Industry leading Education

Size: px
Start display at page:

Download "Industry leading Education"

Transcription

1 Industry leading Education Please ask questions #CGwebinar Todays slides are available group.com/slides023/ Past webinars and recordings group.com/webinar/ HIPAA

2 Ensuring Patient Privacy The Need to Monitor for Inappropriate Access to ephi This document may not be reproduced, transmitted, or distributed without the prior permission of All Medical Solutions

3 Introduction About the Speaker: Stephen Salinas serves as Senior Business Development Consultant and Channel Manager at All Medical Solu9ons (AMS). While at AMS, Stephen has worked alongside California s two most successful Regional Extension Centers (HITEC- LA and COREC), overseeing the successful adop9on of EHR technology and Meaningful Use to over 1,200 California physicians. About All Medical Solu4ons: All Medical Solu9ons (AMS) is a healthcare organiza9on consultancy and solu9ons development division of Fusion Systems Co., Ltd., a global Informa9on Technology Solu9ons consul9ng business. Based in California, AMS has over 20 years of experience in developing proprietary technology products for Fortune 500 companies and over 10 years in bringing tailored and insighwul solu9ons to na9onal and regional healthcare providers. As a Service Partner of two RECs, AMS has witnessed first hand the many issues healthcare organiza9ons face with regards to HIPAA and Meaningful Use. AMS launched SPHER in 2013, an online state- of- the- art Electronic Health Record (EHR) monitoring solu9on which fulfills federal HIPAA audit requirements. For more informa9on, go to amsspher.com.

4 Today s Topic: Ensuring Pa4ent Privacy The Need to Monitor for Inappropriate Access to ephi A look into the current state of healthcare and security, your obliga4ons under HIPAA to monitor user ac4vity of your EHR to ensure pa4ent privacy rights are protected, and an outline of what should be done to protect your organiza4on from the threat of a privacy breach

5 Agenda The Need to Become Compliant with HIPAA The current state of healthcare and security Results of the OCR Pilot HIPAA Audits of 2012 User Ac9vity Monitoring the #1 security deficiency The official OCR HIPAA Audits enforced in 2013 A Deeper Dive into User Ac4vity Monitoring (Privacy Monitoring) The importance of User Ac9vity Monitoring User Ac9vity Monitoring references in HIPAA and Meaningful Use Iden9fying the hurdles organiza9ons face when aiming for compliance How to correctly implement, document, and maintain a Privacy Monitoring program Re- evalua4ng Your Current Security Posture The need to priori9ze Privacy Monitoring and Workforce Educa9on Case Studies

6 What is a Privacy Breach? According to HIPAA, an impermissible use or disclosure of protected health informa9on is presumed to be a breach unless the covered en9ty or business associate demonstrates that there is a low probability that the protected health informa9on has been compromised. 4 factors: Nature and extend of the PHI involved Unauthorized person who the used the PHI or to whom disclosure was made to Whether PHI was actually acquired or viewed Extent to which the risk to the PHI has been mi9gated

7 The Current State of Healthcare and Security The cost of a Privacy Breach Healthcare industry loses $7 Billion a year due to privacy breaches Average cost of a privacy breach = $2.4 million 94% of healthcare organiza9ons have had at least one data breach in the last two years Compared to all other industries in the US, healthcare had the highest per capita breach cost 54% of organiza9ons have liile or no confidence they can quickly detect privacy breaches (Ponemon Ins9tute)

8 The Need to be Compliant with HIPAA The HIPAA/HITECH rule marks the most sweeping changes to the HIPAA Privacy and Security Rules since they were first implemented. These changes not only greatly enhance a pa9ent s privacy rights and protec9ons, but also strengthen the ability of [the Office of Civil Rights] to vigorously enforce the HIPAA privacy and security protec9ons. (Leon Rodriguez, Head of OCR)

