Proofpoint HIPAA Breach Report:

Size: px
Start display at page:

Download "Proofpoint HIPAA Breach Report:"

Transcription

1 Proofpoint HIPAA Breach Report: An Analysis of HITECH Breach Notifications and Settlements, Q Healthcare Industry Update threat protection compliance archiving & governance secure communication

2 Contents HIPAA Breach Report...3 Overall Figures... 3 Legal Environment...4 HIPAA Breaches By Location...4 HIPAA Breaches By Type... 5 HIPAA Breaches By State...6 Notable HIPAA Breaches...7 Blue Cross Blue Shield of Tennessee (BCBST) $18.5 million... 7 Cignet Health $4.3 million...8 CVS Caremark $2.25 million...9 State of Alaska $1.7 million...9 Massachusetts Eye and Ear Infirmary $1.5 million...10 RiteAid $1 million South Shore Hospital $750, TRICARE Management Activity $4.9 billion*...12 Sutter Medical Foundation $944 million $4.25 billion*...12 Proofpoint Solutions for HIPAA / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

3 HIPAA Breach Report Proofpoint monitors a variety of security-related activities and provides Industry Updates for several areas. This report covers HIPAA breaches of 500 and greater individuals as reported to and published by the US Department of Health and Human Services (HHS). This report breaks down the breaches by number of incidents, individuals, type of breach, location of breach, and by state. Additionally, it provides a description of notable breaches including settlement costs. Proofpoint, a strong proponent of security and privacy, provides this information to help organizations and individuals stay aware of the current state of healthcare information governance with regards to Protected Health Information (PHI). Overall Figures Since 2009, 585 individual HIPAA security breaches have been posted for breaches covering over 500 individuals. Additionally, the breaches are spread over 49 US states and territories, covering 46 states. The states of Hawaii, Maine, South Dakota and Vermont are the only states without a registered breach. Healthcare Data Breaches At A Glance 1 $7 billion loss estimate across healthcare industry due to privacy breaches 94% of healthcare organizations have had at least one data breach within the last two years $2.4 million average economic impact per breach in 2012, with an increase of almost $400,000 since % of healthcare staff believes data breaches will lead to financial identity theft 18% of healthcare organizations report actual medical identity theft as a result of data breach Figure 1. Overall HIPAA Reported Breach Figures Overall Figures Approximate Number of Individuals Compromised 21,784,290 Number of Breaches 585 States with Recorded Breaches 46 A number of breaches have existed for an extended period of time, the longest of which was a breach at Duke University where their system was compromised from 2004 to For breaches where the system was compromised for an extended period of time, 250 days was the average length of compromise. Extended Breach Figure 2. Extended Breach Figures Number of Extended Breaches 57 Average Length of Extended Breaches Maximum Length of Extended Breach 250 days 9.4 years This Proofpoint report also covers the length of time it takes to post a breach from the time the breach occurred. Of the 443 breaches where the notification to the public occurred after the breach, the average length of time to post was 142 days. The maximum time to post is 9.8 years that was also the Duke University incident. Figure 3. Notification Delay Figures Notification Delay Number of Breaches with Delayed Notification 443 Average Length of Delayed Notification 142 days Maximum Length of Delayed Notification 9.8 years 1 The source data for this document is provided by the US Department of Health and Human Services and available at 1 Ponemon Institute LLC, Third Annual Benchmark Study on Patient Privacy & Data Security. December / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

4 Legal Environment In addition to the increasingly public nature of security breaches, there has been an increase in lawsuits. A number of lawsuits seek $1,000 per compromised individual, resulting in damages figures into the billions of dollars for breaches involving over a million individuals. Billion dollar lawsuits have occurred in two incidents and are tracked in Section 2 of this update. Figure 4. Lawsuit Overview Organization Individuals Compromised Damages Sought TRICARE 4,901,432 $4.9 billion Sutter Medical Foundation Approx million $944 million - $4.25 billion HIPAA Breaches By Location The most common form of breach is through the theft or loss of backup tapes and disks, followed by EMR systems and computer systems. However, adding the various breaches attributed to computers (Network Server, Computer, Laptop, and Portable Electronic Device), this figure reaches 39%, a figure greater than both Backup Tapes and EMR systems. With lawsuits seeking $1,000 per compromised patient, it becomes evident that these areas are potentially financially risky a 5 million patient compromise resulting in a $5 billion lawsuit. Figure 5. Number of Patients Compromised by Location 4 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

