HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals
|
|
|
- Arnold Evelyn Shields
- 10 years ago
- Views:
Transcription
1 HIPAA for HIT and EHRs Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals Donald Bechtel, CHP Siemens Health Services Patient Privacy Officer
2 Fair Information Practices Fair Information Practices (FIP) as a Privacy Framework Code of Fair Information Practices was first developed in the early 1970s by Department Health, Education, and Welfare, now known as Department of Health and Human Services (DHHS) HIPAA Privacy Rules were built on the foundation of FIP Meaningful Use requires that EP and EH must comply with HIPAA privacy and security requirements ONC Adopted the FIP for the Nationwide Health Information Network HIT Policy Committee recommends FIP - to build public trust and participation in health information technology and electronic health information exchange. Individual Access Correction Openness and Transparency Individual Choice or Right to Informed Consent Collection, Use, and Disclosure Limitation Data Quality and Integrity Security Safeguards Accountability Availability Page 3
3 ONC s EHR Standards, Implementation Specifications, and Certification Criteria Final Rule versus HIPAA Identified nine privacy and security criteria for a certified EHR System (o) Access Controls - Unique User ID and Tracking (p) Emergency Access (q) Automatic Log-off (r) Audit Log (stronger than HIPAA specific content) (s) Integrity (stronger than HIPAA requires hashing standard) (t) Authentication (u) General Encryption (stronger than HIPAA required method) (v) Encryption when Exchanging ehi (stronger than HIPAA required) (w) Accounting of Disclosures (Optional for Stage 1) These also tie very well with HIPAA Security Safeguards New NIST test scripts version 1.1 were recently issued Page 4
4 Protect Electronic Health Information Access Controls vs Data Controls Access Controls, User ID and Passwords (authentication of user) Policies and procedures to assign and remove user IDs Page 5 Termination procedures executed immediately Policies and procedures for strong password requirements Policies and procedures to designate and maintain user authorizations Optionally support for tokens or smart cards User authentications procedures through global logon to authorized apps Network access controls Firewalls, routers, etc. Environmental security controls Restricted access to users and applications Vendor s application in-depth security controls Data at Rest restricted access controls Optionally encryption based on risk assessments Data in transit must be encrypted, including private point-to-point lines Audit logs capture and report information, detection and alerts
5 Connectivity User and System Authentication (trusted trading partners) Cross enterprise access controls Individual identification remains a key concern Trading Partner Agreements or other contracts between organizations Should help to spell out controls for interconnectivity and authentication HISPs, HIOs (a.k.a. HIEs) RHIOs, etc will need to develop these agreements and define the methods that they will support. As with HIPAA today, ensure that all entities are protecting data equally, and are only using and disclosing health information as permitted With the new HITECH rules it is now clear that Business Associations when in possession of PHI must protect it with the same safeguards as a Covered Entity. Sending encrypted and documents has challenges NHIN and NHIN Direct are working on these issues Page 6
6 Sharing documents (individually identifiable health information) What information should be sent for minimum necessary OCR to issue Guidelines (still pending) Should rely on standards like HL7 and CDA Templates and others where available Medication list, Allergy List, Vital Signs, Lab Results, Submission to Immunization Registries, Public Health Surveillance Ensure that the information is protected when sent (encrypted) Will patient consent be required for Stage I documents? Currently, under HIPAA guidelines the above reports should not require consent, when sent in the context of treatment, payment, or healthcare operations More guidance on consent may come from the HIT Policy Committee We must know the entity requesting data and be able to authenticate them Page 7
7 Role of the Provider Implement the necessary policies and procedures to maintain an EHR system EHR systems provide the tools to preserve data privacy and security, but they won t work without the provider s policies and procedures to enable them. For things like: Access controls Authorizations Identity management Patient consent management And so on Page 8
8 Page 9 Questions
