Outline. Learning Objectives 9/23/2013. HIPAA Headline



Similar documents
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA Violations Incur Multi-Million Dollar Penalties

Why Lawyers? Why Now?

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

What s New with HIPAA? Policy and Enforcement Update

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Proofpoint HIPAA Breach Report:

HIPAA Compliance Guide

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HIPAA WEBINAR HANDOUT

HIPAA Security Rule Compliance

OCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013

Security Is Everyone s Concern:

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Security Overview of the Regulations

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

HIPAA compliance audit: Lessons learned apply to dental practices

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act.

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

HIPAA ephi Security Guidance for Researchers

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR Court Reporters and HIPAA

Page 1. Copyright MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

HIPAA Security Alert

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

Practices to Research Data in Light of HIPAA and ANPRM

HIPAA HANDBOOK. Keeping your backup HIPAA-compliant

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Overview of the HIPAA Security Rule

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Compliance: Efficient Tools to Follow the Rules

Somansa Data Security and Regulatory Compliance for Healthcare

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Datto Compliance 101 1

My Docs Online HIPAA Compliance

Best Practices for DLP Implementation in Healthcare Organizations

Have you ever accessed

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

plantemoran.com What School Personnel Administrators Need to know

HIPAA Overview and updates since HITECH and PPACA

Security Compliance, Vendor Questions, a Word on Encryption

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

troinet.com Why the HIPAA Police Woke Up, New Rules & 5 Things You Can Do To Protect Your Practice

HIPAA Compliance Guide

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Privacy and Security and Research

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

Understanding HIPAA Regulations and How They Impact Your Organization!

HIPAA Security Series

The Impact of HIPAA and HITECH

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

What do you need to know?

Assessing Your HIPAA Compliance Risk

HIPAA and HITECH Compliance for Cloud Applications

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Joe Dylewski President, ATMP Solutions

HIPAA: Compliance Essentials

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Q: How does a provider know if their system has encryption? Do big services (gmail, yahoo, hotmail, etc.) have built-in encryption?

Surviving a HIPAA Audit: What you need to know NOW So you can cope THEN. Jonathan Krasner

PREP Course #23: Privacy and IT Security for Researchers

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HIPAA security rules of engagement

Transcription:

HIPAA Security: How to avoid becoming the next HIPAA Headline Marion K. Jenkins, PhD, FHIMSS Executive Vice President Healthcare 3t Systems Adjunct Faculty HC IT University of Denver MGMA Annual Meeting, October 2013 Outline Learning objectives Who is 3t Systems (not a commercial) HIPAA Overview brief history, key definitions, examples of breaches to date Overview of Security Rule specifications Administrative; Physical; Technical; Omnibus Anatomy of an actual HIPAA breach Next steps and action items for practices Questions/discussion 2 Learning Objectives 1. Identify the primary HIPAA risks and determine how to address them 2. Describe how HIPAA compliance can make your practice more functional 3. Avoid the primary pitfalls identified in most HIPAA assessments 3 1

Who is 3t Systems (for info/background not a commercial) Leading healthcare IT systems integrator based in Colorado: Consulting services Managed services Medical grade cloud hosting Over 200 healthcare IT projects throughout US Large physician practices, multi location clinics, acute care, children s hospitals behavioral health, surgery centers, urgent/emergent care 4 Some macro numbers HHS reported HIPAA breaches since 2009 There have been nearly 650 breaches that have involved 500 or more records Total is over 22 million patient records affected Largest is 4.9 million records (USAF contractor) Smallest reported breach (and not on this list) is 441 records (Hospice of Northern Idaho) Largest pending judgments are $3 4 BILLION (Sutter Health, California) and against SAIC (USAF) 5 HIPAA A Brief History HIPAA signed by President Clinton in 1996 Primary purpose was to make HC insurance portable Governed paper records Massive increase in administrative burden to HC Massive efforts on compliance and training HIPAA Security became effective in April 2005 Most people were unaware or chose to ignore it They assumed IT had it taken care of Thought it was something they had already done 6 2

