Christopher R. Apgar, CISSP - CEO & President SW Barbur, Ste PO Box 80278, Portland, OR (503) capgar@apgarandassoc.

Size: px
Start display at page:

Download "Christopher R. Apgar, CISSP - CEO & President 11000 SW Barbur, Ste. 201. PO Box 80278, Portland, OR 97208 (503) 384-2538 capgar@apgarandassoc."

Transcription

1 Christopher R. Apgar, CISSP - CEO & President SW Barbur, Ste PO Box 80278, Portland, OR (503) capgar@apgarandassoc.com Resume Qualifications Summary: Certified Information System Security Professional (CISSP) Workgroup for Electronic Data Interchange (WEDI) Board of Directors Co-chair, WEDI Regional Affiliates California Office of the Attorney General Medical Identity Theft Prevention project member American Health Information Management Association Medical Identity Theft Advisory Panel Member, Oregon Prescription Drug Monitoring Program Advisory Commission Co-Author, State E-Health Alliance white papers (interstate legal HIE barriers and solutions) RTI International Health Information Security & Privacy Collaborative (HISPC) Technical Advisory Panel (Phase I III) Oregon HISPC Phase I Technical Advisor Nationally recognized information security & HIPAA knowledge holder, speaker and author (security, privacy, national identifiers, electronic health information exchange) HIPAA/Financial/GLBA privacy & security auditor Nationally recognized expert in assisting organizations develop solid privacy and security programs and comply with HIPAA, GLBA and other applicable regulations (state and federal) Contributing editor for HCPro Briefings on HIPAA Oregon and SW Washington Healthcare, Privacy & Security Forum Board of Directors Personal Experience & Accomplishments: CEO & President, Apgar & Associates, LLC (April 4, 2004 to present): Provide consulting services on security and privacy program development and management, regulatory compliance, conduct compliance audits, conduct risk assessments, document risk mitigation strategies, implement mitigation strategies, etc. Provide outsourced compliance officer support to providers, health plans and business associates. Conduct risk analyses organizational and EHR implementation related. Assist with HIE/HIT planning (organizational, state and national). Provide security, privacy, transaction and code sets and national identifiers training ranging from beginner level to more

2 advanced training such as how to implement role based access control, how to conduct a risk assessment and management of a security and privacy compliance program, how to implement the national provider identifier, etc. Assist in HIPAA transaction & code set and national identifier implementation (provider, health plan, clearinghouse and vendor). Contributing editor, HCPro, Inc. Briefings on HIPAA. National Governors Association State Law HIE Barrier Analysis (September 5, 2009 to October 15, 2009 and August 2010 to September 2010): Develop a report analyzing the pros and cons to different solutions that reduce legal barriers to inter-state electronic health information exchange (HIE) Develop a report including tools for state use in addressing HIE interstate and federal statute legal barriers. Report 2 publication pending. National Privacy & Security Solutions Development (August 15, 2005 to March 31, 2009): Member of the RTI International team (HISPC project) on contract with the US Department of Health & Human Services to develop national privacy and security solutions and associated implementation plans for electronic health information exchange. Also a former member of the Oregon HISPC project team. Privacy & Security Compliance Auditor (April 4, 2004 to present): End-to-end privacy and security compliance auditor for small to large health care organizations (e.g., health plans, providers, vendors, hybrid entities and non-profits; HIPAA, 42 CFR Pt. 2, Red Flag Rule, state law, GLBA, SOX, appropriate privacy and security practices given technical changes and industry requirements). Author (January 2000 to present): Security Q&A and product review articles for HCPro, Inc., privacy how to s for AIS, Inc. and other health care related publications Miscellaneous Other Compliance Projects (April 4, 2004 to present): Security, privacy, regulatory and HIE projects for small clinics, non-profits, health care clearinghouses, large health plans and providers, vendors (US based and international). Also, speak nationally and am regularly quoted in national security, privacy and electronic health information exchange publications. This also includes re-writing Thompson Publishing s HIPAA textbook and contracted to write HIPAA Myths for AIS, Inc. Information Security and HIPAA Compliance Officer, Providence Health Plans (July 1, 1999 to April 4, 2004): Responsible for information security and HIPAA compliance efforts for Providence Health Plans (electronic transaction & code sets, privacy, information security and national identifiers); provide state & national advice/leadership in developing & communicating security, privacy and HIPAA required controls; all aspects of data security (training development & implementation, audit plan development & implementation, strategic planning, security tool review & selection, etc.); Regulatory Affairs liaison; policy development & management; HIPAA compliance; regulatory review & analysis; staff supervision. Responsible for assisting in the development and management of information services quality assurance program. Advisor in the development of business continuation plan. Education: BS, Psychology (with MIS coursework) - Portland State University, 1990 AS, Business/Accounting - Central Oregon Community College, 1986 March 2013 Bibliography - Apgar Page 2

