HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives

Size: px
Start display at page:

Download "HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives"

Transcription

1 HIPAA and New Technologies Using Social Media and Texting Within the Rules Jim Sheldon-Dean Director of Compliance Services Lewis Creek Systems, LLC For Northern California Chapter Healthcare Financial Management Association October 28, Today s Objectives Discuss how to handle patient communications Explain the issues involved with using Social Media and Texting Discuss how Social Media and Texting can work under HIPAA Identify guidance from HHS for patient communications Discuss new rights for electronic copies of electronic records Show the new process that must be used in the event of breach Learn about being prepared for enforcement and auditing Learn how to approach compliance Q&A session jim@lewiscreeksystems.com

2 My Background Disclaimer: I am an engineer, not a lawyer, and this is not legal advice I am only providing information and resources BSCE (Civil Engineering) from UVM, MST (Transportation) from MIT More than 32 years in consulting, information systems, software development, and information security Process, problem-solving oriented 8 years as Vermont EMT, crew chief 14 years in HIPAA and health information privacy and security regulatory compliance See for more details, resources, information security compliance news, etc. jim@lewiscreeksystems.com The Long Path of HITECH Health Information Technology for Economic and Clinical Health Act, or the HITECH Act, under consideration in 2008 Became Title XIII, Subtitle D-Privacy (all the sections 134xx) of the American Recovery and Reinvestment Act of 2009 Most of the proposed rules finalized in the big HIPAA Omnibus Update, enforceable as of September 23, 2013 Omnibus Update Rule, with Preamble, available at: New Combined Rules published by HHS OCR, available at: index.html jim@lewiscreeksystems.com

3 HIPAA Privacy & Security Rules Privacy Rule 45 CFR 164.5xx, enforceable since 2003 Establishes Rights of Individuals Controls on Uses and Disclosures Baseline Privacy and Security Protections for PHI Security Rule 45 CFR 164.3xx, enforceable since 2005 Applies to all electronic PHI Flexible, customizable approach to health information security Uses Risk Analysis to identify and plan the mitigation of security risks Calls for numerous Policies and Procedures Now being enforced much more vigorously HIPAA Breach Notification Rule CFR 45 Part 164 Subpart D; 45 CFR 164.4xx Enforceable since February 2010, Final Rule now in effect, with new changes in how to determine if a breach must be reported Works with Privacy and Security Rules Requires reporting of all PHI breaches to HHS and individuals; breaches affecting 500 or more individuals must be reported to individuals, HHS, and the Press, simultaneously Provides great examples of what not to do; HHS Wall of Shame: breachnotificationrule/breachtool.html jim@lewiscreeksystems.com

4 Designated Record Set In 45 CFR : (1) A group of records maintained by or for a covered entity that is: (i) The medical records and billing records about individuals maintained by or for a covered health care provider; (ii) The enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or (iii) Used, in whole or in part, by or for the covered entity to make decisions about individuals. (2) For purposes of this paragraph, the term record means any item, collection, or grouping of information that includes protected health information and is maintained, collected, used, or disseminated by or for a covered entity. jim@lewiscreeksystems.com Individual Access of PHI Must have a process for individual to request access, for reasonable cost-based fee Must provide the entire record in the Designated Record Set if requested: Medical and billing records used in whole or in part to make decisions related to health care Information kept electronically must be available electronically if requested Exceptions for Psychotherapy notes, proceedings, if harm may result, if it would expose provider of confidential information Changes to HIPAA and CLIA allow access of lab information Automatic 30-day extension to provide records held off-site no longer allowed Make sure your Notice of Privacy Practices is up-to-date jim@lewiscreeksystems.com

5 New Guidance on Access of PHI Guidance on Access of PHI, particularly concerning minors and mental health information: special/mhguidance.html Guidance clarifying that same-sex spouses have the same HIPAA rights as other family members, no matter where services are provided: special/samesexmarriage/index.html Access and Individual Preferences (b)(1) Standard: Confidential Communications Requirements (i) A covered health care provider must permit individuals to request and must accommodate reasonable requests by individuals to receive communications of protected health information from the covered health care provider by alternative means or at alternative locations (c) Provision of Access (2) Form of access requested. (i) The covered entity must provide the individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. New (c)(2)(ii): If PHI is electronic, individual may request electronic copy. jim@lewiscreeksystems.com

