HIPAA COMPLIANCE PLAN FOR 2013



Similar documents
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Meaningful Use: FAQs for Providers

Meaningful Use Audits. NextGen Physician Consulting Services

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

BEST PRACTICES FOR MEDICARE

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Stage 2 Meaningful Use What the Future Holds. Lindsey Wiley, MHA HIT Manager Oklahoma Foundation for Medical Quality

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

ARRA, HITECH Act, and Meaningful Use

OCR/HHS HIPAA/HITECH Audit Preparation

Adopting an EHR & Meaningful Use

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

What do you need to know?

HIPAA in an Omnibus World. Presented by

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Incentives to Accelerate EHR Adoption

TennCare/Medicaid EHR Provider Incentive Program

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HIPAA Security Rule Compliance

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

The Basics of HIPAA Privacy and Security and HITECH

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

HIPAA and HITECH Compliance for Cloud Applications

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Security Is Everyone s Concern:

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

My Docs Online HIPAA Compliance

Joe Dylewski President, ATMP Solutions

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Iowa Medicaid Electronic Health Record (EHR) Incentive Program Environmental Scan Summary. June 24, 2016

Overview of the HIPAA Security Rule

JULY 2010 FINAL RULE. Medicare & Medicaid Programs Electronic Health Record Incentive Program as it Applies to Physicians

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

HIPAA security rules of engagement

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Meaningful Use Stage 1:

The Impact of HIPAA and HITECH

Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else

Alaska Department of Health and Social Services Medicaid Electronic Health Record (EHR) Incentive Program

Sustainable Compliance: A System for Ongoing Audit Readiness

COMPLIANCE ALERT 10-12

HIPAA and Mental Health Privacy:

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

HIPAA Security Series

An Overview of Meaningful Use: FAQs

HIPAA Privacy & Security Rules

Transcription:

HIPAA COMPLIANCE PLAN FOR 2013

Welcome! Presentor is Rebecca Morehead, Practice Manager Strategist www.practicemanagersolutions.com

Meaningful Use? As a way to encourage hospitals and providers to adopt EHRs, Congress in 2009 passed a law creating incentive payments for providers and hospitals that choose to adopt and use certified EHR technology in a meaningful way. Incentives are offered from Medicare and Medicaid for adopting a certified EHR program and implementing the Meaningful Use criteria designed by CMS. The incentives are obtained through attestation.

Medicare Eligible Providers Doctors of Medicine or Osteopathy Doctors of Dental Surgery or Dental Medicine Doctors of Podiatric Medicine Doctors of Optometry Chiropractors

Medicaid Eligible Providers Physicians Nurse Practitioners Certified Nurse - Midwife Dentists Physicians Assistants who practice in a Federally Qualified Health Center (FQHC) or Rural Health Center (RHC) that is led by a Physician Assistant.

Stage 1 - Attesting Website - https://ehrincentives.cms.gov/hitech/login.action Core Measures 15/Menu Measures 5 out of 10 Guide for attestation https://www.cms.gov/regulations-and- Guidance/Legislation/EHRIncentivePrograms/downloads/EP_Attestation_U ser_guide.pdf Core Measure #15: http://www.cms.gov/ehrincentiveprograms/downloads/15_core_protectel ectronichealthinformation.pdf

Step 2: Meaningful Use Core Measures Core Measure 15 Objective Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities. Measure Have you conducted or reviewed a security risk analysis per 45 CFR 164.308 (a)(1) and implemented security updates as necessary and corrected identified security deficiencies as part of your risk management process? Yes No

What Does The Security Rule State? HIPAA Security Rule Administrative Safeguards (45 CFR 164.308 (a)(8)) Perform a periodic technical and non-technical evaluation, based initially upon the standards implemented under this rule and subsequently in response to environmental or operational changes affecting the security of electronic protected health information that establishes the extent to which an entity s security policies and procedures meet the requirements

HIPAA Security Compliance (Use The Detailed Checklist) S - Set a Security Action Plan to Protect Patient Health Information R Record Your Plan with Documentation A Assess Your Plan Annually or With Changes

2 Phases to Answering MU #15 CMS MU Core Measure #15 states: Have you conducted or reviewed a security risk analysis per 45 CFR 164.308 (a)(1) and implemented security updates as necessary and corrected identified security deficiencies as part of your risk management process? Phase 1 Deals with regular assessment of the potential risks and vulnerabilities of the ephi Phase 2 Defines a process of documenting processes that define how organization will comply with HIPAA security policies