3 Honors and Awards Phi Theta Kappa, Central Oregon Community College, 1985 Phi Kappa Phi, Portland State University, 1989 Senior Member, Information Systems Security Association, 2012 Associations and Community Service Chair, Community Advocates/Kids Can Board of Directors, 1994 to 1996 Information Systems Security Association, 2003 to Present American Health Information Management Association, 2011 to Present Oregon Health Information Management Association, 2011 to Present Health Care Compliance Association, 2013 Professional Certified Information Systems Security Professional, ISC 2, May 2002 to Present Chair, Oregon and SW Washington Healthcare, Privacy and Security Forum, May 2000 to August 2012 Member, Oregon and SW Washington Healthcare, Privacy and Security Forum Board of Directors, August 2012 to Present URAC Privacy Advisory Commission, 2002 to 2003 Co-chair, Workgroup for Electronic Data Interchange Regional Affiliate Workgroup, January 2005 to Present Member, Oregon Prescription Drug Monitoring Program Advisory Commission, July 2009 to Present Member, Workgroup for Electronic Data Interchange Board of Directors, January 2006 to Present Co-chair, Workgroup for Electronic Data Interchange Health Information Exchange Workgroup, December 2012 to Present Publications, Articles. Lectures and Addresses Editorial Oversight & Publication Advisory Editor, Security Compliance Newsletter, AISHealth, 2003 to 2005 Board of Advisors, Health Information Compliance Insider, HCPro, Inc to 2009 Moderator, HealthSec Conference and Expo, MIS Training Institute, 2004 Technical Advisor, Oregon Health Information Privacy and Security Collaborative 2006 to 2007 Member, Oregon Health Information Infrastructure Advisory Committee 2007 to 2009 Member, US Department of Health and Human Services, Office of the National Coordinator for Health Information Technology Health Infrastructure Standards and Technology Technical Committee Contributing editor, Briefings on HIPAA,, HCPro, Inc., 2008 to Present) Publications and Articles: Co-author, HIPAA Forms, Policies & Procedures, HIPAA Privacy Handbook, Oregon Medical Association, 2002 March 2013 Bibliography - Apgar Page 3

4 Chapter author, Audit Program Requirements, HIPAA Privacy Handbook, AISHealth, 2002 Chapter author and co-editor, HIPAA Security Handbook, AISHealth, 2004 to 2007 Co-author, Compliance Guide to HIPAA Security Risk Analysis HIPAA Risk Analysis Tools, Brownstone Publishers, Inc., 2004 HIPAA News & Views, Oregon Medical Association, 2005 to 2010 Contributing author, HIPAA Patient Privacy Compliance Guide, AISHealth, January 2005 Auditing Part 2, HIPAA Security Newsletter AISHealth, April 2005 Security Protocol & Systems Development, HIPAA Security Newsletter, AISHealth, April 2005 The Risk of Non-compliance, HIPAA Security Newsletter, AISHealth, April 2005 Privacy and Security in Healthcare & Confidential Information Exchange, MDT Quarterly, July 6, 2005 Security Q&A bi-monthly column, Briefings on HIPAA, HCPro, Inc to Present Product Watch bi-monthly column, Briefings on HIPAA, HCPro, Inc., 2006 to Present Secure Data Transmission Methods, Tech Target Security Media Group, January 2006 Co-author, Privacy and Security Assessment of Variation Toolkit, Agency for Healthcare Research and Quality and Office for the National Coordinator for Health Information Technology Health Information Privacy and Security Collaboration, April 2006 Precautions Privacy Officers Should Take to Minimize Risks Related to Laptop Computers, AISHealth, June 2006 Co-author, Stakeholder Group Meeting Facilitator s Guidebook, Agency for Healthcare Research and Quality and Office for the National Coordinator for Health Information Technology Health Information Privacy and Security Collaboration, July 2006 Monthly Privacy Issues column, Report on Patient Privacy, AISHealth, 2007 to 2010 Co-author, HIPAA Certification Training Manual, Supremus Group, LLC and Thompson Publishing, 2007 Co-author, Specially Protected Health Information Oregon Legal Requirements, Oregon Health Information Security & Privacy Collaboration, December, 2007 Co-author, Mitigating Medical Identity Theft, American Health Information Management Association, July 2008 Advantage, Journal of AHIMA: A Closer Look at the Red Flag Rules, American Health Information Management Association, November 2008 Co-author, Policy Strategies for Advancing Interstate Health Information Exchange: A Report to the State Alliance for ehealth, October 2009 Co-author, State and Federal Consent Laws Affecting Interstate Health Information Exchange: A Report to the National Governors Association, September 2010 Contributing author, The Financial Impact of Breached Protected Health Information A Business Case for Enhanced PHI Security, American National Standards Institute, March 2012 HIPAA & Compliance Assessments: Does HIPAA require covered entities and business associates conduct periodic compliance assessments and do they need to be outsourced?, Apgar & Associates, LLC Blog, June 2012 Risk Analysis versus Risk Assessment Conducting a risk analysis is not always the same as conducting a risk assessment, Apgar & Associates, LLC Blog, June 2012 Data Breach Examiner: Four Things You Need to Know About Risk Analysis, ID Experts, September 2012 March 2013 Bibliography - Apgar Page 4