Certification Guidance for EHR Technology Developers Serving Health Care Providers Ineligible for Medicare and Medicaid EHR Incentive Payments
I. Background Certification Guidance for EHR Technology Developers Serving Health Care Providers Ineligible for Medicare and Medicaid EHR Incentive Payments The Medicare and Medicaid EHR Incentive Programs,
Mark Anderson, FHIMSS, CPHIMSS Healthcare IT Futurist
Mark R. Anderson, FHIMSS, CPHIMS CEO of AC Group, Inc. Mark Anderson, FHIMSS, CPHIMSS Healthcare IT Futurist CEO of AC Group National Speaker on EHR > 800 sessions since 2001 Semi annual report on Vendor
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
HL7 & Meaningful Use. Charles Jaffe, MD, PhD CEO Health Level Seven International. HIMSS 11 Orlando February 23, 2011
HL7 & Meaningful Use Charles Jaffe, MD, PhD CEO Health Level Seven International HIMSS 11 Orlando February 23, 2011 Overview Overview of Meaningful Use HIT Standards and Meaningful Use Overview HL7 Standards
Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality
Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality Meaningful Use Stage 1 Focuses on Functional & Interoperability
Eligible Professional Meaningful Use Core Measures Measure 7 of 17 Stage 2 Date issued: August, 2014
Eligible Professional Meaningful Use Core Measures Measure 7 of 17 Stage 2 Date issued: August, 2014 Patient Electronic Access Objective Measure Provide patients the ability to view online, download and
AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS
AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS OBJECTIVE Increase your IT vocab so that you can assess the risks related to your audits of EHRs and/or EHR related data AGENDA What
Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:
HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates
Interoperability Testing and Certification. Lisa Carnahan Computer Scientist Standards Coordination Office
Interoperability Testing and Certification Lisa Carnahan Computer Scientist Standards Coordination Office Discussion Topics US National Institute of Standards & Technology American Recovery & Reinvestment
How to Use the NYeC Privacy and Security Toolkit V 1.1
How to Use the NYeC Privacy and Security Toolkit V 1.1 Scope of the Privacy and Security Toolkit The tools included in the Privacy and Security Toolkit serve as guidance for educating stakeholders about
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
Meaningful Use of Certified EHR Technology with My Vision Express*
Insight Software, LLC 3050 Universal Blvd Ste 120 Weston FL 33331-3528 Tel. 877-882-7456 www.myvisionexpress.com Meaningful Use of Certified EHR Technology with My Vision Express* Eligible Professional
Identity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
Meaningful Use and Release of Information
Meaningful Use and Release of Information Understanding IOD s Role IOD Incorporated 1030 Ontario Road Green Bay, WI 54311 800.236.3355 iodincorporated.com INTRODUCTION According to HIMSS, Meaningful Use
The basics of Health Information Technology
The basics of Health Information Technology 2012 1 What is Health Information Technology? Health IT, or e-health, is increasingly viewed as the most promising tool for improving the overall quality, safety
WISHIN Pulse Statement on Privacy, Security and HIPAA Compliance
WISHIN Pulse Statement on Privacy, Security and HIPAA Compliance SEC-STM-072014 07/2014 Contents Patient Choice... 2 Security Protections... 2 Participation Agreement... 2 Controls... 3 Break the Glass...
HIMSS Interoperability Showcase 2011
Interoperability will bind together a wide network of real-time life critical data that not only transform but become healthcare. Health Information Interoperability Challenges Healthcare and healthcare
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery
Navigating the Trends in Health Care Today. MEDITECH Solutions for Meaningful Use and Interoperability
Navigating the Trends in Health Care Today MEDITECH Solutions for Meaningful Use and Interoperability Certification Update EHRs Meeting ONC 2014 Standards "There is no such thing as being 'Stage 1 Certified'
Meaningful Use Stage 2 (MU2): The Patient Portal and its Value for Increased Patient Engagement
Meaningful Use Stage 2 (MU2): The Patient Portal and its Value for Increased Patient Engagement Shelby Miller Senior Health Solutions Consultant Avastone Health Solutions Who is Avastone Health Solutions?
ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4
ConnectVirginia EXCHANGE Onboarding and Certification Guide Version 1.4 July 18, 2012 CONTENTS 1 Overview... 5 2 Intended Audience... 5 3 ConnectVirginia Background... 5 3.1 Federated... 5 3.2 Secure...
