HIPAA Requirements and Mobile Apps



Similar documents
Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

HIPAA Compliance Guide

HIPAA Information Security Overview

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Compliance Guide

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

Security Is Everyone s Concern:

HIPAA Security Series

Managing Privacy and Security Challenges of Patient EHR Portals

HIPAA Security Rule Compliance

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Datto Compliance 101 1

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

HIPAA Security Alert

HIPAA Security Matrix

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

VMware vcloud Air HIPAA Matrix

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

CHIS, Inc. Privacy General Guidelines

When HHS Calls, Will Your Plan Be HIPAA Compliant?

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

What s New with HIPAA? Policy and Enforcement Update

HIPAA and Mental Health Privacy:

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

The CIO s Guide to HIPAA Compliant Text Messaging

UF IT Risk Assessment Standard

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

HIPAA: Bigger and More Annoying

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

Overview of the HIPAA Security Rule

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

New HIPAA regulations require action. Are you in compliance?

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

HIPAA PRIVACY AND SECURITY AWARENESS

C.T. Hellmuth & Associates, Inc.

Montclair State University. HIPAA Security Policy

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

How To Write A Health Care Security Rule For A University

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

Jeff M. Bauman, Psy.D. P.A. and Associates FLORIDA-HIPAA PRIVACY NOTICE FORM

How To Protect Your Health Care From Being Hacked

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA: In Plain English

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Procedure Title: TennDent HIPAA Security Awareness and Training

HIPAA Compliance: Are you prepared for the new regulatory changes?

AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Policy Title: HIPAA Security Awareness and Training

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Healthcare Compliance Solutions

HIPAA Privacy & Security White Paper

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Cyber Self Assessment

HIPAA Security Training Manual

SECURITY RISK ASSESSMENT SUMMARY

Krengel Technology HIPAA Policies and Documentation

HIPAA Assessment HIPAA Policy and Procedures

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Transcription:

HIPAA Requirements and Mobile Apps OCR/NIST 2013 Annual Conference Adam H. Greene, JD, MPH Partner, Washington, DC

Use of Smartphones and Tablets Is Growing 2

How Info Sec Sees Smartphones Easily Lost, Stolen, or Discarded with PHI on It Camera for Improperly Recording PHI No Physical Keyboard for complex passwords Easy Access to Facebook for Improperly Posting PHI 3

How Info Sec First Responds 1. Thou Shall Disable Thy Smartphone Camera 2. Thou Shall Not Text 3. Thou Shall Not Place PHI on Thy Smartphone or Tablet 4

How Clinicians and Other Staff Respond 5

Design an Effective Mobile App Strategy 1. Identify mobile app needs 2. Integrate into risk analysis 3. Design risk management strategy 4. Obtain business associate agreement if necessary and perform due diligence 5. Document Security Rule compliance 6. For patient/enrollee-facing apps, comply with Privacy Rule 6

Identify Mobile App Needs 1. Thou Shall Disable Thy Smartphone Camera Is there appropriate use of smartphone cameras for certain procedures? Is their an appropriate way to securely share pictures and add them to the record? 7

Identify Mobile App Needs 2. Thou Shall Not Text Why are members of the workforce texting? Is e-mail effective? Is a no-texting policy effective, or is secure texting needed? 8

Identify Mobile App Needs 3. Thou Shall Not Place PHI on Thy Smartphone or Tablet Why is PHI ending up on smartphones? Is remote access to PHI sufficient? Is a secure vault for PHI needed? 9

Identify Mobile App Needs Patient Engagement Improved access to EHR (MU Stage 2) Ability to accept patient health information (e.g., ibluebutton) Improved treatment communications and adherence Appointment reminders 10

Identify Mobile App Solutions Mobile diagnostic tools Secure access to e-mail Mobile EHR portal Secure texting Secure container Secure access to Blue Button data Remote wipe and antivirus 11

Include Mobile Apps in Risk Analysis Identify where PHI is located on mobile devices C - What apps Create PHI (e.g., diagnostic apps) R - What apps Receive PHI (e.g., EHR portal, e-mail, ibluebutton) M - What apps Maintain PHI (e.g., e-mail, secure container) T - What apps Transmit PHI (e.g., secure texting) 12

HIPAA Hot Potato Health Plan Server Physician Tablet Patient Device Covered by HIPAA Covered by HIPAA Not Covered by HIPAA 13

Include Mobile Apps in Risk Analysis Identify threats and vulnerabilities What if mobile device is lost, stolen, or replaced? What if mobile device is shared? Can malware on device lead to unauthorized access? Can transmissions be intercepted by unauthorized third party? Is PHI on device reasonably available? 14

Include Mobile Apps in Risk Analysis Identify current security controls? Is information encrypted while maintained? Is information encrypted in transit? What authentication of app users is in place? Is PHI backed up when necessary? Can PHI be remotely wiped? 15

Include Mobile Apps in Risk Analysis Identify likelihood, impact, and aggregate risk What is the likelihood of a threat exploiting a vulnerability? What is the impact if exploited? Likelihood x Impact = Risk 16

Implement Risk Management Strategy What risks are medium and high? Can risks be lowered to reasonable amounts through: Policies Training Additional technical controls (e.g., locking down the device or adding remote wipe features) 17

Obtain Necessary BAAs & Due Diligence Does the app developer create, receive, maintain, or transmit PHI on covered entity s behalf? If PHI is encrypted and app developer does not have the key, HIPAA is unclear as to whether BAA is needed Due diligence - What is app developer s security? 18

Document Security Rule Compliance Included in risk analysis Included in risk management Sanctions for violations of policy Reasonably review system activity If activity cannot be centrally reviewed, document whether this is reasonable Authorization, supervision, and clearance Who needs access to PHI on mobile devices 19

Document Security Rule Compliance Termination procedures Is PHI on mobile devices secured and access through apps terminated at employment termination Include mobile apps in security awareness and training Address potential malware on mobile device Address mobile app passwords 20

Document Security Rule Compliance Identify and respond to mobile app security incidents Ensure that PHI in mobile apps is reasonably backed up Integrate mobile apps into contingency planning Evaluate mobile app program 21

Document Security Rule Compliance Address physical security of mobile devices Address which mobile devices need to be inventoried Ensure proper disposal/re-use of mobile devices with apps containing PHI Address whether mobile devices need to be backed up 22

Document Security Rule Compliance Address automatic logoff of mobile apps Address encryption of data maintained by apps on device Address encryption of data transmitted by mobile app Document basis for transmission of some PHI without encryption 23

PRIVACY RULE AND MOBILE APPS 24

The X-Factor 25

Right of Access Patient may access copy of designated record set in requested form and format, if readily producible Mobile app to portal may be convenient means of providing access (and support MU Stage 2 objectives) But, patient may prefer unencrypted e- mails (permissible after warning of risk) 26

Right to Confidential Communications Must accommodate reasonable requests for communications to patient by alternative means or at alternative location Some patients may prefer communications through unencrypted e-mails Other patients may not want unencrypted appointment reminders 27

Don t Let Security Trump Patient Preference (No matter how much you paid for that secure mobile app) 28

For more information Adam H. Greene, JD, MPH adamgreene@dwt.com 202.973.4213 29