5 Chapter author, Regulatory Aspects of Healthcare IT: Legal Best Practices and Requirements, Healthcare Information Technology Exam Guide, McGraw-Hill, 2013 Training/ Conferences/ Addresses: Healthcare: Privacy in a Digital Age, Concordia University, November 2001 The Successful Privacy Officer: The Steps Every Privacy Officer Should be Taking to Lead Their HCO Toward Compliance, Healthcare Intelligence Network, 2002 HIPAA Privacy Compliance, Costal Health & Train, 2002 HIPAA 2002: A Technical Look at Security & Privacy, American Health Quality Association Technical Conference, January 2002 A Conversation with Chris Apgar, Data Security Officer, Providence Health Plans, Oregon Medical Association, 2003 HIPAA Awareness, Oregon Department of Human Services, 2003\ Practical Strategies in Complying with the HIPAA Security Rule, International Association of Privacy Professionals Annual Conference, February 2003 Analysis of the Final HIPAA Security Rule, International Association of Privacy Professionals Annual Conference, February 2003 HIPAA Readiness Workshop: How to Submit Clean Claims When Carriers Requirements Differ, HCPro, Inc., August 2003 Role Based Access Control, HealthSec Conference & Expo, MIS Training Institute, September 2003 HIPAA Transactions and Code Sets After the Deadline: Strategies for Survival, Healthcare Intelligence Network, November 2003 Business Associates and Covered Entities: Adapt Contracts to Comply With New HIPAA Law, HCPro, Inc., 2003 Regulatory Education Series, Oregon Medical Association, 2004 to Present HIPAA Security: The One-Year Checklist, Healthcare Intelligence Network, 2004 HIPAA Security Auditing: How to Create a Consistent, Repeatable, and Documented Program, Healthcare Intelligence Network, 2004 HIPAA Security Rule, America s Health Insurance Plans, September 2004 HIPAA Security Auditing and Monitoring: Creating, Building and Testing a Strategy to Ensure Your Organization s Compliance, Healthcare Intelligence Network, 2004 Managing a Privacy & Security Compliance Program, HealthSec Conference & Expo, MIS Training Institute, September 2004 Security Roles, Responsibilities & Reporting: A Panel Discussion, HealthSec Conference & Expo, MIS Training Institute, September 2004 HIPAA Security & the Final Rules, HealthSec Conference & Expo, MIS Training Institute, September 2004 HIPAA Security Rule Overview, America s Health Insurance Plans, September 2004 HIPAA Security Auditing: How to Create a Consistent, Repeatable and Documented Program, Health Intelligence Network, November 2004 Adopting a Security Culture, HealthStream, Inc., November 2004 HIPAA Security Risk Assessment: An Audio Workshop, Healthcare Intelligence Network, 2005 HIPAA Security Rule Workshop, Northwest Benefit Planning, January 2005 HIPAA Security 201: Policies & Procedures, Oregon Medical Association, March 2005 March 2013 Bibliography - Apgar Page 5

6 HIPAA Security 201: Auditing & Monitoring Training, Oregon Medical Association, March 2005 Managing a Privacy & Security Compliance Program, IT Security World Conference & Expo, MIS Training Institute, September 2005 Why Worry About Security Compliance, Oregon & SW Washington Healthcare, Privacy & Security Forum, September 2005 Security Incident Response What to do if a Breach Occurs & How to Mitigate Damages, HIPAA Summit, September 2005 (NOTE: Presented at eight of the ten preceding summits but did not retain the presentation material) Security Incident Response: How Providers can Minimize Impact & Liability, Decision Health/UCG, October 2005 Protecting Patient Privacy, University of Portland, November 2005 National Provider Identifier: Know How Changes will Affect Your Business, HCPro, Inc., November Encryption Solution That Won't Break Your Budget, InBox Conference, Spring 2006 Encryption - Secure Transmission In A Not So Secure World, Lorman Education Services, Inc., March 2006 Healthcare: Ethics and Compliance, Lorman Education Services, Inc., March 2006 Find a Secure Solution: Protect Patient Privacy & Your Organization, HCPro, Inc., May 2006 Managing a Data Security Audit Program, HIPAA Summit, August 2006 Gauging the Maturity of Your Security Compliance Program, HealthSec Conference & Expo, MIS Training Institute, September 2006 Privacy/Security Identity Management, HIPAA Collaborative of Wisconsin Fall Conference, September 2006 National Provider Identifier Implementation: Comply and get paid, HCPro, Inc., October 2006 Legalities of Utilizing & Maintaining Computerized Medical Records in Oregon, Lorman Education Services, Inc., October 2006 National Provider Identifier Implementation: Comply & Get Paid, HCPro, Inc., October 2006 Document Retention & Destruction Program Development & Management, Lorman Education Services, Inc., October 2006 Privacy & Security Solutions for Interoperable Health Information Exchange, Workgroup for Electronic Data Exchange Fall Conference, November 2006 National Provider Identifiers: Health Plan Contingencies to Avert a Spring Disaster, AISHealth, December 2006 HIPAA Secure Transmission Rules: Minimizing Your Legal Risks, Progressive Business Publications, March 2007 Personal Health Records: An Industry Primer from a Privacy & Security Perspective, Workgroup for Electronic Data Interchange Spring Conference, May 2007 Alphabet Soup: Rules of the Game from the Privacy, Security & Interoperability Perspective, Workgroup for Electronic Data Interchange Spring Conference, May 2007 Health Information Security & Privacy Collaborative: Project Overview, Workgroup for Electronic Data Interchange Spring Conference, May 2007 CMS NPI Guidance, HCPro, Inc., May 2007 Document Retention A Legal Perspective, Lorman Education Services, Inc., May 2007 NPI: Strategies to prepare your contingency plan and get paid, HCPro, Inc., May 2007 HIPAA Security: Prevent & Respond to Breaches, HCPro, Inc., August 2007 March 2013 Bibliography - Apgar Page 6