9 The Driver for HIPAA/HITECH Audits " Section of the HITECH Act Mandatory audits will occur separate from the standard audits now in place. " US Government Accountability Office GAO GAO evaluates the HITECH EHR/Meaningful Use Incentive Program managed by CMS Proposes the need for Meaningful Use Audits to ensure hospitals and providers participating in the program have not falsely attested to achieving Meaningful Use 10% Hospitals and 20% of Providers that attested for Meaningful Use will be audited " HIPAA Omnibus Final Rule redefines and increases Civil Monetary Penalties Civil Money Penalties (CMPs) for covered entities have been increased to a $1.5 million cap per violation for violations due to willful neglect ( did not know ) Willful Neglect Not Corrected: defined as a breach resulting from an intentional failure or reckless indifference of HIPAA obligations, and the breach was not corrected immediately after discovery. Violations are defined as the number of patient records affected. " HHS Contracts KPMG 2012 Audit Pilot Program 115 Covered Entities (CEs) Audited during Q Selection of CEs was based on random selection, and not based on prior HIPAA infractions #1 Discrepancy: NO User Activity Monitoring

10 KPMG Pilot Audits: Privacy/Security/Breach Non-Compliance

11 KPMG Findings Top 9 Security Issues Auditors reported that the CEs did not know it was required *Reused with permission from Adam H. Greene, JD, MPH from PPN Final Omnibus Presentation

12 HIPAA/HITECH Audits Occurring in 2013 " Covered En99es can expect two (2) separate audits where they will be required to demonstrate HIPAA Compliance Q CMS Meaningful Use (MU) Audits Q HHS OCR Privacy/Security/Breach Audit Program

13 CMS Meaningful Use Audits " Q CMS Meaningful Use (MU) Audits 10% Hospitals, 20% of Providers will be audited and be able to demonstrate that they met the required MU criteria If an audited entity has failed to correctly attest to even a single metric then that participant will be required to return all of the funds and face the possibility of fraud charges Specifically MU Core Measure 14 for Hospitals, MU Core Measure 15 for Providers (HIPAA Security Rule Compliance) Measure: Conduct or review a security risk analysis in accordance with (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of the risk management process. You will be required to submit a copy of your Security Risk Assessment as well as an outline of your risk management process showing the security safeguards (? policies and procedures) both implemented to date and in progress. If the entity is unable to demonstrate compliance with the HIPAA Security Rule, the entity may be subject to the more stringent HHS OCR Audit

14 HHS OCR Audit Program " Q HHS OCR Privacy/Security/Breach Audit Program " Increased number of Audit Protocol Procedures compared to the OCR KPMG Pilot Audit Program Privacy Audit Procedures Security Audit Procedures of the Audit Procedures directly relate to User Ac9vity Monitoring Breach No9fica9on Audit Procedures 10 Learn more about the HIPAA Audit Program Protocol :

15 The OCR Audit Process " Advanced day no9fica9on by mail " 15 day deadline to respond a large documenta9on request " 3-5 day on- site data collec9on of up to 5 auditors Interviews of key personnel and assorted staff members, site walkthroughs, opera9onal reviews, and requests for further informa9on " Drat report issued, 10 days window to respond " Final report issued, imposing CMPs and correc9ve ac9on Notification letter and request for documentation sent to Covered Entity Receiving and reviewing documentation and planning the audit field work On-site field work Draft audit report Covered Entities review and comment on draft audit report Final audit report

16 A Deeper Dive into User Ac4vity Monitoring HIPAA requires user ac4vity monitoring You must review your EHR audit logs for inappropriate access Protect your Pa4ents Privacy by adhering to the law

17 What is Inappropriate Access and Disclosure? " HHS outlines what is defined as inappropriate access and disclosure under the HIPAA Privacy Rule: HIPAA is based on sound current prac9ce that protected health informa9on should not be used or disclosed when it is not necessary to sa9sfy a par9cular purpose or carry out a func9on. The minimum necessary standard requires covered en99es to evaluate their prac9ces and enhance safeguards as needed to limit unnecessary or inappropriate access to and disclosure of protected health informa9on.

