Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol



Similar documents
2016 OCR AUDIT E-BOOK

Overview of the HIPAA Security Rule

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Our Commitment to Information Security

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Summit. March 10, Phyllis A. Patrick, MBA, FACHE, CHC Phyllis A. Patrick & Associates LLC

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

The HIPAA Audit Program

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

What Are The Odds Of a HIPAA Audit?

Sample Business Associate Agreement Provisions

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

What do you need to know?

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Healthcare and IT Working Together KY HFMA Spring Institute

Business Associate Management Methodology

HIPAA Privacy and Information Security Management Briefing

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

University Healthcare Physicians Compliance and Privacy Policy

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Sustainable Compliance: A System for Ongoing Audit Readiness

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

Nine Network Considerations in the New HIPAA Landscape

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

SECURITY RISK ASSESSMENT SUMMARY

HIPAA for Business Associates

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Interpreting the HIPAA Audit Protocol for Health Lawyers

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

Lessons Learned from HIPAA Audits

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

M E M O R A N D U M. Definitions

HIPAA COMPLIANCE PLAN FOR 2013

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Joe Dylewski President, ATMP Solutions

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Turn hipaa. hipaa compliance

Bridging the HIPAA/HITECH Compliance Gap

HIPAA Security Rule Compliance

2012 HIPAA Privacy and Security Audits

How to Use the NYeC Privacy and Security Toolkit V 1.1

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Entities Covered by the HIPAA Privacy Rule

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

What is required of a compliant Risk Assessment?

Use & Disclosure of Protected Health Information by Business Associates

HIPAA PRIVACY AND SECURITY AWARENESS

Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015

VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data

Preparing for the HIPAA Security Rule

HIPAA Security Rule Toolkit

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

OCR/HHS HIPAA/HITECH Audit Preparation

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Transcription:

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol 1

Learning Objectives Understand Privacy and Security Requirements Understand the new OCR audit protocol Learn how to prepare for upcoming HIPAA Audits Learn differences between Meaningful Use security requirements and OCR HIPAA audits.

About the Presenter John DiMaggio, Chief Executive Officer, Blue Orange Compliance John DiMaggio is the co-founder and CEO of Blue Orange Compliance, a firm dedicated to helping health care providers and business associates navigate the required HIPAA and HITECH Privacy and Security regulations. John is a recognized healthcare information compliance speaker to state bar associations and healthcare associations including HIMSS, LTPAC, NAHC, LeadingAge and ALFA. John is also a LeadingAge CAST Commissioner. John s extensive healthcare experience includes Chief Information Officer with NCS Healthcare and Omnicare; senior operations roles with NeighborCare, and general consulting to the industry. John began his career as a key expert in Price Waterhouse s Advanced Technologies Group and served on several national and international standards organizations including the American National Standards Institute (ANSI) and the International Standards Organization (ISO). John is the named inventor for multiple healthcare technology and process patents. He holds an MBA in Finance from Katz Graduate School of Business and a BS in Computer Science from the University of Pittsburgh. John DiMaggio, CEO Blue Orange Compliance 5131 Post Rd Dublin, OH 43017 john.dimaggio@blueorangecompliance.com 614.270.9623

About Blue Orange Specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that human capital is limited. Our high-tech, low-touch, cost-effective approach provides continuous, maximum information and guidance and requires minimal staff time and engagement. Security Risk Assessments HIPAA Privacy and Breach Analysis & Remdiation Penetration testing Mock Office for Civil Rights HIPAA Audits

Organization Questions 1. Have you performed a HIPAA security risk analysis? Has it been regularly updated? 2. Do you have an active security plan? 3. Do you have operational policies and procedures for Security? Privacy? Breach? 4. Have they been updated since Omnibus (2013)? 5. Has your staff been trained in HIPAA and your policies and procedures? 6. Do you have a HIPAA Privacy officer and Security Officer designated? 7. Have you reviewed the latest Office for Civil Rights HIPAA Audit protocol?

Privacy and Security Regulations Enforcement Threats Risks Consequences Privacy Office for Civil Rights Malicious Outsider Audit Fines Security CMS Malicious Insider Breach Reputation Breach Department of Justice Human Error Complaint, Whistleblower Legal State Attorneys General Environmental Office of Inspector General

Is Privacy and Security Important? Who thinks it is important? Government Clients (Business Associate) Insurance Companies Your patients and residents What will happen if we don t do it? It s not if, it s when Random Audit For Cause Audit Breach Legal Reputation

Why HIPAA? Exchange and transmit claims information in a standard way Public feel safe their health information is protected How information can be shared Patient rights Specifics around protecting electronic health information