ARRA/HITECH Act 2009 Part of Meaningful Use stimulus up to $54K/ $63K for physicians, millions of $$ for hospitals to adopt EHRs (Medicare/Medicaid) Max fines increased from $50,000 to $1.5 million Fines apply regardless of: Whether docs/facilities are seeking MU funds Whether docs/facilities qualify for MU funds (e.g., Ambulatory Surgery Centers, self pay, etc.) Whether the facility has or uses an EHR 7 2013 Omnibus rule Max fines remain at $1.5 million Significant expansion of what constitutes a covered entity and who must comply Significant increase in breach notification requirements Increased enforcement, training of state Attorneys General, random audits (e.g., KPMG) Civil penalties can also be imposed Must keep all documents for 6 years 8 Potential risks to Covered Entity Huge fines by HHS (Office of Civil Rights) Usually must compensate victims for damages (ongoing credit monitoring services) If breach involves >500 records, entity must contact the local media (negative exposure) Civil penalties (Sutter Health in CA facing a $4 Billion class action lawsuit) Loss of productivity: investigation/remediation Public relations nightmare 9 3

HIPAA Chapter and Verse* HIPAA is contained in the Federal Register, CFR Parts 160, 162 & 164: Section 164.308 Administrative Section 164.310 Physical Section 164.312 Technical Section 164.314 Business Associate Arrangements Section 164.316 Policies and Procedures Documentation *More than 500 pages! 10 What does HIPAA Security* Say? The HIPAA Security Rule requires you to protect and secure all electronic protected health information (ephi) against: accidental or intentional causes of: unauthorized access, theft, loss or destruction, from either internal or external sources. * HIPAA Security governs electronic records. HIPAA Privacy governs paper records 11 HIPAA Security Graphical Representation Theft Loss Internal Threats Improper Access EPHI Destruction External Threats Accidental CAUSES Intentional Source: internally produced graphic 4

Definition of ephi ephi is patient health information which is computer based (i.e., created, received, stored, maintained, processed and/or transmitted in, on or through any form of electronic means). Electronic media includes computers, laptops, memory sticks, USB drives, smartphones, PDAs, servers, data storage systems, backup tapes, disk drives, network systems, email, websites, digital printers/copiers/scanners, etc. 13 Examples of ephi NAME (or anything that could identify a patient and/ or connect them to a clinic or a provider), and/or some or any of the following: Demographic data (e.g., address, date of birth, sex) Medical record number, account number, SSN Date of service (e.g., treatment, admission, discharge) Ancillary medical records or components: reports, images, test results, progress notes, treatment plans, dictation files, or anything similar (including partial records) 14 Unlikely locations of ephi ephi is not just confined to an EHR: Emails (including server stores and local caches/pst) Reports, documents, letters, spreadsheets etc. created by or maintained in a practice or hospital Faxes/scans (today s printer/copiers p MFPs store images of scans and faxes on internal hard drives) PDF s and other static instances of data File shares, databases, backups Ancillary files labs, imaging, file attachments Scanned/attached or other external medical records Tweets, blogs, social media posts, phone photos 15 5

Things HIPAA doesn t say Length/complexity/change cycle of passwords Timeout or logoff time interval Type of encryption (e.g., technically WEP for WiFi is actually HIPAA compliant) Version of OS such as Win 7, Svr 08 or higher (HIPAA doesn t name vendor names/products) Actually doesn t mention laptops (or tablets, SmartPhones, PDAs, etc.), just workstations 16 HIPAA Security is a good thing Most HIPAA Security requirements are best business and IT practices, and help protect any vital data from theft/loss/hacking/destruction Implementing them makes HC facilities, and basically all businesses, more secure Cybersecurity legislation is in the works at both state/federal levels that is patterned after HIPAA Security and will likely govern all businesses eventually 17 3 Categories of Safeguards Administrative Safeguards Policy/staff/training issues mostly HR and legal, although some are definitely technical Physical Safeguards Mostly facility and operational Technical Safeguards Technology and systems mostly IT stuff Omnibus rule (2013) adds new requirements 18 6

Required versus Addressable Required self evident your organization must comply with the requirement (although there is no single right way specified to do so). Addressable you must determine if the require ment is pertinent to your organization and either comply or document good cause as to why not. Cost is not a valid reason to be non compliant. You are Required to address the Addressable ones. (So basically everything is required) 19 Administrative Safeguards 23 specifications, 12 of which are required Mostly concerns policies and procedures Don t be fooled because it s paperwork these safeguards are VERY IMPORTANT! Example required safeguards Establish a Security Officer and reporting system Conduct a complete system assessment Establish procedures to address potential risks 20 Physical Safeguards 10 specifications, 4 of which are required Mostly deals with physical access/security Examples of required safeguards: Establish physical security proceduresfor all devices Establish security procedures for use, re use and disposal of media (hard drives, USB, tapes, etc.) Establish data backup procedures to make an exact copy of ephi 21 7