5 HIPAA Breaches By Type Data breaches involving electronic PHI (ephi) occur through a variety of means. The largest number of records and most number of breaches occur due to improper security of ephi resulting in theft, loss, hacking and unauthorized access. This is evident in both the number of patients exposed per type and also by the number of losses per type as shown below. Figure 6. Number of Patients Compromised by Type Figure 7. Number of Breaches by Type 5 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

6 HIPAA Breaches By State HIPAA Breaches have occurred in 29 US States and Territories. Of the 50 states, only Hawaii, Maine, South Dakota, and Vermont have not experienced any breaches. By number of individuals affected, the top 10 states, represent 19 million people or 87% of all individuals affected. With breaches across 46 of the 50 states, it appears breaches are not targeted towards any individual state; however, certain states have historically had more breaches. Figure 8. Affected Individuals And Number of Breaches for Top 10 States The affected individuals in the top two states represent a significant portion of those states populations. Figure 9. Affected Individual Equivalents for Top States States of Note Virginia California Breaches in Context The affected individuals in the top two states represent a significant portion of those states populations. The nearly 4 million people affected are equivalent to a number greater than everyone living in Los Angeles. 6 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

7 Notable HIPAA Breaches HIPAA breaches are becoming more costly with the passage of the HITECH Act with settlement and remediation costs in the millions and class-action lawsuits seeking billions of dollars. Under calculations by the US Department of Health and Human Services (HHS) Office of Civil Rights (OCR), penalties can reach $50,000 per day, having easily reached the $1.5 million per year limit stipulated by HITECH. This section provides case studies for select HIPAA breaches so healthcare practitioners can get up to date information on compliance and remediation costs and approaches. Of note, some patients have initiated class-action lawsuits seeking $1,000 per affected member with aggregate damages sought reaching into billions of dollars. With the importance of data privacy and identity theft, organizations should take steps to prevent breaches or be prepared to face these types of lawsuits if a breach does occur. Blue Cross Blue Shield of Tennessee (BCBST) $18.5 million Breach Information: Blue Cross Blue Shield of Tennessee Blue Cross Blue Shield of Tennessee Individuals Affected 1 million HIPAA Security Rule breach $18.5 million total $1.5 million: HHS civil money penalty (CMP) $11 million: customer alerts and HIPAA compliance $6 million: encrypt data 885 terabytes of data Breach Date October 2, 2009 Theft of 57 unencrypted hard drives consisting of demographic information, Social Security numbers, diagnosis codes and health plan identification numbers. In 2009, 57 hard drives with ephi was stolen from BCBST with information for 1 million patients. This resulted in a cost of $18.5 million with $11.5 million being associated with handling the single theft event. Additionally, more than $6 million and 5,000 man-hours of effort were spent to encrypt data at-rest totaling 885 terabytes to ensure this type of breach does not happen again. 7 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

8 Cignet Health $4.3 million Breach Information: Cignet Health Cignet Health of Prince George s County, MD Individuals Affected 41 HIPAA Privacy Rule breach $4.3 million total HITECH (d) $1,351,600 HIPAA civil money penalty (CMP) $3.0 million fine for willful neglect and failure to cooperate with HHS Office of Civil Rights (OCR) Refusal to provide access to medical records for 41 patients and the HHS OCR Breach Date September 2008 October patients had requested access to medical records from September 2008 to October Covered entities are required to respond within 30 days and no later than 60 days. Cignet did not respond which resulted in a CMP of $1.3 million. During OCR investigations, Cignet allegedly refused to respond to OCR investigations that ran from March 17, 2009 to April 7, 2010, including failure to respond to a court ordered subpoena. OCR was able to obtain a default judgment against Cignet in United States District Court and added a $3.0 million fine for willful neglect of the HIPAA Privacy Rule, resulting in a total fine of $4,351,600. The $1,351,600 base CMP was the minimum HIPAA fine and calculated using $100 / day for 13,516 penalty days during which Cignet ignored patient requests. The $3 million willful negligence penalty was calculated at $50,000 per day of non-compliance with the OCR investigation resulting in a $242 million fine for the 4,859 patient days in 2009 and 2,619 patient days in The penalty was reduced to $3 million or the $1.5 million per year allowed under the HITECH Act. 8 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

