THE FINAL OMNIBUS HIPAA RULE: ARE YOU COMPLIANT?

Size: px
Start display at page:

Download "THE FINAL OMNIBUS HIPAA RULE: ARE YOU COMPLIANT?"

Transcription

1 THE FINAL OMNIBUS HIPAA RULE: ARE YOU COMPLIANT? Ohio Hospital Association Annual Meeting June 9, 2014 Presented By: Lisa Pierce Reisz Vorys, Sater, Seymour and Pease Natasha Davis Nationwide Children s Hospital Natasha.davis@nationwidechildrens.org

2

3 HIPAA History The Privacy Rule balances protections and uses. HIPAA 1996 Security Rule and Privacy Rule 2003 HITECH Act and Stimulus Package 2009 New Breach Reporting Increased Enforcement and Audits Omnibus Regulations The New Rule January 2013 The Security Rule specifies a series of administrative, physical, and technical safeguards for covered entities and their business associates to use to assure the confidentiality, integrity, and availability of electronic protected health information.

4 Final Omnibus HIPAA Rule is Comprised of Four Final Rules Final modifications to the HIPAA Privacy, Security and Enforcement Rules as mandated by HITECH. Final rule adopting changes to the HIPAA Enforcement Rule provided by HITECH. Final rule on Breach Notification for unsecured PHI under HITECH. Final rule modifying the HIPAA Privacy Rule as required by the Genetic Information Nondiscrimination Act ( GINA ).

5 Changes to the Privacy Rule 1. Right to electronic copy of EHR, and right to direct copy to third party. 2. Right to restrict disclosures to health plans of treatment/services paid for in cash. 3. Marketing communications paid for by third parties require authorization. Limited exception for refill reminders and current prescriptions. 4. Easy way to stop fundraising communications. 5. Prohibition on sale of PHI without authorization.

6 Changes to Privacy Rule (cont d) 6. Makes it easier for parents to permit providers to release student immunization records to schools. 7. Permits researchers to use a single authorization for more than one purpose, and relaxes the policy on authorization for future research. 8. HIPAA protection limited to 50 years after death, and makes access to friends and families easier. 9. Required changes to Notices of Privacy Practices, but relaxes distribution requirements for Health Plans.

7 The Security Rule NO CHANGES Except: Business Associates are now required by HHS to fully comply with The Security Rule. Moral of the story is: All entities should take care before simply signing a business associate agreement since the stakes of HIPAA compliance are now quite high.

8 HIPAA Enforcement Rule Transformed HIPAA Compliance HITECH transformed HIPAA compliance from low priority to a high risk obligation requiring careful attention of both CEs and BAs. Significant increase in civil monetary penalties Increased budget to OCR for HIPAA enforcement efforts. Audits (with budget to conduct them). Granted state AGs enforcement authority over HIPAA violations affecting state residents. Created breach notification and reporting requirements for certain violations. HITECH s increased enforcement emphasis has been incorporated into the Final Omnibus HIPAA Rule.

9 Increased Civil Monetary Penalties Civil monetary penalties for HIPAA violations were significantly increased after HITECH (and these increased CMPs have been incorporated into the Final Omnibus HIPAA Rule). Civil Monetary Penalties for HIPAA Violations: Violation Category of Culpability Did not know (and would not have known with reasonable diligence) Violation due to reasonable- cause but not willful neglect. Each Violation Annual Maximum for Identical Violations $100 - $50, $1,500, $1,000 - $50, $1,500, Willful neglect but violation corrected $10,000 - $50, $1,500, Willful neglect violation NOT corrected $50, $1,500,000.00

10 Factors Impacting Amount of CMPs The nature and extent of the violation. The nature and extent of the resulting harm. Other factors: prior compliance with the rules the financial condition of the CE or BA at the time of the violation.

11 Summary of Federal Enforcement HHS Enforcement: 91,721 HIPAA complaints filed with OCR between April 14, 2003 and January 31, ,148 (92%) resolved through investigation and enforcement; 9,948 resolved through investigation and finding no violation; 53,516 resolved through closure of cases not eligible for enforcement. The compliance issues investigated most are: Impermissible uses and disclosures of PHI; Lack of safeguards of PHI; Lack of patient access to their PHI; Uses or disclosures of more than the minimum necessary PHI; and Lack of administrative safeguards of ephi.

12

13 HHS Enforcement Actions RiteAid settled with HHS and FTC for $1 million for its failure to protect PHI in disposal of pill bottles and other health information, 6/2010. Cignet Health Care fined $4.3 million for failing to provide patients a copy of their own medical records, 2/2011. Mass General Hospital paid $1 million settlement and CAP after employee lost paper file containing PHI on subway, 2/2011. UCLA Health Systems settles with HHS for $865,000 and commitment to a CAP for employee PHI surfing, 7/2011. Blue Cross Blue Shield of Tennessee settled HIPAA violation with HHS for $1.5 million for failing to secure PHI in off-site storage facility, 3/2012.