7 Personal Health Records: Privacy & Security Best Practices, Progressive Business Publications, September 2007 The High Cost of Medical Identity Theft, IT Security World Conference Expo, MIS Training Institute, September 2007 How Much is Enough? Interpreting the HIPAA Security Rule (panel), IT Security World Conference Expo, MIS Training Institute, September 2007 Staffing for Security & Safety, Professional Association of Health Care Office Management Fall Conference, September 2007 Personal Health Records: Privacy and Security Best Practices, Progressive Business Publications, September 2007 Oregon Identity Theft Protection Act, Oregon Health Information Management Association Fall Conference, September 2007 Preparing for an Audit: The OIG is Coming, Workgroup for Electronic Data Interchange Fall Conference, November 2007 Are You at Risk: Business in a Digital World, Parker, Smith, Feek, November 2007 HIPAA Administrative Simplification Overview, Portland State University, November 2007 Subpoena, Court Order & Record Retention Requirements, Central City Concern, December 2007 Coordinating & Balancing Privacy, Security & Practical Operations, HIPAA Summit, December 2007 Healthcare Security Professional Advanced Problem Solving Roundtable (panel), HIPAA Summit, December 2007 Complying With New Health Data Breach Laws, MelaMedia, LLC, February 2008 Risk Analysis & Risk Management, ISSA Portland Student Chapter, April 2008 HIPAA Security Requirements: Prevent and Respond to Breaches, Progressive Business Conferences, May 2008 Electronic Health Records not the Solution: Bridge to Improved Health Information Exchange, Oregon Health Information Management Association Annual Conference, May 2008 EHR's Not the Solution - Bridge to Improved Health Information Exchange, Oregon Health Information Management Association Spring Conference, May 2008 Health Information Security & Privacy Collaboration: Phase III, WEDI Spring Conference, May 2008 Legal Issues Legal & Regulatory Issues Related to Health Information Exchange, Northwest Medical Informatics Symposium, September 2008 Personal Health Records: Overcome Privacy and Security Barriers and Other Challenges, HCPro, Inc., January 2009 ARRA & Red Flag Rules Changes in Healthcare Privacy and Security Requirements, Oregon Health Information Management Association Spring Conference, May 2009 Business Associated Action Plan: Comply with HITECH by February Deadline, HCPro, Inc., 2009 Legal Issues Legal & Regulatory Issues Related the Privacy & Security of Patient Information, RMC, Inc., February 2009 Legal Issues Legal & Regulatory Issues Related the Privacy & Security of Patient Information, Portland Medical Community Managers, April 2009 HCPro e-learning Changes on the Horizon, HCPro, Inc., May 2009 Covered Entities and Business Associates: Adapt Contracts to Comply with New HIPAA Law, HCPro Inc., July 2009; January 2010 Dealing with the Use of Social Networking and Communications Vehicles in the Healthcare Environment: Twitter, Facebook, MySpace, IM and P-2-P, 17th HIPAA Summit, August 2009 March 2013 Bibliography - Apgar Page 7

