OIG Security Audits of EHR Incentive Program Participants

Size: px
Start display at page:

Download "OIG Security Audits of EHR Incentive Program Participants"

Transcription

1 OIG Security Audits of EHR Incentive Program Participants April 12-16, 2015 David G. Schoolcraft and Elana R. Zana Attorneys Ogden Murphy Wallace, P.L.L.C. 1 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.

2 Conflict of Interest David G. Schoolcraft, JD Elana R. Zana, JD Have no real or apparent conflicts of interest to report 2 HIMSS 2015

3 Learning Objectives Learning Objective 1: Analyze the questions posed by the Office of Inspector General (OIG) to determine how to maintain appropriate documentation to respond to their inquiries Learning Objective 2: Identify contractors that may be included in an OIG audit including how to design a combined response strategy in advance of an OIG audit Learning Objective 3: Discuss the path of an OIG audit from a hospital perspective to create resource allocation plans in advance of an OIG audit 3

4 An Introduction to the Benefits Realized for the Value of Health IT Prevention & Patient Education OIG Security Audit designed to evaluate hospital management and health information security including outside vendors Savings Hospitals implementing appropriate security audits and protections will avoid claw back of Meaningful Use dollars 4

5 Digitized health files are jet fuel for medical identity theft. - Pam Dixon, World Privacy Forum Source: CBS News

6 OIG Work Plans Target HIPAA & EHR 2014 Work Plan Security of Certified Electronic Health Record Technology under Meaningful Use 2015 Work Plan Security of Certified Electronic Health Record Technology under Meaningful Use Hospitals electronic health record system contingency plan 6

7 Multiple Government Entities Auditing HIPAA Security 7

8 Security of Certified EHR Technology under Meaningful Use We will perform audits of various covered entities receiving EHR incentive payments from CMS and their business associates, such as EHR cloud service providers, to determine whether they adequately protect electronic health information created or maintained by certified EHR technology Furthermore, business associates that transmit, process, and store EHRs for Medicare/Medicaid providers are playing a larger role in the protection of electronic health information. Therefore, audits of cloud service providers and other downstream service providers are necessary to assure compliance with regulatory requirements and contractual agreements. 8

9 OIG Refuses Request For Information No information publicly available about: Audit Process How to prepare for an audit Penalties related to audit results Number of hospitals undergoing an audit Audit reports Benchmarks & best practices used as comparisons 9

10 EHR Incentive Program Audits: Double Jeopardy 10

11 EHR Incentive Program Audits: Double Jeopardy 11

12 CMS vs. OIG 1. Meaningful Use Core Measure: Protect Electronic Health Information 2. To measure the objective, eligible hospitals must conduct security risk analysis of certified EHR technology per federal regulations 3. Figliozzi requests copy of Security Risk Analysis does not analyze adequacy of Security Risk Analysis 4. Failure of CMS audit = Return of Meaningful Use $$$ 12

13 CMS vs. OIG 1. OIG deeper dive into EHR security 2. Business Associates with access to EHR 3. Focus on EHR cloud service providers & EHR vendor 4. On-site Audit (2-3 weeks) 5. Interviews 6. Failure of OIG Audit = Fraud??? 13

14 OIG Audit Questionnaire 17 areas of interest including: EHR Risk Assessment, Audits & Reports EHR Security Plan Organizational Chart Network diagram EHR websites & Patient Portals Policies and Procedures System Inventory Tools used to perform vulnerability scans Central Log and Event Reports EHR System Users List of contractors supporting EHR & Network Perimeter Devices 14

15 Audit Question: Network Diagram Provide the EHR network diagram (or network map) that shows your EHR network architecture including external connections. 15

16 Audit Question: EHR Web Sites Provide a description of internal or external web sites associated with the EHR system including patient portals. 16

17 Audit Question: Policies & Procedures Provide copies of policies related to: a. risk assessment b. plan of action and milestones/corrective action plans c. incident response d. encryption e. patch management f. access controls g. audit logging and/or audit controls 17

18 Audit Question: System Inventory For all network servers provide: a. server name b. operating system and version c. primary function/service (e.g. database, file, backup) d. name of system manager 18

19 Audit Question: EHR Network Devices Information Request for: a. manufacturer and model number b. software version c. primary function 19

