HIPAA COMPLIANCE PLAN FOR 2013
|
|
|
- Cecilia McCormick
- 10 years ago
- Views:
Transcription
1 HIPAA COMPLIANCE PLAN FOR 2013
2 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist
3 Meaningful Use? As a way to encourage hospitals and providers to adopt EHRs, Congress in 2009 passed a law creating incentive payments for providers and hospitals that choose to adopt and use certified EHR technology in a meaningful way. Incentives are offered from Medicare and Medicaid for adopting a certified EHR program and implementing the Meaningful Use criteria designed by CMS. The incentives are obtained through attestation.
4 Medicare Eligible Providers Doctors of Medicine or Osteopathy Doctors of Dental Surgery or Dental Medicine Doctors of Podiatric Medicine Doctors of Optometry Chiropractors
5 Medicaid Eligible Providers Physicians Nurse Practitioners Certified Nurse - Midwife Dentists Physicians Assistants who practice in a Federally Qualified Health Center (FQHC) or Rural Health Center (RHC) that is led by a Physician Assistant.
6 Stage 1 - Attesting Website - Core Measures 15/Menu Measures 5 out of 10 Guide for attestation Guidance/Legislation/EHRIncentivePrograms/downloads/EP_Attestation_U ser_guide.pdf Core Measure #15: ectronichealthinformation.pdf
7 Step 2: Meaningful Use Core Measures Core Measure 15 Objective Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities. Measure Have you conducted or reviewed a security risk analysis per 45 CFR (a)(1) and implemented security updates as necessary and corrected identified security deficiencies as part of your risk management process? Yes No
8 What Does The Security Rule State? HIPAA Security Rule Administrative Safeguards (45 CFR (a)(8)) Perform a periodic technical and non-technical evaluation, based initially upon the standards implemented under this rule and subsequently in response to environmental or operational changes affecting the security of electronic protected health information that establishes the extent to which an entity s security policies and procedures meet the requirements
9 HIPAA Security Compliance (Use The Detailed Checklist) S - Set a Security Action Plan to Protect Patient Health Information R Record Your Plan with Documentation A Assess Your Plan Annually or With Changes
10 2 Phases to Answering MU #15 CMS MU Core Measure #15 states: Have you conducted or reviewed a security risk analysis per 45 CFR (a)(1) and implemented security updates as necessary and corrected identified security deficiencies as part of your risk management process? Phase 1 Deals with regular assessment of the potential risks and vulnerabilities of the ephi Phase 2 Defines a process of documenting processes that define how organization will comply with HIPAA security policies
11 Is Your Risk Mitigated by Your EMR Vendor? Threat Vulnerability RISK Security risks in your ephi Life Cycle Security risks in your overall practice - People - Documentation Threats Incidental, Passive, Active - Common viruses, spyware, unauthorized access, laptops stolen, network abuse, sabatoge, unsecure wireless, remote access
12 Safeguards Addressed Physical Safeguards facility, places/locations where patient data is accessed. Examples Alarm systems, locked offices, screens on monitors Administrative Safeguards Security Officer, Workforce Training, Assessments Examples Staff Training, Reviewing activity of users, policy enforcement Technical Safeguards Controls, audit logs, securing exchanges Examples Securing passwords, backing up data, virus checks, data encryption Documentation Policies and Procedures Organizational Breaches, BA Agreements
13 What Does a Complete Security Risk Assessment Consist Of? (Refer to Checklist) Analysis of your practice s risks Plan to mitigate any identified security risks Immediate Short-term Long-term Policies that address potential risks Procedures to support the policies that prevent security risks
14 If you are attesting YES that you have completed Meaningful Use Measure #15 and you aren t in compliance with the guidelines, then you could be committing FRAUD or WILLFUL NEGLECT.
15 What Are The Penalties/Costs? Civil Penalties can be assessed $100 per violation, can be measured by time, number of individuals affected up to $25,000 for multiple violations during a calendar year. Criminal Penalties can be assessed Department of Justice - $50,000 up to $250K for wrongful disclosures, and could involve imprisonment. Breach Incidents Over 500 are publicly recorded on OCR website Corrective Action Costs can be extensive.