6 , Texting, and Security and texting are inherently insecure Unless steps are taken, and texts may be retained or exposed by unknown parties Secure communications are essentially required as good practice for professional communications Yahoo mail, g-mail, texting, etc., are all insecure means of communication and their use may be considered a breach Technologies for securing communications are readily available today Security Rule requires consideration of encryption of data at rest and data in motion Security rule does not explicitly require encryption Risk Analysis may indicate need to encrypt over the Internet Professional communications must be encrypted over the Internet Guidance says plain with patients is fine if they want it Evaluate the risks and discuss with the individual Guidance says nothing about Texting May apply the same logic to Texting jim@lewiscreeksystems.com Patient Communications Guidance HHS Guidance and Preamble discussions in new rules say unencrypted between providers and patients is permitted if the patient requests it, per See HHS Guidance, Question 3, page 3: special/healthit/safeguards.pdf See Preamble to Omnibus Update, page 5634: pdf See Preamble to CLIA/HIPAA Modifications, page 7302: pdf jim@lewiscreeksystems.com

7 Texting is Very Useful Fast way to communicate short messages Useful for Updates, Schedule Changes Easy to communicate if running late, etc. Quick communication of results, comments More appropriate than an or phone call Can be more discreet and private than a phone conversation Can be quicker than a phone call for short messages Can provide accurate information not dependent on voice Many communications used to go by Pager Many paging operations moving to texting now Texting is more interactive than paging jim@lewiscreeksystems.com Issue Number One with Texting It s a Privacy thing Patients may not appreciate the risks of loss of privacy through texting HIPAA does require you to do your best to meet patient preferences for communication method Use Risk Analysis to evaluate and explain risks Provide a secure solution for those who prefer it It s a new technology and people will not understand it fully for quite some time jim@lewiscreeksystems.com

8 Issue Number Two with Texting Documentation: It s a Medical Records thing Regular texting doesn t provide a paper trail of conversations and contacts If it s part of patient care, it needs to be documented properly, and that requires more than regular texting A secure, traceable texting technology is important when medical record information is texted jim@lewiscreeksystems.com Secure Texting Solutions Cortext by Imprivata Comes in several versions Free app provides a secure channel Upgrades provide documentation, reporting, etc. TigerText Free app provides a secure channel DocHalo jim@lewiscreeksystems.com

9 Texting Education and Policies Staff can forget the rules with something new Educate the staff as to the risks and what MUST NOT be sent via plain or text message Establish secure, private and text messaging for private information (using Cortext by Imprivata, or TigerText, for instance, for texting) Define policies for use of and texting Require Risk Analysis for any uses of any or texting involving PHI Include process for approving and monitoring uses Include standards for allowable interactions via regular & texting Identify secure services to be used where secure and texting would be appropriate Texting Policy Contents Be brief and to the point Separation of Personal and Business activity Separation of Business and Patient information Requirement to encrypt any communications with PHI Provide Examples of what to do and what not to do Defining exceptions based on risk and need Define Rules for using any new technology Provide for regular reviews of usage to stay within bounds of HIPAA privacy and security rules Training, training, training!! Documentation, documentation, documentation!!

10 Social Media is Here to Stay Social Media now entrenched in society Facebook, Linked-In, Twitter, Instagram, Issues of Privacy Issues of management of communications Must be considered in policy Define roles, limits, guidelines Communication Issues Staff must distinguish between personal and entity use Staff may not represent entity unless authorized to Designate an authorized spokesperson for public contact Require tracking and retaining any data that may be treatment information as part of a medical record Establish use of private social networks for professional purposes carefully Don t forget, the usual HIPAA rules all still apply! jim@lewiscreeksystems.com

11 How Patients Want to Use Social Media Patients want to share experiences and treatments Patients want to share with providers and other patients There are significant benefits to sharing information as part of some treatment and healing processes Some younger patients (or clients) may be intensive users of social media and would prefer to communicate there, despite any privacy concerns How Professionals Want to Use Social Media Professional Support Group Share treatments and experiences with other providers Providers want to reach out to: Patients for marketing The Community for marketing Providers want to interact with some patients/clients There are significant benefits to sharing information as part of some treatment and healing processes Providers have to do what they need to to achieve their health care goals