14 HHS Enforcement Actions (cont d) Phoenix Cardiac Surgery (physician practice) settled with HHS for $100, after OCR found failure to implement HIPAA policies and procedures and to safeguard ephi, 4/2012. State of Alaska settled HIPAA violations with HHS for $1.7 million after OCR determined that Alaska did not have adequate HIPAA policies and procedures in place (i.e. no risk assessment), 6/2012. Massachusetts Eye and Ear Infirmary paid $1.5 million to HHS for HIPAA Security Rule violations including failure to conduct a risk assessment and to implement policies related to security of ephi on mobile devices, 9/2012. Hospice of North Idaho settled HIPAA violation for $50, after breach investigation showed that HONI failed to do a security risk assessment, 1/2013.

15 HHS Enforcement Actions (cont d) Idaho State University agreed to pay HHS $400,000 after a breach of ephi involving 17,500 patients. The ephi was unsecured for at least 10 months after a firewall was disabled. OCR concluded that ISU s risk analysis and assessments were incomplete and inadequately identified potential risks and vulnerabilities, 5/2013. Shasta Regional Medical Center paid HHS $275,000 and agreed to a comprehensive CAP after two senior leaders met with multiple media outlets regarding medical services provided to patient and impermissibly ed PHI to its entire workforce. The CAP requires SRMC to update its policies and procedures and train its workforce regarding HIPAA, 6/2013. Wellpoint agreed to pay HHS $1.7 million for Security Rule violations after security weaknesses left the ephi of 612,402 individuals accessible over the internet. Wellpoint failed to (1) adequately implement policies and procedures for authorizing access to the on-line application database, (2) perform an appropriate technical evaluation to a software upgrade, or (3) implement technical safeguards to verify the user, 7/2013.

16 HHS Enforcement Actions (cont d) Affinity Health Plan paid HHS $1,215,780 to settle potential HIPAA violations arising from the return of a leased copier to its leasing vendor which contained the PHI of 344,579 individuals still on its hard drive. OCR concluded that Affinity had violated HIPAA by returning the copiers without erasing the ephi from the hard drive. OCR also determined that Affinity had failed to incorporate the ephi contained on these copiers into its Security Rule risk assessment, 8/2013. Adult & Pediatric Dermatology, P.C. agreed to pay HHS $150,000 to settle potential HIPAA violations arising out of the theft of an unencrypted thumb drive containing the PHI of approximately 2,200 individuals from the vehicle of one of its employees. OCR s investigation determined that APDerm failed to conduct an accurate and thorough risk assessment and did not have written HIPAA policies and procedures or employee training in place, 12/2013.

17 HHS Enforcement Actions (cont.) Skagit County, Washington Public Health Department agreed to pay HHS $215,000 and to correct deficiencies in its HIPAA compliance program following a breach report that seven individuals ephi was accessed by unknown parties when the ephi had been inadvertently moved to a publicly accessible server, 3/2014. Concentra Health Services paid HHS $1,725,220 to settle HIPAA violations arising out of the theft of unencrypted laptops. OCR s investigation revealed that Concentra had previously recognized the risk in multiple risk analyses but failed to take adequate steps to encrypt, 4/2014. QCA Health Plan paid HHS $250,000 to settle HIPAA violations arising from the theft of an unencrypted laptop from an employee s car. OCR determined that QCA had failed to comply with multiple HIPAA obligations, 4/2014.

18 HHS Enforcement Actions (cont.) The New York and Presbyterian Hospital and Columbia University agreed to pay HHS $3,300, and $1,500,000 respectively and to enter into a CAP to settle the following potential HIPAA violations: Impermissibly disclosed the ephi of 6,800 patients to Google and other internet search engines when a computer server was errantly reconfigured; Failed to conduct an accurate and thorough risk analysis that incorporated all IT equipment, applications and ephi data systems; Failed to implement processes for assessing and monitoring all IT equipment, applications and systems that were linked to patient databases prior to the breach incident and failed to implement security measures sufficient to reduce the risks of inappropriate disclosure to an acceptable level; Failed to implement appropriate policies and procedures for authorizing access to patient data bases and failed to comply with its own policies on access, 5/2014.