16 Are Your Incentive Payments at Risk If you attest to MU #15 without conducting a complete security risk assessment YES CMS has authorized audits People/Workforce Documentation Policies/Processes Penalties can be assessed
17 What to Do If You re NOT Attesting to Meaningful Use HIPAA Security Rule Administrative Safeguards (45 CFR (a)(8)) Perform a periodic technical and non-technical evaluation, based initially upon the standards implemented under this rule and subsequently in response to environmental or operational changes affecting the security of electronic protected health information that establishes the extent to which an entity s security policies and procedures meet the requirements
18 Frequently Asked Questions What is the HIPAA Security Rule? ve/securityrule/index.html Is this the same as OSHA? What is the difference between the HIPAA Privacy Rule and the HIPAA Security Rule? Can I perform the SRA myself? After I complete the Security Risk Analysis, am I compliant with the Security Rule? What should I do next?
19 How Are Audits Affecting Us? Audits of Covered Entities in general 150 for (Per HITECH Act OCR audits of covered entities for Privacy and Security.) KPMG (Phoenix, Alaska, 115 by year end) Audits of Meaningful Use Attestors Figliozzi and Company CMS Audits under ARRA Audits from suspected HIPAA violations Complaint Investigations
20 Audit Results Lack of Security Risk Assessment Not performed or not documented Lack of Documentation Policies Procedures Processes Lack of Workforce Training Security Rule
21 Covered entities must perform a full and comprehensive risk assessment and have in place meaningful access controls to safeguard hardware and portable devices we expect organizations to comply with their obligations under these rules regardless of whether they are private or public entities. ~OCR Director, Leon Rodriguez
22 How We Can Help 1. We use a certified partner to create and license our HIPAA Security Risk Assessment Excel-based program for calculation and scoring Based on NIST Guidelines Completed in one day Personalized one-on-one Prioritizes Your Immediate Needs Maintain and Update the Program with latest information 2. Library of policies to address security risks Workshop March 21 and 22 in Maitland: 3. Long-term assistance in developing customized procedures 4. HIPAA Security Workforce Training In Your Office
23 We Are Here For You! Website Facebook Page Linked In - Phone or x 1
24 More For Your Practice Radio Radio Show just for Practice Managers and Providers: Bringing more resources, more ideas and more support to your busy medical practice. Listen for free live or download on itunes and listen later.
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
Meaningful Use: FAQs for Providers
Meaningful Use: FAQs for Providers On Feb. 17, 2009, President Obama signed the American Recovery and Reinvestment Act of 2009 (ARRA) into law. This law includes provisions (known as the HITECH Act) designed
Meaningful Use Audits. NextGen Physician Consulting Services
Meaningful Use Audits NextGen Physician Consulting Services Agenda Audit Overview Documentation for measures requiring numerator and denominator data Documentation for attestation only measures Security
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit
Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm
Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security
BEST PRACTICES FOR MEDICARE
BEST PRACTICES FOR MEDICARE AND MEDICAID EMR INCENTIVE PROGRAMS 1 Regina Gurvich, MBA CHC Chief Compliance Officer, AdvantageCare Physicians Monitoring compliance with Meaningful Use requirements Audit-ready
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
Stage 2 Meaningful Use What the Future Holds. Lindsey Wiley, MHA HIT Manager Oklahoma Foundation for Medical Quality
Stage 2 Meaningful Use What the Future Holds Lindsey Wiley, MHA HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
ARRA, HITECH Act, and Meaningful Use
ARRA, HITECH Act, and Meaningful Use Overview American Recovery and Reinvestment Act Health Information Technology for Economic and Clinical Health (HITECH) Act Interoperability and Standards Meaningful
OCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
Adopting an EHR & Meaningful Use
Adopting an EHR & Meaningful Use Learn how to qualify for the EHR Incentive Program The materials in this presentation, or prepared as part of this presentation, are provided for informational purposes
HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C.