12 Roles for Social Media Marketing Who represents you within your organization for those media? Are policies clear and unambiguous? Is there a formal approval channel, just like for any other official communication? Any rogue staff members representing themselves officially? Treatment Staying in touch for group therapies Discussing treatments for classes of patients in a group Professional Support Finding solutions, treatments Sharing experiences Any staff members sharing on inappropriate social media? jim@lewiscreeksystems.com The Number One Issue: Privacy Patients and clients may not appreciate the risks of loss of privacy through social media HIPAA does require you to do your best to meet patient preferences for communication method Use Risk Analysis to evaluate and explain risks Providers may not appreciate the risks of exposures and breaches under HIPAA Has the risk analysis considered social media? Is the organization prepared for breaches? Is the organization prepared for audits? It s a new technology and people will not understand it fully for quite some time jim@lewiscreeksystems.com

13 Issue Number Two: Documentation It s a Medical Records thing Regular Social Media do not provide a paper trail of conversations and contacts If it s part of patient care, it needs to be documented properly, and that requires more than Facebook or Twitter But Social Media can still be used for administrative or informative processes, so long as there is no PHI jim@lewiscreeksystems.com Issue Number Three: The Organization s Reputation Social Media is just like any media: If you don t control what is provided in your name to the media, your reputation may be permanently damaged If you don t manage the interaction, it may work against you in the modern world You must decide who is responsible for the organization s presence on social media and dedicate the resources for it Who should manage the presence? How will breaking news be handled? Who should definitely NOT be representing themselves as the organization jim@lewiscreeksystems.com

14 Managing Social Media Communications Discover how it is being used now do some research you probably have social-media-savvy staff on hand Define the three roles of Marketing, Treatment, and Professional Support Define the responsibilities and adopt policy for marketing via social media make sure staff knows they re not allowed to unilaterally represent themselves for the organization Define how social media may or may not be used for treatment purposes, and how to get approval make sure staff knows they can t make these decisions on their own Define what social media may be appropriate for professional support purposes and what information is to be shared make sure staff knows not to share any Protected Health Information inappropriately jim@lewiscreeksystems.com Preventing Social Media Issues Educate the staff as to the risks and what MUST NOT be posted on Facebook, Linked-In, Twitter, Instagram, etc. Establish private social media sites for private information (using Yammer, for instance) Define policies for use of social media for patient/client interactions Include process for approving and monitoring uses Include standards for allowable interactions on social media Identify secure social media services for appropriate group work Define policies for use of social media to address the public Include chain of command for communications Apply consistent resources to monitor and manage public interactions on social media Define policies for use of social media for professional support Define limits and allowable forums for various classes of data jim@lewiscreeksystems.com

15 Social Media Policies Be brief and to the point Cover Blogging, Collaborative Wikis, as well as Social Networks such as Facebook, Linked-In, Twitter, etc. Separation of Personal and Business activity Provide Examples of what to do and what not to do Say how you will manage any business presence Define Responsibilities for Official Representatives Define Rules for establishing any new presence on-line Provide for regular reviews of usage to stay within bounds of HIPAA privacy and security rules Training, training, training!! Documentation, documentation, documentation!! Information Security Management Process Definition of Information Security Protecting: Confidentiality Integrity Availability Definition of a Management Process: Define and understand what you have See how well it performs Watch for problems Review activities and issues Make changes based on bang-for-buck jim@lewiscreeksystems.com

16 Information Security Management Process Information Inventory and Flow Analysis Access and Configuration Control Know who and whats been going on in your networks and systems Respond to and learn from Incidents Audit and review regularly, and when operations or environment change Make risk-based improvements Focus: Confidentiality, Integrity, Availability What is a HIPAA Breach? Breach is any acquisition, access, use, or disclosure in violation of the Privacy Rule Exceptions Not Reportable if: Secured or destroyed Unintentional internal use, in good faith, with no further use Inadvertent internal use, within job scope Info cannot be retained Harm Standard removed from regulation Not reportable if a low probability of compromise based on a risk assessment jim@lewiscreeksystems.com

