Ensuring HIPAA Compliance When Transmitting PHI via Patient Portals, and Texting
|
|
|
- Susanna Reynolds
- 10 years ago
- Views:
Transcription
1 Presenting a live 90-minute webinar with interactive Q&A Ensuring HIPAA Compliance When Transmitting PHI via Patient Portals, and Texting Protecting Patient Privacy, Complying with State and Federal Regulations, and Meeting Meaningful Use Stage 2 Standards THURSDAY, SEPTEMBER 17, pm Eastern 12pm Central 11am Mountain 10am Pacific Today s faculty features: Ryan P. Blaney, Member, Cozen O Connor, Washington, D.C. Diane M. Welsh, Shareholder, von Briesen & Roper, Madison, Wis. The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions ed to registrants for additional information. If you have any questions, please contact Customer Service at ext. 10.
2 Tips for Optimal Quality FOR LIVE EVENT ONLY Sound Quality If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection. If the sound quality is not satisfactory, you may listen via the phone: dial and enter your PIN when prompted. Otherwise, please send us a chat or [email protected] immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.
3 Continuing Education Credits FOR LIVE EVENT ONLY In order for us to process your continuing education credit, you must confirm your participation in this webinar by completing and submitting the Attendance Affirmation/Evaluation after the webinar. A link to the Attendance Affirmation/Evaluation will be in the thank you that you will receive immediately following the program. For additional information about CLE credit processing call us at ext. 35.
4 Program Materials FOR LIVE EVENT ONLY If you have not printed the conference materials for this program, please complete the following steps: Click on the ^ symbol next to Conference Materials in the middle of the lefthand column on your screen. Click on the tab labeled Handouts that appears, and there you will see a PDF of the slides for today's program. Double click on the PDF and a separate page will open. Print the slides by clicking on the printer icon.
5 Ensuring HIPAA Compliance When Transmitting PHI Via Patient Portals, and Texting September 17, 2015 Ryan P. Blaney, Esq. Cozen O Connor, Washington, DC [email protected] (202) Sponsored by the Legal Publishing Group of Strafford Publications Diane M. Welsh, Esq. von Briesen & Roper, Madison, WI [email protected] (608)
6 6 OVERVIEW OF PRESENTATION
7 Health Care Reform & Financial Incentives Health Information Technology for Economic and Clinical Health (HITECH) Act Incentive payments to providers who employ meaningful use of certified EHR technology. Beginning in 2015, Medicare (but not Medicaid) will reduce payments to physicians and other providers who are eligible but choose not to participate. 7
8 Meaningful Use Measures Patient portals are a way to meet the meaningful use requirements ( measures ) Core measures - i.e., providing patients with an electronic copy of their health information; providing clinical summaries for each office visit Menu measures i.e., providing patients with timely electronic access to their health information; patientspecific education resources 8
9 What is a Patient Portal? A secure online website that gives you 24-hour access to your personal health information and medical records 9
10 10 Consumer-focused Health Care??? Facts & Stats
11 Patient Interaction & Partnership 84% of US consumers with smart phones/home computers want access to electronic medical records 41% willing to switch doctors over issue 70% of consumers believe it s important to be able to consult their providers via . See Kaveh Safavi, M.D., J.D., Accenture Consumer Survey on Patient Engagement, Sept
12 12 Lifecycle of Patient Web Portal
13 Patient Web Portal Selecting & Design Phase Evaluating Patient Portal Vendors Secure messaging with providers? Do they have a privacy & security officer(s)? Proxy Access? Portal maintenance and repairs Design phase Security, access and control Mobile friendly 13
14 Contracting Don t just sign the standard contract placed in front of you! Pay attention to clauses/provisions: Who owns the data? Term and renewal Indemnification Limitations on Liability Reporting requirements and breaches Termination and data (discussed later) 14
15 What is a Business Associate Definition: ( BA )? A person who (i) performs for or on behalf of a covered entity, or assists a covered entity, in performing an activity or function involving use or disclosure of health information (e.g., claims processing, utilization review, billing), or (ii) provides legal, actuarial, accounting, management, administrative, accreditation or financial services where the provision of such services involves the disclosure of health information from the entity or another business associate of the entity Includes anyone with health information from your health plans, providers and covered entities (could include attorneys, consultants, third party administrators, auditors, computer software service companies) 15
16 What are the Business Associate Rules? 16
17 Tips for Drafting & Negotiating BAAs Reporting requirements and timing (the parties can and should agree on shorter periods) Review the underlying services agreement and modify services agreement and BAA to be consistent Agency and subcontractor provisions Indemnification clauses Breach notification costs and responsibilities Termination and destruction of PHI 17
