OIG Security Audits of EHR Incentive Program Participants
|
|
|
- Valerie Hood
- 10 years ago
- Views:
Transcription
1 OIG Security Audits of EHR Incentive Program Participants April 12-16, 2015 David G. Schoolcraft and Elana R. Zana Attorneys Ogden Murphy Wallace, P.L.L.C. 1 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.
2 Conflict of Interest David G. Schoolcraft, JD Elana R. Zana, JD Have no real or apparent conflicts of interest to report 2 HIMSS 2015
3 Learning Objectives Learning Objective 1: Analyze the questions posed by the Office of Inspector General (OIG) to determine how to maintain appropriate documentation to respond to their inquiries Learning Objective 2: Identify contractors that may be included in an OIG audit including how to design a combined response strategy in advance of an OIG audit Learning Objective 3: Discuss the path of an OIG audit from a hospital perspective to create resource allocation plans in advance of an OIG audit 3
4 An Introduction to the Benefits Realized for the Value of Health IT Prevention & Patient Education OIG Security Audit designed to evaluate hospital management and health information security including outside vendors Savings Hospitals implementing appropriate security audits and protections will avoid claw back of Meaningful Use dollars 4
5 Digitized health files are jet fuel for medical identity theft. - Pam Dixon, World Privacy Forum Source: CBS News
6 OIG Work Plans Target HIPAA & EHR 2014 Work Plan Security of Certified Electronic Health Record Technology under Meaningful Use 2015 Work Plan Security of Certified Electronic Health Record Technology under Meaningful Use Hospitals electronic health record system contingency plan 6
7 Multiple Government Entities Auditing HIPAA Security 7
8 Security of Certified EHR Technology under Meaningful Use We will perform audits of various covered entities receiving EHR incentive payments from CMS and their business associates, such as EHR cloud service providers, to determine whether they adequately protect electronic health information created or maintained by certified EHR technology Furthermore, business associates that transmit, process, and store EHRs for Medicare/Medicaid providers are playing a larger role in the protection of electronic health information. Therefore, audits of cloud service providers and other downstream service providers are necessary to assure compliance with regulatory requirements and contractual agreements. 8
9 OIG Refuses Request For Information No information publicly available about: Audit Process How to prepare for an audit Penalties related to audit results Number of hospitals undergoing an audit Audit reports Benchmarks & best practices used as comparisons 9
10 EHR Incentive Program Audits: Double Jeopardy 10
11 EHR Incentive Program Audits: Double Jeopardy 11
12 CMS vs. OIG 1. Meaningful Use Core Measure: Protect Electronic Health Information 2. To measure the objective, eligible hospitals must conduct security risk analysis of certified EHR technology per federal regulations 3. Figliozzi requests copy of Security Risk Analysis does not analyze adequacy of Security Risk Analysis 4. Failure of CMS audit = Return of Meaningful Use $$$ 12
13 CMS vs. OIG 1. OIG deeper dive into EHR security 2. Business Associates with access to EHR 3. Focus on EHR cloud service providers & EHR vendor 4. On-site Audit (2-3 weeks) 5. Interviews 6. Failure of OIG Audit = Fraud??? 13
14 OIG Audit Questionnaire 17 areas of interest including: EHR Risk Assessment, Audits & Reports EHR Security Plan Organizational Chart Network diagram EHR websites & Patient Portals Policies and Procedures System Inventory Tools used to perform vulnerability scans Central Log and Event Reports EHR System Users List of contractors supporting EHR & Network Perimeter Devices 14
15 Audit Question: Network Diagram Provide the EHR network diagram (or network map) that shows your EHR network architecture including external connections. 15
16 Audit Question: EHR Web Sites Provide a description of internal or external web sites associated with the EHR system including patient portals. 16
17 Audit Question: Policies & Procedures Provide copies of policies related to: a. risk assessment b. plan of action and milestones/corrective action plans c. incident response d. encryption e. patch management f. access controls g. audit logging and/or audit controls 17
18 Audit Question: System Inventory For all network servers provide: a. server name b. operating system and version c. primary function/service (e.g. database, file, backup) d. name of system manager 18
19 Audit Question: EHR Network Devices Information Request for: a. manufacturer and model number b. software version c. primary function 19
20 Target of the Investigation? MU Participants Investigation Recipient Hospitals & EPs EHR Vendors Business Associates Ex: NextGen Cloud Services Subcontractors Ex: Dell, AWS 20
21 Audit Readiness Plan 1. Gather information consistent with OIG Audit Questionnaire 2. Evaluate health IT vendors and related contract terms 3. Identify team that will respond to an OIG audit request 4. Conduct a mock audit to fully assess readiness 21
22 Questions Speakers: David G. Schoolcraft, Attorney Elana R. Zana, Attorney Ogden Murphy Wallace, P.L.L.C. Website: omwhealthit.com Blog: 22
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
5/11/2015 AGENDA ROUNDTABLE PARTICIPANTS TALES FROM THE FRONTLINES OF MEANINGFUL USE: FOCUS ON OPTOMETRY
TALES FROM THE FRONTLINES OF MEANINGFUL USE: FOCUS ON OPTOMETRY Best Practices, Lessons Learned and the Road Ahead June 25, 2015 The CMS EHR Meaningful Use program brings special challenges to the field
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
PREPARING FOR EMR PROGRAM SUCCESS IN 2016 12/10/2015. December 15, 2015. Travis Skinner, CPA Senior Managing Consultant tskinner@bkd.