17 Is It a Reportable Breach? All breaches of unsecured PHI not meeting an exception are reportable, unless there is a low probability of compromise of the data, based on a risk assessment including at least: what was the info, how well identified was it, and is its release adverse to the individual to whom it was disclosed was it actually acquired or viewed the extent of mitigation All breaches, large and small, reportable to the individuals promptly, within 60 days Breaches affecting 500 or more individuals must also be reported to HHS and the press within 60 days of discovery By March 1, every year: Report prior year s small breaches to HHS To file breaches with HHS: jim@lewiscreeksystems.com HHS Report to Congress for 2009 and 2010 breaches For reported breaches of 500 or more individuals PHI in the first year of the reporting requirement: 76% of breaches involve loss (15%), theft (56%), or improper disposal (5%) Old-fashioned physical security of valuable data 17% are caused by unauthorized access or disclosure 6% are caused by hacking Portable data, laptops, smart phones, memory sticks the leaders for breaches of PHI, but servers not immune from physical or technical attack For smaller breaches, under 500 individuals: Largely single individuals affected Misdirected fax, , or hard copy communication breachnotificationrule/breachreptmain.html jim@lewiscreeksystems.com

18 HHS Report to Congress for 2011 and 2012 breaches For large breaches, affecting 500 or more individuals: In 2011 and 2012, HHS received 458 reports, affecting million people 0.97 percent of reports, but affected percent of affected individuals For smaller breaches, affecting fewer than 500 individuals: In 2012, there were 21,194 reports, affecting a total of 165,135 individuals In 2012, 83% took place at healthcare providers and 17% at health plans How? The most common causes: theft: 53%, unauthorized access or disclosure: 18% The largest number of individuals affected: due to theft, at 36% of all affected Where was the data? Laptop computers (27%), paper (23%), network servers, (13%), desktop computers (12%), and portable electronic devices (9%) jim@lewiscreeksystems.com Lessons Learned from PHI Breaches Encrypt whatever you reasonably can; honor wishes of the individuals for communication but explain the risks Check fax numbers and addresses regularly Use physical safeguards to restrict access to devices with PHI Reduce risk through network or enterprise storage as alternative to local devices Encrypt data at rest on any desktop or portable device/media storing ephi anything that isn t bolted down Have clear and well documented administrative and physical safeguards on the portable media which handle ephi Raise the security awareness of workforce members and managers to promote good data stewardship jim@lewiscreeksystems.com

19 New Enforcement Definitions Reasonable Cause: An act or omission in which a covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission violated an administrative simplification provision, but in which the covered entity or business associate did not act with willful neglect Reasonable Diligence: Business care and prudence expected from a person seeking to satisfy a legal requirement under similar circumstances Willful Neglect: Conscious, intentional failure or reckless indifference to the obligation to comply with the administrative simplification provision violated jim@lewiscreeksystems.com Tiered Penalty Structure Tier 1: Did not know and, with reasonable diligence, would not have known $100 - $50,000 per violation Tier 2: Violation due to reasonable cause and not willful neglect $ $50,000 per violation Tier 3: Violation due to willful neglect and corrected within 30 days of when known or should have been known with reasonable diligence $10,000 - $50,000 per violation Tier 4: Violation due to willful neglect and NOT corrected within 30 days of when known or should have been known with reasonable diligence $50,000 per violation Affirmative Defenses and Waivers may be available but not when willful neglect is involved Continued corrective action allowed, even if no penalty $1.5 million maximum for all violations of a similar type in a calendar year Can levy penalties on a daily basis! jim@lewiscreeksystems.com