Is Your Risk Mitigated by Your EMR Vendor? Threat Vulnerability RISK Security risks in your ephi Life Cycle Security risks in your overall practice - People - Documentation Threats Incidental, Passive, Active - Common viruses, spyware, unauthorized access, laptops stolen, network abuse, sabatoge, unsecure wireless, remote access

Safeguards Addressed Physical Safeguards facility, places/locations where patient data is accessed. Examples Alarm systems, locked offices, screens on monitors Administrative Safeguards Security Officer, Workforce Training, Assessments Examples Staff Training, Reviewing activity of users, policy enforcement Technical Safeguards Controls, audit logs, securing exchanges Examples Securing passwords, backing up data, virus checks, data encryption Documentation Policies and Procedures Organizational Breaches, BA Agreements

What Does a Complete Security Risk Assessment Consist Of? (Refer to Checklist) Analysis of your practice s risks Plan to mitigate any identified security risks Immediate Short-term Long-term Policies that address potential risks Procedures to support the policies that prevent security risks

If you are attesting YES that you have completed Meaningful Use Measure #15 and you aren t in compliance with the guidelines, then you could be committing FRAUD or WILLFUL NEGLECT.

What Are The Penalties/Costs? Civil Penalties can be assessed $100 per violation, can be measured by time, number of individuals affected up to $25,000 for multiple violations during a calendar year. Criminal Penalties can be assessed Department of Justice - $50,000 up to $250K for wrongful disclosures, and could involve imprisonment. Breach Incidents Over 500 are publicly recorded on OCR website Corrective Action Costs can be extensive.

Are Your Incentive Payments at Risk If you attest to MU #15 without conducting a complete security risk assessment YES CMS has authorized audits People/Workforce Documentation Policies/Processes Penalties can be assessed

What to Do If You re NOT Attesting to Meaningful Use HIPAA Security Rule Administrative Safeguards (45 CFR 164.308 (a)(8)) Perform a periodic technical and non-technical evaluation, based initially upon the standards implemented under this rule and subsequently in response to environmental or operational changes affecting the security of electronic protected health information that establishes the extent to which an entity s security policies and procedures meet the requirements

Frequently Asked Questions What is the HIPAA Security Rule? http://www.hhs.gov/ocr/privacy/hipaa/administrati ve/securityrule/index.html Is this the same as OSHA? What is the difference between the HIPAA Privacy Rule and the HIPAA Security Rule? Can I perform the SRA myself? After I complete the Security Risk Analysis, am I compliant with the Security Rule? What should I do next?

How Are Audits Affecting Us? Audits of Covered Entities in general 150 for 2012. (Per HITECH Act OCR audits of covered entities for Privacy and Security.) KPMG (Phoenix, Alaska, 115 by year end) Audits of Meaningful Use Attestors Figliozzi and Company CMS Audits under ARRA http://practicemanagersolutions.com/meaningfuluse-audit-information-for-you/ Audits from suspected HIPAA violations Complaint Investigations

Audit Results Lack of Security Risk Assessment Not performed or not documented Lack of Documentation Policies Procedures Processes Lack of Workforce Training Security Rule

Covered entities must perform a full and comprehensive risk assessment and have in place meaningful access controls to safeguard hardware and portable devices we expect organizations to comply with their obligations under these rules regardless of whether they are private or public entities. ~OCR Director, Leon Rodriguez

How We Can Help 1. We use a certified partner to create and license our HIPAA Security Risk Assessment Excel-based program for calculation and scoring Based on NIST Guidelines Completed in one day Personalized one-on-one Prioritizes Your Immediate Needs Maintain and Update the Program with latest information 2. Library of policies to address security risks Workshop March 21 and 22 in Maitland: http://practicemanagersolutions.com/hipaasecurity-policy-writing-intensive/ 3. Long-term assistance in developing customized procedures 4. HIPAA Security Workforce Training In Your Office

We Are Here For You! Email info@practicemanagersolutions.com Website www.practicemanagersolutions.com Facebook Page www.facebook.com/practicemanagersolutions Linked In - http://www.linkedin.com/in/rebmorehead Phone 407-878-3137 or 866-492-0481 x 1

More For Your Practice Radio Radio Show just for Practice Managers and Providers: http://practicemanagersolutions.com/more-foryour-practice-radio-show/ Bringing more resources, more ideas and more support to your busy medical practice. Listen for free live or download on itunes and listen later.