Importance of the Information Risk Assessment. Compliance Programs are intended to proactively audit and assess an organization’s operations to detect.

Slides:



Advertisements
Similar presentations
The HIPAA Privacy Rule And Its Impact On Agents And Employers National Association of Health Underwriters Capitol Conference March 23, 2003 Joseph T. Holahan,
Advertisements

The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Steps to Compliance: Managing Business Associates PRESENTED BY.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
NAU HIPAA Awareness Training
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
HIPAA Privacy of Health Information Claudia Allen, Esq. General Counsel HealthBridge.
What You Don’t Know Can Cost You HIPAA in a HITECH World Alaina N. Crislip, Esq. October 10, 2013.
Business Associate Contracts: Time Is Running Out... Rebecca L. Williams, RN, JD Partner Davis Wright Tremaine LLP Seattle, WA
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA and HITECH The Latest Developments Presented By: Michele Madison Partner, Healthcare Practice Morris, Manning & Martin, LLP
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Advanced Issues in Privacy: Drafting and Negotiating Business Associate Contracts Thomas E. Jeffry, Jr. Partner Davis Wright Tremaine LLP Los Angeles,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
The American Recovery and Reinvestment Act of 2009: Changes to HIPAA Privacy and Security Requirements And its Impact on Hospitals Presented By: Michele.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
A Professional Corporation Stinson, Mag & Fizzell (402) Business Associates 101 Jennifer Wolfe Jerram, B.S.N., J.D.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Privacy Rule Implementation Status Report Richard M. Campanelli, J.D. Director, Office for Civil Rights Before the The Tenth National HIPAA Summit.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
Enforcement, Business Associates and Breach Notification. Oh my!
HIPAA Administrative Simplification
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
Business Associate Contracts: Time Is Running Out . . .
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

Importance of the Information Risk Assessment

Compliance Programs are intended to proactively audit and assess an organization’s operations to detect and prevent improper or illegal activities. Effective Compliance Programs can support mitigation of fines and penalties, but it must be effective within the organization

HIPAA requires organizations that handle protected health information to regularly review: administrative, physical; and technical safeguards they have in place to protect the security of the information

On March 28, 2014, a new security risk assessment (SRA) tool to help guide health care providers in small to medium sized offices conduct risk assessments of their organizations was made available from HHS. assessment

The scope of risk analysis that the Security Rule encompasses includes the potential risks and vulnerabilities to the confidentiality, availability and integrity of all e-PHI that an organization creates, receives, maintains, or transmits. (45 C.F.R. § (a)

Administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information

 Security Management Process  Assigned Security Responsibility  Workforce Security  Information Access Management  Security Awareness and Training  Security Incident Procedures  Contingency Plan Evaluation  Business Associate Contracts and Other Arrangements

physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion

 Facility Access Controls  Device and Media Controls  Workstation Use  Workstation Security

the technology and the policy and procedures for its use that protect electronic protected health information and control access to it

 Access Control  Audit Controls  Integrity  Person or Entity Authentication  Transmission Security

Business Associates Security Breach Notification

Certain entities now explicitly included in definition of “business associate” ◦ Health Information Organizations, E-prescribing Gateways and other persons that provide data transmission services to a covered entity that require access on a routine basis to PHI ◦ Patient Safety Organizations ◦ Any person offering PHRs on behalf of a covered entity Data transmission organization that acts as a mere conduit for the transport of PHI and does not access PHI other than on a random or infrequent basis is NOT a business associate (transient vs. persistent analysis) Subcontractors of BAs are considered BAs if they handle PHI 13

A “subcontractor” is any person to whom BA delegates a function, activity or service, other than as a member of BA’s workforce Subcontractor is a BA if it creates, receives, maintains or transmits PHI on behalf of a business associate Person who receives or accesses PHI to assist BA with BA’s own management and administration or legal responsibilities is not a subcontractor and therefore not a BA ◦ But BA must obtain “reasonable assurances” Status as business associate flows “down the chain” 14

Comply with applicable requirements of Security Rule Provide security breach notification to CE Use and disclose PHI only as permitted by BA Agreement Not use or disclose PHI in a way that would violate the HIPAA Privacy Rule if done by covered entity (subject to narrow exceptions) Execute BA Agreements with subcontractors that create, receive or maintain PHI on BA’s behalf If subcontractor engages in pattern or practice in material breach of its BA Agreement, take reasonable steps to cure breach or terminate if feasible Use reasonable efforts to limit PHI to minimum necessary Disclose PHI ◦ To covered entity, individual or individual’s designee when required to provide electronic copy of PHI ◦ To Secretary of HHS when required Provide accounting of disclosures 15