19 Criminal Enforcement Actions 42 U.S.C. 1302d-6 To commit a criminal offense under HIPAA a person must knowingly and in violation of HIPAA do one of the following: Use or cause to be used a unique health identifier; Obtain individually identifiable health information; or Disclose individually identifiable health information to another person. Penalties for Criminal Violations: HIPAA Violation Fine Prison Knowingly Up to $50, Up to 1 year False Pretenses: Intent to sell, transfer, or use to commercial advantage, personal gain, or malicious harm DOJ enforces HIPAA s criminal provisions. Up to $100, Up to 5 years Up to $250, Up to 10 years Few cases have been prosecuted but typically involve theft of PHI for some form of financial gain by an employee of a covered entity. - U.S. v. Gibson, No. CR RSM, 2004 WL (W.D. Wash. Aug. 19, 2004).

20 OCR Audits HITECH required HHS to provide for periodic audits to ensure HIPAA compliance by CEs and BAs. OCR began a pilot audit program in November 2011, in which it conducted 115 audits of CEs to assess privacy and security compliance. The pilot phase ended in December The goal of the OCR audit program was analyze the policies and procedures of covered entities to determine areas of risk. Full investigations of covered entities were only undertaken if the audit revealed a serious compliance problem. In February 2014, OCR announced that it would begin a second round of HIPAA audits later this year with a preaudit survey of covered entities being issued soon.

21 State Enforcement Actions HITECH gave state AGs new HIPAA enforcement powers. June 2011, HHS trained state AGs on HIPAA enforcement. Security breach-related legislation has been enacted in 46 states, the District of Columbia, Puerto Rico and the Virgin Islands.

22 Breach Notification Rule Final Omnibus HIPAA Rule significantly changed definition of Breach. Beginning on September 23, 2013, HITECH s significant harm test will be replaced with a more objective test for breach. Expectation is that more data incidents will be reportable breaches under the new breach rule.

23 Definition of Breach Replaces significant harm test used to determine breach with a more objective measure. Now, any unauthorized acquisition, access, use or disclosure of PHI is presumed to be a breach, unless the covered entity or business associate demonstrates a low probability that the PHI has been compromised based on an assessment of the following four risk factors: The nature and extent of the PHI involved, including the types of identifiers; The unauthorized person who used the PHI or to whom it was disclosed; Whether the PHI was actually acquired or viewed; and Extent to which the risk to the PHI has been mitigated.

24 Exceptions to Definition of Breach Not every impermissible acquisition, access, use or disclosure of PHI constitutes a Breach under HIPAA. The unauthorized acquisition or access to secured PHI does not constitute a breach: ENCRYPT, ENCRYPT, ENCRYPT!! Exceptions to Definition of Breach: Unintentional acquisition. Inadvertent disclosure. Recipient would not have been able to retain information.

25 Causes of Breach Human error and process mistakes, not technology, are the biggest causes of HIPAA violations. Top 3 Causes of Breach: 1. Lost or stolen laptops, removable devices (flash drives), mobile devices, and documents (46%). 2. Employee mistake or unintentional actions (42%). 3. Third-party errors (42%). Ponemon Institute (2012)

26

27 Causes of Breach (cont d) Process Failures include: 1. Failure to encrypt PHI. 2. Failure to establish adequate password protections. 3. Failure to adequately train employees on HIPAA policies and procedures. 4. Failure to consistently discipline employees for HIPAA violations.

28 28 et-isnt-to-blame-for-hipaabreaches-0913/

29 BREACH MATRIX Note: This Matrix is not an exhaustive list and is only intended to be used as a guide. The "totality of the circumstances" will be considered with the use of the 4 factors to determine whether an incident rises to the level of a reportable breach.

30 HIGH MEDIUM LOW Financial Reputational Personal Nature of the data would allow for identity theft such as: (SSN, CC, drivers license) Combination of information that would indicate a high risk to patient MRN + Medical History Publicly available information Sensitive diangoses (HIV, STD, Mental Health, Hema/Onc) Family members or other relationship where there is explicit instruction they should not receive information. Revealing Photos, Abuse information, Custody Sensitive diangoses (HIV, STD, information. Mental Health, Hema/Onc) Employer is notified of a sensitive condition. MRN + Medical History. Certain types of Treament information and/or medication. Appointment reminder or Physician's name (sensitive dept) Family with close relationship to the child but not authorized disclosure. Photo where pt can be identified (scar/tatto) Publicly available information Non-sensitive Lab Value Appt reminder (non-sensitive dept) Revealing Photos, Abuse information, Custody information. MRN + Medical History Appointment reminder or Physician's name (sensitive dept) Photo where pt can be identified (scar/tatto) Physician's Name (Sensitive Department) Publicly available information MRN Appt reminder (non-sensitive dept) IMPACT Factor 1 Note: Any identifiers listed herein do NOT represent an exhaustive list; rather, they represent examples that have occurred at NCH and other institutions and are listed to serve as triggers and NOT definitive results. Photo of unidentified body part Photo of unidentified body part