8 Healthcare Providers and Social Networking: New Threat to Patient Privacy presents Minimizing Liability for Unwitting Physician and Staff Breaches, Strafford Legal Webinars, October 2009 Social Networking and Healthcare Providers Minimizing Liability, Legal Publishing Group of Strafford Publications, October 2009 Security Audits From an Auditor s Perspective, American Heath Information Management Association Virtual Conference, December Challenges & Trends, ISSA Portland Chapter, January 2010 Social Networking: Risks to Privacy and Security, Iowa Medical Society, April 2010 Meaningful Use: What is it and what does it mean?, Portland Medical Community Managers, April 2010 EHR Implementation: What you need to know about security beyond Implementation, Oregon and Washington Medical Group Management Association Annual Conference, June 2010 Privacy & Security Breaches: Requirements & Responsibilities; Business Associates: Requirements & Responsibilities, Oregon Health Information Management Association Fall Conference, September 2010 The art of Social Networking, America Health Information Management Association Virtual Conference, September 2010 The Latest on Meaningful Use and EHR Certification: Implications for Privacy and Security, HIPAA Summit West, October 2010 Feeling Anti-Social? HIM Privacy & Social Media, American Health Information Management Association, April 2011 Privacy, Security and the HITECH Act: Compliance deadlines have come and gone, Greater Oregon Behavioral Health, Inc. Spring Conference, May 2011 Connectivity Solutions: Increasing Connectivity through Game-Changing Advances in HIT & HIE, World Congress Executive Forum & Expo on HealthCare Payment, July 2011 EHR Accounting of Disclosures Draft Rule Overview, AISHealth, July 2011 Social Media Risks & Remedies, AISHealth, November 2011 Patient Privacy Rights: Tips & Trends, International Association of Privacy Professionals, December 2011 HIMSS 2012, Symantec, February 2012 o Data Loss Prevention: If You Don t Want to Cry, Don t Spill the Milk in the First Place o Encryption: You Can make it Harder to Read than A Physician s Handwriting! o Name Your Poison: HHS Audit or OCR o HIPAA Audits: Double Your Pleasure, Double Your Fun Proposed Meaningful Use Stage 2 Requirements, Axway, March 2012 Electronic Health Records & Meaningful Use Incentives: Medicare & Medicaid, Oregon Psychiatric Association Annual Conference, March 2012 Privacy, Security and the American Recovery and Reinvestment Act: Health Care Regulatory Environment Overview, Portland State University, March 2012 How to Conduct a HIPAA Security Audit (or Risk Assessment), Healthcare Care Compliance Association Compliance Institute: April, 2012 Risk Analysis & Meaningful Use, Physicians Insurance, April 2012 How to Prepare for Office for Civil Rights HIPAA Audits, Oregon Health Information Management Association Spring Conference, May 2012 Incident Response: Are you ready?, HIPAA Summit West, October 2012 Mobile Devices: Managing Risk, Central Oregon Mobility Summit, October 2012 March 2013 Bibliography - Apgar Page 8

9 Managing Security and Compliance in a Virtual World, Healthcare IT News/HIMSS Media, October 2012 How to Prepare for Office for Civil Rights HIPAA Audits, Oregon Health Information Management Association, January 2013 EMPLOYMENT HISTORY: 2004 to Present: CEO & President of Apgar & Associates, LLC 2000 to Present: Contributing Editor of HCPro, Inc., Briefings on HIPAA 1998 to 2004: Information Security Officer and HIPAA Compliance Officer of Providence Health Plans REFERENCES: Available upon request. March 2013 Bibliography - Apgar Page 9

Business Associates and HIPAA

Business Associates and HIPAA Business Associates and HIPAA What BAs need to know to comply with HIPAA privacy and security rules by Dom Nicastro White paper The lax days of complying with privacy and security laws are over for business

More information

Santa Rosa Presents Webinar Series Electronic Health Records & Meaningful Use Incentives: Medicare & Medicaid

Santa Rosa Presents Webinar Series Electronic Health Records & Meaningful Use Incentives: Medicare & Medicaid Santa Rosa Presents Webinar Series Electronic Health Records & Meaningful Use Incentives: Medicare & Medicaid February 11, 2011 Chris Apgar, CISSP President Overview ARRA & Meaningful Use Rule Overview

More information

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego Meaningful Use as it Relates to HIPAA Compliance Sunday March 30, 2014, 9am noon HCCA Conference, San Diego CLAconnect.com Objectives and Agenda Understand the statutory and regulatory background and purpose

More information

HIPAA Overview. Darren Skyles, Partner McGinnis Lochridge. Darren S. Skyles dskyles@mcginnislaw.com

HIPAA Overview. Darren Skyles, Partner McGinnis Lochridge. Darren S. Skyles dskyles@mcginnislaw.com HIPAA Overview Darren Skyles, Partner McGinnis Lochridge HIPAA Health Insurance Portability and Accountability Act of 1996 Electronic transaction and code sets: Adopted standards for electronic transactions

More information

How to prepare your organization for an OCR HIPAA audit

How to prepare your organization for an OCR HIPAA audit How to prepare your organization for an OCR HIPAA audit Presented By: Mac McMillan, FHIMSS, CISM CEO, CynergisTek, Inc. Technical Assistance: 978-674-8121 or Amanda.Howell@iatric.com Audio Options: Telephone

More information

Does Your Information Security Program Measure Up? Session #74

Does Your Information Security Program Measure Up? Session #74 Does Your Information Security Program Measure Up? Session #74 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy

More information

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq. The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery

More information

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

Library Guide: HIPAA

Library Guide: HIPAA Library Guide: HIPAA Page 2 Table of Contents Overview...2 Course Descriptions: Privacy and Security Library: Business Practices to Protect Personal Health Information (HIPAA05)... 3 HIPAA: General Awareness

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

Joe Dylewski President, ATMP Solutions

Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare

More information

HIMSS and AHIMA: Trends in HIE Organizational Staffing. CMS ehealth Forum December 6, 2013

HIMSS and AHIMA: Trends in HIE Organizational Staffing. CMS ehealth Forum December 6, 2013 HIMSS and AHIMA: Trends in HIE Organizational Staffing CMS ehealth Forum December 6, 2013 Scott MacLean Introductions Chair, HIMSS Board of Directors Deputy CIO, Director of IS Operations, Partners HealthCare

More information

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents 2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

HIPAA Security Risk Analysis for Meaningful Use

HIPAA Security Risk Analysis for Meaningful Use HIPAA Security Risk Analysis for Meaningful Use NOTE: Make sure your computer speakers are turned ON. Audio will be streaming through your speakers. If you do not have computer speakers, call the ACCMA

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

Health Homes Implementation Series: NYeC Privacy and Security Toolkit. 16 February 2012

Health Homes Implementation Series: NYeC Privacy and Security Toolkit. 16 February 2012 Health Homes Implementation Series: NYeC Privacy and Security Toolkit 16 February 2012 1 Agenda What are the New York ehealth Collaborative (NYeC) and the Regional Extension Center? What are Health Homes?

More information

Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes

Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes Watch the Replay Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes FairWarning Executive Webinar Series May 20, 2014 #AnytimeAudit Today s Panel Laura E. Rosas, JD, MPH

More information

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014 OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2 Linda Sanches, MPH Senior Advisor, Health Information Privacy HCCA Compliance Institute March 31, 2014 Agenda Background Audit Phase

More information

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing

More information

Appendix B: Existing Guidance to Support HIE Implementation Opportunities

Appendix B: Existing Guidance to Support HIE Implementation Opportunities Appendix B: Existing Guidance to Support HIE Implementation Opportunities APPENDIX B: EXISTING GUIDANCE TO SUPPORT HIE IMPLEMENTATION OPPORTUNITIES There is an important opportunity for the states and

More information

A smarter way to protect your brand. Copyright 2012 Compliance 360 All Rights Reserved

A smarter way to protect your brand. Copyright 2012 Compliance 360 All Rights Reserved A smarter way to protect your brand Minimizing Compliance Risks of Proactive OCR HIPAA Audits Copyright 2012 Compliance 360 All Rights Reserved Compliance 360 at a Glance Compliance, Risk and Audit Solutions

More information

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

Health Insurance Portability and Accountability Act HIPAA. Glossary of Common Terms

Health Insurance Portability and Accountability Act HIPAA. Glossary of Common Terms Health Insurance Portability and Accountability Act HIPAA Glossary of Common Terms Terms: HIPAA Definition*: PHCS Definition/Interpretation: Administrative Simplification HIPAA Subtitle F It is the purpose

More information

HEALTH IT! LAW & INDUSTRY

HEALTH IT! LAW & INDUSTRY A BNA, INC. HEALTH IT! LAW & INDUSTRY Meaningful Use REPORT VOL. 2, NO. 15 APRIL 12, 2010 BNA Insights: Toward Achieving Meaningful Use: HHS Establishes Certification Criteria for Electronic Health Record

More information

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits Presented by: Don Waechter, Managing Partner Health Compliance Partners Ann Breitinger, Attorney Blalock Walters Legal Disclaimer

More information

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com HIT Audit Workshop Jeffrey W. Short jshort@hallrender.com 1 Audits and Investigations to be Discussed Meaningful Use Audits HIPAA Audits Data Breach Investigations Software Vendor Audits FTC Investigations

More information

Meaningful Use and Security Risk Analysis

Meaningful Use and Security Risk Analysis Meaningful Use and Security Risk Analysis Meeting the Measure Security in Transition Executive Summary Is your organization adopting Meaningful Use, either to gain incentive payouts or to avoid penalties?

More information

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1 HIPAA/HITECH Privacy and Security for Long Term Care 1 John DiMaggio Chief Executive Officer, Blue Orange Compliance Cliff Mull Partner, Benesch, Healthcare Practice Group About the Presenters John DiMaggio,

More information

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

HIPAA Compliance Audits: Your Newest Risk: Are You Prepared?

HIPAA Compliance Audits: Your Newest Risk: Are You Prepared? HIPAA Compliance Audits: Your Newest Risk: Are You Prepared? Presented by: Melissa (Lisa) Thompson, JD, MPH and Elizabeth Lamkin, MHA Slide 1 Speakers Melissa (Lisa) Thompson, JD, MPH Partner Adelman,

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011 Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8

More information

Regulatory Compliance Tools from Strategic Management Services March 27, 2012

Regulatory Compliance Tools from Strategic Management Services March 27, 2012 Streamlining Assessments with Regulatory Compliance Tools from Strategic Management Services March 27, 2012 Presented by: Scott Shepherd, SAI Global Compliance 360 GRC Software Suite Camella Boateng, Strategic

More information

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by: HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates

More information

Privacy and Security: Meaningful Use in Healthcare Organizations

Privacy and Security: Meaningful Use in Healthcare Organizations Privacy and Security: Meaningful Use in Healthcare Organizations Phyllis A. Patrick, MBA, FACHE, CHC July 20, 2011 Webinar Essentials 1. Session is currently being recorded, and will be available on our

More information

Opportunities for Medicaid to Invest in HIT. Shannah Koss, Principal Koss on Care LLC