9 CVS Caremark $2.25 million Breach Information: CVS Caremark Corp. Individuals Affected 955 CVS Caremark Corp. HIPAA Privacy Rule breach $2.25 million Breach Date August 13, 2012 Improper disposal of PHI in unsecure dumpsters that were accessible by the public. The HHS OCR and Federal Trade Commission (FTC) investigated CVS after media reports alleged that PHI was being disposed of in unsecure dumpsters. The investigation found that CVS failed to implement proper policies, procedures, and training for employees to properly recognize and securely dispose of PHI. In addition to the $2.25 million CMP, the Corrective Action Plan requires updated disposal procedures, sanctioning of non-compliant workers, and a 3 year period during which CVS is required to send compliance reports to OCR. State of Alaska $1.7 million Breach Information: Alaska Department of Health and Human Services Individuals Affected 501 Alaska Department of Health and Human Services (ADHHS) HIPAA Security Rule breach $1.7 million Breach Date October 12, 2009 Other s Theft of USB flash drive containing ephi from car of ADHSS An unencrypted flash drive was stolen from the car of an ADHHS IT worker. ADHHS wasn t certain the device contained PHI, but since it was unencrypted, they reported it to USDHSS OCR. OCR conducted an investigation and found that ADHHS did not have adequate polices and procedures to protect ephi. Additionally, ADHHS had not conducted and/or implemented a risk analysis, risk management procedures, device and media controls or an ephi encryption system. OCR issued a $1.7 million CMP fine and a corrective action plan that includes ADHHS to review, revise and maintain policies to stay in compliance with HIPAA. A monitor will provide OCR with regular updates on ADHHS progress on HIPAA compliance. On September 7, 2010, ADHHS lost ephi for 2000 individuals due to theft 9 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

10 Massachusetts Eye and Ear Infirmary $1.5 million Breach Information: Massachusetts Eye and Ear Infirmary Individuals Affected 3,621 Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates (MEEI) HIPAA Privacy and Security Rule breach $1.5 million Breach Date February 19, 2010 Theft of unencrypted laptop including prescriptions and clinical information for 3,621 patients and research subjects MEEI reported the theft of an unencrypted laptop containing patient records for 3,621 individuals. As part of its investigation the OCR concluded that MEEI was not: performing a thorough analysis of risk to the confidentiality of the ephi stored on the laptop Other s adopting and implementing policies and procedures to restrict access to ephi to authorized users of portable devices. OCR s investigation found that additional breaches occurred over an extended period of time, demonstrating a long-term, organizational disregard for the requirements of the Security Rule. MEEI settled for a $1.5 million CPM fine and agreed to take corrective measures with reporting over 3 years. On November 10, 2009 employees improperly accessed patient credit card information including names, addresses and credit card information. Per HIPAA requirements, MEEI notified the affected individuals, the media and HHS. MEEI terminated the involved employees, offered 1 year of free credit card monitoring to individuals, revised their safeguards policy, and reviewed processes for credit card payment. 2 US Department of Health and Human Services. News Release: Massachusetts provider settles HIPAA case for $1.5 million. September 17, / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