31 BREACH MATRIX Likelihood Factor 2 - Who received the PHI: Covered Entity Entity obligated to protect sensitive data (bank, school, government) Business Associate Non-covered entity with no obligations to protect Inappropriate Access (Snooping) Criminal (Due to Theft) Mal-intent Unknown Factor 4 - Extent risk mitigated: Signed COD We do not know refusal to sign certificate Other Mitigating Circumstances: Days Missing Number of people who viewed it Impact to Likelihood: Low Low Low Increase Likelihood Increase Likelihood Increase Likelihood Increase Likelihood Increase Likelihood Lowers Likelihood Medium/High Medium/High Varies Varies Note: This Matrix is not an exhaustive list and is only intended to be used as guide. High >50% likely (Almost Certain) Medium 10-50% likely (Moderate) Low <10% likely (Unlikely/Rare)

32 BREACH MATRIX Probability of Compromise Assessment All 4 factors have been considered: 1. The nature and extent of the PHI involved 2. To whom the disclosure was made Was the PHI actually viewed or 3. acquired Extent to which the risk to the PHI was 4. mitigated

33 BREACH MATRIX Scale Likelihood Low Medium High Low Low Low Medium Impact Medium Low Medium High High Medium High High Note: This Matrix is not an exhaustive list and is only intended to be used as a guide.

34 Breach Notification Requirements HITECH breach notification rule adopted without change: Breaches involving fewer than 500 people. Written notification by first class mail to the individual at their last known address. Annual submission of a log to the Secretary of HHS documenting such breaches during the year involved. Breaches involving 500 or more people. Written notification by first class mail to the individual at their last known address. Notification to prominent media outlets serving a state or jurisdiction of a breach involving more than 500 residents of the state or jurisdiction. Immediate notification to the Secretary of HHS. Posting on HHS website the HHS Wall of Shame.

35 Timing of Breach Notification: Covered Entity: If a Breach has occurred, a CE must provide notice to the affected individuals without unreasonable delay and in no event later than 60 days from the date of discovery.

36 Timing of Breach Notification: (cont d) Business Associate: BA, following discovery of a breach, must notify the CE of such breach without unreasonable delay and in no case later than 60 days following the discovery of the breach. If a BA is acting as an agent of a CE, then BA s discovery of the breach will be imputed to CE (which means the 60-day clock runs at the time the BA discovers the breach). If the BA is not an agent of the CE, then the CE must provide notice based on the time the BA notifies the covered entity of the breach (a new 60-day clock starts).

37 Breach Statistics There are currently 991 entities listed on the HHS Wall of Shame. Healthcare industry loses $7 Billion a year due to HIPAA data breaches. The average economic impact of a data breach has increased by $400, to a total of $2.4 million since 2012 with an average cost of $471 per patient record. 94% of healthcare organizations have had at least one data breach in the last two years.

38 Breach Statistics (cont d) Average number of lost or stolen records per breach is 2, % of all data breaches in 2012 involved medical records. 18% of healthcare organizations say medical identity theft was a result of a data breach. Annual security risk assessments are conducted by less than half of all health care providers. Ponemon Institute (2012)

39 Breach Response Plan 1. Establish a security incident response team. 2. Breach Response: a. Identify and immediately stop the data incident. b. Develop and document a detailed description of facts. c. Conduct an investigation (including an IT forensic investigation) into incident. d. Engage outside experts (consider structuring expert retention through legal counsel to maximize privilege). e. Identify and isolate pertinent records, files and documents (both paper and electronic). f. Mitigate any harm to individuals/patients. g. Document all steps taken in responding to breach incident.

40 Breach Response Plan (cont d) 3. Designate a Communications Coordinator to do the following: a. Regularly communicate with response team. b. Consult with legal regarding scope of information to be disclosed. c. Manage publicity and public relations efforts. d. Serve as single contact point with media. e. Communicate accurate and concise information; avoid misleading, inaccurate or incomplete information. f. Establish policies and procedures for tracking timing of notice. i. Date breach was discovered and details of discovery. ii. All notifications made within 60-day reporting period. iii. All notification delays and reasons for such delays. iv. All communications with OCR. v. All notification delays requested by law enforcement.

41 Breach Response Plan (cont.) 4. Develop a Breach Notification Process: a. Develop and document your notification to individuals/patients affected by the breach including all means to ensure delivery. b. Develop and document your notifications to necessary regulators, including OCR and state agencies, if applicable. c. Develop and document your notifications to media, if required. 5. Determine root cause of incident, formulate a corrective action plan and institute remedial steps in a timely manner. 6. Update risk assessment. 7. Update or reinstitute training of employees. 8. Discipline employees for any violations of HIPAA policies and procedures.