Community Behavioral Health. PW 0214 Executive Summary
PW 0214 Executive Summary Copyright 2014 Cerner Corporation. All rights reserved. This document and the software it pertains to are furnished under license and may be used or copied only in accordance
EHR Incentive Program Stage 3 Objectives & Measures Crosswalk of Stage 3 Proposed Objectives, Measures & Corresponding Stage 2 Measures
EHR Incentive Program Stage 3 Objectives & Measures Crosswalk of Stage 3 Proposed Objectives, Measures & Corresponding Stage 2 Measures Objective 1: Protect Patient Health Information Measures: 1 (Complete
Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses
Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses DR. KIBBE S RESPONSES What is health information exchange? How can health information exchange help my practice? Can I comply
Raj Chaudhary, PE, CGEIT Partner, Crowe Horwath LLP. Chris Reffkin, CISSP Manager, Crowe Horwath LLP www.crowehorwath.com/hipaa
HIPAA/HITECH Security and Privacy A Practical Approach Presented by: Raj Chaudhary, PE, CGEIT Partner, Crowe Horwath LLP Chris Reffkin, CISSP Manager, Crowe Horwath LLP www.crowehorwath.com/hipaa Learning
The Do s and Don ts of Medical Device integration
Advances in Wireless Technologies for Healthcare The Do s and Don ts of Medical Device integration Shahid N. Shah, CEO Visit Dräger and Shahid at HIMSS 2012 Dräger Booth on the main floor: Booth #5734
Appendix B: Existing Guidance to Support HIE Implementation Opportunities
Appendix B: Existing Guidance to Support HIE Implementation Opportunities APPENDIX B: EXISTING GUIDANCE TO SUPPORT HIE IMPLEMENTATION OPPORTUNITIES There is an important opportunity for the states and
Interoperability: White Paper. Introduction. PointClickCare Interoperability - 2014. January 2014
White Paper PointClickCare Interoperability - 2014 Interoperability: In healthcare, interoperability is where multiple technology platforms and software applications are able to connect, communicate, and
Interim Final Rule on Standards, Implementation Specifications, and Certification Criteria
Interim Final Rule on Standards, Implementation Specifications, and Certification Criteria NIST/OCR Conference Safeguarding Health Information: Building Assurance through HIPAA Security Steven Posnack,
SECURITY RISK ASSESSMENT SUMMARY
Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected
EHR Incentive Program Updates. Jason Felts, MS HIT Practice Advisor
EHR Incentive Program Updates Jason Felts, MS HIT Practice Advisor An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Step 3: Mute your
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit
West Virginia Meaningful Use Registration System Instructions
West Virginia Meaningful Use Registration System Instructions To register, go to: http://www.wvdhhr.org/bph/oeps/murs/login.cfm Click on Need to register an account? Enter e-mail and your choice of password.
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
Medicaid EHR Incentive Program. Focus on Stage 2. Kim Davis-Allen, Outreach Coordinator [email protected]
Medicaid EHR Incentive Program Focus on Stage 2 Kim Davis-Allen, Outreach Coordinator [email protected] Understanding Participation Program Year Program Year January 1 st - December 31st. Year
VASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations
How To Improve Health Information Exchange
Health Information Exchange Strategic and Operational Plan Profile Overview Hawai i is comprised of eight main islands, seven of which are inhabited. With a population of approximately 1.3 million, Hawai
Managing Privacy and Security Challenges of Patient EHR Portals
Managing Privacy and Security Challenges of Patient EHR Portals Jacki Monson, JD, CHC Adam H. Greene, JD, MPH DISCLAIMER: The views and opinions expressed in this presentation are those of the author and
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
Health Informa.on Technology Audits: "Meaningful Use" and HIPAA. January 23, 2015 Eli Poliakoff Gary Capps
Health Informa.on Technology Audits: "Meaningful Use" and HIPAA January 23, 2015 Eli Poliakoff Gary Capps 1 HITECH - Related Audits Health Informa.on Technology for Economic and Clinical Health Act ("HITECH")
Carolyn P. Hartley, MLA President, CEO Physicians EHR, Inc
Carolyn P. Hartley, MLA President, CEO Physicians EHR, Inc Health Information Management Professional SME to Regional Extension Centers President, CEO: Physicians EHR, Inc 140+ complex to risky EHR installations
Meaningful Use Audits. NextGen Physician Consulting Services
Meaningful Use Audits NextGen Physician Consulting Services Agenda Audit Overview Documentation for measures requiring numerator and denominator data Documentation for attestation only measures Security
MicroMD EMR version 7.6
MicroMD EMR version 7.6 H I T E C H M E A S U R E C a l c u l a t i o n s MICROMD EMR HITECH MEASURE CALCULATIONS VERSION 7.6 TABLE OF CONTENTS PREFACE Welcome to MicroMD EMR... i How This Guide is Organized...