11 RiteAid $1 million Breach Information: RiteAid RiteAid Individuals Affected Approximately 2,900 HIPAA Privacy Rule breach $1.0 million Breach Date October 10, 2011 Improper disposal of PHI in unsecure dumpsters that were accessible by the public. A local television station filmed RiteAid employees dumping patient prescriptions and other PHI in local dumpsters. An investigation by the OCR and FTC followed and confirmed that improper disposal of patient prescriptions was occurring in numerous cities. Under the settlement, RiteAid has agreed to train its workforce on HIPAA Privacy Rule requirements, monitor its progress internally, and allow an outside monitoring agency to review its progress with respect to the settlement. The $1 million fine equates to just over $200 per each of RiteAid s 4,900 stores. South Shore Hospital $750,000 Breach Information: South Shore Hospital Business Associate Individuals Affected 800,000 South Shore Hospital Archive Data Solutions (formerly Iron Mountain Data Products, Inc.) HIPAA Security Rule breach $750,000 million Breach Date February 25, 2010 Theft of nearly 500 unencrypted backup tapes. The hospital sent nearly 500 unencrypted backup tapes with ephi in 3 boxes to be erased by Archive Data Solutions after which the tapes went missing. The ephi included patient names, Social Security numbers, and data for financial, clinical and medical diagnoses. The hospital was able to recover one tape but was fined $750,000, which was reduced by $275,000 for technology investments made after the breach. 11 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

12 TRICARE Management Activity $4.9 billion* Breach Information: TRICARE Management Activity Business Associate Individuals Affected 4,901,432 TRICARE Management Activity Science Applications International Corporation (SAIC) HIPAA Security Rule breach Breach Date September 13, 2011 $4.9 billion sought in class-action lawsuit, representing $1,000 per individual affected Loss of unencrypted backup tapes possibly containing patient addresses, phone numbers, Social Security numbers and clinical data. A computer tape containing ephi of 4.9 million patients was stolen from the car of an employee of Science Applications International Corp., a contractor with TRICARE Management Activity. A class-action lawsuit seeking $1,000 per individual was filed by the law firm of Shulman, Rogers, Gandal, Pordy & Ecker of Maryland on behalf of an Air Force veteran of the first Iraq war and a military spouse. Defendants in the suit are named as TRICARE and Defense Secretary Leon Panetta. In this instance, TRICARE has declined to provide identity theft protection. By comparison, the Veterans Affairs Department offers credit monitoring services and up to $1 million in annual identity theft protection at a cost of $29.95 per year per veteran. Other covered entities experiencing HIPAA breaches have also offered identity theft protection. Sutter Medical Foundation $944 million $4.25 billion* Breach Information: Sutter Medical Foundation Individuals Affected Sutter Medical Foundation 943,434 individuals for clinical data and medical diagnoses 3.3 million individuals for demographic data HIPAA Security Rule breach $750,000 million Theft of computer containing PHI. Breach Date October 15, 2011 Theft of a single computer containing clinical data and medical diagnoses for nearly 1 million patients along with demographic data for more than 3.3 million patients. This breach also affected 21 other healthcare providers. The theft occurred when someone used a rock to break a window at Sutter Medical Foundation s administrative offices to remove an unencrypted desktop computer containing a patient database. While Sutter Medical Foundation had initiated an encryption program, the initial focus was handheld devices and had not reached this system. In addition to the breach, which occurred on October 15, 2011, notifications to patients did not occur until November 16, 2011, one month later. 11 lawsuits have been initiated seeking $1,000 per affected individual. Some lawsuits are focused on the 943,434 patients and seek $1 billion while others seek to represent all affected patients and seek $4.25 billion. 12 / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

13 Proofpoint Solutions for HIPAA Proofpoint is a leading provider of Information Security and Governance Solutions that can be deployed to meet the requirements of the HIPAA Privacy and Security Rules. This solution suite provides solutions to protect data-at-rest in a secure archive while also meeting HIPAA and Medicare records retention requirements and protecting data in-motion. To learn more about how Proofpoint solutions are addressing the requirements of HIPAA and HITECH for leading healthcare organizations, please contact us at Proofpoint, Inc. 892 Ross Drive, Sunnyvale, CA Tel: / Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 05/13

HIPAA WEBINAR HANDOUT

HIPAA WEBINAR HANDOUT HIPAA WEBINAR HANDOUT OCR Enforcement Tools Voluntary corrective action Resolution Agreement and Payment CMPs Referral to DOJ for criminal investigation Resolution Agreements Contract signed by HHS and

More information

What do you need to know?