42 Incident Response Plan Test: Table Top Mock Breach Sample breach scenarios that are atypical Goal: to catch gaps in process Half day commitment of key players from incident response team Security, Privacy, Legal, PR/Marketing, HR, Executive Leadership Surprise we learned: Social media response needs to be quick and is crucial, requires leadership comfort with fast decision making around a message! Have written documentation that is widely accessible so B Team is ready for an audit or an incident.

43 Lessons Learned From Data Breaches: Encrypt all data on portable devices. Improve physical security. Do not give employees unfettered access to all spaces in which data, records and devices are stored. Limit online access to data. Not everyone needs access to everything. Re-evaluate job descriptions and tailor data access to those reasonably necessary for employees to perform their duties. Terminate access for all former employees. Discipline employees who access patient data without need. Ask patients to update their information regularly to eliminate billing and information release errors.

44 Lessons Learned From Data Breaches: (cont d) Properly destroy data on recycled and retired technology. Properly destroy patient paper records that are beyond statutory retention periods. Update HIPAA policies and procedures to reflect actual operations of organization. Train and re-train employees on HIPAA compliance. Consider procuring cyber insurance.

45 GINA Provisions Requires genetic information be treated as PHI. Prohibits health plans from using/disclosing genetic information for underwriting purposes.

46

47 Business Associates Definition of Business Associate expanded: Includes Health Information Organizations, E-prescribing Gateways, and PHR vendors that provide services to covered entities. Includes entities that merely store PHI ( business associates may now create, receive, maintain, or transmit PHI ). Downstream subcontractors of Business Associates are now defined as Business Associates. Patient safety activities have been added to the list of functions that may cause an organization to be deemed a business associate. Conduit exception is narrow and intended to only exclude courier services and their electronic equivalents; data storage services that store PHI are considered business associates. Whether an entity is considered a business associate is based on the nature of their activities. The outcome cannot be avoided by simply foregoing a contract!

48 Business Associates (cont d) Various HIPAA provisions now expressly apply to BA and their subcontractors: All applicable provisions of the Security Rule. BAs are now directly liable for Security Rule violations (as well as breach of contract liability). The use and disclosure limitations of the Privacy Rule including the minimum necessary principle and, if applicable, deidentification standards. BAs are now directly liable for Privacy Rule violations (as well as breach of contract liability). The requirement to provide a copy of ephi to a covered entity, the individual or the individual s designee. The requirement to maintain an accounting of disclosures. The obligation to cooperate with HHS during an investigation or compliance review.

49 Business Associates (cont d) As of September 23, 2013, BAs and their subcontractors must comply with HIPAA requirements: Adoption and implementation of dozens of documented HIPAA policies and procedures. Implementation of Security Rule technical requirements. Conducting a security risk analysis. Developing mitigation plan. Producing a contingency plan. Encryption of ephi. Preparing systems to log and monitor user activity. Compliance requires training workforce on HIPAA compliance program.

50 Business Associate Agreements CEs should be reviewing and updating all business associate agreements: Enhanced business associate compliance obligations. Breach response and reporting obligations. Timing. Responsibility designation. Cost of reporting obligations. Indemnification provisions. Breach notification costs. Credit monitoring and other mitigation costs. Defense costs. CMPs. Insurance coverage. Federal agency law will play an important part in defining the relationship between CEs and BAs. CEs are directly liable for their BAs if they constitute agents.

51 State Law and 42 C.F.R. Part 2 HIPAA is a Floor. Additional federal and state laws also govern confidentiality of drug and alcohol treatment records and behavioral health and mental health records. More stringent is standard to determine preemption; i.e., which law controls. More stringent = greater privacy protection and/or greater rights to individuals regarding protected health information.

52 Judicial and Administrative Proceedings Subpoenas Satisfactory assurances Court orders Mental health information Substance abuse information

53 HIPAA In The Digital Age Technology complicates HIPAA compliance. Your risk assessment must consider: Mobile devices (smartphones, ipads, laptops) BYOD policies Texting Secure s and data transfers Cloud computing Telecommuting Social Media

54 Key Issues to Address: Keeping a risk assessment up-to-date. Development/Update of HIPAA policies and procedures. Review and update of business associate agreements to include breach notification provisions, indemnification provisions, insurance requirements. Update of NPPs. Update breach response plan to include new test for determining whether you have a reportable breach. Encryption policies. Employee training and discipline.