20 HHS Is Serious About Enforcement $4.3 million fine for Cignet Health of Maryland for multiple HIPAA violations $1 million settlement with Mass General Hospital for records left on the subway $865K+ settlement with UCLA Medical Center for snooping in celebrity records Multiple multi-million dollar settlements with pharmacies for poor disposal of PHI $100K settlement with a physician s office for Security Rule violations $1.5 million settlement with BC/BS of Tennessee for lost hard drives $1.7 million settlement with Alaska Medicaid for lack of security process $1.5 million settlement with MEEI for lack of security for portable devices $50K settlement with Hospice of North Idaho for insecure laptop, no process $400K settlement with Idaho State University for insecure server, no process $275K settlement with Shasta Regional Med Center for inappropriate disclosure of PHI and lack of sanctions for violations $1.7 million settlement with WellPoint for insecure server, no process $1.2 million settlement with Affinity Health for improper disposal of copiers $150K settlement with APDerm for lost insecure USB drive and no Breach policies $215K settlement with Skagit County, WA for insecure server, no process $2 million in settlements with 2 entities for unsecured stolen laptops $4.8 million in settlements with Columbia/Presbyterian for poor server management $800K settlement with Parkview Health System for mishandled paper records jim@lewiscreeksystems.com What is a HIPAA Audit? Initial program conducted in 2012, being revised for New program already getting started initial survey of 1200 entities Will focus on identified problem areas from 2012: laptops, encryption, internal reviews and audits, risk analysis, and access of records Show you have in place all the policies and procedures required by the HIPAA Privacy and Security Rules Show you have been using them e.g., Show training policy, training materials, and training rosters e.g., Show security incident policy and security incident reports 2 week notice! You must be prepared in advance or it s too late! jim@lewiscreeksystems.com

21 2012 HIPAA Audit Program Overall Small covered entities (30% of the sample) had 66% of the deficiencies Health care providers (50% of the sample) had 81% of the deficiencies Security findings were 2/3 of the issues. Security issues User activity monitoring Contingency planning Authentication/integrity Media reuse and destruction Risk assessment Granting and modifying user access Privacy Issues Review process for denials of patient access to records Failure to provide appropriate patient access to records Lack of policies and procedures Uses and disclosures of decedent information Disclosures to personal representatives Business associate contracts Method for New Audits Find audit targets through survey of 1200 entities Approximately 200 Desk audits of specific issues All communication, submissions electronic, via portal NO CHANCE to provide additional information you must provide what is needed the first time Approximately 200 Field audits as necessary, depending on budget Get list of Business Associates from audit targets Audit Covered Entities in , BAs in

22 How to Prepare for an Audit 1. Do it NOW, before they call 2. Be ready to answer the questions asked in prior audits 3. Document any policies and procedures, and any action, activity, or assessment performed pursuant to compliance with the rules 4. Make sure your documentation is complete and up-to-date use tools to evaluate and document your compliance history HIPAA Audit Protocol downloaded to a spreadsheet, to link all your policies and procedures and documentation to the regulations so they re easy to find for daily use and in the event of an audit NIST HIPAA Security Rule Toolkit: New ONCHIT/OCR/OGC Security Risk Assessment Tool, with versions for ipad and Windows 7 jim@lewiscreeksystems.com Your To-Do List Find out what people are doing already Consider professional communications & patient communications separately Document your processes for proper methods of communications Find ways to secure professional communications Accommodate new individual rights Find ways to offer secure patient communications Develop and document the process for adopting and using insecure communications (plain , social media, and texting) if patients desire Establish your processes for Risk Analysis and Documentation Document your communications policies and procedures Update your Notice of Privacy Practices Train staff in new policies and procedures Document, document, document! Always have a plan for moving forward, and follow it! jim@lewiscreeksystems.com

23 Thank you! Any Questions? For additional information, please contact: Jim Sheldon-Dean Lewis Creek Systems, LLC 5675 Spear Street, Charlotte, VT

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

OCR Reports on the Enforcement. Learning Objectives

OCR Reports on the Enforcement. Learning Objectives OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

New HIPAA Rules and EHRs: ARRA & Breach Notification

New HIPAA Rules and EHRs: ARRA & Breach Notification New HIPAA Rules and EHRs: ARRA & Breach Notification Jim Sheldon-Dean Director of Compliance Services Lewis Creek Systems, LLC www.lewiscreeksystems.com and Raj Goel Chief Technology Officer Brainlink

More information

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.

More information

What do you need to know?