What do you need to know? What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,

More information

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013 Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013 Presentation Overview s investigative

More information

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance For Calendar Years 2011 and 2012 As Required by the Health Information Technology for Economic and Clinical

More information

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES Melissa D. Berry The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position

More information

SELECT HIPAA PRIVACY AND SECURITY ENFORCEMENT ACTIONS. Current as of December 2015. attorney advertisement

SELECT HIPAA PRIVACY AND SECURITY ENFORCEMENT ACTIONS. Current as of December 2015. attorney advertisement SELECT HIPAA PRIVACY AND SECURITY ENFORCEMENT ACTIONS Current as of December 2015 Five Palo Alto Square, 3000 El Camino Real, Palo Alto, CA 94306 The content of this packet is an introduction to Cooley

More information

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now? Outline MOR-OF Education and Medical Expo August 23, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. HIPAA Compliance II. Why Should You Care? A. Market Pressure

More information

HIPAA Compliance: Efficient Tools to Follow the Rules

HIPAA Compliance: Efficient Tools to Follow the Rules Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

Security Compliance, Vendor Questions, a Word on Encryption

Security Compliance, Vendor Questions, a Word on Encryption Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center aparsons@shastahealth.org

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

You Probably Don t Even Know

You Probably Don t Even Know You Probably Don t Even Know That You Need To Comply With HIPAA In Collaboration With: About ERM About The Speaker Stephen Siegel, Esq., Of Counsel, Broad and Cassel Board Certified Health Law Over 25

More information

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer HIPAA LIAISON MEETING PRESENTAITON August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer Current State of HIPAA Enforcement Content Contributor Abby Bonjean, Investigator Office for

More information

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010 Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance For Calendar Years 2009 and 2010 As Required by the Health Information Technology for Economic and Clinical Health (HITECH)

More information

Outline. Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 7/10/2014

Outline. Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 7/10/2014 LeadingAge Florida s 50 th Annual Convention and Exposition Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 James Robnett Special Agent in Charge

More information

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

OCR Reports on the Enforcement. Learning Objectives

OCR Reports on the Enforcement. Learning Objectives OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012 HIPAA Privacy, Security, Breach, and Meaningful Use Practice Requirements for 2012 CHUG October 2012 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Standards for Privacy of Individually

More information

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Violations Incur Multi-Million Dollar Penalties HIPAA Violations Incur Multi-Million Dollar Penalties Whitepaper HIPAA Violations Incur Multi-Million Dollar Penalties Have you noticed how many expensive Health Insurance Portability and Accountability

More information

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010 New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,

More information

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)

More information

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE The Speakers Cinda Velasco Attorney, Manager, Privacy Officer Patient Safety and Risk Management Trish Lugtu Senior Manager MMIC

More information

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group HOW TO REALLY IMPLEMENT HIPAA Presented by: Melissa Skaggs Provider Resources Group WHAT IS HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104 191, 110 Stat. 1936,

More information

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514

More information

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed

More information

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What

More information

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE [ Hosting for Healthcare: Addressing the Unique Issues of Health IT & Achieving End-to-End Compliance

More information

WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP

WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Whether you re a healthcare provider, health plan or a non-healthcare business that deals with patients

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges

Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges Cynthia Marcotte Stamer Board Certified Labor and Employment Law Texas Board of Legal Specialization Primary Telephone: (214) 452-8297 24-Hour Telephone (469) 767.8872 Addison Telephone (972) 588.1860

More information

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Violations Incur Multi-Million Dollar Penalties HIPAA regulations have undergone major changes in the last few years giving both the federal and state Governments new and enhanced powers and resources to pursue HIPAA violations HIPAA Violations Incur

More information

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C.

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C. HIPAA Hot Topics Audits, the Latest on Enforcement and the Impact of Breaches September 2012 Nashville Knoxville Memphis Washington, D.C. Overview HITECH Act HIPAA Audit Program: update and initial results

More information

Tatiana Melnik Tampa, FL 734.358.4201 www.melniklegal.com

Tatiana Melnik Tampa, FL 734.358.4201 www.melniklegal.com 1 Outline HCDA General Membership Meeting September 23, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. What is HIPAA? II. Why Should You Care? A. B. Regulatory

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec. The OCR Auditors are coming - Are you next? What to Expect and How to Prepare On June 10, 2011, the U.S. Department of Health and Human Services Office for Civil Rights ( OCR ) awarded KPMG a $9.2 million

