What Are The Odds Of a HIPAA Audit?



Similar documents
What do you need to know?

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

What s New with HIPAA? Policy and Enforcement Update

HIPAA Overview and updates since HITECH and PPACA

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

Nine Network Considerations in the New HIPAA Landscape

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Overview of the HIPAA Security Rule

Privacy & Security. Risk Management Strategies for Healthcare Data. Ohio Hospital Association Centennial Annual Meeting.

HIPAA for Business Associates

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

2016 OCR AUDIT E-BOOK

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

InfoGard Healthcare Services InfoGard Laboratories Inc.

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Let s Talk About Privacy

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

Security Is Everyone s Concern:

Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Lessons Learned from HIPAA Audits

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

HIPAA WEBINAR HANDOUT

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Privacy and Information Security Management Briefing

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

Our Commitment to Information Security

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

The Impact of HIPAA and HITECH

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

My Docs Online HIPAA Compliance

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

Texas House Bill 300 & HIPAA. A MainNerve Whitepaper

HIPAA COMPLIANCE PLAN FOR 2013

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Preparing for the HIPAA Security Rule

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

HIPAA Privacy and Security

Transcription:

What Are The Odds Of a HIPAA Audit? 1

Random Odds The law Outline Why is enforcement up? What types of audits and what causes them Examples of enforcement What can you do to avoid audits and fines 2

3

Random odds. Winning Lotto 1 in 175 Million Attacked by a shark 1 in 11.5 Million Hit by Lightning 1 in 960,000 Hole in One 1 in 12,500 Random HIPAA Audit 1 in 10,000 Meaningful use Audit 1 in 10 Breach-Related Audit 1 in? 4

HIPAA Overview HIPAA Protect patient confidentiality while furthering innovation and patient care. Omnibus Business Associates must protect PHI. HITECH/Meaningful Use Accelerate adoption of EHR(electronic Health records). Corrective Actions or Fines HIPAA OMNIBUS HITECH/ Meaningful Use 5

HIPAA Enforcement All too often we see covered entities with a limited risk analysis Organizations must have in place compliant business associate agreements as well as an accurate and thorough risk analysis We take seriously all complaints filed by individuals, and will seek the necessary remedies to ensure that patients privacy is fully protected. * As of May 2016 Settlements so far in 2016 have totaled more than any year prior $8,664,800 - Jocelyn Samuels, Director of OCR Three Prison Sentences Medical License Revoked State Attorney General levying fines 6

Why is Enforcement Up é Anthem Blue cross Breach (2014) 1 in 4 Americans affected Omnibus Rule Jocelyn Samuels New OCR Director (2015) Education is over this is about enforcement Record Enforcement (2015) 3 Prison Sentences License revocation Heavy Fines Broad Targets Phase 2 Audits (2016) CE s & BA s Increased Budget More Auditors We are all connected 7

Causes Of A HIPAA Audit Phase 2 Random Business Associates Meaningful Use Failure Breach Notification?% Reported Whistleblower Complaint HHS is REQUIRED by law to investigate ALL HIPAA violation complaints 8

Phase 2 Random Audits Covered Entities and Business Associates will be randomly audited Began: March 22, 2016 New funding for FCI federal to support the audits The friends you keep can get you audited Audit Risk-O-Meter Low Medium High 9

What If I Attest For Meaningful Use? Random 5-10% of providers will be audited by CMS Failure rate as high as 79% Failure may be reported to OCR Security Risk Assessment for Meaningful Use DOES NOT make you HIPAA Compliant Audit Risk-O-Meter Low Medium High 10

What Causes a HIPAA Audit? Complaint of Security/Privacy violation HHS is REQUIRED by law to investigate ALL HIPAA violation complaints Whistleblower Anonymous % of Money Collected Audit Risk-O-Meter Low Medium High 11

HHS Breach Portal AKA Wall of Shame Breach Notification Rule Affects < 500 PHI: must notify all breaches of calendar year by a deadline Affects > 500 PHI: must notify HHS immediately, publicized in HHS Wall of Shame Audit Risk-O-Meter Low Medium High 12

HHS Wall of Shame 56% 11% 20% Caused by Theft or Lossrelated reasons Audit Risk-O-Meter Caused by Hacking or IT incident Audit Risk-O-Meter Involved Business Associates Audit Risk-O-Meter Low Medium High Low Medium High Low Medium High Based on HHS Breach Portal: Breaches Affecting 500 or More Individuals, Type of Breach https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf 13

I have to worry about Business Associates?! > 59% of BAs reported a data breach in the last two years that involved the loss or theft of patient data. > 29% experienced two breaches or more. Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data conducted by Ponemon Institute http://media.scmagazine.com/documents/121/healthcare_privacy_security_be_30019.pdf 14

