Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security



Similar documents
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

HIPAA Requirements and Mobile Apps

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

Have you ever accessed

HELPFUL TIPS: MOBILE DEVICE SECURITY

CHIS, Inc. Privacy General Guidelines

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

ONE Mail Direct for Mobile Devices

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

When HHS Calls, Will Your Plan Be HIPAA Compliant?

FileCloud Security FAQ

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Managing Mobile Device Security

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Montclair State University. HIPAA Security Policy

HIPAA Compliance: Are you prepared for the new regulatory changes?

Type of Personal Data We Collect and How We Use It

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

HIPAA Compliance Guide

HIPAA and Health Information Privacy and Security

The CIO s Guide to HIPAA Compliant Text Messaging

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

My Docs Online HIPAA Compliance

Best Practices Guide to Electronic Banking

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

HIPAA/HITECH Compliance Using VMware vcloud Air

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Welcome to Sookasa. Getting Started Guide for SafeMonk users

State of South Carolina Policy Guidance and Training

PHI- Protected Health Information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Security COMPLIANCE Checklist For Employers

Information Technology Branch Access Control Technical Standard

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Medical Privacy Version Standard. Business Associate Agreement. 1. Definitions

Security Considerations

AirWatch for ios Devices

Cyber Self Assessment

HIPAA Reality Check: The Gap Between Execs and IT March 1, 2016

Top Ten Technology Risks Facing Colleges and Universities

Sustainable Compliance: A System for Ongoing Audit Readiness

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Authorized. User Agreement

MOBILE BANKING USER GUIDE

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Mobile Health Apps 101: A Primer for Consumers. myphr.com

Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition

Secure Client User Guide Receiving Secure from Mercantile Bank

HIPAA Privacy & Security White Paper

8.03 Health Insurance Portability and Accountability Act (HIPAA)

Critical Data Guide. A guide to handling critical information at Indiana University

I ve been breached! Now what?

Our Commitment to Information Security

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

AirWatch for Android Devices

White Paper. Document Security and Compliance. April Enterprise Challenges and Opportunities. Comments or Questions?

Business ebanking Fraud Prevention Best Practices

Information Security Policy

Overview of the HIPAA Security Rule

SOOKASA WHITEPAPER HIPAA COMPLIANCE.

DiamondStream Data Security Policy Summary

HIPAA BUSINESS ASSOCIATE AGREEMENT

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

VMware vcloud Air HIPAA Matrix

Client Security Risk Assessment Questionnaire

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

Transcription:

Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security

Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile This is Device an example Usage text. In Go Your ahead Practice and replace it Summary 5 Q & A 6 Fill Out Information Request Forms

HIPAA Compliant Email Can Email Be Used To Communicate With Patients? Yes but 1. Strong Security 2. Consent 3. Business Associate Agreement (BAA)

HIPAA Compliant Email How Does Email Work?

HIPAA Compliant Email There Are Several Options Choose Wisely. General Encrypted Email Options: 1. Email is encrypted and sent to recipient (key needed) 2. Email is encrypted and sent to webmail 3. Email is encrypted and sent to recipient (key NOT needed)

HIPAA Compliant Email 5 Strategies For Achieving HIPAA Compliant Email 1. Notify or Warn Your Patients 2. Document Patient s Consent 3. Use an EHR with a Patient Portal 4. Consider a HIPAA Compliant Email Solution 5. Manually Encrypt Transmitted Files

Mobile Devices Mobile Device Usage Is On The Rise

Mobile Devices Risks To Health Information

Mobile Devices Health Information When Using a Mobile Device

Mobile Devices Tips Mobile To Devices: Protect Tips & Secure to Health Information Protect and Secure Health Information Use Use a password a password or other other user user authentication. authentication. Keep security software up to date. Install Install and and enable enable encryption. encryption. Install Install and and activate activate wiping wiping and/or remote remote disabling. Disable and do not install file- Disable sharing and applications. do not install file- sharing applications. Install and enable a firewall. Install and enable a firewall. Install and enable security software. Install and enable security software. Research mobile applications (apps) before before downloading. downloading. Maintain physical control of your mobile device. mobile device. Use adequate security to send or receive health information over public Wi-Fi public networks. Wi-Fi networks. Delete all stored health information Delete before all discarding stored health or reusing information the before mobile discarding device. or reusing the mobile device.

Mobile Devices Your Practice s Policies and Procedures

Mobile Devices 5 Steps To Managing Mobile Devices 1.) DECIDE Decide whether mobile devices will be used to access, receive, transmit, or store patients health information or be used as part of the organization s internal networks or systems (e.g., your EHR system). 2.) ASSESS Consider how mobile devices affect the risks (threats and vulnerabilities) to the health information the organization holds. 3.) IDENTIFY Identify the organization s mobile device risk management strategy, including privacy and security safeguards. 4.) DEVELOP, DOCUMENT, and IMPLEMENT Develop, document, and implement the organization s mobile device policies and procedures to safeguard health information 5.) TRAIN Conduct mobile device privacy and security awareness and training for providers and professionals.

Mobile Devices What To Avoid Sharing your mobile device password or user authentication Allowing the use of your mobile device by unauthorized users Storing or sending unencrypted health information with your mobile device Ignoring mobile device security software updates Downloading applications (apps) without verifying they are from a trusted source Leaving your mobile device unattended Using an unsecured Wi-Fi network Discarding your mobile device without first deleting all stored information Ignoring your organization s mobile device policies and procedures

SUMMARY HIPAA Compliant Email Email communications are permitted, but you must take precautions; It is a good idea to warn patients about the risks of using email that includes patient health information (PHI); Providers should be prepared to use email for certain communications, if requested by the patient, but must ensure they are not exposing information the patient does not want shared; and Providers must take steps to protect the integrity of information and protect information shared over open networks.

SUMMARY Mobile Device Managment Mobile devices can be a great productivity tool The risks are very different Use mobile devices with extreme care 11 tips for protecting and securing PHI on mobile devices You must have written policies and procedures to address mobile device usage within your practice 5 steps to managing mobile devices What to avoid

Thank You! Questions? Contact Us @: 980-224-3279 support@carolinacomputer.net www.carolinacomputer.net