18 Outline the Problem " Internal workforce and 3 rd par9es have access to your pa9ents ephi " You grant access to PHI under the assump9on that privacy policies will be followed in the strictest sense " New informa9on systems put in place (EHR) " Implemen9ng new policies, procedures, and security safeguards are an aterthought " Staff not effec9vely educated on the new policies and procedures " Management not strictly and rou9nely enforcing " Current and newly adopted policies and procedures may not strong enough and will need revised " It is the covered en99es responsibility to monitor all access to ephi, including access granted to Business Associates " Your Risk/Vulnerability of facing an internal privacy breach is high

19 HIPAA Security Related Regulations HIPAA Security Rules " Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports (a)(1)(ii)(D) " Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information (B) " Implement procedures for monitoring log-in attempts and reporting discrepancies (a)(5)(ii)(C) " Retain required documentation of policies, procedures, actions, activities or assessments required by the HIPAA Security Rule for six years from the date of its creation or the date when it last was in effect, whichever is later (B)(1)(ii) Meaningful Use Requirements " ONC certification for EHR technology requires an EHR to produce an audit log (r) " Conduct a Security Risk Assessment per HIPAA (a)(1), implementing security updates as necessary and correcting deficiencies Meaningful Use Core Measure 14 for Hospitals, 15 for Providers

20 Insurance Exclusions " For arising out of or resulting from any act, error, omission, incident, failure of Computer Security. " Based upon, arising from, or in consequence of any claim or proceeding brought by or on behalf of any federal, state, or local government agency or authority; or licensing or regulatory organization. Due to the increasing number of ephi related breaches since the adoption of EHR, insurance companies are utilizing their exclusion clauses. Many policies do not cover breaches due to reckless indifference of HIPAA obligations (willful neglect). Civil Money Penalties (CMPs) mandated by the OCR and Class Action Lawsuits Costs associated with fulfilling breach notification requirements and loss of income due to site failure Credit card monitoring services for affected patients, etc. Source: Beazley, Chubb, Doctors Company, Lloyds of London If found negligent, the Insurance Carrier is not obligated to pay these.

21 Common Misconceptions " This is a responsibility that is supposed to be handled by my EHR vendor (or other health informa9on system) As required by Federal ONC- Cer9fica9on for EHRs, their obliga9on to the client is to ensure that their system is audit capable, that it can generate a human readable audit log " This is a responsibility that can be handled by my IT department Reviewing audit logs requires prac9cal knowledge of healthcare workflow and as well as the organiza9ons policies and procedures; this is the responsibility of the privacy/security department

22 Why is user activity monitoring important? While external aiackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destruc9ve and insidious. Eight years of research on data breach costs has shown employee behavior to be one of the most pressing issues facing organiza9ons today, up 22 percent since the first survey. (Larry Ponemon, Chairman of Ponemon Ins9tute)

23 What does the audit log tell you? Date Provide a precise date for organizations to see who has accessed patient information Time Provide a precise time for organizations to see who has accessed patient information 5 Core Audit Log Attributes User Provide a clear definition of all user access within organizations, to know who has data privileges Patient Maintain record of all authorized and unauthorized access to specific patient information Action Must be recorded when health information is viewed, created, modified, exported, or deleted

24 Full Review vs Partial Review The Facts: " Auditing takes so many resources and so much time it is near impossible to do manually. The Math: " Time for auditing 1 line: ~15 seconds Event correlation - Is this specific activity permitted? Users of the EHR: Staff, HIE, Vendors, etc. " Calculations for level of effort*: Average daily audit log: ~ 3560 lines per provider (3 to 4 staff) Range Day Week Month Year 100 % hours hours hours 3,559 hours 80% ,846 20% " 100% review by use of trained staff and an automated incident detection tool is the NIST standard** * Calculations using 20 business days in a month ** NIST SP use trained staff and tool to review 100% logs