Computer and Device Theft 90% of Healthcare Professionals use personal phones for work 4.5 Million smart phones lost/stolen (2013) Only 11% use STRONG passwords Only 7% used encryption 91.4% of organizations report loss of mobile device(s) 1 out of 10 laptops are lost/stolen http://www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm http://www.isaca.org/cyber/documents/state-of-cybersecurity_res_eng_0415.pdf http://www.naswassurance.org/malpractice/malpractice-tips/computer-device-theft/ 15

Leading Causes Of Data Breaches Since 2010 48% involved Laptop/Desktop/Mobile Device http://pages.bitglass.com/rs/bitglass/images/wp-healthcare-report-2014.pdf 16

Causes Of A HIPAA Audit Business Associates Phase 2 Random Meaningful Use Failure Breach Notification Low?% Medium Audit Risk-O-Meter High Reported Whistleblower Complaint HHS is REQUIRED by law to investigate ALL HIPAA violation complaints 17

The Process Of An Audit Desk Audit Request for Gap and Remediation Report On Site Audit Review of all 7 Elements of Effective Compliance Corrective Action Plan Results Fines 18

Laptop Theft Who: A radiation oncology private physician practice, Cancer Care Group, P.C. What: A laptop theft lead to breach Why: But lack of comprehensive risk analysis and device and media control policy lead to a steep penalty Settlement: $775,000 and CAP (Corrective Action Plan) (9/2/15) 19

Importance of BAA & Complete Risk Analysis Who: North Memorial Health Care of Minnesota What: Laptop theft, 6,497 patient records Why: No BAA with Billing firm, failed to complete a risk analysis to address all potential risks and vulnerabilities to ephi Settlement: $1,550,000 and CAP (3/19/16) Two major cornerstones of the HIPAA Rules were overlooked by this entity, said Jocelyn Samuels, Director of OCR. Organizations must have in place compliant Business Associate Agreements as well as an accurate and thorough risk analysis that addresses their enterprise-wide IT infrastructure. http://www.hhs.gov/about/news/2016/03/16/155-million-settlement-underscores-importance-executing-hipaa-businessassociate-agreements.html 20

The NEED for BAAs Who: Raleigh Orthopaedic (North Carolina) What: Breach report,17,300 patient records Why: Handed over x-rays and associated PHI to potential business partner without first executing a business associate agreement. Settlement: $750,000 and CAP (4/20/16) HIPAA s obligation on covered entities to obtain business associate agreements is more than a mere check-the-box paperwork exercise, said Jocelyn Samuels, Director of OCR. It is critical for entities to know to whom they are handing PHI and to obtain assurances that the information will be protected. http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/raleigh-orthopaedic-clinic-bulletin/ index.html 21

Avoidable Breach Who: Anchorage Community Mental Health Services (ACMHS) - Nonprofit org. What: Malware caused breach of unsecured ephi Why: ACMHS had adopted policies and procedures in 2005, but these policies and procedures were not followed and/or updated. ACMHS could have avoided the breach (and not be subject to the settlement agreement), if it had followed its own policies and procedures Settlement: $150,000 and CAP (12/2014) 22

Physical Security Who: Lahey Hospital and Medical Center (Mass.) What: Portable CT scanner stolen from unlocked room overnight Why: Failure to conduct a thorough risk assessment for all ephi, failure to physically safeguard workstation with ephi, failure to implement unique user names to identify and track users, and failure to document workstation activity. Settlement: $850,000 and 3 year CAP (11/24/15) 23

How Do Your Patients Feel About HIPAA? Are You Confident Your Healthcare Providers Security Measures Protect Your Medical Records Did Your Provider s Negligence Cause Or Contribute to Identify Theft 68% Not confident 53% Yes, they caused or contributed to it. HIPAA compliance as a differentiator Fitbit Inc. announces its HIPAA compliance, stock price soared (26%) http://medidfraud.org/wp-content/uploads/2015/02/2014_medical_id_theft_study1.pdf 24

The Seven Fundamental Elements of an Effective Compliance Program Compliance according to HHS: 1. Implementing written policies, procedures and standards of conduct. 2. Designating a compliance officer and compliance committee. 3. Conducting effective training and education. 4. Developing effective lines of communication. 5. Conducting internal monitoring and auditing. 6. Enforcing standards through well-publicized disciplinary guidelines. 7. Responding promptly to detected offenses and undertaking corrective action. *Source HHS & OIG 25

The HIPAA Compliance Puzzle Incident Management & Remediation Audits SRA (Security Risk Assessment), Administrative, Privacy Remediation Plan Business Associate Management Document Version Employee Attestation & Tracking Policies, Procedures & Training 26

Compliance Questions? For more information, contact: Marc Haskelson 855.854.4722 ext 507 marc@compliancygroup.com 27