New elements ◦ BA must comply with applicable provisions of Security Rule ◦ BA must report any use or disclosure not in compliance with agreement (existing requirement), specifically including breaches of unsecured PHI ◦ BA must ensure that any subcontractor that creates, receives or maintains PHI on its behalf enters into BA Agreement ◦ To the extent BA is to carry out CE’s obligations under Privacy Rule, BA must comply with requirements of Privacy Rule that apply to CE in performing obligations Compliance deadlines ◦ BA Agreements must comply by 9/23/13 unless grandfathered ◦ Grandfathered agreements:  If prior to 1/25/13, had BA or subcontractor agreement in place that was compliant with pre-HITECH standards, and agreement not renewed or modified between 3/26/13 and 9/23/13, agreement is deemed compliant until earlier of (i) renewed or modified or (ii) 9/22/14  Automatic or “evergreen” renewal does not end deemed compliance period 16

Breach Notification 17

 Security provisions of HIPAA now apply to a Business Associate of a Covered Entity in the same manner that such sections apply to the Covered Entity.  Business associates subject to same penalties as Covered Entities  Also applies to vendors of personal health records Security and Notice Requirements 18

Security and Notice Requirements Applies to any Covered Entity or BA/vendor that:  Accesses, maintains, retains, modifies, records, stores, destroys or otherwise holds, uses, or discloses unsecured protected health information  Applies directly to vendors, regardless of whether a business associated agreement is executed 19

Security and Notice Requirements  Unsecured Protected Health Information means (Section 13402(h)) ◦ protected health information that is not secured through the use of a technology or methodology specified by the Secretary in the guidance issued under this section 20

Security and Notice Requirements  Obligation to notify triggers upon discovery of a breach ◦ Discovery determined to be the first day on which such breach is known or should reasonably have been known to such entity or associate to have occurred ◦ Knowledge by any person that is an employee, officer or other agent of the entity or associate 21

Security and Notice Requirements  Notice to Individual must include: ◦ Identification of each individual whose unsecured protected health information has been, or is reasonably believed to have been accessed, acquired, or disclosed during such breach ◦ Brief description of what happened, including the date of the breach and the date of discovery of the breach ◦ Description of the types of unsecured protected health information that were involved 22

Security and Notice Requirements Steps the individual should take to protect themselves from potential harm resulting from the breach Description of what the covered entity involved is doing to investigate the breach, to mitigate losses, and to protect against any further breaches Contact procedures for individuals to ask question or learn additional information

Security and Notice Requirements  Notice to the Secretary by Covered Entities:  For breaches impacting 500 or more individuals, notify the Secretary immediately  For breaches impacting fewer than 500 individuals, maintain a log and notify the Secretary annually submit such log 24

Security and Notice Requirements Notice Process  Notice Timing:  Notice must be made without unreasonable delay and in no case later than 60 calendar days after discovery of a breach  Delay allowed if a law enforcement official determines that a notification, notice or posting would impede a criminal investigation or cause damage to national security  Methods of Notice:  Written notification by first class mail to individual  Substitute notice process for insufficient or out of date contact information  Media notice information for 500 individuals or more 25

“Safe Harbor”  Safe Harbor from Notification Requirement is to ensure the data is maintained in a “secure” manner.  June Requested comments on the proposed form of “secure” data. ◦ Encryption ◦ De-Identification 26

 Of the 90,000 complaints investigated most are, compiled cumulatively, in order of frequency:  Impermissible uses and disclosures of protected health information;  Lack of safeguards of protected health information;  Lack of patient access to their protected health information;  Uses or disclosures of more than the minimum necessary protected health information; and  Lack of administrative safeguards of electronic protected health information. 28

The most common types of covered entities that have been required to take corrective action to achieve voluntary compliance are, in order of frequency:  PRIVATE PRACTICES;  General Hospitals;  Outpatient Facilities;  Health Plans (group health plans and health insurance issuers); and,  Pharmacies. 29

 $800,000 HIPAA Settlement in Medical Records Dumping Case - June 23, 2014 $800,000 HIPAA Settlement in Medical Records Dumping Case  Data Breach Results in $4.8 Million HIPAA Settlements - May 7, 2014 Data Breach Results in $4.8 Million HIPAA Settlements  Concentra Settles HIPAA Case for $1,725,220 - April 22, 2014 Concentra Settles HIPAA Case for $1,725,220

 QCA Settles HIPAA Case for $250,000 – April 22, 2014 QCA Settles HIPAA Case for $250,000  County Government Settles Potential HIPAA Violations - March 7, 2014 County Government Settles Potential HIPAA Violations

Adult & Pediatric Dermatology, P.C., of Concord, Massachusetts (APDerm) -$150, Affinity Health Plan, Inc. will settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules for $1,215,780. WellPoint Inc. has agreed to pay the U.S. Department of Health and Human Services $1.7 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules 32

33 Michele Madison, Partner, Morris, Manning & Martin, LLP Healthcare & Healthcare IT Practices Direct:

 The materials and information presented and contained within this document are provided by MMM as general information only, and do not, and are not intended to constitute legal advice.  Any opinions expressed within this document are solely the opinion of the individual author(s) and may not reflect the opinions of MMM, individual attorneys, or personnel, or the opinions of MMM clients.  The materials and information are for the sole use of their recipient and should not be distributed or repurposed without the approval of the individual author(s) and Morris, Manning & Martin LLP.  This document is Copyright ©2011 Morris, Manning & Martin, LLP. All Rights Reserved worldwide. 34