25 The method of auditing audit logs Basic audi9ng methods These methods will only be allow you to detect large security incidents Examples: 1. Abnormal 9mes of access: Accessing records during non- standard hours for that par9cular user 2. Abnormal number of pa9ent records accessed per user: Seeing a spike of 100 pa9ents vs the average 20 that par9cular user sees per day 3. Abnormal exports or dele9ons of informa9on

26 The method of auditing audit logs Advanced audi9ng methods (known as Behavioral Analy9cs) These methods will allow you to detect smaller security incidents Examples: 1. Role based behavior: Authorized uses of PHI by role (Physicians, Nurses, Medical Assistants, Administrators, etc.) 2. Individual behavior: Tracking of individual user s paierns of behavior i. A medical assistant working in the front office accesses the system in a different way (check- in/check- out procedures) than a medical assistant working in the back office (documen9ng vital signs) ii. Individuals may only be allowed to work in a single department, where other individuals float from department to department having mul9ple roles and responsibili9es within the organiza9on 3. Pa9ent Workflow: Tracking of the documented order of events as a pa9ent navigates through the office

27 How do I demonstrate compliance? A sound policy and procedure for audi9ng user ac9vity (reviewing of audit logs) outlining a clear methodology Frequency and 9meliness of review, as well as to the extent they are reviewed A documented history of reviewed audit logs as well as security incident tracking reports (outlining all suspicious security incidents you ve flagged for further inves9ga9on) A sound policy and procedure for an incident response plan outlining how you respond to suspicious security incidents Timeliness to no9fy/interview key personnel as well as the individual responsible Who to contact and steps to take in the event that the flagged incident is in fact a Privacy Breach A documented history of your inves9ga9on of flagged incidents, the results of you inves9ga9on, and the response taken (enforcing sanc9on policies or staff re- educa9on as needed) Educa3on to workforce members and 3 rd par9es that have access to your systems must be made aware that their ac9vity is con9nuously monitored Must be made a aware that they must comply to any further inves9ga9on needed by the Security Officer(s) Are subject to Sanc3on Policies in the event that they have caused a privacy breach

28 From an auditors perspective You want to demonstrate your ability to find poten9al security incidents regardless if they were a privacy breach or not It demonstrates your ability to enforce HIPAA Non- breaches gives you valuable informa9on of where security vulnerabili9es may exist Ater the inves9ga9on leads you to believe that the incident does not cons9tute a privacy breach, ask yourself had the individual had malicious intent, could they have caused a breach Rou9ne inves9ga9ons with staff members also serves as a means to re- educate and reinforce your security posture Your ability to immediately iden9fy a breach AND immediately respond to it (within 30 days) works in your favor should you be faced with an OCR inves9ga9on The use of an automated security system that reviews ALL access to ephi is your best defense The audit log review remains impar9al and allows for automa9c documenta9on

29 Case Study Cedars- Sinai Medical Center, Los Angeles (June 18 th - 24 th ) Medical Record Breaches Following Kardashian Birth Reveal an Ongoing Issue An automated security system was in place and immediately flagged this ac9vity for review The internal inves9ga9on and breach no9fica9on process occurred immediately ater the event took place. 5 staff members and 1 volunteer from the adjacent Cedars- affiliated physician offices were immediately fired Physicians had shared with their employees their EHR usernames and passwords to access the hospital system, in viola9on of hospital policy. Cedars is in the process of addressing the conduct of the physicians partly at fault and has indefinitely terminated their access. How will they fair during the OCR inves9ga9on?