Opportunities for Medicaid to Invest in HIT. Shannah Koss, Principal Koss on Care LLC Opportunities for Medicaid to Invest in HIT Shannah Koss, Principal Koss on Care LLC Topics Key HIT components in the ARRA What is happening in state Medicaid programs today? Challenges and opportunities

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

Maintaining the Privacy of Health Information in Michigan s Electronic Health Information Exchange Network. Draft Privacy Whitepaper

Maintaining the Privacy of Health Information in Michigan s Electronic Health Information Exchange Network. Draft Privacy Whitepaper CHARTERED BY THE MICHIGAN HEALTH INFORMATION NETWORK SHARED SERVICES MIHIN OPERATIONS ADVISORY COMMITTEE (MOAC) PRIVACY WORKING GROUP (PWG) Maintaining the Privacy of Health Information in Michigan s Electronic

More information

HIPAA Overview and updates since HITECH and PPACA

HIPAA Overview and updates since HITECH and PPACA HIPAA Overview and updates since HITECH and PPACA Presented by: Angela Miller, CMC, CHC Medical Auditing Solutions LLC 2013 (c)2013 Medical Auditing Solutions LLC 1 Learning Objectives Overview the high

More information

PCPCC National Briefing/Webinar

PCPCC National Briefing/Webinar PCPCC National Briefing/Webinar O V E R C O M I N G B A R R I E R S T O C O L L A B O R A T I O N A M O N G B E H A V I O R A L H E A L T H A N D P R I M A R Y C A R E P R O V I D E R S D A Y N A B O W

More information

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Business Associates, HITECH & the Omnibus HIPAA Final Rule Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

How to Use the NYeC Privacy and Security Toolkit V 1.1

How to Use the NYeC Privacy and Security Toolkit V 1.1 How to Use the NYeC Privacy and Security Toolkit V 1.1 Scope of the Privacy and Security Toolkit The tools included in the Privacy and Security Toolkit serve as guidance for educating stakeholders about

More information

HIPAA: AN OVERVIEW September 2013

HIPAA: AN OVERVIEW September 2013 HIPAA: AN OVERVIEW September 2013 Introduction The Health Insurance Portability and Accountability Act of 1996, known as HIPAA, was enacted on August 21, 1996. The overall goal was to simplify and streamline

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

HIPAA Privacy and Business Associate Agreement

HIPAA Privacy and Business Associate Agreement HR 2011-07 ATTACHMENT D HIPAA Privacy and Business Associate Agreement This Agreement is entered into this day of,, between [Employer] ( Employer ), acting on behalf of [Name of covered entity/plan(s)

More information

HIPAA Security Compliance Reviews

HIPAA Security Compliance Reviews HIPAA Security Compliance Reviews Elizabeth S. Holland, MPA Office of E-Health Standards and Services Centers for Medicare & Medicaid Services U.S. Department of Health and Human Services 1 2 What is HIPAA?

More information

The benefits you need... from the name you know and trust

The benefits you need... from the name you know and trust The benefits you need... Privacy and Security Best at Practices the price you can afford... Guide from the name you know and trust The Independence Blue Cross (IBC) Privacy and Security Best Practices

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

OCR/HHS HIPAA/HITECH Audit Preparation

OCR/HHS HIPAA/HITECH Audit Preparation OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education

More information

HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply

HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply October 18, 2013 ACEDS Membership Benefits Training, Resources and Networking for the ediscovery Community Exclusive News and

More information

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS Security solutions for patient and provider access AT A GLANCE Healthcare organizations of all sizes are responding to the demands of patients, physicians,

More information

HIPAA Security Overview of the Regulations

HIPAA Security Overview of the Regulations HIPAA Security Overview of the Regulations Presenter: Anna Drachenberg Anna Drachenberg has been assisting healthcare providers and hospitals comply with HIPAA and other federal regulations since 2008.

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

The HIPAA Audit Program

The HIPAA Audit Program The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance

More information

2009 HIMSS Security Survey

2009 HIMSS Security Survey 2009 HIMSS Security Survey Statement to the HIT Standards Committee Privacy and Security Workgroup Lisa Gallagher, BSEE, CISM, CPHIMS Healthcare Information and Management Systems Society Secretary Chopra,

More information

Headaches and Pitfalls in Business Associate Contract Management

Headaches and Pitfalls in Business Associate Contract Management Headaches and Pitfalls in Business Associate Contract Management ISACA Puget Sound Chapter September Monthly Luncheon Meeting September 17, 2013 2013 Christiansen IT Law Presenter CV John R. Christiansen,

More information

PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE

PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE THIS AGREEMENT, effective, 2011, is between ( Provider Organization ), on behalf of itself and its participating providers ( Providers

More information

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C.

