Karen D. Smith, Esq. Partner Bricker & Eckler LLP 100 S. Third Street Columbus, OH 43215 (614) 227-2313.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
ITEC 6324 Health Insurance Portability and Accountability (HIPAA) Act of 1996 Instructor: Dr. E. Crowley Name: Victor Wong Date: 2 Sept
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
UTHSC IRB Donna Hollaway, RN, CCRC 11/30/2011 Authority to Audit 45 CFR (e) An IRB shall conduct continuing review of research covered by this.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Internal Auditing and Outsourcing
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
IT’S OFFICIAL: GOVERNMENT AUDITING OF SECURITY RULE COMPLIANCE Nancy Davis, MS, RHIA Director of Privacy/Security Officer, Ministry Health Care & Catherine.
Privacy and Security Tiger Team Subgroup Discussion: MU3 RFC July 29, 2013.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
The Implementation of HIPAA Joan M. Kiel, Ph.D., C.H.P.S. Duquesne University Pittsburgh, Pennsylvania.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Marcia Gonzales, JD Compliance Officer & Privacy Officer
Encounter Data Validation: Review and Project Update August 25, 2015 Presenters: Amy Kearney, BA Director, Research and Analysis Team Thomas Miller, MA.
What to Expect and How to Prepare: Healthcare Security & Privacy Regulation and Enforcement in 2015 and Beyond.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Eliza de Guzman HTM 520 Health Information Exchange.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Problem Areas Updates Penalties FRCC Compliance Workshop September / October
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Copyright © Emerson Strategic Group, Inc. All Rights Reserved 1 Ninth National HIPAA Summit Auditing for Privacy Compliance: A Case Study September.
Health Big Data Discussion Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair June 8, 2015.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
How to Survive a HIPAA Audit Compliance Counsel February 2014.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
1 Auditing Your Fusion Center Privacy Policy. 22 Recommendations to the program resulting in improvements Updates to privacy documentation Informal discussions.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Rational HIPAA Woes for the CFO and Business Leaders
HIPAA CONFIDENTIALITY
By: Eamon Callahan and Wilston Johnston
Countdown to Compliance
Concerns of a Privacy Advocate – and How to Respond
HIPAA Security Standards Final Rule
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Karen D. Smith, Esq. Partner Bricker & Eckler LLP 100 S. Third Street Columbus, OH (614)

 HITECH Background  Phase 1 review  Phase 2 preview  Recommendations 2

 Increased enforcement under HITECH  Increased penalties  State AG enforcement  Public records of breach notifications  BAs directly subject to penalties  HHS audits Background 3

 HITECH Act requires HHS to conduct HIPAA audits (42 USC §17490)  “The Secretary shall provide for periodic audits to ensure that covered entities and business associates that are subject to the requirements of this subtitle and subparts C and E of part 164 of title 45, Code of Federal Regulations, as such provisions are in effect as of the date of enactment of this Act, comply with such requirements.” Background 4

 OCR sought a comprehensive and flexible process for analyzing entity efforts to provide regulatory protections and individual rights  Identify  (1) best practices and  (2) uncover risks  not identified through other enforcement tools  Encourage consistent attention to compliance activities 5

 115 performance audits conducted through December 2012  Initial 20 audits to test original audit protocol  Final 95 audits using modified audit protocol Phase 1 6

 For every finding cited in the audit reports, audit identified a “cause”  Most common across all entities: entity unaware of requirement.  30% (289 of 980 findings) 39% (115 of 293) of Privacy 27% (163 of 593) of Security 12% (11) of Breach Notification  Most of these related to elements of the Rules that stated what a covered entity had to do to comply  Other causes, included but not limited to:  Lack of application of sufficient resources  Incomplete implementation  Complete disregard 7

 Privacy  notice of privacy practices  access of individuals  minimum necessary  authorizations  Security  risk analysis  media movement and disposal  audit controls and monitoring Phase 1 Cause Analysis: Top Elements 8

 Implement a risk-based approach  would allow OCR to determine areas of the Rules that require implementation of controls, which, if not implemented effectively, would pose the greatest risk to the protection of PHI  OCR should consider a multi-tiered audit approach that can be tailored based on entity type, area or a hybrid Phase 1 9

 Any covered entity  Health plans of all types  Health care clearinghouses  Individual and organizational providers of all sizes  Any business associate  Selection through covered entities’ identification of their business associates Phase 2 10