What do you need to know? What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

HIPAA in an Omnibus World. Presented by

HIPAA in an Omnibus World. Presented by HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement Office of the Secretary Office for Civil Rights () Current Developments in Privacy and Security Rule Enforcement Michigan Medical Billers Association Andrew C. Kruley, J.D. Equal Opportunity Specialist

More information

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013 Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013 Presentation Overview s investigative

More information

OCR UPDATE Breach Notification Rule & Business Associates (BA)

OCR UPDATE Breach Notification Rule & Business Associates (BA) OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the

More information

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C.

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C. HIPAA Hot Topics Audits, the Latest on Enforcement and the Impact of Breaches September 2012 Nashville Knoxville Memphis Washington, D.C. Overview HITECH Act HIPAA Audit Program: update and initial results

More information

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update OCR / WEDI Webinar Series July 17, 2013 Today s Speakers Verne Rinker, JD, MPH Health Information Privacy Specialist

More information

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer HIPAA LIAISON MEETING PRESENTAITON August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer Current State of HIPAA Enforcement Content Contributor Abby Bonjean, Investigator Office for

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA 101. March 18, 2015 Webinar

HIPAA 101. March 18, 2015 Webinar HIPAA 101 March 18, 2015 Webinar Agenda Acronyms to Know HIPAA Basics What is HIPAA and to whom does it apply? What is protected by HIPAA? Privacy Rule Security Rule HITECH Basics Breaches and Responses

More information

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014 Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit Iliana L. Peters, J.D., LL.M. April 23, 2014 OCR RULEMAKING UPDATE What s Done? What s to Come? What s Done: Interim Final Rules

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014 HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014 Introduction The HIPAA Privacy Rule establishes the conditions under which Covered Entities

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

STANDARD ADMINISTRATIVE PROCEDURE

STANDARD ADMINISTRATIVE PROCEDURE STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.26 Investigation and Response to Breach of Unsecured Protected Health Information (HITECH) Approved October 27, 2014 Next scheduled review: October 27, 2019

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP Carol Ann Raymond, MBA, Ed.S., CCC-SLP Associate Clinical Professor/Clinic Director Department of Communication Sciences and Disorders Financial o Employed by the University of Georgia o Non-Financial

More information

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514

More information

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA Privacy & Breach Notification Training for System Administration Business Associates HIPAA Privacy & Breach Notification Training for System Administration Business Associates Barbara M. Holthaus privacyofficer@utsystem.edu Office of General Counsel University of Texas System April 10,

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule NYCR-245157 HIPPA, HIPAA HiTECH& the Omnibus Rule A. HIPAA IIHI and PHI Privacy & Security Rule Covered Entities and Business Associates B. HIPAA Hi-TECH Why

More information

HIPAA Security Risk Analysis for Meaningful Use

HIPAA Security Risk Analysis for Meaningful Use HIPAA Security Risk Analysis for Meaningful Use NOTE: Make sure your computer speakers are turned ON. Audio will be streaming through your speakers. If you do not have computer speakers, call the ACCMA

More information

HIPAA WEBINAR HANDOUT

HIPAA WEBINAR HANDOUT HIPAA WEBINAR HANDOUT OCR Enforcement Tools Voluntary corrective action Resolution Agreement and Payment CMPs Referral to DOJ for criminal investigation Resolution Agreements Contract signed by HHS and

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010 New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS

More information

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Brought to you by Winston & Strawn s Health Care Practice Group 2013 Winston & Strawn LLP Today s elunch Presenters

More information

HIPAA/HITECH: A Guide for IT Service Providers

HIPAA/HITECH: A Guide for IT Service Providers HIPAA/HITECH: A Guide for IT Service Providers Much like Arthur Dent in the opening scene of The Hitchhiker s Guide to the Galaxy (HHGTTG), you re experiencing the impact of new legislation that s infringing

More information

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA INFORMATION SECURITY & HIPAA COMPLIANCE MPCA Annual Conference August 5, 201 Agenda 1 HIPAA 2 The New Healthcare Paradigm Internal Compliance 4 Conclusion 2 1 HIPAA 1 Earning Their Trust 4 HIPAA 5 Health

More information

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES Melissa D. Berry The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

Business Associates Agreement

Business Associates Agreement Business Associates Agreement This Business Associate Agreement (the Agreement ) between Customer,( Covered Entity ) and Kareo ( Business Associate ) will be in effect during any such time period that

