Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN 678.640.4752.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
SCHIE Mission To improve the quality and efficiency of health care for all stakeholders in the Santa Cruz community. To deliver technology assistance,
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Privacy Rule Training
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Are you ready for HIPPO??? Welcome to HIPAA
Understanding Meaningful Use Presented by: Allison Bryan MS, CHES December 7, 2012 Purdue Research Foundation 2012 Review of Stage 1 and Stage 2.
To improve the quality and efficiency of health care for all stakeholders in the Santa Cruz community. To deliver technology assistance, guidance and.
1 Electronic Transactions and Code Sets Enforcement CMS Office of HIPAA Standards.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
HIPAA COMPLIANCE FANTASTIC FOUR CASEY FORD MANINDER SINGH RANGER OLSOM Information Security in Real Business.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
IT’S OFFICIAL: GOVERNMENT AUDITING OF SECURITY RULE COMPLIANCE Nancy Davis, MS, RHIA Director of Privacy/Security Officer, Ministry Health Care & Catherine.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
The PRISM Privacy Tool: A User’s Guide PHDSC Home Page  PRISM Web Page 
Meaningful Use Security Risk Assessment (SRA): Resources for Eligible Professionals (EPs) Kim Bell, MHA, FACHE, PCMH-CCE Executive Director Georgia Health.
Meaningful Use Security Risk Analysis Passing Your Audit.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
1 Meaningful Use Audits Sarah McIntee, Esq. David Main, Esq. Health TechNet Luncheon May 16, 2014.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
1 PARCC Data Privacy & Security Policy December 2013.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
HIPAA Privacy Rule Training
Community Health Center Security Risk Management
Health Insurance Portability and Accountability Act of 1996
In-depth look at the security risk analysis
2015 Orientation to HIPAA Privacy Rule Compliance
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
Health Care: Privacy in a Digital Age
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Presentation transcript:

Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN

Overview  Why is the Security Risk Assessment (SRA) needed?  Introduction of the CMS/OCR SRA Tool  How do you use the Tool?  Review of Pros and Cons of Utilizing Tool  Q&A

Why is the SRA Needed?  Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities conduct a risk assessment of their healthcare organization  Conducting a security risk assessment is a core requirement for providers seeking payment through the Medicare and Medicaid EHR Incentive Program, commonly known as the Meaningful Use Program

Why is the SRA Needed?  A risk assessment helps your organization ensure it is compliant with HIPAA’s administrative, physical, and technical safeguards  A risk assessment also helps reveal areas where your organization’s protected health information (PHI) could be at risk

Introduction to Tool  Result of a collaborative effort by the HHS Office of the National Coordinator for Health Information Technology (ONC) and Office for Civil Rights (OCR).  Designed to help practices conduct and document a risk assessment in a  Thorough, organized fashion at their own pace  Facilitating assessment of information security risks in your organization under the HIPAA Security Rule.  The application, available for downloading at  Also produces a report that can be provided to auditors.

Disclaimer The Security Risk Assessment Tool at HealthIT.gov is provided for informational purposes only. Use of this tool is neither required by nor guarantees compliance with federal, state or local laws. Please note that the information presented may not be applicable or appropriate for all health care providers and organizations. The Security Risk Assessment Tool is not intended to be an exhaustive or definitive source on safeguarding health information from privacy and security risks. For more information about the HIPAA Privacy and Security Rules, please visit the HHS Office of Civil Rights the HHS Office for Civil Rights Health Information Privacy website.

Introduction to Tool  Downloading the SRA Tool (Windows version) To download the SRA Tool, navigate to ONC’s website at:

Introduction to Tool  Next, select the blue button located within the Security Risk Assessment Tool” box.

Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing  Once you select the button, you will be directed to the Security Risk Assessment Tool page  Navigate to the right side of the page to begin downloading the Windows version of the tool

Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing  While your downloading experience may vary depending upon the internet browser you are using, all browsers should allow you to save the file on your desktop computer or laptop  Once prompted, select the arrow symbol next to the “Save” option

Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing  From the menu options, select “Save As” then select the folder location where you would like to store your application  Finally, select the “Save” button  Once you have downloaded the application  Double-click the icon and select “run” when prompted  The SRA Tool will open Introduction to Tool

Demonstration – Using the Tool Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing

Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is:  A Security Risk Assessment Tool  Use of the Tool can support an organization’s risk assessment process  Supports identification of conditions where Electronic Protected Health Information (ePHI) could be disclosed without proper authorization, improperly modified, or made unavailable when needed  Responses to the questions in the SRA Tool can be used to help organizations identify areas where security controls designed to protect ePHI may need to be implemented or where existing implementations may need to be improved

Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is:  Single User  Downloadable to desktop  Recommended for small to medium size offices  Easy to use

Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is Not:  A Multi-User Tool - Not a collaborative multi-user tool to be used simultaneously by any users -Single user at any one time with appropriate permissions to install and run the application on the desktop will use the tool to individually capture information -However, multiple users may access the tool on separate occasions.

Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is Not:  A Compliance Tool  The SRA Tool does not produce a statement of compliance  Use the SRA Tool in coordination with other tools and processes to support HIPAA Security Rule – Risk Analysis compliance and risk management activities  Statements of compliance are the responsibility of the covered entity and the HIPAA Security Rule regulatory and enforcement authority  Please note that the SRA Tool does not cover additional Security Rule requirements  Does not provide mitigation or mitigation plan w/dates, or Policies & Procedures

Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is Not:  A HIPAA Privacy Rule Tool  The SRA Tool provides guidance in understanding the requirements of the HIPAA Security Rule – Risk Analysis specifically  Does not include provisions for the HIPAA Privacy Rule  Downloadable on Windows 8

Resources GA-HITEC CMS Incentive Programs GA Medicaid Incentive Program

Q & A Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN