Security. aspen advisors. An Often Overlooked Meaningful Use Requirement. July 2011
|
|
- Myrtle Benson
- 8 years ago
- Views:
Transcription
1 Security An Often Overlooked Meaningful Use Requirement July 2011 aspen advisors
2 Table of Contents Why Perform a Risk Analysis?... 1 How to Conduct a Risk Analysis?... 1 When to do a Risk Analysis?... 4 Conclusion... 4 i
3 During the first quarter of 2011 alone, there have been media reports of inappropriate access to electronic Personal Health Information (e-phi) of four sizeable healthcare organizations. This is damaging in terms of public relations, patient confidence, possible revenue loss, and increased costs to protect patients with exposed identifying details. It seems that many organizations are overlooking or delaying the need to perform a security risk assessment. Yet, under the Health Information Technology for Economic and Clinical Health Act (HITECH) enacted as part of the American Recovery and Reinvestment Act of 2009 (ARRA), one of the core Meaningful Use (MU) measures for both Eligible Professionals and Eligible Hospitals alike is the requirement for healthcare providers to Conduct or review a security risk analysis and implement security updates as necessary, and correct identified security deficiencies prior to or during the EHR reporting period to meet this measure. During the fi rst quarter of 2011 alone, there have been media reports of inappropriate access to e-phi of four sizeable healthcare organizations. This measure is, therefore, a key task healthcare providers must conduct before attesting to their ability to meet all Stage 1 requirements. Additionally, the risk analysis requirement in the HIPAA Security Rule is not only an integral part of meeting meaningful use for HITECH but also for being in compliance with the law. All e-phi created, received, maintained, or transmitted by an organization is subject to the Security Rule. The Security Rule requires entities to evaluate risks and vulnerabilities in their environments and to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of e-phi. Risk analysis is the first step in that process. This paper outlines the key steps required to achieve this important core Meaningful Use measure. Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications in the Security Rule. Therefore, a risk analysis is foundational for healthcare providers to obtain the HITECH subsidies offered by the federal government. Why Perform a Risk Analysis? Under the HIPAA Security Rule all e-phi created, received, maintained, or transmitted by a Covered Entity (CE) is subject to the Security Rule. If we assume that information technology powers modern healthcare, then it stores or disseminates most everything an entity might know about a patient. Thus e-phi security and privacy is fundamental and paramount. The Security Rule requires entities to evaluate risks and vulnerabilities in their technology environments and to implement reasonable and appropriate security measures to protect e-phi. The Office for Civil Rights (OCR), the security watchdog for the Department of Health and Human Services (HHS), in particular, is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule. The OCR is also the body responsible for ensuring CEs are complying with the intent of the security rule. From a compliance perspective then, it may seem especially wise to take heed to what the OCR is saying. In its first guidance released on July 14, 2010, the OCR states: A risk analysis is foundational, and must be understood in detail before OCR can issue meaningful guidance that specifically addresses safeguards and technologies that will best protect electronic health information. In short, an information technology risk analysis is the fundamental security cornerstone the Department of Health and Human Services expects covered entities to meet. An information technology risk analysis is the fundamental security cornerstone the Department of Health and Human Services expects covered entities to meet. How to Conduct a Risk Analysis? A risk analysis using a risk-based approach is the very foundation from which to build your information security compliance program. A security risk analysis 1
4 should be conducted with active participation of internal auditors, IT leadership, and IT subject matter experts. Many organizations look toward well experienced consultants that can lead the effort and efficiently drive to the desired outcome. The OCR suggests in its first guidance that a covered entity might use the NIST risk-based approach for doing a risk analysis: We note that some of the content contained in this guidance is based on recommendations of the National Institute of Standards and Technology (NIST). NIST, a federal agency, publishes freely available material in the public domain, including guidelines. Although only federal agencies are required to follow guidelines set by NIST, the guidelines represent the industry standard for good business practices with respect to standards for securing e-phi. Therefore, non-federal organizations may find their content valuable when developing and performing compliance activities. Of course other good risk frameworks exist, such as Control Objectives for Information Technology (COBIT developed by the Information Systems for Auditing and Control Association (ISACA), or Octave developed by the CERT Soft ware Engineering Institute at the Carnegie-Mellon University. These frameworks may be used, but with OCR s recommendation and the fact that the NIST guidance, as provided in its Special Publication is excellent, thorough, and easily tailored for small, medium, and large covered entities, we recommend using the NIST framework. With OCR s recommendation and the fact that the NIST guidance, as provided in its Special Publication is excellent, thorough, and easily tailored for small, medium, and large covered entities, we recommend using the NIST framework. Primary Steps for Security Risk Assessment NIST s risk assessment methodology encompasses nine primary steps outlined below. 1 System Characterization. To fully understand your technology risk, you must understand key technology components in your infrastructure. These could be applications, hardware, operating systems, laptops, and mobile devices (i.e., pretty much anything that receives, stores, or transmits information). 2 Threat Identification. Threats can be highly specific and discrete and will usually be based on threat motivation and capability. In general, however, threats can be divided into three types: Human threats created or instigated by human beings; Environmental threats caused by what insurance companies term Acts of God ; and Natural threats that arise from the inherent nature of information systems. 3 Vulnerability Identification. Your systems will be vulnerable to a wide range of these threats. Vulnerabilities can range from poor soft ware construction and poor design of back-up power to poor training on information security. However, much vulnerability is found within information systems. These could be described as vulnerabilities within applications, databases, networks, and combinations of these. 4 Controls Analysis. Controls analysis allows an organization to assess the capabilities of your existing set of controls to meet your environment s needs. It does this by helping you identify any existing policies and procedures or standards that may be in violation. Controls are typically described as one of three types: Preventative: lower the likelihood of the threat exercising the vulnerability; Mitigating: lower the impact should the threat exercise the vulnerability; or Detective: alert management that the threat has exercised the vulnerability. Thus controls will be either technology or process based and usually involve interactions among people. Since many controls safeguard against multiple vulnerabilities, it is usually easier to keep track of multiple instances of a control than to attempt to define and consolidate an underlying control. 2
5 5 Likelihood Determination. The risk assessment team should use their best judgment to assign likelihoods, considering the threat motivation and ability, the nature of the vulnerability, and current and planned controls. We suggest that a risk assessment methodology use three tiers to determine likelihood: High: The threat will successfully exercise the vulnerability more than once a year; Medium: The threat will successfully exercise the vulnerability less than once a year but more than once every three years; or Low: The threat will successfully exercise the vulnerability less than once every three years. The output of this step of the risk assessment process is a likelihood determination for each threat and vulnerability pair facing the system or systems undergoing the risk assessment. 6 Impact Analysis. In the absence of any historical data, the risk assessment team should use their best judgment to analyze that impact, considering for each system the effects of lost confidentiality, integrity, or availability, and the effect of any current or planned mitigating controls. For a recent client, we suggested a risk assessment methodology that uses three tiers to determine impact: High: The impact will cost more than 0.1% of covered entity revenue in financial outlays, require more than 400 man-hours to repair, endanger patient safety, or damage a covered entity s reputation for security; Medium: The threat will cost more than 0.01% of revenue in financial outlays or require more than 40 man-hours to repair; and Low: The threat will cost less than 0.01% of revenue or require less than 40 man hours to repair. 7 Risk Determination. Risk determination is a combination of the impact rating and the likelihood determination. We suggest a three tiered matrix to quickly make decisions. Response speed is critical when an incident occurs, and having a ready way to gauge risk is, therefore, instrumental. Likelihood Impact High Medium Low High High High Medium* Medium High Medium Low Low Medium Low Low The area marked with an asterisk (*) is potentially problematic; these are low likelihood, high impact events that are, by nature, difficult to predict. As part of the risk management process, the healthcare organization s compliance group, IT security committee, or the audit committee should review all risks assigned to this quadrant to determine if the risks have been appropriately ranked and if additional controls are needed. 8 Control Recommendations. Based on the determination of risk, your organization will need a roadmap for planning controls for future implementation. Through this process your management team can make fundamental decisions to either accept each risk as it stands or alleviate some of the risk by imposing additional controls. This is an especially useful exercise since it covers approvals, scheduling, and budgeting for additional control implementation. 9 Results Documentation. Finally, all of this effort must be documented. Compliance officers who have gone through frequent audits know the value of excellent documentation. This, therefore, is a must and should be considered the capstone of your work. A readily available, well written, and thoughtful document that describes your entire risk analysis process will go a long way to assuage any auditor. 3
6 When to do a Risk Analysis? To prepare for Meaningful Use attestation, it is recommended to conduct the security risk analysis at both the technical design and system build phase when implementing a new EHR system. Additionally, it will be important to update the risk analysis further on in the MU Roadmap approximately four months prior to go-live. As ongoing changes happen, new risk occurs. We recommend that large organizations conduct an annual review. Smaller organizations may only do this every two years, but in our judgment, the pace of information technology changes and requirements is so rapid that an annual assessment is necessary for most institutions. As an added value, the annual risk assessment becomes part of the compliance process; that is, the risk assessment can be merely updated as an addendum and not as an overbearing intrusion that competes with other organizational needs. A regular review of your risk posture is what is required to protect e-phi. Too many new threat vectors and vulnerabilities are introduced into information environments each day. A reasoned, systematic, and consistent approach will help to achieve your organizational goals. The Department of Health and Human Services has continued the theme of protecting patient health information and has deemed adequate security and privacy consideration should be in scope as one of its initial ( Stage 1 ) core measures for demonstrating Meaningful Use. By doing so, HHS has clearly stressed that security and privacy will not be taken lightly. In essence, HHS recognizes that the very success of the HITECH program rests in part on patients ability to trust provider information systems with sensitive information. About the Authors Feisal Nanji Executive Director, Techumen Feisal Nanji has over 20 years of experience in multiple facets of information technology including software development, strategy planning, and solutions implementation. Mr. Nanji is Executive Director of Techumen, where he leads the organization s security risk analysis and remediation consulting services to improve client security, disaster preparedness, and regulatory compliance. A regular review of your risk posture is what is required to protect e-phi. Too many new threat vectors and vulnerabilities are introduced into information environments each day. A reasoned, systematic, and consistent approach will help to achieve your organizational goals. Conclusion Spurred by the HITECH Act, the healthcare industry is embracing Electronic Health Records at an accelerating rate. This move from paper records to fully electronic patient records is significant and carries with it a need for heightened responsibility since digital information can be copied, transmitted, or used so easily. As such, the risk accruing from this transition to electronic records must be well understood by healthcare organizations. In its passage of HITECH, the U.S. Congress took special consideration to note that security and privacy of patient records should be a paramount concern. Before founding Techumen, Mr. Nanji was a Senior Manager in Ernst & Young s IT Advisory Services Group and also held positions at Primeon, a provider of application security software, services, and penetration-testing, and Berkeley Process Control, a developer of embedded and robotic software for industrial applications. He also served as Director of Research for a financial and technical consulting firm and a boutique investment banking firm. Mr. Nanji earned his Master of Public Policy from Harvard University and his Bachelor of Business Administration from the University of Notre Dame. He also is a Certified Information Security Systems Professional....continued 4
7 About the Author Jeffrey White Principal, Aspen Advisors Jeffrey White has over 20 years of experience in the management and delivery of technology services and has specialized in the area of enterprise technology infrastructure, communications and networking systems and security. Client engagements have included IT strategic planning, technical architecture development, numerous RIS/PACS design and implementations (various vendors), technical contract negotiation, design and implementation of data networks, server infrastructure, application of Internet security, and IS/IT operational effectiveness. His clients have included multi-facility Integrated Delivery Networks, large physician group practices, academic medical centers, specialty university hospitals, and independent community hospitals. Recently Mr. White was a key leader of an 18-month project for technology specification, planning, contracting, and implementation for a new hospital constructed in Africa. Before joining Aspen Advisors, Mr. White was Managing Principal of HealthTech Advisors and also held long-term positions at a publicly traded health-care information technology professional services firm (First Consulting Group) and Electronic Data Systems (now HP Enterprise Services) in Brazil and Singapore. Mr. White attended University of Texas at Arlington and Richland College where he studied Computer Science and Geo-Sciences. Additionally, he was nominated for and successfully completed EDS Manufacturing Professional Leadership, a 9-week intensive Executive MBA type program. About Aspen Advisors Aspen Advisors is a professional services firm with a rich mix of respected industry veterans and rising stars who are united by a commitment to excellence and ongoing dedication to healthcare. We work with healthcare organizations to optimize the value of their information technology investments. Our experienced team is highly skilled in all aspects of healthcare technology. We understand the complexities of healthcare operational processes, the vendor landscape, the political realities, and the importance of projects that are executed successfully the first time. Every client is important to us, and every project is critical to our reputation. Established in 2006, the firm has grown significantly year over year and was named a 2010 Up and Comer by Healthcare Informatics. Our hallmarks are top quality service and satisfied clients; we re proud that each past and current client is 100% referenceable. Contact Us: or info@aspenadvisors.net 5
Sunday March 30, 2014, 9am noon HCCA Conference, San Diego
Meaningful Use as it Relates to HIPAA Compliance Sunday March 30, 2014, 9am noon HCCA Conference, San Diego CLAconnect.com Objectives and Agenda Understand the statutory and regulatory background and purpose
More informationInformation Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
More informationDecrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
More informationHIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
More informationHIPAA Security Risk Analysis for Meaningful Use
HIPAA Security Risk Analysis for Meaningful Use NOTE: Make sure your computer speakers are turned ON. Audio will be streaming through your speakers. If you do not have computer speakers, call the ACCMA
More informationHIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
More informationGuidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
More informationMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis Meeting the Measure Security in Transition Executive Summary Is your organization adopting Meaningful Use, either to gain incentive payouts or to avoid penalties?
More informationHIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
More informationWhat is required of a compliant Risk Assessment?
What is required of a compliant Risk Assessment? ACR 2 Solutions President Jack Kolk discusses the nine elements that the Office of Civil Rights requires Covered Entities perform when conducting a HIPAA
More informationData Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm
Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security
More informationDeveloping HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant
Developing HIPAA Security Compliance Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant Learning Objectives Identify elements of a HIPAA Security compliance program Learn the HIPAA Security Rule basics
More informationNationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
More informationPrivacy and Security Meaningful Use Requirement HIPAA Readiness Review
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit
More informationHITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
More informationOverview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
More informationHIPAA and HITRUST - FAQ
A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are
More informationMU Security & Privacy Risk Assessments: What It Is & How to Approach It
MU Security & Privacy Risk Assessments: What It Is & How to Approach It Dr. Bryan S. Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP Advisor, Health Information Trust Alliance 2011-2014 HITRUST LLC, Frisco,
More informationArt Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
More informationARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper
ARRA HITECH Stimulus HIPAA Security Compliance Reporter White Paper ARRA HITECH AND ACR2 HIPAA SECURITY The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems,
More informationPrivacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:
HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates
More informationWelcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
More informationHIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
More informationOCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013
ISACA - North Texas Chapter April 11, 2013 Introduction 1 2 Basic components of HIPAA and HITECH legislation HITECH and rising breaches 3 4 OCR HIPAA audits Key findings of the pilot audits 5 Approaches
More informationDissecting New HIPAA Rules and What Compliance Means For You
Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the
More informationThe Medicare and Medicaid EHR incentive
Feature The Meaningful Use Program: Auditing Challenges and Opportunities Your pathway to providing value By Phyllis Patrick, MBA, FACHE, CHC Meaningful Use is an area ripe for providing value through
More informationHow To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
More informationTrust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
More informationCybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
More informationNine Network Considerations in the New HIPAA Landscape
Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant
More informationHIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1
HIPAA/HITECH Privacy and Security for Long Term Care 1 John DiMaggio Chief Executive Officer, Blue Orange Compliance Cliff Mull Partner, Benesch, Healthcare Practice Group About the Presenters John DiMaggio,
More informationHosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE
Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE [ Hosting for Healthcare: Addressing the Unique Issues of Health IT & Achieving End-to-End Compliance
More informationFeisal Nanji. Techumen LLC, (feisal@techumen.com)
TACKLING THE ENCRYPTION CONUNDRUM Feisal Nanji Executive Director Techumen LLC, (feisal@techumen.com) Conflict of Interest Disclosure Feisal Nanji, CISSP Has no real or apparent conflicts of interest to
More informationSurviving a HIPAA Audit: What you need to know NOW So you can cope THEN. Jonathan Krasner www.beinetworks.com www.hipaasecurenow.
Surviving a HIPAA Audit: What you need to know NOW So you can cope THEN Jonathan Krasner www.beinetworks.com www.hipaasecurenow.com Healthcare IT Landscape Meaningful Use Incentives Technology Advances
More informationHIPAA COMPLIANCE PLAN FOR 2013
HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt
More informationHIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
More informationHIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationHIPAA Security. 1 Security 101 for Covered Entities. Security Topics
HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &
More informationBusiness Associate Management Methodology
Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates
More informationPreparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
More informationEmpowering Nurses & Building Trust Through Health IT
Empowering Nurses & Building Trust Through Health IT Helen Caton-Peters, MSN, RN Health Information Privacy & Security Specialist Office of the National Coordinator for Health Information Technology 2
More informationHIPAA Summit. March 10, 2011. Phyllis A. Patrick, MBA, FACHE, CHC Phyllis A. Patrick & Associates LLC
HIPAA Summit March 10, 2011 Phyllis A. Patrick, MBA, FACHE, CHC Phyllis A. Patrick & Associates LLC The Secretary shall provide for periodic audits to ensure that covered entities and business associates
More informationBridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
More informationBusiness Associates, HITECH & the Omnibus HIPAA Final Rule
Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS
More informationThe Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
More informationPreparing for HIPAA and Meaningful Use Compliance Audits
Preparing for HIPAA and Meaningful Use Compliance Audits Presented by: David Holtzman VP of Compliance, CynergisTek CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com
More informationHIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality
HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.
More informationUsing the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
More informationWhite Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate
More informationStrategies for. Proactively Auditing. Compliance to Mitigate. Matt Jackson, Director Kevin Dunnahoo, Manager
Strategies for 1 Proactively Auditing HIPAA Security Compliance to Mitigate Risk Matt Jackson, Director Kevin Dunnahoo, Manager AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois www.ahia.org
More informationHIPAA Compliance Audits: Your Newest Risk: Are You Prepared?
HIPAA Compliance Audits: Your Newest Risk: Are You Prepared? Presented by: Melissa (Lisa) Thompson, JD, MPH and Elizabeth Lamkin, MHA Slide 1 Speakers Melissa (Lisa) Thompson, JD, MPH Partner Adelman,
More informationHealthcare and IT Working Together. 2013 KY HFMA Spring Institute
Healthcare and IT Working Together 2013 KY HFMA Spring Institute Introduction Michael R Gilliam Over 7 Years Experience in Cyber Security BA Telecommunications Network Security CISSP, GHIC, CCFE, SnortCP,
More informationMU Security & Privacy Risk Assessments: What It Is & How to Approach It
MU Security & Privacy Risk Assessments: What It Is & How to Approach It Dr. Bryan S. Cline, CISSP-ISSEP, CISM, CISA, ASEP, CCSFP CISO & VP, CSF Development & Implementation Health Information Trust Alliance
More informationNEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16
NEW PERSPECTIVES on Healthcare Risk Management, Control and Governance www.ahia.org Journal of the Association of Heathcare Internal Auditors Vol. 32, No. 3, Fall, 2013 Professional Fee Coding Audit: The
More informationThe HIPAA Omnibus Final Rule
WHITE PAPER The HIPAA Omnibus Final Rule Four risk exposure events that can uncover compliance issues leading to investigations, potential fines, and damage to your organization s reputation. By Virginia
More informationImplementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind
Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and
More informationHIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
More informationUnderstanding HITRUST s Approach to Risk vs. Compliance-based Information Protection
Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and
More information5 Cornerstones of Compliance
5 Cornerstones of Compliance DATTO S INFORMATION SECURITY CONTROLS by Feisal Nanji, Datto Chief Security Officer For backup and disaster recovery (BDR) solution providers Security Compliance can be a multi-tiered,
More informationHow to Use the NYeC Privacy and Security Toolkit V 1.1
How to Use the NYeC Privacy and Security Toolkit V 1.1 Scope of the Privacy and Security Toolkit The tools included in the Privacy and Security Toolkit serve as guidance for educating stakeholders about
More informationSecurity Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
More informationWell-Documented Controls Reduce Risk and Support Compliance Initiatives
White Paper Risks Associated with Missing Documentation for Health Care Providers Well-Documented Controls Reduce Risk and Support Compliance Initiatives www.solutionary.com (866) 333-2133 Many Health
More informationFrequently Asked Questions about the HITRUST Risk Management Framework
Frequently Asked Questions about the HITRUST Risk Management Framework Addressing common questions and misconceptions about the HITRUST CSF, CSF Assurance Program and supporting methods and tools, and
More informationAssessing Your HIPAA Compliance Risk
Assessing Your HIPAA Compliance Risk Jennifer Kennedy, MA, BSN, RN, CHC National Hospice and Palliative Care Organization HIPAA Security Rule All electronic protected health information (PHI and EPHI)
More informationOCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
More informationHIPAA SECURITY RISK ANALYSIS FORMAL RFP
HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS,
More informationHIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com
HIT Audit Workshop Jeffrey W. Short jshort@hallrender.com 1 Audits and Investigations to be Discussed Meaningful Use Audits HIPAA Audits Data Breach Investigations Software Vendor Audits FTC Investigations
More information12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule
HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
More informationWhat s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue
What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue Healthcare Advisors The # of data breaches is climbing The
More informationThe HIPAA Audit Program
The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance
More informationHIPAA Compliance Review Analysis and Summary of Results
HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk
More informationHealth Homes Implementation Series: NYeC Privacy and Security Toolkit. 16 February 2012
Health Homes Implementation Series: NYeC Privacy and Security Toolkit 16 February 2012 1 Agenda What are the New York ehealth Collaborative (NYeC) and the Regional Extension Center? What are Health Homes?
More informationIsaac Willett April 5, 2011
Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act
More informationTACKLING THE ENCRYPTION CONUNDRUM
TACKLING THE ENCRYPTION CONUNDRUM Feisal Nanji DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of
More informationStraight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes
Watch the Replay Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes FairWarning Executive Webinar Series May 20, 2014 #AnytimeAudit Today s Panel Laura E. Rosas, JD, MPH
More informationWhite Paper #6. Privacy and Security
The Complexity of America s Health Care Industry White Paper #6 Privacy and Security www.nextwavehealthadvisors.com 2015 Next Wave Health Advisors and Lynn Harold Vogel, Ph.D. The Complexity of America
More informationHIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
More informationPreparing for the HIPAA Security Rule Again; now, with Teeth from the HITECH Act!
A White Paper for HIPAA Business Associates (And Agents & Subcontractors!) Preparing for the HIPAA Security Rule Again; now, with Teeth from the HITECH Act! Introduction Two years ago we first published
More informationHIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
More information6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013
Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,
More informationArizona State University. HIPAA Compliance. Audit Report Number 15-08. May 7, 2015
This page left blank intentionally. Summary The Health Insurance Portability and Accountability Act of 1996 (HIPAA) audit was included on the Arizona State University (ASU) FY 2015 annual audit plan approved
More informationHIPAA Changes 2013. Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13
HIPAA Changes 2013 Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13 BEI Who We Are DC Metro IT Service Provider since 1987 Network Design/Upgrade Installation/Managed IT Services for small to medium-sized
More informationTom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh
Effectively Completing and Documenting a Risk Analysis Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS Session Objectives Identify the difference between risk analysis and risk assessment
More information2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
More informationHIPAA Compliance and the Protection of Patient Health Information
HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance
More informationHIPAA Security Overview of the Regulations
HIPAA Security Overview of the Regulations Presenter: Anna Drachenberg Anna Drachenberg has been assisting healthcare providers and hospitals comply with HIPAA and other federal regulations since 2008.
More informationSecuring Patient Portals
Securing Patient Portals What you need to know to comply with HIPAA Omnibus and Meaningful Use Brian Selfridge, Partner, Meditology Services, LLC Blake Sutherland, VP Enterprise Business, Trend Micro Brian
More informationHow to Leverage HIPAA for Meaningful Use
How to Leverage HIPAA for Meaningful Use The overlap between HIPAA and Meaningful Use requirements 2015 SecurityMetrics How to Leverage HIPAA for Meaningful Use 2 About this ebook Who should read this
More informationUnderstanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
More information08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
More informationCMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM
CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM The Centers for Medicare & Medicaid Services (CMS) and the Office of the National Coordinator
More informationJoe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
More informationU.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)
U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment (SRA) Tool User Guide Version Date: March 2014
More informationPreparing for the HIPAA Security Rule Again; now, with Teeth from the HITECH Act!
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Again; now, with Teeth from the HITECH Act! Introduction Several years ago we first published A White Paper for Health
More informationBNA s Health Law Reporter
BNA s Health Law Reporter Reproduced with permission from BNA s Health Law Reporter, 20 HLR 1272, 08/18/2011. Copyright 2011 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com HHS
More information[Insert Company Logo]
[Insert Company Logo] Business Continuity and Disaster Recovery Planning (BCDRP) Manual 1 Table of Contents Critical Business Information 4 Business Continuity and Disaster Recover Planning (BCDRP) Personnel
More informationEnsuring Privacy & Security of Patient Information
Ensuring Privacy & Security of Patient Information Danika Brinda, Assistant Professor and REACH P&S Subject Matter Expert Jane McGrath, Program Manager REACH/Stratis Health Session 12, Thursday, June 12,
More informationSECURETexas Health Information Privacy & Security Certification Program FAQs
What is the relationship between the Texas Health Services Authority (THSA) and the Health Information Trust Alliance (HITRUST)? The THSA and HITRUST have partnered to help improve the protection of healthcare
More informationFaster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions
Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Table of Contents Introduction... 3 1. Data Backup: The Most Critical Part of any IT Strategy...
More informationAm I a Business Associate? Do I want to be a Business Associate? What are my obligations?
Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Brought to you by Winston & Strawn s Health Care Practice Group 2013 Winston & Strawn LLP Today s elunch Presenters
More information