20 Target of the Investigation? MU Participants Investigation Recipient Hospitals & EPs EHR Vendors Business Associates Ex: NextGen Cloud Services Subcontractors Ex: Dell, AWS 20

21 Audit Readiness Plan 1. Gather information consistent with OIG Audit Questionnaire 2. Evaluate health IT vendors and related contract terms 3. Identify team that will respond to an OIG audit request 4. Conduct a mock audit to fully assess readiness 21

22 Questions Speakers: David G. Schoolcraft, Attorney Elana R. Zana, Attorney Ogden Murphy Wallace, P.L.L.C. Website: omwhealthit.com Blog: 22

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

5/11/2015 AGENDA ROUNDTABLE PARTICIPANTS TALES FROM THE FRONTLINES OF MEANINGFUL USE: FOCUS ON OPTOMETRY

5/11/2015 AGENDA ROUNDTABLE PARTICIPANTS TALES FROM THE FRONTLINES OF MEANINGFUL USE: FOCUS ON OPTOMETRY TALES FROM THE FRONTLINES OF MEANINGFUL USE: FOCUS ON OPTOMETRY Best Practices, Lessons Learned and the Road Ahead June 25, 2015 The CMS EHR Meaningful Use program brings special challenges to the field

More information

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

HITRUST CSF Assurance Program

HITRUST CSF Assurance Program HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

PREPARING FOR EMR PROGRAM SUCCESS IN 2016 12/10/2015. December 15, 2015. Travis Skinner, CPA Senior Managing Consultant tskinner@bkd.

PREPARING FOR EMR PROGRAM SUCCESS IN 2016 12/10/2015. December 15, 2015. Travis Skinner, CPA Senior Managing Consultant tskinner@bkd. PREPARING FOR EMR PROGRAM SUCCESS IN 2016 December 15, 2015 Travis Skinner, CPA Senior Managing Consultant [email protected] Michael Orr, CPA Director [email protected] David McDonald, CPA Director [email protected]

More information

Securing Patient Portals

Securing Patient Portals Securing Patient Portals What you need to know to comply with HIPAA Omnibus and Meaningful Use Brian Selfridge, Partner, Meditology Services, LLC Blake Sutherland, VP Enterprise Business, Trend Micro Brian

More information

Considering Meaningful Use Participation when Acquiring a Hospital or Professional Practice

Considering Meaningful Use Participation when Acquiring a Hospital or Professional Practice WHITE PAPER Considering Meaningful Use Participation when Acquiring a Hospital or Professional Practice An Encore Point of View By Paul Murphy, MBA & Amy Thorpe MBA, PMP, FHIMSS February 2015 AN ENCORE

More information

Checklist and Related Guidance for Meaningful Use Audits

Checklist and Related Guidance for Meaningful Use Audits Checklist and Related Guidance for Meaningful Use Audits This checklist was prepared by Jill M. Girardeau, Partner, Womble Carlyle Sandridge & Rice, LLP and Dina Marty, Counsel, Wake Forest Baptist Medical

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?

More information

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing

More information

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011 Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8

More information

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability

More information

Navigating Compliance Landmines in EHR Documentation

Navigating Compliance Landmines in EHR Documentation Navigating Compliance Landmines in EHR Documentation Brian T. Bates, CPA, CHC, Mac Corporate Compliance Officer University of Alabama Health Services Foundation, P.C. DISCLAIMER: The views and opinions

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol 1 Learning Objectives Understand Privacy and Security Requirements Understand the new OCR audit protocol Learn how to prepare

More information

Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015

Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015 Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015 James B. Wieland, Principal, Ober Kaler David Holtzman, VP of Compliance, CynergisTek Welcome The slides

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Managing Privacy and Security Challenges of Patient EHR Portals

Managing Privacy and Security Challenges of Patient EHR Portals Managing Privacy and Security Challenges of Patient EHR Portals Jacki Monson, JD, CHC Adam H. Greene, JD, MPH DISCLAIMER: The views and opinions expressed in this presentation are those of the author and

More information

Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else

Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else Jim Tate Founder: EMR Advocate, Inc. Managing Partner: HITECH Answers Author of The Incentive Roadmap The Meaningful