More information

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

OCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013

OCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013 ISACA - North Texas Chapter April 11, 2013 Introduction 1 2 Basic components of HIPAA and HITECH legislation HITECH and rising breaches 3 4 OCR HIPAA audits Key findings of the pilot audits 5 Approaches

More information

HIPAA & HITECH AND THE DISCOVERY PROCESS

HIPAA & HITECH AND THE DISCOVERY PROCESS HIPAA & HITECH AND THE DISCOVERY PROCESS HEATHER L. HUGHES, J.D. U.S. Legal Support, Inc. 363 North Sam Houston Parkway East, Suite 900 Houston, Texas 77060 (713) 653-7100 State Bar of Texas 8 th ANNUAL

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HIPAA Security Overview of the Regulations

HIPAA Security Overview of the Regulations HIPAA Security Overview of the Regulations Presenter: Anna Drachenberg Anna Drachenberg has been assisting healthcare providers and hospitals comply with HIPAA and other federal regulations since 2008.

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Ricky Link, Coalfire ISACA North Texas and IIA Fort Worth Chapters The Petroleum Club of Fort Worth March 4, 2014 1 About Coalfire Coalfire

More information

HIPAA Security & Compliance

HIPAA Security & Compliance Creative Mind. Creative Heart. Creative Care. 2014 WALA Spring Conference HIPAA Security & Compliance Jeff Grady Thursday, March 27 10:30 am HIPAA Security & Compliance A TIME FOR ACTION Jeff Grady, Senior

More information

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update OCR / WEDI Webinar Series July 17, 2013 Today s Speakers Verne Rinker, JD, MPH Health Information Privacy Specialist

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

Lessons Learned from HIPAA Audits

Lessons Learned from HIPAA Audits Lessons Learned from HIPAA Audits October 29, 2012 Tony Brooks, CISA, CRISC Partner - IT Assurance and Risk Services HORNE LLP AGENDA HIPAA/HITECH Regulations Breaches and Fines OCR HIPAA/HITECH Compliance

More information

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments Robin B. Campbell Ethan P. Schulman Jennifer S. Romano HIPAAPrivacy and Security Breach Overview of the Laws Developments Incident

More information

Outline. Learning Objectives 9/23/2013. HIPAA Headline

Outline. Learning Objectives 9/23/2013. HIPAA Headline HIPAA Security: How to avoid becoming the next HIPAA Headline Marion K. Jenkins, PhD, FHIMSS Executive Vice President Healthcare 3t Systems Adjunct Faculty HC IT University of Denver MGMA Annual Meeting,

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Information Security and Privacy. WHAT are the Guidelines? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT are the Guidelines? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT are the Guidelines? HOW is it to be done? WHY is it done? 1 WHAT are the guidelines O Be in compliance of Federal/State Laws O Federal: O HIPAA 1996 2 3 WHAT are the

More information

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability

More information

Information Security and Privacy. WHAT are the Guidelines? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT are the Guidelines? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT are the Guidelines? HOW is it to be done? WHY is it done? 1 WHAT are the guidelines O Be in compliance of Federal/State Laws O Federal: O HIPAA - 1996 O HITECH - 2009

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives

HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives HIPAA and New Technologies Using Social Media and Texting Within the Rules Jim Sheldon-Dean Director of Compliance Services Lewis Creek Systems, LLC www.lewiscreeksystems.com For Northern California Chapter

More information

HIPAA Security Risk Analysis for Meaningful Use

HIPAA Security Risk Analysis for Meaningful Use HIPAA Security Risk Analysis for Meaningful Use NOTE: Make sure your computer speakers are turned ON. Audio will be streaming through your speakers. If you do not have computer speakers, call the ACCMA

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP Carol Ann Raymond, MBA, Ed.S., CCC-SLP Associate Clinical Professor/Clinic Director Department of Communication Sciences and Disorders Financial o Employed by the University of Georgia o Non-Financial

More information

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues Doing Business in Oregon Under the Oregon Consumer Identity Theft Protection Act and Related Privacy Risks Privacy Data Loss www.breachblog.com Presented by: Mike Porter March 10, 2009 2 Privacy Data Loss

