access Control and Validation Procedures (A) Maintenance Records (A) Accountability (A) Data Backup and Storage (A) 8/6/13HealthCareToo,LLCProprietary 39 Applies to: Covered Entity, Business Associates, and Subcontractors
  • 40. Security Rule: Admin Safeguards Required Addressable Risk Analysis (R) Risk Management (R) Sanction Policy (R) Information System Activity Review (R) Assigned Security Responsibility (R) Isolating Health Care Clearinghouse Function (R) Response and Reporting (R) Data Backup Plan (R) Disaster Recovery Plan (R) Emergency Mode Operation Plan (R) Evaluation (R) Written Contract or Other Arrangement (R) Authorization and/or Supervision (A) Workforce Clearance Procedure (A) Termination Procedures (A) Access Authorization (A) Access Establishment and Modification (A) Security Reminders (A) Protection from Malicious Software (A) Log-in Monitoring (A) Password Management (A) Testing and Revision Procedure (A) Applications and Data Criticality Analysis (A) 8/6/13HealthCareToo,LLCProprietary 40 Applies to: Covered Entity, Business Associates, and Subcontractors
  • 41. Security Rule: Tech Safeguards Required Addressable Unique User Identification (R) Emergency Access Procedure (R) Audit Controls (R) Person or Entity Authentication (R) Automatic Logoff (A) Encryption and Decryption (A) Mechanism to Authenticate Electronic PHI (A) Integrity Controls (A) Encryption (A) 8/6/13HealthCareToo,LLCProprietary 41 Applies to: Covered Entity, Business Associates, and Subcontractors
  • 43. Fine Structure 8/6/13HealthCareToo,LLCProprietary Violation Category Per Violation Per Calendar Year Did Not Know $100 - $50,000 $1,500,000 Reasonable Cause $1,000 - $50,000 $1,500,000 Willful Neglect – Corrected $10,000 - $50,000 $1,500,000 Willful Neglect – Not Corrected $50,000 $1,500,000 43
  • 44. Last year we had a $1.5M settlement with BCBS TN that had 57 hard drives stolen from a storage facility. The citation that drove the penalty was NOT the breach. Rather, the penalty was applied because of the failure to implement appropriate administrative safeguards, not performing a risk assessment, and failure to implement access controls for physical safeguards. They could have turned that storage facility into Fort Knox, and it might have still been breached. But the problem was they didn’t implement any preventive policies or procedures or appropriate administrative or physical safeguards. This is a great example of the lack of ongoing attention to compliance. 8/6/13HealthCareToo,LLCProprietary HIPAA in a HITECH World: HIPAA Violations on the Rise, According to Director of OCR Posted on March 22, 2013 by April Sage Leon Rodriguez, Director Office for Civil Rights 44
  • 45. Another Real Life Example Breach of less than 500 patients' PHI • Hospice of North Idaho fined $50,000 • Unencrypted laptop was stolen from an employee's car. • OCR found that HONI (1) did not conduct a risk analysis to safeguard ePHI and (2) did not have policies/procedures in place to address mobile device security. 8/6/13HealthCareToo,LLCProprietary 45
  • 46. HIPAA Omnibus • History / Definitions • Omnibus – Major Changes • When • Who • What • Where • How • Why • Question / Answers 8/6/13HealthCareToo,LLCProprietary 46
  • 47. Patient Rights over PHI What it says What it means In this final rule, we strengthen an individual’s right to receive an electronic copy of his or her protected health information. The final rule requires that a covered health care provider agree in most cases to an individual’s request to restrict disclosure to a health plan of the individual’s protected health information that pertains to a health care service for which the individual has paid the health care provider in full out of pocket. If you use an EHR, you must provide an e-copy of PHI to patients upon request, within timeframe and costs of Final Rule. Patients may pay for treatment and ask provider to withhold PHI from insurer. 8/6/13HealthCareToo,LLCProprietary 47
  • 48. Greater Use of Health Information Technology 8/6/13HealthCareToo,LLCProprietary 48
  • 49. Street Value of Medical Records A thief downloading and stealing data can get $50 on the street for a medical identification number compared to just $1 for a Social Security number. For those receiving the medical ID number and using it to defraud a health care organization, the average payout is more than $20,000,” according to Pam Dixon, executive director of the World Privacy Forum. "Compare that to just $2,000 for the average payout for regular ID theft. 8/6/13HealthCareToo,LLCProprietary “Protected Health Information (PHI): High Value to Hackers: Medical Facilities at Risk”, http://www.prweb.com/releases/2013/2/prweb10412883.htm 49
  • 50. Resources • Jan 17, 2013 New Release on Omnibus http://www.hhs.gov/news/press/2013pres/01/20130117 b.html • Poyner Spruill Summary of HIPAA Omnibus http://www.poynerspruill.com/publications/Pages/sum maryofNewHIPAARules.aspx • Health Information Privacy http://www.hhs.gov/ocr/privacy/hipaa/understanding/in dex.html • Enforcement Examples http://www.hhs.gov/ocr/privacy/hipaa/enforcement/exa mples/index.html • HHS “Wall of Shame” http://www.hhs.gov/ocr/privacy/hipaa/administrative/br eachnotificationrule/breachtool.html 8/6/13HealthCareToo,LLCProprietary 50