PREPARING FOR EMR PROGRAM SUCCESS IN 2016 December 15, 2015 Travis Skinner, CPA Senior Managing Consultant [email protected] Michael Orr, CPA Director [email protected] David McDonald, CPA Director [email protected]
Securing Patient Portals
Securing Patient Portals What you need to know to comply with HIPAA Omnibus and Meaningful Use Brian Selfridge, Partner, Meditology Services, LLC Blake Sutherland, VP Enterprise Business, Trend Micro Brian
Considering Meaningful Use Participation when Acquiring a Hospital or Professional Practice
WHITE PAPER Considering Meaningful Use Participation when Acquiring a Hospital or Professional Practice An Encore Point of View By Paul Murphy, MBA & Amy Thorpe MBA, PMP, FHIMSS February 2015 AN ENCORE
Checklist and Related Guidance for Meaningful Use Audits
Checklist and Related Guidance for Meaningful Use Audits This checklist was prepared by Jill M. Girardeau, Partner, Womble Carlyle Sandridge & Rice, LLP and Dina Marty, Counsel, Wake Forest Baptist Medical
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use
Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
Navigating Compliance Landmines in EHR Documentation
Navigating Compliance Landmines in EHR Documentation Brian T. Bates, CPA, CHC, Mac Corporate Compliance Officer University of Alabama Health Services Foundation, P.C. DISCLAIMER: The views and opinions
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol
Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol 1 Learning Objectives Understand Privacy and Security Requirements Understand the new OCR audit protocol Learn how to prepare
Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015
Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015 James B. Wieland, Principal, Ober Kaler David Holtzman, VP of Compliance, CynergisTek Welcome The slides
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Managing Privacy and Security Challenges of Patient EHR Portals
Managing Privacy and Security Challenges of Patient EHR Portals Jacki Monson, JD, CHC Adam H. Greene, JD, MPH DISCLAIMER: The views and opinions expressed in this presentation are those of the author and
Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else
Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else Jim Tate Founder: EMR Advocate, Inc. Managing Partner: HITECH Answers Author of The Incentive Roadmap The Meaningful
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
Meaningful Use Stages 1 and 2 and How to Survive a Meaningful Use Audit. Charles Jarvis, Senior Manager
Meaningful Use Stages 1 and 2 and How to Survive a Meaningful Use Audit Charles Jarvis, Senior Manager Outline Overview Meaningful Use Stage 1 Differences between Stage 1 and Stage 2 Surviving a Meaningful
HIPAA COMPLIANCE PLAN FOR 2013
HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt
Meaningful Use Audits. NextGen Physician Consulting Services
Meaningful Use Audits NextGen Physician Consulting Services Agenda Audit Overview Documentation for measures requiring numerator and denominator data Documentation for attestation only measures Security
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended
Contracting Guidelines with EHR Vendors
Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written from the perspective of the software company. You can request language
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA
AHLA B. HIPAA Compliance Audits Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA Anna C. Watterson Davis Wright Tremaine LLP Washington, DC Fraud
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
The HITECH Act and Meaningful Use Implications for Population and Public Health
The HITECH Act and Meaningful Use Implications for Population and Public Health Bill Brand, MPH Public Health Informatics Institute Meaningful Use for Public Health Professionals: Basic Training May 16,
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
BEST PRACTICES FOR MEDICARE
BEST PRACTICES FOR MEDICARE AND MEDICAID EMR INCENTIVE PROGRAMS 1 Regina Gurvich, MBA CHC Chief Compliance Officer, AdvantageCare Physicians Monitoring compliance with Meaningful Use requirements Audit-ready
Six Steps to Achieving Meaningful Use Qualification, Stage 1
WHITE PAPER Six Steps to Achieving Meaningful Use Qualification, Stage 1 Shefali Mookencherry Principal Healthcare Strategy Consultant Hayes Management Consulting Background Providers can qualify for Stage
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
Auditing PQRS & Meaningful Use To Maintain Compliance. Standard Disclaimer. Learning Objectives 12/2/2014
2014 NAMAS Conference Asheville, NC December 9, 2014 Auditing PQRS & Meaningful Use To Maintain Compliance Presented by David J. Zetter, PHR, CHCC, CPCO, CPC, CPC-H, PCS, FCS, CHBC, CMUP Standard Disclaimer
Meaningful Use and Release of Information
Meaningful Use and Release of Information Understanding IOD s Role IOD Incorporated 1030 Ontario Road Green Bay, WI 54311 800.236.3355 iodincorporated.com INTRODUCTION According to HIMSS, Meaningful Use
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality
Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality Meaningful Use Stage 1 Focuses on Functional & Interoperability
To: From: Date: Subject: Proposed Rule on Meaningful Use Requirements Stage 2 Measures, Payment Penalties, Hardship Exceptions and Appeals
MEMORANDUM To: PPSV Clients and Friends From: Barbara Straub Williams Date: Subject: Proposed Rule on Meaningful Use Requirements Stage 2 Measures, Payment Penalties, Hardship Exceptions and Appeals The
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