18 HIPAA Audits HIPAA Compliance is like middle school math you must show your work Leon Rodriguez, Director Office of Civil Rights HIPAA related recordkeeping is essential. Audit: Leverage OCR s HIPAA Privacy, Security and Breach Audit Protocol available online. Assessments: analysis of vulnerabilities, data criticality, remediation strategies and process for determining and accepting risks in the organization. 18
19 Breaches The Omnibus Rule made significant changes to the interim final breach notification rule by: Adding a presumption that any unauthorized use or disclosure of unsecured PHI is a breach Removing the prior risk of harm standard. Requires Covered Entities to evaluate and demonstrate that low probability PHI has been compromised otherwise notification to patients required 19
20 How? Sources of Data Breach Source: Ponemon Institute LLC 2014 Cost of Data Breach Study: Global Analysis (IBM sponsored) 20
21 What cyber criminals have already taken Intellectual Property Loss varies on nature of industry State Secrets Destabilizing American infrastructure Medical Records Average Black Market Value = $60 > cc Credit Cards PCI violations range from $10K - $100K Identity Theft Companies pay approx. $180 per compromised customer Corporate Espionage Loss of contracts = loss of revenue 21
22 Costs of Data Breaches $145/record, avg. of > 28k records (Ponemon Institute Survey) $159 when caused by malicious attacks (Ponemon Institute Survey) Average financial impact to surveyed companies with for one or more incidents = $3.5 million 22
23 Patient Portal, Texting and Use and Safeguards Diane Welsh
24 Promoting Portal Use Identify Physician Champions. Identify physician champions to lead by example. Training. Conduct standardized in-service training to all employees. Support. Trainers and clinic-based super-users provide hands-on support as needed. Inform and Encourage Patients. Providers and staff inform patients of availability and advantages of portal and encourage participation. Promote use of portal through other channels, as well (newsletters, local media). adapted from: 24
25 25 from
26 Disclaimers for Patients Never Use for Urgent Messages Message Response Time Password Management Keep Passwords Confidential Changing Password Use Portal, not unsecured , for Secure Communication with Provider 26
27 Workforce Training HIPAA training, when hired and annually Portal-specific training To ensure proper use by workforce So workforce can properly assist patients Avoids improper or riskier means of communication 27
28 Provider to Patient Provider to Provider Texting 28
29 Provider to Provider Texting 29
30 Provider to Patient Texting Potential Uses Risk Management 30
31 Privacy and Security Concerns Driving Patients to Portal as Alternative 31
32 Policies and Procedures Protocols for Transmitting Information to Patients in a Patient-Centered, Timely Manner Secure Messages to Patients Considerations for Adolescent Patients Caregiver Access Incident Reports Deactivating Accounts 32
33 Minimum Necessary Standard Covered Entities must make reasonable efforts not to use or disclose more than the minimum amount of health information necessary to accomplish the intended purpose of the disclosure With limited exceptions, the standard generally applies to all uses and disclosures of health information 45 CFR (b) 33
34 Minimum Necessary Exceptions Standard does not apply to: Disclosures to a health care provider for treatment purposes Authorized uses or disclosures Disclosures for HIPAA compliance purposes (e.g., most disclosures to HHS) Uses or disclosures that are required by law and specifically permitted in the Privacy Rule without individual authorization 34
35 Security Rule Requirements Ensure confidentiality, integrity, and availability of ephi Protect against reasonably foreseeable threats to the security or integrity of ephi Protect against reasonably anticipated uses or disclosures of ephi that are not permitted by Privacy Rule 45 CFR (a) 35
36 36 Guide to Privacy and Security of Health Information, v. 1.2, The Office of the National Coordinator for Health Information Technology
37 37 Guide to Privacy and Security of Health Information, v. 1.2, The Office of the National Coordinator for Health Information Technology
38 38
39 Security Rule: Access Control The Security Rule defines access in as the ability or the means necessary to read, write, modify, or communicate data/information or otherwise use any system resource. Access controls provide users with rights and privileges to access and perform functions using information systems, applications, programs, or files. Access controls should enable authorized users to access the minimum necessary information needed to perform job functions. Rights or privileges should be granted to authorized users based on a set of access rules that the covered entity is required to implement as part of (a)(4), the Information Access Management standard under the Administrative Safeguards section of the Rule. The Access Control standard requires a covered entity to: Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in (a)(4)[Information Access Management]. 39
40 Access Control A covered entity can comply with this standard through a combination of access control methods and technical controls. There are a variety of access control methods and technical controls that are available within most information systems. The Security Rule does not identify a specific type of access control method or technology to implement. Access controls should be appropriate for the role and function of the workforce member. Four implementation specifications are associated with the Access Controls standard. 1. Unique User Identification (Required) 2. Emergency Access Procedure (Required) 3. Automatic Logoff (Addressable) 4. Encryption and Decryption (Addressable) HIPAA Security Series 40