55

56 QUESTIONS?

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

Ready or Not: OCR s Second Round of HIPAA Audits Are Just Around the Corner

Ready or Not: OCR s Second Round of HIPAA Audits Are Just Around the Corner Ready or Not: OCR s Second Round of HIPAA Audits Are Just Around the Corner OPRA 2015 Fall Conference November 4, 2015 Presented By: Lisa Pierce Reisz Vorys, Sater, Seymour and Pease LLP 614.464.8353 lpreisz@vorys.com

More information

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now? Outline MOR-OF Education and Medical Expo August 23, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. HIPAA Compliance II. Why Should You Care? A. Market Pressure

More information

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

OCR Reports on the Enforcement. Learning Objectives

OCR Reports on the Enforcement. Learning Objectives OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil

More information

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013 Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013 Presentation Overview s investigative

More information

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq. HIPAA Compliance, Notification & Enforcement After The HITECH Act Presenter: Radha Chanderraj, Esq. Key Dates Publication date January 25, 2013 Effective date - March 26, 2013 Compliance date - September

More information

OCR UPDATE Breach Notification Rule & Business Associates (BA)

OCR UPDATE Breach Notification Rule & Business Associates (BA) OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the

More information

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C.

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September 2012. Nashville Knoxville Memphis Washington, D.C. HIPAA Hot Topics Audits, the Latest on Enforcement and the Impact of Breaches September 2012 Nashville Knoxville Memphis Washington, D.C. Overview HITECH Act HIPAA Audit Program: update and initial results

More information

Outline. Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 7/10/2014

Outline. Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 7/10/2014 LeadingAge Florida s 50 th Annual Convention and Exposition Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 James Robnett Special Agent in Charge

More information

Philip L. Gordon, Esq. Littler Mendelson, P.C.

Philip L. Gordon, Esq. Littler Mendelson, P.C. Beyond The Legal Requirements: Key Practical Issues in Negotiating Business Associate Agreements, Responding to a Breach of Unsecured PHI, and Understanding HHS Enforcement Philip L. Gordon, Esq. Littler

More information

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE The Speakers Cinda Velasco Attorney, Manager, Privacy Officer Patient Safety and Risk Management Trish Lugtu Senior Manager MMIC

More information

New HIPAA regulations require action. Are you in compliance?

New HIPAA regulations require action. Are you in compliance? New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security

More information

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Presented by Jack Kolk President ACR 2 Solutions, Inc. HIPAA 102 : What you don t know about the new changes in the law can hurt you! Presented by Jack Kolk President ACR 2 Solutions, Inc. Todays Agenda: 1) Jack Kolk, CEO of ACR 2 Solutions a information security

More information

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA INFORMATION SECURITY & HIPAA COMPLIANCE MPCA Annual Conference August 5, 201 Agenda 1 HIPAA 2 The New Healthcare Paradigm Internal Compliance 4 Conclusion 2 1 HIPAA 1 Earning Their Trust 4 HIPAA 5 Health

More information

What do you need to know?

What do you need to know? What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,

More information

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement Office of the Secretary Office for Civil Rights () Current Developments in Privacy and Security Rule Enforcement Michigan Medical Billers Association Andrew C. Kruley, J.D. Equal Opportunity Specialist

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update OCR / WEDI Webinar Series July 17, 2013 Today s Speakers Verne Rinker, JD, MPH Health Information Privacy Specialist

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List

More information

Am I a Business Associate?

Am I a Business Associate? Am I a Business Associate? Now What? JENNIFER L. RATHBURN Quarles & Brady LLP KATEA M. RAVEGA Quarles & Brady LLP agenda» Overview of HIPAA / HITECH» Business Associate ( BA ) Basics» What Do BAs Have

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer HIPAA LIAISON MEETING PRESENTAITON August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer Current State of HIPAA Enforcement Content Contributor Abby Bonjean, Investigator Office for

More information

HIPAA in an Omnibus World. Presented by

HIPAA in an Omnibus World. Presented by HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters

More information

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014 HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014 Introduction The HIPAA Privacy Rule establishes the conditions under which Covered Entities

More information

You Probably Don t Even Know

You Probably Don t Even Know You Probably Don t Even Know That You Need To Comply With HIPAA In Collaboration With: About ERM About The Speaker Stephen Siegel, Esq., Of Counsel, Broad and Cassel Board Certified Health Law Over 25

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI January 23, 2013 HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI Executive Summary HHS has issued final regulations that address recent legislative

More information

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement Clinton Mikel The Health Law Partners, P.C. Alessandra Swanson U.S. Department of Health and Human Services - Office for Civil Rights Disclosure

More information

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist www.riskwatch.com Introduction Last year, the federal government published its long awaited final regulations implementing the Health

More information

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq. The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery

More information

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule ) HIPAA and HITECH Compliance Under the New HIPAA Final Rule Presented Presented by: by: Barry S. Herrin, Attorney CHPS, Name FACHE Smith Smith Moore Moore Leatherwood Leatherwood LLP LLP Atlanta Address

More information

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Business Associates, HITECH & the Omnibus HIPAA Final Rule Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS

More information

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY. REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW PROTECTED HEALTH INFORMATION (PHI) ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

More information

HIPAA 101. March 18, 2015 Webinar

HIPAA 101. March 18, 2015 Webinar HIPAA 101 March 18, 2015 Webinar Agenda Acronyms to Know HIPAA Basics What is HIPAA and to whom does it apply? What is protected by HIPAA? Privacy Rule Security Rule HITECH Basics Breaches and Responses

More information

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance For Calendar Years 2011 and 2012 As Required by the Health Information Technology for Economic and Clinical

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by: HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates

More information

Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

Raymond: Beyond Basic HIPAA - GSHA Convention 2-28-15 1 HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP Carol Ann Raymond, MBA, Ed.S., CCC-SLP Associate Clinical Professor/Clinic Director Department of Communication Sciences and Disorders Financial o Employed by the University of Georgia o Non-Financial

More information

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013 Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,

More information

What s New with HIPAA? Policy and Enforcement Update

What s New with HIPAA? Policy and Enforcement Update What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final

More information

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule JANUARY 23, 2013 HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule By Linn Foster Freedman, Kathryn M. Sylvia, Lindsay Maleson, and Brooke A. Lane On

More information

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014 Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit Iliana L. Peters, J.D., LL.M. April 23, 2014 OCR RULEMAKING UPDATE What s Done? What s to Come? What s Done: Interim Final Rules

More information

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule Patricia D. King, Esq. Associate General Counsel Swedish Covenant Hospital Chicago, IL I. Business Associates under

More information

Legislative & Regulatory Information

Legislative & Regulatory Information Americas - U.S. Legislative, Privacy & Projects Jurisdiction Effective Date Author Release Date File No. UFS Topic Citation: Reference: Federal 3/26/13 Michael F. Tietz Louis Enahoro HIPAA, Privacy, Privacy

More information

Community First Health Plans Breach Notification for Unsecured PHI

Community First Health Plans Breach Notification for Unsecured PHI Community First Health Plans Breach Notification for Unsecured PHI The presentation is for informational purposes only. It is the responsibility of the Business Associate to ensure awareness and compliance

More information

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview Updated HIPAA Regulations What Optometrists Need to Know Now The U.S. Department of Health & Human Services Office for Civil Rights recently released updated regulations regarding the Health Insurance

More information

Breaches. Complying with the HIPAA Omnibus Final Rule. Important Definitions. Protected Health Information Includes HIPAA PRIVACY 3/2/2014

Breaches. Complying with the HIPAA Omnibus Final Rule. Important Definitions. Protected Health Information Includes HIPAA PRIVACY 3/2/2014 Breaches Complying with the HIPAA Omnibus Final Rule You Can Be Successful! Advocate Medical Group in Chicago had 4 desktop computers taken in a burglary that contained the personal information of over

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Tatiana Melnik Tampa, FL 734.358.4201 www.melniklegal.com

Tatiana Melnik Tampa, FL 734.358.4201 www.melniklegal.com 1 Outline HCDA General Membership Meeting September 23, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. What is HIPAA? II. Why Should You Care? A. B. Regulatory

More information

Dissecting New HIPAA Rules and What Compliance Means For You

Dissecting New HIPAA Rules and What Compliance Means For You Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the

More information

HIPAA Compliance in 2013:

HIPAA Compliance in 2013: HIPAA Compliance in 2013: National Association for Home Care & Hospice March on Washington March 18, 2013 1 Marcia Augsburger Partner, DLA Piper, LLP (US) Firm HIPAA Officer and HIPAA Working Group Co-Chair

More information

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Brought to you by Winston & Strawn s Health Care Practice Group 2013 Winston & Strawn LLP Today s elunch Presenters

More information

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy

More information

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

HIPAA Update Focus on Breach Prevention

HIPAA Update Focus on Breach Prevention HIPAA Update Focus on Breach Prevention Objectives By the end of this program, participants should be able to: Identify top reasons why breaches occur Review the breach definition and notification process

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals HIPAA New Breach Notification Risk Assessment and Sanctions Policy Incident Management Policy For breaches affecting 1 3 individuals +25 individuals + 500 individuals Focus on: analysis documentation PHI

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act by Lane W. Staines and Cheri D. Green On February 17, 2009, The American Recovery and Reinvestment Act

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013 Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and

More information

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013 HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security May 7, 2013 Presenters James Clay President Employee Benefits & HR Consulting The Miller Group jimc@millercares.com

More information

HIPAA - Breaking News!