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C. HIPAA Hot Topics Audits, the Latest on Enforcement and the Impact of Breaches September 2012 Nashville Knoxville Memphis Washington, D.C. Overview HITECH Act HIPAA Audit Program: update and initial results

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Compliance and the Protection of Patient Health Information HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance

More information

COURSE SYLLABUS Health Information Management Program

COURSE SYLLABUS Health Information Management Program COURSE SYLLABUS Health Information Management Program Course Title: Legal Aspects of Health Information Course Number: Credit Hours: 2 Term: Fall, 2013 Method of Delivery: Online Prerequisites: BIO 111;

More information

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE [ Hosting for Healthcare: Addressing the Unique Issues of Health IT & Achieving End-to-End Compliance

More information

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)

More information

White Paper #6. Privacy and Security

White Paper #6. Privacy and Security The Complexity of America s Health Care Industry White Paper #6 Privacy and Security www.nextwavehealthadvisors.com 2015 Next Wave Health Advisors and Lynn Harold Vogel, Ph.D. The Complexity of America

More information

Essential Skills for Business Analysts in the Healthcare Domain

Essential Skills for Business Analysts in the Healthcare Domain #ASPEevents Essential Skills for Business Analysts in the Healthcare Domain Essential Skills for Business Analysts in the Healthcare Domain Presented By Mary C. Zarba, MBA Vail, Colorado Welcome!! One

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and

More information

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.

More information

Cost Effective Protection Against HIPAA Enforcement

Cost Effective Protection Against HIPAA Enforcement Cost Effective Protection Against HIPAA Enforcement With Special Guest Speaker: Joe Dylewski, President, ATMP Group Joseph Dylewski is a twenty-three year Information Technology Professional veteran, with

More information

HIPAA COMPLIANCE PLAN FOR 2013

HIPAA COMPLIANCE PLAN FOR 2013 HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

General HIPAA Implementation FAQ

General HIPAA Implementation FAQ General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,

More information

CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM

CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM The Centers for Medicare & Medicaid Services (CMS) and the Office of the National Coordinator

More information

Somansa Data Security and Regulatory Compliance for Healthcare

Somansa Data Security and Regulatory Compliance for Healthcare Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,

More information

HIPAA Privacy & Security Rules

HIPAA Privacy & Security Rules HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to

More information

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire Compliance, Security and Risk Management Relationship Advice Andrew Hicks, Director Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control panel on

More information

Special Topics in Vendor-Specific Systems

Special Topics in Vendor-Specific Systems Special Topics in Vendor-Specific Systems Quality Certification of Commercial EHRs Quality Certification of Commercial EHRs Learning Objectives 1. Describe the Certification Commission for Health Information

More information

Will the Feds Really Buy Me an EHR?

Will the Feds Really Buy Me an EHR? Steven Waldren, MD, David C. Kibbe, MD, MBA, and Jason Mitchell, MD Will the Feds Really Buy Me an EHR? and Other Commonly Asked Questions About the HITECH Act The economic stimulus package offers $19

More information

Healthcare Payment Processing: Managing Data Security and Privacy Risks

Healthcare Payment Processing: Managing Data Security and Privacy Risks Moderator: Linda A. Malek Chair, Healthcare Moses & Singer LLP Healthcare Payment Processing: Managing Data Security and Privacy Risks Thursday, September 13, 2012 Panelists: Beth L. Rubin Senior Counsel

More information

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Developing HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant

Developing HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant Developing HIPAA Security Compliance Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant Learning Objectives Identify elements of a HIPAA Security compliance program Learn the HIPAA Security Rule basics

More information

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule Understanding Health Insurance Portability Accountability Act AND HITECH HIPAA s Privacy Rule 1 What Is HIPAA s Privacy Rule The privacy rule is a component of the Health Insurance Portability and Accountability

More information

Objectives 5/5/2015. Quality Health Associates (QHA) of ND

Objectives 5/5/2015. Quality Health Associates (QHA) of ND Privacy and Security: HIPAA/HITECH/Meaningful Use Looking Back, Forging Ahead Patti Kritzberger, RHIT, CHPS Quality Health Associates of North Dakota HIT/Quality Improvement Specialist Quality Health Associates

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

HIPAA Privacy and Security Requirements

HIPAA Privacy and Security Requirements 600 East Superior Street, Suite 404 I Duluth, MN 55802 I Ph. 800.997.6685 or 218.727.9390 I www.ruralcenter.org HIPAA Privacy and Security Requirements Joe Wivoda CIO and HIT Consultant June 19, 2013 Purpose

More information

Are You Prepared for an OCR HIPAA Audit or Investigation? February 15, 2012 ID Experts Webinar www.idexpertscorp.com

Are You Prepared for an OCR HIPAA Audit or Investigation? February 15, 2012 ID Experts Webinar www.idexpertscorp.com Are You Prepared for an OCR HIPAA Audit or Investigation? February 15, 2012 ID Experts Webinar www.idexpertscorp.com Mahmood Sher-Jan VP of Product Management mahmood.sher-jan@idexpertscorp.com Chris Apgar

More information

HEALTH INFORMATION TECHNOLOGY*

HEALTH INFORMATION TECHNOLOGY* GLOSSARY of COMMON TERMS and ACRONYMS In HEALTH INFORMATION TECHNOLOGY* (April 2011) AHIC American Health Information Community The AHIC was a federal advisory panel created by HHS to make recommendations

More information

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University

More information