41 Security Rule: Authentication Must: Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner. In order to determine which electronic mechanisms to implement to ensure that electronic PHI is not altered or destroyed in an unauthorized manner, a covered entity must consider the various risks to the integrity of the electronic PHI identified during the risk analysis. After covered entities have identified risks to the integrity of the data, they must identify security measures that will reduce the risks. 41
42 Security Rule: Audit Controls The Audit Controls standard requires a covered entity to: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. Most information systems provide some level of audit controls with a reporting method, such as audit reports. These controls are useful for recording and examining information system activity, especially when determining if a security violation occurred. The Security Rule does not identify data that must be gathered by the audit controls or how often the audit reports should be reviewed. A covered entity must consider its risk analysis and organizational factors, such as current technical infrastructure, hardware and software security capabilities, to determine reasonable and appropriate audit controls for information systems that contain or use electronic PHI. 42
43 Consider: Audit Controls What audit control mechanisms are reasonable and appropriate to implement so as to record and examine activity in the patient portal? What are the audit control capabilities of the patient portal? Do the audit controls implemented allow the organization to adhere to policy and procedures developed to comply with the required implementation specification for Information System Activity Review? 43
44 The TCPA in the Health Care Context 44
45 Telephone Consumer Protection Act of 1991 (TCPA) Enacted by Congress in 1991 to protect consumers by placing limitations on telemarketing calls Distinction between: residential vs. wireless calls Also applies to all text messaging FCC issues Declaratory Rulings (DR) that sheds light on the TCPA July 10, 2015 DR responds to 21 requests to seek clarification under the TCPA 45
46 Residential Lines & Consent Residential Lines Restriction on use of artificial/prerecorded voice to deliver message Unless prior express written consent Exemption from consent: Emergencies Noncommericial purpose Commercial purpose but not telemarketing (no advertisement) Delivery of a health care message by/on behalf of a CE or BA Message by/on behalf of tax-exempt NFP 46
47 Wireless Numbers & Consent Contacting Wireless Numbers More restrictive than residential lines Wireless (e.g., cellphone; any service that charges a party for a call) Prohibitions: On use of an automatic telephone dialing system/artificial or prerecorded voice to initiate calls: Advertisements and Telemarketing Express, written consent required Express consent oral or written if not for advertising or telemarketing 47
48 July 10, 2015 DR TCPA applies to calls and all forms of text messages Text messaging - not more similar to ing Phone-to-Phone texting similar to Internet-to-Phone text messaging TCPA and the CAN-SPAM Act both apply to unsolicited messages Limited exception for healthcare calls (calls that are subject to HIPAA) 48
49 TCPA s Healthcare Call Exception Prior Express Consent is achieved by Giving a health care provide your number Only health care messages from a provider Health care as defined under HIPAA Use - within the scope of the consent given Closely related to purpose for which the number was provided Providers should consider: Does the call meet HIPAA s definition of health care? Is the call within the scope of the consent? 49
50 TCPA s HealthCare Call Exception Express Consent (Period of Incapacity) Exception applies if a person is incapacitated and a third party provides prior express consent for health care calls Non-Telemarketing Healthcare Calls Exemption 50 No charge to consumer for text messages, exempted from prior express consent Calls must be exigent and have a health care treatment purpose (e.g., appointments) Applies to calls subject to HIPAA (Privacy Rule)
51 TCPA s Healthcare Call Exception Several Conditions for the non-telemarketing healthcare calls exemption include: Voice calls/text message - only to a patient who provides wireless number Voice calls/text messages include name/contact info. of provider Voice calls/text messages - limited in purpose No telemarketing, solicitation, advertising or financial purpose (billing, debt collection, accounting) Must comply with HIPAA Opting-out must be available and be honored 51
52
53 Need for Speed Average smartphone has more computer power than all of NASA in 1969
Negotiating EHR Agreements: Complying with HIPAA, Stark and AKS, Overcoming Privacy and Security Risks
Presenting a live 90-minute webinar with interactive Q&A Negotiating EHR Agreements: Complying with HIPAA, Stark and AKS, Overcoming Privacy and Security Risks Acquiring an EHR and Meeting Incentive Program
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
Business Associates, HITECH & the Omnibus HIPAA Final Rule
Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS
Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm
Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746
New HIPAA regulations require action. Are you in compliance?