Nine Network Considerations in the New HIPAA Landscape
Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant
ILHIE Direct Secure Messaging Solution
ILHIE Direct Secure Messaging Solution How Secure Messaging Can Improve Patient Care and Help You Achieve Stage 1 Meaningful Use January 2012 1 What is Secure Messaging? Secure Messaging is an encrypted
How To Improve Health Care Quality
Meaningful Use: At the Crossroads between Stage 1 and Stage 2 Presented by: Bruce Eckert, National Practice Director Date: April 19, 2013 Heading Agenda Ariel 40 Stage 2 Major Changes Payment Adjustments
ITUS Med Solutions. HITECH & HIPAA Compliance Guide
Solutions HITECH & HIPAA Compliance Guide 75 East 400 South Suite 301 - Salt Lake City - UT - 84111 (801) 505-9570 www.itus-med.com Email: [email protected] HITECH & HIPAA Compliance HITECH and HIPAA
Expanded Support for Medicaid Health Information Exchanges
Expanded Support for Medicaid Health Information Exchanges Joint Public Health Forum & CDC Nationwide Webinar April 21, 2016 CDC EHR Meaningful Use Webpage-Joint Public Health Forum & CDC Nationwide Webinars
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
MICROMD EMR VERSION 9.0 2014 OBJECTIVE MEASURE CALCULATIONS
MICROMD EMR VERSION 9.0 2014 OBJECTIVE MEASURE CALCULATIONS TABLE OF CONTENTS PREFACE Welcome to MicroMD EMR... i How This Guide is Organized... i Understanding Typographical Conventions... i Cross-References...
The Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security
The Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security NCHICA 11th Academic Medical Center Security & Privacy Conference, June 22-24, 2015 Panel Leader: Panelists: Amy Leopard,
Faculty Disclosure. Pharmacist Learning Objectives. Pharmacy e-hit: The Future of Pharmacy and Patient Care
Pharmacy e-hit: The Future of Pharmacy and Patient Care 1 Faculty Disclosure Ms Spiro has no actual or potential conflicts of interest associated with this presentation. 2 Pharmacist Learning Objectives
Enabling Patients Decision Making Power: A Meaningful Use Outcome. Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality
Enabling Patients Decision Making Power: A Meaningful Use Outcome Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality Today 1. Meaningful Use (MU) 2. 2/3rds of MU relates
Stage 2 Meaningful Use What the Future Holds. Lindsey Wiley, MHA HIT Manager Oklahoma Foundation for Medical Quality
Stage 2 Meaningful Use What the Future Holds Lindsey Wiley, MHA HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.
Participating in a Health Information Exchange (HIE) Many Faces of Community Health 2011. 10/27/11 Greg Linden
Participating in a Health Information Exchange (HIE) Many Faces of Community Health 2011 10/27/11 Greg Linden CIO, Stratis Health HIE Subject Matter Expert, REACH Objective This session will outline options
Security Compliance, Vendor Questions, a Word on Encryption
Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center [email protected]
Essential Skills for Business Analysts in the Healthcare Domain
#ASPEevents Essential Skills for Business Analysts in the Healthcare Domain Essential Skills for Business Analysts in the Healthcare Domain Presented By Mary C. Zarba, MBA Vail, Colorado Welcome!! One