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean. BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is made as of the day of, 2010, by and between Methodist Lebonheur Healthcare, on behalf of itself and all of its affiliates ( Covered Entity

More information

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable: PLEASE NOTE: THIS DOCUMENT IS SUBMITTED AS A SAMPLE, FOR INFORMATIONAL PURPOSES ONLY TO ABC ORGANIZATION. HIPAA SOLUTIONS LC IS NOT ENGAGED IN THE PRACTICE OF LAW IN ANY STATE, JURISDICTION, OR VENUE OF

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

Understanding HIPAA Regulations and How They Impact Your Organization!

Understanding HIPAA Regulations and How They Impact Your Organization! Understanding HIPAA Regulations and How They Impact Your Organization! Presented by: HealthInfoNet & Systems Engineering! April 25 th 2013! Introductions! Todd Rogow Director of IT HealthInfoNet Adam Victor

More information

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Violations Incur Multi-Million Dollar Penalties HIPAA Violations Incur Multi-Million Dollar Penalties Whitepaper HIPAA Violations Incur Multi-Million Dollar Penalties Have you noticed how many expensive Health Insurance Portability and Accountability

More information

HIPAA Privacy and Security

HIPAA Privacy and Security HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NCHICA HITECH Act Breach Notification Risk Assessment Tool Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NORTH CAROLINA HEALTHCARE INFORMATION AND COMMUNICATIONS ALLIANCE, INC August

More information

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance Iliana Peters, JD, LLM, HHS Office for Civil Rights Kevin

More information

HIPAA Security Overview of the Regulations

HIPAA Security Overview of the Regulations HIPAA Security Overview of the Regulations Presenter: Anna Drachenberg Anna Drachenberg has been assisting healthcare providers and hospitals comply with HIPAA and other federal regulations since 2008.

More information

What s New with HIPAA? Policy and Enforcement Update

What s New with HIPAA? Policy and Enforcement Update What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final

More information

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc.

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc. BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc. THIS BUSINESS ASSOCIATE AGREEMENT (BAA) is entered into by and between First Choice Community Healthcare, with a principal place of

More information

Community First Health Plans Breach Notification for Unsecured PHI

Community First Health Plans Breach Notification for Unsecured PHI Community First Health Plans Breach Notification for Unsecured PHI The presentation is for informational purposes only. It is the responsibility of the Business Associate to ensure awareness and compliance

More information

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013 HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security May 7, 2013 Presenters James Clay President Employee Benefits & HR Consulting The Miller Group jimc@millercares.com

More information

Chris Bennington, Esq., INCompliance Consulting Shannon DeBra, Esq., Bricker & Eckler LLP Victoria Norton, R.N., J.D., M.B.A.

Chris Bennington, Esq., INCompliance Consulting Shannon DeBra, Esq., Bricker & Eckler LLP Victoria Norton, R.N., J.D., M.B.A. Chris Bennington, Esq., INCompliance Consulting Shannon DeBra, Esq., Bricker & Eckler LLP Victoria Norton, R.N., J.D., M.B.A., UC Health 7093020v1 Examples from the News Review of HIPAA Breach Regulations

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule ) HIPAA and HITECH Compliance Under the New HIPAA Final Rule Presented Presented by: by: Barry S. Herrin, Attorney CHPS, Name FACHE Smith Smith Moore Moore Leatherwood Leatherwood LLP LLP Atlanta Address

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is by and between ( Covered Entity )and CONEX Med Pro Systems ( Business Associate ). This Agreement has been attached to,

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

Tulane University. Tulane University Business Associates Agreement SCOPE OF POLICY STATEMENT OF POLICY IMPLEMENTATION OF POLICY

Tulane University. Tulane University Business Associates Agreement SCOPE OF POLICY STATEMENT OF POLICY IMPLEMENTATION OF POLICY Tulane University DEPARTMENT: General Counsel s POLICY DESCRIPTION: Business Associates Office -- HIPAA Agreement PAGE: 1 of 1 APPROVED: April 1, 2003 REVISED: November 29, 2004, December 1, 2008, October