New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Business Associate Management Methodology
Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates
12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule
HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013
HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security May 7, 2013 Presenters James Clay President Employee Benefits & HR Consulting The Miller Group [email protected]
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate
SECURITY RISK ASSESSMENT SUMMARY
Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection
Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?
Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Brought to you by Winston & Strawn s Health Care Practice Group 2013 Winston & Strawn LLP Today s elunch Presenters
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice
Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone
M E M O R A N D U M. Definitions
M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better
3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?
HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed
Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More
Presenting a live 90-minute webinar with interactive Q&A Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More TUESDAY, SEPTEMBER 16, 2014
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 Policy and Procedure Templates Reflects modifications published in the Federal Register
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP
HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
HIPAA COMPLIANCE PLAN FOR 2013
HIPAA COMPLIANCE PLAN FOR 2013 Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com Meaningful Use? As a way to encourage hospitals and providers to adopt
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES I. Overview / Definitions The Health Insurance Portability and Accountability Act is a federal law
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
HIPAA Security. 1 Security 101 for Covered Entities. Security Topics
HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire
Vendor Management Challenges and Solutions for HIPAA Compliance Jim Sandford Vice President, Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control
Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box 80278 Portland, OR 97280 503-384-2538 877-376-1981 503-384-2539 Fax
Please Read This business associate audit questionnaire is part of Apgar & Associates, LLC s healthcare compliance resources, Copyright 2014. This questionnaire should be viewed as a tool to aid in evaluating
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
HIPAA/HITECH: A Guide for IT Service Providers
HIPAA/HITECH: A Guide for IT Service Providers Much like Arthur Dent in the opening scene of The Hitchhiker s Guide to the Galaxy (HHGTTG), you re experiencing the impact of new legislation that s infringing
HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers
Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List
Datto Compliance 101 1
Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)
ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures
Presenting a live 90-minute webinar with interactive Q&A ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures Discharging Fiduciary Duties
OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR 2463. Court Reporters and HIPAA
Court Reporters and HIPAA OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR 2463 1 What Exactly is HIPAA? HIPAA is an acronym for the Health Insurance Portability and Accountability Act
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the BAA ) is made and entered into as of the day of, 20, by and between Delta Dental of California (the Covered Entity ) and (the Business
for Landlords and Tenants Negotiating Insurance, Indemnity and Mutual Waiver of Subrogation Provisions
Presenting a live 90 minute webinar with interactive Q&A Commercial Leases: Risk Mitigation Strategies for Landlords and Tenants Negotiating Insurance, Indemnity and Mutual Waiver of Subrogation Provisions
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
OCR UPDATE Breach Notification Rule & Business Associates (BA)
OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the
Use & Disclosure of Protected Health Information by Business Associates
Applicability: Policy Title: Policy Number: Use & Disclosure of Protected Health Information by Business Associates PP-12 Superseded Policy(ies) or Entity Policy: N/A Date Established: January 31, 2003
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI
January 23, 2013 HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI Executive Summary HHS has issued final regulations that address recent legislative
HIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
Presented by Jack Kolk President ACR 2 Solutions, Inc.
HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security
Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:
PLEASE NOTE: THIS DOCUMENT IS SUBMITTED AS A SAMPLE, FOR INFORMATIONAL PURPOSES ONLY TO ABC ORGANIZATION. HIPAA SOLUTIONS LC IS NOT ENGAGED IN THE PRACTICE OF LAW IN ANY STATE, JURISDICTION, OR VENUE OF
How To Listen To A Conference On A Computer Or Cell Phone
Presenting a live 90-minute webinar with interactive Q&A M&A Auctions: Successful Bidding Strategies Planning and Executing Winning Bids, Minimizing Costs of Losing Bids THURSDAY, JANUARY 8, 2015 1pm Eastern
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA is a huge piece of legislation. Only a small portion of it applies to IT providers in healthcare; mostly the Security Rule. The HIPAA Security Rule outlines
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) by and between OUR LADY OF LOURDES HEALTH CARE SERVICES, INC., hereinafter referred to as Covered Entity, and hereinafter referred
HIPAA Requirements and Mobile Apps
HIPAA Requirements and Mobile Apps OCR/NIST 2013 Annual Conference Adam H. Greene, JD, MPH Partner, Washington, DC Use of Smartphones and Tablets Is Growing 2 How Info Sec Sees Smartphones Easily Lost,
HIPAA and TCPA Intersection: Navigating Healthcare Call Exemption, Landline/Cell Phone Distinction, Scope of Consent
Presenting a live 90-minute webinar with interactive Q&A HIPAA and TCPA Intersection: Navigating Healthcare Call Exemption, Landline/Cell Phone Distinction, Scope of Consent THURSDAY, NOVEMBER 5, 2015