 Have selected a pool of covered entities eligible for audit  Used resources developed through Booz Allen Hamilton contract  Health care providers selected through NPI database  Clearinghouses & Health Plans from external databases (e.g., AHIP)  Random selection used when possible within types  Wide range (e.g., group health plans, physicians and group practices, behavioral health, dental, hospitals, laboratories) Phase 2 11

 Available entity databases lack data for entity stratification  Survey currently being processed through Paperwork Reduction Act clearance  Questions address  size measures  location  services  best contacts  OCR will conduct address verification with entities this spring  Entities will receive link to online screening “pre-survey” this summer; Expect to contact entities  OCR will use results of survey to select a projected 350 covered entities to audit Phase 2 12

 Primarily internally staffed  Selected entities will receive notification and data requests in fall 2014  Entities will be asked to identify their business associates and provide their current contact information  Will select business associate audit subjects for 2015 first wave from among the BAs identified by covered entities  Desk audits of selected provisions  Comprehensive on-site audits as resources allow Phase 2 13

PeriodActivity Spring 2014CE address verification Summer 2014Pre-audit surveys link sent to covered entity pool Fall 2014Notification and data request letters to selected entities Two weeksPeriod for entity response October June 2015 CE audit reviews 2015Business associate audits Phase 2 14

 Data request will specify:  content and file organization  file names  any other document submission requirements  Requested data will only be assessed if it is submitted on time  Documentation must be current as of request date Phase 2 15

 Documents must accurately reflect the program  Auditors will NOT have the opportunity to contact the entity for clarifications, or to seek out additional information  Do not submit extraneous information: OCR says it may increase difficulty for auditor to find and assess required items  Failing to respond to requests may lead to referral for regional compliance review Phase 2 16

 Very little detail provided by HHS  “Comprehensive on-site audits as resources allow”  Interviews with key personnel  Observations of processes and operations  3-10 days (in round 1)  Length of audit depends on complexity of CE Phase 2 17

 Auditors will assess entity efforts via an updated protocol  New criteria will reflect the omnibus rule changes, more specific test procedures  Sampling methodology will be used in many provisions to assess compliance efforts  Provisions that resulted in a high quantity of compliance failures in the pilot audits will be targeted through the desk audits  The website will include the updated protocol for the entities’ use Phase 2 18

2014  Covered Entities  Security: Risk analysis and risk management  Breach: Content and timeliness of notifications  Privacy: Notice and access Phase 2 19

2015  Round 1: Business Associates  Security: Risk analysis and risk management  Breach: Breach reporting to CE  Round 2: Covered Entities (Projected)  Security: Device and media controls, transmission security  Privacy: Safeguards, training Phase 2 20

2016  Projected  Security: Encryption and decryption Facility access control (physical) Other areas of high risk as identified by 2014 audits, breach reports and complaints Phase 2 21

 Risk Analysis  Review most recent Risk Analysis  Consider conducting new Risk Analysis  Consider obtaining third-party review of Risk Analysis  Business Associates  Review and update BA list  Review template BAA  Amend BAAs for Omnibus Rule compliance by Sept. 23  Engage BAs in dialogue on compliance (e.g., BAs should conduct own risk analyses) Phase 2 22

 Breach Documentation  Review breach log  Review template notice and timeliness of past notices  Review files associated with breaches  Per OCR, files should include: Documentation of root cause of breach Documentation of compliance gap resulting in breach Documentation that root cause was addressed Phase 2 23

 Notice of Privacy Practices  Review for Omnibus Rule compliance  Confirm distribution/posting requirements are being met  Patient Access  Review policy and procedure  Review related documentation  Security Rule  Review policies and procedures on transmission security, devices (focus on mobile devices), and facility access control  OCR recommends reviewing mobile device policy “at least annually” Phase 2 24

 Policies and Procedures  Review policies against current OCR protocol (and new protocol once available)  Confirm that Omnibus Rule changes have been incorporated as applicable  Supporting Documentation  Confirm that documentation required by policies is actually being kept on file  Review documentation against current OCR protocol (and new protocol once available) Phase 2 25

 Audits  Conduct self audit  Obtain third party mock audit  Training  Review and update training program as necessary  Review documentation of training  Provide annual training and remedial training Phase 2 26

27