30 Affirmative Defense and Good Faith Effort " The OCR may not impose a CMPs on a CE or BA for a viola9on if the CE or BA establishes that the viola9on is: Not due to willful neglect; and Corrected during the 30- day period beginning on the first date the CE or BA knew, or by exercising reasonable diligence, would have know that the viola9on occurred. " However, in order to make a claim to affirma9ve defense, you must be able to quickly detect breaches in the first place.

31 Re-evaluating Your Current Security Posture " Top factors that lower overall costs as it relates to minimizing/mi9gated breaches 1. Strong security posture (risk management and educa9on/training) 2. Incident response plan (incident detec9on/ inves9ga9on and breach no9fica9on) 3. Appointment of a CISO or equivalent posi9on (centralizing the management of data protec9on) 4. Consultants engaged to help remediate the breach

32 Automated EHR-Centric Breach Detection Impartial vs. Manual Log Review HIPPA Compliance Audit Log Requirement Six (6) Year Activity Reporting (b)(2)(i) Self Reporting & Document Storage Time Savings (more patient focused) Proactive Incident & Breach Detection Improved HIPAA Reporting Accuracy Compliments EHR Security Framework

33 To learn more about SPHER please visit: Stephen Salinas Channel Manager All Medical Solutions Contact Data Tel: (310) Fax: (310)

34 HIPAA Compliance HITECH Attestation Omnibus Rule Ready Meaningful Use Core Measure 15 Free Demo and 15 Day Evaluation group.com HIPAA Hotline HIPAA

HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Business Associates, HITECH & the Omnibus HIPAA Final Rule Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS

More information

Health Informa.on Technology Audits: "Meaningful Use" and HIPAA. January 23, 2015 Eli Poliakoff Gary Capps

Health Informa.on Technology Audits: Meaningful Use and HIPAA. January 23, 2015 Eli Poliakoff Gary Capps Health Informa.on Technology Audits: "Meaningful Use" and HIPAA January 23, 2015 Eli Poliakoff Gary Capps 1 HITECH - Related Audits Health Informa.on Technology for Economic and Clinical Health Act ("HITECH")

More information

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16 NEW PERSPECTIVES on Healthcare Risk Management, Control and Governance www.ahia.org Journal of the Association of Heathcare Internal Auditors Vol. 32, No. 3, Fall, 2013 Professional Fee Coding Audit: The

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How?

Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How? Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How? March 27 th 12 pm EDT Moderator: Gerry Blass Panelists: Mac McMillan, Francois Bodhuin, Lou Dignam Webinar

More information

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire Vendor Management Challenges and Solutions for HIPAA Compliance Jim Sandford Vice President, Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?

More information

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Developing HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant

Developing HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant Developing HIPAA Security Compliance Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant Learning Objectives Identify elements of a HIPAA Security compliance program Learn the HIPAA Security Rule basics

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

Build a HIPAA- Compliant Prac5ce. Wes Strickling, Founder & CEO

Build a HIPAA- Compliant Prac5ce. Wes Strickling, Founder & CEO Build a HIPAA- Compliant Prac5ce Wes Strickling, Founder & CEO Agenda What is HIPAA Compliance? What does it mean to your prac5ce? What should you do? Q & A What Is HIPAA Compliance? Health Insurance Portability

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

Understanding HIPAA Regulations and How They Impact Your Organization!

Understanding HIPAA Regulations and How They Impact Your Organization! Understanding HIPAA Regulations and How They Impact Your Organization! Presented by: HealthInfoNet & Systems Engineering! April 25 th 2013! Introductions! Todd Rogow Director of IT HealthInfoNet Adam Victor

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013 Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and

More information

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits Presented by: Don Waechter, Managing Partner Health Compliance Partners Ann Breitinger, Attorney Blalock Walters Legal Disclaimer

More information

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate

More information

Community First Health Plans Breach Notification for Unsecured PHI

Community First Health Plans Breach Notification for Unsecured PHI Community First Health Plans Breach Notification for Unsecured PHI The presentation is for informational purposes only. It is the responsibility of the Business Associate to ensure awareness and compliance

More information

HIPAA Compliance Audits: Your Newest Risk: Are You Prepared?

