HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health information security & compliance
Health Insurance Portability & Accountability Act (HIPAA)
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
2015 User Conference HIPAA and Patient Safety: Why It Matters April 24, 2015 (GEN-AO1) Presented by: Susan J. Kressly, MD, FAAP Medical Director, Office.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
How to Survive a HIPAA Audit Compliance Counsel February 2014.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HIPAA Yesterday, Today and Tomorrow? Dianne S. Faup Office of HIPAA Standards Centers for Medicare & Medicaid Services.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
Privacy & Information Security Basics
In-depth look at the security risk analysis
HIPAA Administrative Simplification
Privacy Notice - Requirements
Disability Services Agencies Briefing On HIPAA
HITECH’s Impact on Research
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.

HIPAA Compliance Compliance is more than a Notice of Privacy Practices… Privacy Rule – Been there, done that, right? –Recent changes/proposed rule Security Rule – Been there? Done that? –Full risk analysis Breach Notification – Hope you don’t go there… –Missing addresses? Time to alert the media!

Privacy Rule: The Basics Notice of Privacy Practices –Updated? –Acknowledged? –Provided? Authorizations –HIPAA Compliant –Properly retained Policies –Updated? –Training? Business Associate Agreements –Organized, updated, appropriate?

Privacy Rule: Patient Rights Under HIPAA Inspect and copy PHI Request amendments of errors or incomplete information Obtain accounting of disclosures Obtain a list of persons who have accessed PHI electronically Request a restriction of uses/disclosures –HITECH change Receive confidential communications Receive Notice of Privacy Practices File written complaints 4

Changes to Privacy Rule: Accounting of disclosures Proposed Rule divides patient rights into: –(a) Individual’s rights to accounting of disclosures –(b) Individual’s right to an access report Disclosures would: –Be limited to designated record sets –Include business associates –Have an accounting period of 3 years –Specifically list types of disclosures 5

Changes to Privacy Rule: Business Associates Business Associates are now directly subject to HIPAA Are you a business associate? Are you in compliance with HIPAA?

Security Rule Safeguards: How they Apply Security Rule –Administrative Safeguards – who can access? –Physical Safeguards – how can access be physically prevented? –Technical Safeguards – what programs protect access? Required v. Addressable Conducting a Risk Analysis Documenting the Risk Analysis

Security Safeguards 45 CFR Part 164 – Generally requires ensuring confidentiality, integrity and availability of PHI, and protections against reasonably anticipated threats, unauthorized uses, etc. Applicable to covered entities, business associates, others (via grant or contract) Safeguards Example: –Standard (Security management process) –Implementation Specifications Risk analysis (required) Risk management (required) Sanction policy (required) Information system activity review (required)

Flexibility of Approach Required v. Addressable –If something is required, all covered entities must implement –If something is addressable, covered entity must: Assess whether it is a reasonable and appropriate safeguard Implement if reasonable and appropriate If not reasonable and appropriate: –Document why; and –Implement alternative if available, reasonable and appropriate Review and revise as necessary May want to use for paper PHI as well, but not required

Flexibility of Approach In determining what is reasonable and appropriate, must look at: –Size, complexity and capabilities –Technical infrastructure, hardware and software –Costs of security measures –Probability and criticality of potential risks –Likely contribution to protecting the ePHI Important to reassess as organization changes –Growth –Changes in focus –Changes in technology –Changes in information stored

Risk Analysis: Recent Guidance Office for Civil Rights posted guidance pursuant to HITECH requirement on July 14, 2010 First in a series of guidance to implement Security Rule safeguards Some NIST recommendations incorporated Not required to follow, but need to document why not –May have already conducted a risk analysis in different format –May not be appropriate for your organization

Risk Analysis (Required) (a)(1)(ii)(A): –Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity and availability of electronic protected health information held by the organization. What is “accurate”? What is “thorough”? All potential risks? ePHI “held by the organization”

Where to start? Get the right people involved: –Management –IT –HR –Medical records personnel –EHR experts Identify the ePHI in your client’s organization*: –EHR program – s –Documents (word, excel, etc.) –Databases –Metadata *mentioned in OCR guidance

What next? Identify where ePHI is generated: –Internally –Externally – what are the external sources?* Inventory the equipment with ePHI: –Laptops –Desktops –Hard drives –Servers –Mobile devices –Copiers, faxes, scanners

What resources do we need? Gather the applicable documentation: –Security Rule –Organization Policies and Procedures –List of staff –Computer manuals & EHR instructions –IT/Compliance budget information –Cost information for available technology –Information about alternatives –Old audit reports or information about risks* Human risks Natural/environmental risks Technical risks

Required Elements of Risk Analysis Scope of the Analysis Data Collection Identify and Document Potential Threats and Vulnerabilities Assess Current Security Measures Determine the Likelihood of Threat Occurrence Determine the Potential Impact of Threat Occurrence Determine the Level of Risk Finalize Documentation Periodic Review and Update

How to Document Risk Analysis Set up a template – many safeguards will consider the same information, same underlying documentation and same risks Make a list of all safeguards that you are already in compliance – these can be taken off the risk analysis list Make a list of all the remaining safeguards –If there are a lot, prioritize –If there are only a few consider benefit of implementation vs. performing risk analysis Make master list that indicates compliance and/or risk assessment

HIPAA Breach Notification Rule Interim Rule effective Sept. 23, 2009 Final Rule ready May 2010, but withdrawn from OMB review before published Interim Rule still in effect until Final Rule is published nrule/index.html 18

HIPAA Breach Notification Rule 19

HITECH Breach Reporting Only covers unsecured protected health information Written notification More than 500 affected requires notice to media Notice within 60 days of discovery Specific notice requirements Notice to HHS or annual log of breaches

What is a “breach”? Acquisition, access, use or disclosure of PHI in a manner not permitted under HIPAA, which compromises the security or privacy of the PHI. Only applies to “unsecured PHI”, such as unencrypted data on a laptop, etc.

Exceptions to Breach Secured PHI Unintentional, good faith acquisition, access or use by person working under authority of covered entity, if within scope of authority and no further use or disclosure. Disclosures within same entity, or between entity and business associate or OHCA, under same terms. Good faith belief that no information could have been retained.

Reporting is Required – How Do We Do It? Reporting Methods Written notification by first class mail, unless individual has agreed to electronic communication. Website or major media if insufficient contact info for more than 10 people. Media notification required if more than 500 affected. Reporting details Within 60 days of discovery of breach. Must include: –Brief description of breach including date of breach and date of discovery. –Description of PHI involved. –Steps individual should take to protect themselves. –Brief description of mitigation, investigation and protection measures taken by entity. –Contact info for questions, including toll-free phone, , website or address.

Web Resources for HIPAA DHHS Office of Civil Rights –Rules (Privacy, Security, Breach Notification) –FAQs and other informal guidance –Understanding HIPAA Privacy – Covered Entities –Enforcement Activities –Privacy Complaints –Proposed Rules: Google “Proposed HIPAA Regulations” – hhs.gov or other sources only Sign up for listserv: es/listserv.html es/listserv.html 24

Web Resources for HIPAA 25

DHHS New(er) Websites Health Data Privacy and Security Resources –Privacy policies, HIPAA, Privacy & Security Framework Office of the National Coordinator for HIT gov__home/ gov__home/1204 –HITECH, Funding, updates, Regulations 26

DHHS New(er) Websites 27

Questions? Carolyn Heyman-Layne Sedor, Wendlandt, Evans & Filippi, LLC (907)