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Meaningful Use Stages 1 and 2 and How to Survive a Meaningful Use Audit. Charles Jarvis, Senior Manager

Meaningful Use Stages 1 and 2 and How to Survive a Meaningful Use Audit. Charles Jarvis, Senior Manager Meaningful Use Stages 1 and 2 and How to Survive a Meaningful Use Audit Charles Jarvis, Senior Manager Outline Overview Meaningful Use Stage 1 Differences between Stage 1 and Stage 2 Surviving a Meaningful

More information

HIPAA COMPLIANCE PLAN FOR 2013

HIPAA COMPLIANCE PLAN FOR 2013 HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt

More information

Meaningful Use Audits. NextGen Physician Consulting Services

Meaningful Use Audits. NextGen Physician Consulting Services Meaningful Use Audits NextGen Physician Consulting Services Agenda Audit Overview Documentation for measures requiring numerator and denominator data Documentation for attestation only measures Security

More information

IT OUTSOURCING SECURITY

IT OUTSOURCING SECURITY IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended

More information

Contracting Guidelines with EHR Vendors

Contracting Guidelines with EHR Vendors Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written from the perspective of the software company. You can request language

More information

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved

More information

HIPAA RISK ASSESSMENT

HIPAA RISK ASSESSMENT HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation

More information

Managing data security and privacy risk of third-party vendors

Managing data security and privacy risk of third-party vendors Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected

More information

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA AHLA B. HIPAA Compliance Audits Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA Anna C. Watterson Davis Wright Tremaine LLP Washington, DC Fraud

More information

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000. U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098

More information

The HITECH Act and Meaningful Use Implications for Population and Public Health

The HITECH Act and Meaningful Use Implications for Population and Public Health The HITECH Act and Meaningful Use Implications for Population and Public Health Bill Brand, MPH Public Health Informatics Institute Meaningful Use for Public Health Professionals: Basic Training May 16,

More information

HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

BEST PRACTICES FOR MEDICARE

BEST PRACTICES FOR MEDICARE BEST PRACTICES FOR MEDICARE AND MEDICAID EMR INCENTIVE PROGRAMS 1 Regina Gurvich, MBA CHC Chief Compliance Officer, AdvantageCare Physicians Monitoring compliance with Meaningful Use requirements Audit-ready

More information

Six Steps to Achieving Meaningful Use Qualification, Stage 1

Six Steps to Achieving Meaningful Use Qualification, Stage 1 WHITE PAPER Six Steps to Achieving Meaningful Use Qualification, Stage 1 Shefali Mookencherry Principal Healthcare Strategy Consultant Hayes Management Consulting Background Providers can qualify for Stage

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards

More information

Auditing PQRS & Meaningful Use To Maintain Compliance. Standard Disclaimer. Learning Objectives 12/2/2014

Auditing PQRS & Meaningful Use To Maintain Compliance. Standard Disclaimer. Learning Objectives 12/2/2014 2014 NAMAS Conference Asheville, NC December 9, 2014 Auditing PQRS & Meaningful Use To Maintain Compliance Presented by David J. Zetter, PHR, CHCC, CPCO, CPC, CPC-H, PCS, FCS, CHBC, CMUP Standard Disclaimer

More information

Meaningful Use and Release of Information

Meaningful Use and Release of Information Meaningful Use and Release of Information Understanding IOD s Role IOD Incorporated 1030 Ontario Road Green Bay, WI 54311 800.236.3355 iodincorporated.com INTRODUCTION According to HIMSS, Meaningful Use

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality

Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality Meaningful Use Stage 1 Focuses on Functional & Interoperability

More information

To: From: Date: Subject: Proposed Rule on Meaningful Use Requirements Stage 2 Measures, Payment Penalties, Hardship Exceptions and Appeals

To: From: Date: Subject: Proposed Rule on Meaningful Use Requirements Stage 2 Measures, Payment Penalties, Hardship Exceptions and Appeals MEMORANDUM To: PPSV Clients and Friends From: Barbara Straub Williams Date: Subject: Proposed Rule on Meaningful Use Requirements Stage 2 Measures, Payment Penalties, Hardship Exceptions and Appeals The

More information

PCI Compliance. Top 10 Questions & Answers

PCI Compliance. Top 10 Questions & Answers PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information