HIPAA Compliance Audits: Your Newest Risk: Are You Prepared? HIPAA Compliance Audits: Your Newest Risk: Are You Prepared? Presented by: Melissa (Lisa) Thompson, JD, MPH and Elizabeth Lamkin, MHA Slide 1 Speakers Melissa (Lisa) Thompson, JD, MPH Partner Adelman,

More information

Dissecting New HIPAA Rules and What Compliance Means For You

Dissecting New HIPAA Rules and What Compliance Means For You Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the

More information

Meaningful Use and Security Risk Analysis

Meaningful Use and Security Risk Analysis Meaningful Use and Security Risk Analysis Meeting the Measure Security in Transition Executive Summary Is your organization adopting Meaningful Use, either to gain incentive payouts or to avoid penalties?

More information

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist www.riskwatch.com Introduction Last year, the federal government published its long awaited final regulations implementing the Health

More information

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,

More information

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule NYCR-245157 HIPPA, HIPAA HiTECH& the Omnibus Rule A. HIPAA IIHI and PHI Privacy & Security Rule Covered Entities and Business Associates B. HIPAA Hi-TECH Why

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

BNA s Health Law Reporter

BNA s Health Law Reporter BNA s Health Law Reporter Reproduced with permission from BNA s Health Law Reporter, 20 HLR 1272, 08/18/2011. Copyright 2011 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com HHS

More information

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq. The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

HIPAA COMPLIANCE PLAN FOR 2013

HIPAA COMPLIANCE PLAN FOR 2013 HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better

More information

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA

More information

View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013

View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013 View the Replay on YouTube Sustainable HIPAA Compliance: Enhancing Your Epic Reporting FairWarning Executive Webinar Series October 17, 2013 Today s Panel Chris Arnold FairWarning VP of Product Management

More information

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746

More information

HIPAA in an Omnibus World. Presented by

HIPAA in an Omnibus World. Presented by HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters

More information

Interpreting the HIPAA Audit Protocol for Health Lawyers

Interpreting the HIPAA Audit Protocol for Health Lawyers Interpreting the HIPAA Audit Protocol for Health Lawyers This webinar is brought to you by the Health Information and Technology Practice Group (HIT), and is co-sponsored by the Business Law and Governance

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Privacy & Security The HHS Rule is Out What s New and What s Next. Mary Jo Carden, RPh, JD Director, Regulatory Affairs AMCP mcarden@amcp.

Privacy & Security The HHS Rule is Out What s New and What s Next. Mary Jo Carden, RPh, JD Director, Regulatory Affairs AMCP mcarden@amcp. Privacy & Security The HHS Rule is Out What s New and What s Next Mary Jo Carden, RPh, JD Director, Regulatory Affairs AMCP mcarden@amcp.org Disclosure Mary Jo Carden is an employee of the Academy of Managed

More information

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview Updated HIPAA Regulations What Optometrists Need to Know Now The U.S. Department of Health & Human Services Office for Civil Rights recently released updated regulations regarding the Health Insurance

More information

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014 OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2 Linda Sanches, MPH Senior Advisor, Health Information Privacy HCCA Compliance Institute March 31, 2014 Agenda Background Audit Phase

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com HIT Audit Workshop Jeffrey W. Short jshort@hallrender.com 1 Audits and Investigations to be Discussed Meaningful Use Audits HIPAA Audits Data Breach Investigations Software Vendor Audits FTC Investigations

More information

Isaac Willett April 5, 2011

Isaac Willett April 5, 2011 Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act

More information

HIPAA Security Risk Analysis for Meaningful Use

HIPAA Security Risk Analysis for Meaningful Use HIPAA Security Risk Analysis for Meaningful Use NOTE: Make sure your computer speakers are turned ON. Audio will be streaming through your speakers. If you do not have computer speakers, call the ACCMA