Technical Safeguards 9 specifications, 4 of which are required Mostly deals with true I.T. stuff Examples of required safeguards: Assign a unique identifier to track user identity Implement mechanisms that record and examine activity in information systems containing ephi Implement methods to authenticate workforce access ( hard user names/passwords, principle of least privilege) 22 Is this the biggest HIPAA threat? 23 No, this is the biggest HC threat: By far, the largest number of threats are caused by, or enabled by, internal users office and clinical staff 24 8

Some recent HIPAA headlines Theft of physician laptop from Hawaii condo causes 3 rd HIPAA breach at Oregon HC unit Stanford Children s has 4 th HIPAA breach laptop stolen from physician s car Mass General fined $1.3 Million (178 records) UCLA settles celebrity snooping HIPAA case for $865 million. Tom Cruise, Farah Fawcett. Hospice of Northern Idaho fined $50K for breach involving only 441 records 25 What the HHS Breach Numbers Say Email 2% Desktop 2% Tapes 1% USB 1% Server 8% Loss 8% Stolen 4% Hacking 5% Keyword Search workstation 0% Theft 32% Conclusion the key words: + Theft + Laptop + Computer + Portable + Loss Are involved in the description of over 75% of all breaches Portable 8% Computer 12% Laptop 17% Source of data: http://www.hhs.gov/ocr/privacy/hipaa/ administrative/breachnotificationrule/b reachtool.html 26 Location of breaches Location of Breached Information "Dekstop computer" 4% "Email 3% "EMR" 2% Conclusion the following locations: "Other 10% "Network server 10% "Computer 11% "Laptop 25% "Paper 23% + Laptop + Paper + Portable + Computer Total nearly 75% of all breaches "Other portable elctronic device" 12% Source of data: http://www.hhs.gov/ocr/privacy/hipaa/ administrative/breachnotificationrule/b reachtool.html 27 9

HHS Types of breaches Unknown 1% Other 2% Improper disposal 5% Type of Breach Type of breach 0% Conclusion the following types of breaches: Hacking/IT Incident 6% Loss 12% Unauthorized access 19% Theft (including theft + other causes) 55% + Theft (+ other issues) + Unauthorized access + Loss These outnumber hacking/it incident by over 10 : 1 margin Source of data: http://www.hhs.gov/ocr/privacy/hipaa/ administrative/breachnotificationrule/b reachtool.html 28 HIPAA is Very Real Anatomy of a HIPAA Breach close to home 29 You don t want to get one of these nasty grams Source of data: Personal files; used with permission 30 30 10

More bad news only 15 days to respond; threatened penalties 31 31 Even more bad news Freedom of Information Act may make this public 32 32 Prior to 2/2009: Up to $100 per violation $25,000/year cap After 2/2009: $100 to $50K per violation $1.5 MILLION/year cap 33 11

Yikes! 34 Call to action for practices Develop an ongoing culture of HIPAA awareness Do a HIPAA Risk Assessment (required for both Stage 1 and Stage 2 MU) Remediate issues as needed Cybersecurity legislation is in the works that is patterned after HIPAA and will affect all businesses, similar to healthcare 35 Biggest risks Portable devices Laptops(including notebooks, tablets, etc.) Workstations USB drives Email, especially with attachments Files outside of your EHR (letters, reports, spreadsheets, etc.) Unpatched systems (Windows XP and Server 2003 are being dropped in early 2014) 36 12

Best remediation ideas Set up IT systems where no data is stored on local/portable devices (e.g., secure cloud) Use encrypted email (not Hotmail, Gmail, etc.) Hire professional IT partners (ask your IT vendor to spell HIPAA and explain it) Assess systems, remediate issues, train staff Rinse and repeat 37 Review of Objectives 1. Identify the primary HIPAA risks and determine how to address them 2. Describe how HIPAA compliance can make your practice more functional 3. Avoid the primary pitfalls identified in most HIPAA assessments 38 Questions/Discussion 13

More information: Marion K. Jenkins, PhD, FHIMSS Executive Vice President healthcare 3t Systems marion.jenkins@3tsystems.com 303.991.8296 14