More information

What s New with HIPAA? Policy and Enforcement Update

What s New with HIPAA? Policy and Enforcement Update What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement Office of the Secretary Office for Civil Rights () Current Developments in Privacy and Security Rule Enforcement Michigan Medical Billers Association Andrew C. Kruley, J.D. Equal Opportunity Specialist

More information

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

HIPAA SECURITY AND POLICIES AND PROCEDURES. By: Michele Cuper THESIS FOR MASTERS DEGREE INFORMATION ASSURANCE CAPS 795 DAVENPORT UNIVERSITY

HIPAA SECURITY AND POLICIES AND PROCEDURES. By: Michele Cuper THESIS FOR MASTERS DEGREE INFORMATION ASSURANCE CAPS 795 DAVENPORT UNIVERSITY HIPAA SECURITY AND POLICIES AND PROCEDURES 1 HIPAA SECURITY AND POLICIES AND PROCEDURES By: Michele Cuper THESIS FOR MASTERS DEGREE INFORMATION ASSURANCE CAPS 795 DAVENPORT UNIVERSITY PRESENTED TO: DR.

More information

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you

More information

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA Privacy and Security

HIPAA Privacy and Security HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Secure Cloud Hosting for Healthcare Organizations

Secure Cloud Hosting for Healthcare Organizations Secure Cloud Hosting for Healthcare Organizations OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation

More information

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the

More information

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance Iliana Peters, JD, LLM, HHS Office for Civil Rights Kevin

More information

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Checklist for Breach Readiness Enabling a Resilient Organization Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Facts about breach violation impact

More information

New privacy and security requirements increase potential legal liability and jeopardize brand reputation.

New privacy and security requirements increase potential legal liability and jeopardize brand reputation. New privacy and security requirements increase potential legal liability and jeopardize brand reputation. Protect personal health information in motion, in use and at rest with HP access, authentication,

More information

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue Healthcare Advisors The # of data breaches is climbing The

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013

Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013 Recent Developments in U.S. Law: Privacy and Information Technology Health - 2013 Amyt M. Eckstein Moses & Singer LLP 405 Lexington Avenue New York, NY 10174-1299 (212) 554-7843 What Does Privacy Mean?

More information

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014 HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014 Introduction The HIPAA Privacy Rule establishes the conditions under which Covered Entities

More information

Healthcare Horizons Webinar Series:

Healthcare Horizons Webinar Series: Healthcare Horizons Webinar Series: HIPAA and HITECH Enforcement Pete Enko peter.enko@huschblackwell.com 816.983.8312 Steve James steve.james@huschblackwell.com 816.983.8374 Husch Blackwell LLP Before

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

The Case for Email Encryption

The Case for Email Encryption The Case for Email Encryption Improve Compliance and Protect PHI on the Move Healthcare organizations face an ongoing compliance burden involving the protection of sensitive patient data. The task of safeguarding

More information

HIPAA initially went into effect April 14, 2003. HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

HIPAA initially went into effect April 14, 2003. HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers. HIPAA Health Insurance Portability and Accountability Act HIPAA initially went into effect April 14, 2003 HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

OCR UPDATE Breach Notification Rule & Business Associates (BA)

OCR UPDATE Breach Notification Rule & Business Associates (BA) OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

Document Imaging Solutions. The secure exchange of protected health information.

Document Imaging Solutions. The secure exchange of protected health information. The secure exchange of protected health information. 2 Table of contents 3 Executive summary 3 The high cost of protected health information being at risk 4 The compliance officer s dilemma: keeping PHI

More information

Somansa Data Security and Regulatory Compliance for Healthcare

Somansa Data Security and Regulatory Compliance for Healthcare Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,

More information

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.

More information

HIPAA security rules of engagement

HIPAA security rules of engagement healthcare HIPAA security rules of engagement The use of health information technology continues to expand in healthcare. Healthcare organizations are using web-based applications and other portals that

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT The parties to this ( Agreement ) are, a _New York_ corporation ( Business Associate ) and ( Client ) you, as a user of our on-line health record system (the "System"). BY

More information