More information

HITRUST CSF Assurance Program

HITRUST CSF Assurance Program HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview

More information

Industry leading Education. Certified Partner Program. Get Involved. #cgwebinar

Industry leading Education. Certified Partner Program. Get Involved. #cgwebinar Industry leading Education Certified Partner Program Please ask questions For todays Slides http://compliancy-group.com/ slides023/ Todays & Past webinars go to: http://compliancy-group.com/ webinar/ Get

More information

How To Protect Your Health Care From Being Stolen From Your Computer Or Cell Phone

How To Protect Your Health Care From Being Stolen From Your Computer Or Cell Phone Compliance Simplified Achieve, Illustrate, Maintain Industry leading Education Todays Webinar Please ask questions Todays slides are available http://compliancy- group.com/slides023/ Certified Partner

More information

View the Replay on YouTube

View the Replay on YouTube View the Replay on YouTube Privacy Implications of Texas HB 300: What Should You Be Doing Now? FairWarning Executive Webinar Series December 18, 2012 Agenda Privacy Implications of Texas HB 300: What Should

More information

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS James J. Eischen, Jr., Esq. October 2013 Chicago, Illinois JAMES J. EISCHEN, JR., ESQ. Partner at Higgs, Fletcher

More information

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE The Speakers Cinda Velasco Attorney, Manager, Privacy Officer Patient Safety and Risk Management Trish Lugtu Senior Manager MMIC

More information

How to prepare your organization for an OCR HIPAA audit

How to prepare your organization for an OCR HIPAA audit How to prepare your organization for an OCR HIPAA audit Presented By: Mac McMillan, FHIMSS, CISM CEO, CynergisTek, Inc. Technical Assistance: 978-674-8121 or Amanda.Howell@iatric.com Audio Options: Telephone

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

OCR/HHS HIPAA/HITECH Audit Preparation

OCR/HHS HIPAA/HITECH Audit Preparation OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

Datto Compliance 101 1

Datto Compliance 101 1 Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego Meaningful Use as it Relates to HIPAA Compliance Sunday March 30, 2014, 9am noon HCCA Conference, San Diego CLAconnect.com Objectives and Agenda Understand the statutory and regulatory background and purpose

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

Strategies for. Proactively Auditing. Compliance to Mitigate. Matt Jackson, Director Kevin Dunnahoo, Manager

Strategies for. Proactively Auditing. Compliance to Mitigate. Matt Jackson, Director Kevin Dunnahoo, Manager Strategies for 1 Proactively Auditing HIPAA Security Compliance to Mitigate Risk Matt Jackson, Director Kevin Dunnahoo, Manager AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois www.ahia.org

More information

Sustainable HIPAA Compliance: Protecting Patient Privacy through Highly Leveraged Investments

Sustainable HIPAA Compliance: Protecting Patient Privacy through Highly Leveraged Investments View the Replay on YouTube Sustainable HIPAA Compliance: Protecting Patient Privacy through Highly Leveraged Investments FairWarning Executive Webinar Series October 31, 2013 Today s Panel Chris Arnold

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

HIPAA Changes 2013. Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13

HIPAA Changes 2013. Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13 HIPAA Changes 2013 Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13 BEI Who We Are DC Metro IT Service Provider since 1987 Network Design/Upgrade Installation/Managed IT Services for small to medium-sized

More information

Answering to HIPAA. Who Answers Your Phone? Prepared by Kenneth E. Rhea, MD, FASHRM. Brought to you by. www.duxware.com

Answering to HIPAA. Who Answers Your Phone? Prepared by Kenneth E. Rhea, MD, FASHRM. Brought to you by. www.duxware.com Answering to HIPAA Who Answers Your Phone? Prepared by Kenneth E. Rhea, MD, FASHRM Brought to you by www.duxware.com The Event On February 20, 2014 at 8:00 PM an Internal Medicine specialist received a

More information

Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell. Topics Covered Part One. Topics Covered Part Two.

Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell. Topics Covered Part One. Topics Covered Part Two. Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell President & CEO Carosh Compliance Solutions & Liz Mayer, RHIA Director, Organizational Integrity HCI Care Services and VNS

More information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how

More information

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant HIPAA Privacy and Security Rules: A Refresher Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant Objectives Provide overview of Health insurance Portability and Accountability

More information

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and

More information

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act by Lane W. Staines and Cheri D. Green On February 17, 2009, The American Recovery and Reinvestment Act

More information

The HIPAA Omnibus Final Rule

The HIPAA Omnibus Final Rule WHITE PAPER The HIPAA Omnibus Final Rule Four risk exposure events that can uncover compliance issues leading to investigations, potential fines, and damage to your organization s reputation. By Virginia

More information

SECURITY RISK ASSESSMENT SUMMARY

SECURITY RISK ASSESSMENT SUMMARY Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected

More information

HIPAA/HITECH: Conditional Access Management for Business Performance. Mark Seward, Director Security and Compliance Solutions Marketing

HIPAA/HITECH: Conditional Access Management for Business Performance. Mark Seward, Director Security and Compliance Solutions Marketing HIPAA/HITECH: Conditional Access Management for Business Performance Mark Seward, Director Security and Compliance Solutions Marketing Agenda HIPAA compliance problems (a review for most) EHR access issues

More information

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

Sustainable Compliance: A System for Ongoing Audit Readiness

Sustainable Compliance: A System for Ongoing Audit Readiness View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013 Agenda Sustainable Compliance at St. Charles Health System

More information

Creating Stable Security & Compliance Relationships

Creating Stable Security & Compliance Relationships Creating Stable Security & Compliance Relationships David Holtzman JD, CIPP/G VP, Compliance CynergisTek, Inc. James Wieland JD Principal Ober Kaler Welcome The slides for today s webinar are available

More information

Business Associate Management Methodology

Business Associate Management Methodology Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates

More information

Objectives 5/5/2015. Quality Health Associates (QHA) of ND

Objectives 5/5/2015. Quality Health Associates (QHA) of ND Privacy and Security: HIPAA/HITECH/Meaningful Use Looking Back, Forging Ahead Patti Kritzberger, RHIT, CHPS Quality Health Associates of North Dakota HIT/Quality Improvement Specialist Quality Health Associates

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information

More information

2016 OCR AUDIT E-BOOK

2016 OCR AUDIT E-BOOK !! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

What do you need to know?

What do you need to know? What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,

More information

OCR HIPAA AUDITS THEY RE BACK!

OCR HIPAA AUDITS THEY RE BACK! OCR HIPAA AUDITS THEY RE BACK! Chris Apgar, CISSP 2016 OVERVIEW OCR Audit Program Overview What to Expect if OCR s Auditors Show Up Potential Penalties and Other OCR Actions How to Prepare for an Audit

More information

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013 Greenway Marketplace Hear from GSG Compliance & White Plume November 14, 2013 Marketplace Mission Statement To enhance the Greenway customer user experience by offering innovative, forwardthinking technologies

More information

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) March 2011 Presentation by Jennifer L. Cox, J.D. Red Flags Rollback Red flags is going going and not

More information

Surviving a HIPAA Audit: What you need to know NOW So you can cope THEN. Jonathan Krasner www.beinetworks.com www.hipaasecurenow.

Surviving a HIPAA Audit: What you need to know NOW So you can cope THEN. Jonathan Krasner www.beinetworks.com www.hipaasecurenow. Surviving a HIPAA Audit: What you need to know NOW So you can cope THEN Jonathan Krasner www.beinetworks.com www.hipaasecurenow.com Healthcare IT Landscape Meaningful Use Incentives Technology Advances

More information