More information

HIPAA Update Focus on Breach Prevention

HIPAA Update Focus on Breach Prevention HIPAA Update Focus on Breach Prevention Objectives By the end of this program, participants should be able to: Identify top reasons why breaches occur Review the breach definition and notification process

More information

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Patricia D. King, Esq. Associate General Counsel Swedish Covenant Hospital Chicago, IL I. Business Associates under

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability

More information

HIPAA & HITECH AND THE DISCOVERY PROCESS

HIPAA & HITECH AND THE DISCOVERY PROCESS HIPAA & HITECH AND THE DISCOVERY PROCESS HEATHER L. HUGHES, J.D. U.S. Legal Support, Inc. 363 North Sam Houston Parkway East, Suite 900 Houston, Texas 77060 (713) 653-7100 State Bar of Texas 8 th ANNUAL

More information

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010 Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance For Calendar Years 2009 and 2010 As Required by the Health Information Technology for Economic and Clinical Health (HITECH)

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS The following HIPAA Business Associate Terms and Conditions (referred to hereafter as the HIPAA Agreement ) are part of the Brevium Software License

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance For Calendar Years 2011 and 2012 As Required by the Health Information Technology for Economic and Clinical

More information

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN Stewart C. Miller & Co., Inc. (Business Associate) AND City of West Lafayette Flexible Spending Plan (Covered Entity) TABLE OF CONTENTS

More information

Please print the attached document, sign and return to privacy@covermymeds.com or contact Erica Van Treese, Account Manager, Provider Relations &

Please print the attached document, sign and return to privacy@covermymeds.com or contact Erica Van Treese, Account Manager, Provider Relations & Please print the attached document, sign and return to privacy@covermymeds.com or contact Erica Van Treese, Account Manager, Provider Relations & Solutions. Office: 866-452-5017, Fax: 615-379-2541, evantreese@covermymeds.com

More information

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List

More information

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule HEALTHCARE October 2009 Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule This HIPAA Update provides a detailed description of the new breach notification requirements for HIPAA

More information

Document Imaging Solutions. The secure exchange of protected health information.

Document Imaging Solutions. The secure exchange of protected health information. The secure exchange of protected health information. 2 Table of contents 3 Executive summary 3 The high cost of protected health information being at risk 4 The compliance officer s dilemma: keeping PHI

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (this "Agreement") is made as of, 201_ (the Effective Date ), and is entered into between ( Covered Entity ) and Delta Business System, Inc.

More information

Security Compliance, Vendor Questions, a Word on Encryption

Security Compliance, Vendor Questions, a Word on Encryption Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center aparsons@shastahealth.org

More information

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT The parties to this ( Agreement ) are, a _New York_ corporation ( Business Associate ) and ( Client ) you, as a user of our on-line health record system (the "System"). BY

More information

Philip L. Gordon, Esq. Littler Mendelson, P.C.

Philip L. Gordon, Esq. Littler Mendelson, P.C. Beyond The Legal Requirements: Key Practical Issues in Negotiating Business Associate Agreements, Responding to a Breach of Unsecured PHI, and Understanding HHS Enforcement Philip L. Gordon, Esq. Littler

More information

Proofpoint HIPAA Breach Report:

Proofpoint HIPAA Breach Report: Proofpoint HIPAA Breach Report: An Analysis of HITECH Breach Notifications and Settlements, Q1 2013 Healthcare Industry Update threat protection compliance archiving & governance secure communication Contents

More information

Lessons Learned from HIPAA Audits

Lessons Learned from HIPAA Audits Lessons Learned from HIPAA Audits October 29, 2012 Tony Brooks, CISA, CRISC Partner - IT Assurance and Risk Services HORNE LLP AGENDA HIPAA/HITECH Regulations Breaches and Fines OCR HIPAA/HITECH Compliance

More information

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA

More information

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) March 2011 Presentation by Jennifer L. Cox, J.D. Red Flags Rollback Red flags is going going and not

More information

HIPAA Final Rule Changes

HIPAA Final Rule Changes HIPAA Final Rule Changes What you need to know and do now Presented by Lucy A. Homans, Ed.D WSPA Director of Professional Affairs Prepared by the APA Practice Organization Introduction January 2013: U.S.

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,

More information