HIPAA Hot Topics Audits, the Latest on Enforcement and the Impact of Breaches September 2012 Nashville Knoxville Memphis Washington, D.C. Overview HITECH Act HIPAA Audit Program: update and initial results
What do you need to know?
What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,
HIPAA in an Omnibus World. Presented by
HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters
OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute
OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil
OCR Reports on the Enforcement. Learning Objectives
OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil
Incentives to Accelerate EHR Adoption
Incentives to Accelerate EHR Adoption The passage of the American Recovery and Reinvestment Act (ARRA) of 2009 provides incentives for eligible professionals (EPs) to adopt and use electronic health records
TennCare/Medicaid EHR Provider Incentive Program
TennCare/Medicaid EHR Provider Incentive Program 2011 Quick History The HITECH Act (creating the EHR Incentive Program) is a part of the American Re-Investment and Recovery Act (ARRA) NOT the Affordable
HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality
HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.
HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule
HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule NYCR-245157 HIPPA, HIPAA HiTECH& the Omnibus Rule A. HIPAA IIHI and PHI Privacy & Security Rule Covered Entities and Business Associates B. HIPAA Hi-TECH Why
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP
The Basics of HIPAA Privacy and Security and HITECH
The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
My Docs Online HIPAA Compliance
My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several
Joe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
HIPAA Security. 1 Security 101 for Covered Entities. Security Topics
HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule
HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Iowa Medicaid Electronic Health Record (EHR) Incentive Program Environmental Scan Summary. June 24, 2016
Iowa Medicaid Electronic Health Record (EHR) Incentive Program Environmental Scan Summary June 24, 2016 Objective of Study State of health IT engagement EHR Incentive Programs participation EHR vendor/version/certified
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
JULY 2010 FINAL RULE. Medicare & Medicaid Programs Electronic Health Record Incentive Program as it Applies to Physicians
JULY 2010 FINAL RULE Medicare & Medicaid Programs Electronic Health Record Incentive Program as it Applies to Physicians 2 JULY 2010 FINAL RULE - STAGE ONE MEANINGFUL USE Summary Points Brief History...
Building Trust and Confidence in Healthcare Information. How TrustNet Helps
Building Trust and Confidence in Healthcare Information The management of healthcare information in the United States is regulated under the HIPAA (Health Insurance Portability and Accountability Act)
HIPAA security rules of engagement
healthcare HIPAA security rules of engagement The use of health information technology continues to expand in healthcare. Healthcare organizations are using web-based applications and other portals that
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment
Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
Meaningful Use Stage 1:
Whitepaper Meaningful Use Stage 1: EHR Incentive Program Information -------------------------------------------------------------- Daw Systems, Inc. UPDATED: November 2012 This document is designed to
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else
Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else Jim Tate Founder: EMR Advocate, Inc. Managing Partner: HITECH Answers Author of The Incentive Roadmap The Meaningful
Alaska Department of Health and Social Services Medicaid Electronic Health Record (EHR) Incentive Program
Alaska Department of Health and Social Services Medicaid Electronic Health Record (EHR) Incentive Program Frequently Asked Questions Version 1.0, March 2016 Disclaimer: The Alaska Department of Health
Sustainable Compliance: A System for Ongoing Audit Readiness
View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013 Agenda Sustainable Compliance at St. Charles Health System
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
HIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box 80278 Portland, OR 97280 503-384-2538 877-376-1981 503-384-2539 Fax
Please Read This business associate audit questionnaire is part of Apgar & Associates, LLC s healthcare compliance resources, Copyright 2014. This questionnaire should be viewed as a tool to aid in evaluating
HIPAA Security Series
7 Security Standards: Implementation for the Small Provider What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule
An Overview of Meaningful Use: FAQs
An Overview of Meaningful Use: FAQs On Feb. 17, 2009, President Obama signed the American Recovery and Reinvestment Act of 2009 (ARRA) into law. This new law includes provisions (known as the HITECH Act)
HIPAA Privacy & Security Rules
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