HIPAA Who needs to comply? Covered Entity (CE): Health Plans Health Care Providers: Any provider who electronically transmits health information in connection with standardized transactions regulated by HIPAA (e.g., claims transactions, benefit eligibility inquires, etc.). Health Care Clearinghouses: Entities that process nonstandard information they receive from one entity into a standard format (or vice versa). Business Associate (BA): A person or organization (other than a member of the CE s workforce) that performs certain functions or activities on behalf of the CE that involves the use or disclosure of protected information. HIPAA Entity Types Covered Entity Affiliated Covered Entity (ACE) Hybrid Organized Healthcare Arrangement (OHCA)

What s at Risk? Penalties Plus

Audit Process 2016 in process Covered Entities and Business Associates Email verification Questionnaire Audit pool selection Desk Audits

Regulations HIPAA (Federal floor) 45 CFR 164 Subpart C - SECURITY STANDARDS FOR THE PROTECTION OF ELECTRONIC PROTECTED HEALTH INFORMATION 45 CFR 164 Subpart E - PRIVACY OF INDIVIDUALLY IDENTIFIABLE HEALTH INFORMATION 45 CFR 164 Subpart D - NOTIFICATION IN THE CASE OF BREACH OF UNSECURED PROTECTED HEALTH INFORMATION State Regulations Confidentiality Patient Rights Breach

Privacy, Security, Breach Scope Overview Security C.I.A. Confidentiality, Integrity, Availability HIPAA Security Rule Safeguards Administrative Technical Physical Organizational Privacy Patient Rights Uses and Disclosures Training Business Associates Forms, logs, reports, audit Breach Detection Documentation Notification Training Example Security Control Families Access Control Audit and Accountability Certification, Accreditation, and Security Assessment Configuration Management Contingency Planning Identification and Authentication Incident Response Maintenance Media Protection Physical and Environmental Security Planning Security Awareness and Training Personnel Security Risk Assessment System and Service Acquisition System and Communications System and Information Integrity

Office for Civil Rights HIPAA Audits Random Audits Performed Test Audits in 2012 2016 Audits Underway New Audit Protocol Published April, 2016 For Cause Audits/Investigations Incident or Breach Whistleblower Complaint

Office for Civil Rights HIPAA Audit Protocol 180 Audit Items General Item Structure 1. Do Policies and procedures exist for the item? 2. Does the entity perform the necessary requirements if the item? 3. Obtain and review policies and procedures for the item and ensure they have required elements 4. Obtain and review documentation demonstrating the item is being performed in accordance with policies and procedures

# Items Office for Civil Rights HIPAA Audit Protocol - Security 30 # Audit Items Per Security Regulation 25 20 15 10 5 0 164.308 164.310 164.312 164.314 164.316 164.306 Regulation

# Items Office for Civil Rights HIPAA Audit Protocol - Privacy 25 # Audit Items Per Privacy Regulation 20 15 10 5 0 Regulation

# Items Office for Civil Rights HIPAA Audit Protocol - Breach 7 # of Audit Items Per Breach Regulation 6 5 4 3 2 1 0 Regulation

General Audit Item Structure 1. Do Policies and procedures exist for the item? 2. Does the entity perform the necessary requirements if the item? 3. Obtain and review policies and procedures for the item and ensure they have required elements 4. Obtain and review documentation demonstrating the item is being performed in accordance with policies and procedures

OCR Audit Protocol Walkthrough Browse through the protocol walkthrough

OCR Audit Protocol Sample Drilldown - Security Security example walkthrough

OCR Audit Protocol Sample Drilldown - Privacy Privacy example walkthrough

OCR Audit vs. Meaningful Use Audit Privacy and Security Meaningful Use Audit Risk Analysis only (subset of Security Rule) Cover EHR only OCR Audit Deep dive Covers full Security, Privacy, Breach Passed Meaningful Use Audit?

Call to Action - Security Assess Perform thorough and accurate Risk Analysis Develop and actively manage security plan Remediate Rinse and repeat Test Vulnerability Scans - External/Internal Penetration Test Train Workforce IT Specific Remediate Assess Prioritize/ Manage Include in Risk Management Include in Executive Meeting Agenda Share with Board of Directors This is NOT just an I.T. Thing

Call to Action Privacy and Breach Perform Gap Analysis Evaluate Policies and Procedures & Documentation Review HIPAA Entity Designation Review Business Line Regulations Review State Regulations Review Operations

Call to Action Audit Preparation Tabletop exercise/mock Audit Organize information Policy/Procedure Keep at it

Organization Questions 1. Have you performed a HIPAA security risk analysis? Has it been regularly updated? 2. Do you have an active security plan? 3. Do you have operational policies and procedures for Security? Privacy? Breach? 4. Have they been updated since Omnibus (2013)? 5. Has your staff been trained in HIPAA and your policies and procedures? 6. Do you have a HIPAA Privacy officer and Security Officer designated? 7. Have you reviewed the latest Office for Civil Rights HIPAA Audit protocol?

Thank You Contact Info and Additional Information John DiMaggio CEO Blue Orange Compliance john.dimaggio@blueorangecompliance.com 614.270.9623