HIPAA - Breaking News! Health IT and Meaningful Use Update Nebraska Healthcare Quality Forum June 4, 2014 Barbara E. Person and Michael W. Chase Baird Holm LLP #1258792 HIPAA - Breaking News! Office for Civil Rights (OCR) will

More information

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012 HIPAA Privacy, Security, Breach, and Meaningful Use Practice Requirements for 2012 CHUG October 2012 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Standards for Privacy of Individually

More information

HIPAA Privacy Breach Notification Regulations

HIPAA Privacy Breach Notification Regulations Technical Bulletin Issue 8 2009 HIPAA Privacy Breach Notification Regulations On August 24, 2009 Health and Human Services (HHS) issued interim final regulations implementing the HIPAA Privacy Breach Notification

More information

Breaches, Business Associates and Texting, Oh My! A HIPAA HITECH Update. Overview

Breaches, Business Associates and Texting, Oh My! A HIPAA HITECH Update. Overview Breaches, Business Associates and Texting, Oh My! A HIPAA HITECH Update The Bittinger Law Firm 13500 Sutton Park Drive South Suite 201 Jacksonville, Florida 32224 January 13, 2015 Ann M. Bittinger, Esq.

More information

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH) March 2011 Presentation by Jennifer L. Cox, J.D. Red Flags Rollback Red flags is going going and not

More information

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013 HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013 Federal and Texas Privacy & Security Requirements Minimizing Your Risk of Violations DISCLAIMER The information contained in this document

More information

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NCHICA HITECH Act Breach Notification Risk Assessment Tool Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NORTH CAROLINA HEALTHCARE INFORMATION AND COMMUNICATIONS ALLIANCE, INC August

More information

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits Presented by: Don Waechter, Managing Partner Health Compliance Partners Ann Breitinger, Attorney Blalock Walters Legal Disclaimer

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Ricky Link, Coalfire ISACA North Texas and IIA Fort Worth Chapters The Petroleum Club of Fort Worth March 4, 2014 1 About Coalfire Coalfire

More information

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)

More information

Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455. Notification of Security Breach Policy

Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455. Notification of Security Breach Policy Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455 Notification of Security Breach Policy Purpose: This policy has been adopted for the purpose of complying with the Health

More information

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS Shipman & Goodwin LLP HIPAA Alert March 2009 STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS The economic stimulus package, officially named the American Recovery and Reinvestment Act of 2009

More information

Isaac Willett April 5, 2011

Isaac Willett April 5, 2011 Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act

More information

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013 Greenway Marketplace Hear from GSG Compliance & White Plume November 14, 2013 Marketplace Mission Statement To enhance the Greenway customer user experience by offering innovative, forwardthinking technologies

More information

Lawyers as HIPAA Business Associates

Lawyers as HIPAA Business Associates 9/25/13 Lawyers as HIPAA Business Associates ISBA Solo and Small Firm Conference October 4, 2013 Rick L. Hindmand McDonald Hopkins LLC 1 Agenda Background HIPAA/HITECH Act/Omnibus Rule Who is a business

More information

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate

More information

The MC Academy The Employee Benefits and Executive Compensation Series. HIPAA PRIVACY AND SECURITY The New Final Regulations

The MC Academy The Employee Benefits and Executive Compensation Series. HIPAA PRIVACY AND SECURITY The New Final Regulations The MC Academy The Employee Benefits and Executive Compensation Series HIPAA PRIVACY AND SECURITY The New Final Regulations June 18, 2013 Overview Background Recent Changes to HIPAA Identifying Business

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

Proofpoint HIPAA Breach Report:

Proofpoint HIPAA Breach Report: Proofpoint HIPAA Breach Report: An Analysis of HITECH Breach Notifications and Settlements, Q1 2013 Healthcare Industry Update threat protection compliance archiving & governance secure communication Contents

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

Business Associate Management Methodology

Business Associate Management Methodology Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates

More information

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS James J. Eischen, Jr., Esq. October 2013 Chicago, Illinois JAMES J. EISCHEN, JR., ESQ. Partner at Higgs, Fletcher

More information

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements Protecting Patient Information in an Electronic Environment- New HIPAA Requirements SD Dental Association Holly Arends, RHIT Clinical Program Manager Meet the Speaker TRUST OBJECTIVES Overview of HIPAA

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

STANDARD ADMINISTRATIVE PROCEDURE

STANDARD ADMINISTRATIVE PROCEDURE STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.26 Investigation and Response to Breach of Unsecured Protected Health Information (HITECH) Approved October 27, 2014 Next scheduled review: October 27, 2019

More information