My Docs Online HIPAA Compliance



Similar documents
Overview of the HIPAA Security Rule

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

Business Associate Management Methodology

SaaS. Business Associate Agreement

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Security Rule Compliance

New HIPAA regulations require action. Are you in compliance?

COMPLIANCE ALERT 10-12

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

The Basics of HIPAA Privacy and Security and HITECH

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

BUSINESS ASSOCIATE AGREEMENT

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

Health Information Privacy Refresher Training. March 2013

POLICY AND PROCEDURE MANUAL

STANDARD ADMINISTRATIVE PROCEDURE

M E M O R A N D U M. Definitions

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

SAMPLE BUSINESS ASSOCIATE AGREEMENT

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Five Rivers Medical Center, Inc Medical Center Drive Pocahontas, AR Notification of Security Breach Policy

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HIPAA BUSINESS ASSOCIATE AGREEMENT

What do you need to know?

HIPAA Compliance: Are you prepared for the new regulatory changes?

BUSINESS ASSOCIATE AGREEMENT. (Contractor name and address), hereinafter referred to as Business Associate;

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

HIPAA BUSINESS ASSOCIATE AGREEMENT

Dissecting New HIPAA Rules and What Compliance Means For You

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

Business Associates, HITECH & the Omnibus HIPAA Final Rule

HIPAA Security Alert

HIPAA Compliance Guide

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

CHIS, Inc. Privacy General Guidelines

HIPAA and Mental Health Privacy:

HIPAA Compliance Guide

HIPAA BUSINESS ASSOCIATE AGREEMENT

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Authorized. User Agreement

Statement of Policy. Reason for Policy

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

Business Associate Agreement

Please print the attached document, sign and return to or contact Erica Van Treese, Account Manager, Provider Relations &

BUSINESS ASSOCIATES AND BUSINESS ASSOCIATE AGREEMENTS

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

BUSINESS ASSOCIATE ADDENDUM

Table of Contents INTRODUCTION AND PURPOSE 1

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Regulatory Update with a Touch of HIPAA

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

Breach Notification Policy

Transcription:

My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several general characteristics. For instance, medical transcriptionists and similar services ("Business Associates"), as well as physicians and other providers ("Covered Entities") should: Use a multi user account (administrator ID plus multiple group user IDs) Assign individual group user IDs to each "covered entity" and to each MT. Avoid the shared use of individual group user IDs except where justified by shared work role and information access rights Set appropriate folder permissions based on the access privileges of each group user ID Avoid using "Share" or "Give" to deliver files. Use group user IDs and folders with permission Enforce transmission encryption by requiring the use of SSL for all subaccounts. Safeguard login IDs and passwords. Assign strong passwords, using a mixture of letters and numbers, or special characters or upper and lower case Avoid the inclusion of individually identifiable information in the names of uploaded files or comments associated with files.

HIPAA Rules and Regulations As They Apply to My Docs Online HIPAA Omnibus Rule Changes, Impact on My Docs Online and Its Customers (September 2013 Update) In effect March 26, 2013 Covered Entities were given 180 days from then to comply (September 22, 2013) Key Points: Business Associates of Covered Entities are directly liable for compliance with certain of the HIPAA Privacy and Security Rules' requirements. The "conduit exception" still applies but is limited to an organization that merely transmits Protected Health Information as opposed to those that "maintain and store it" (e.g. a record storage company). The former is NOT a Business Associate but the latter is. My Docs Online is typically used as a conduit for the delivery of PHI in the form of digital voice files (dictated notes) from a provider to a transcriptionist or transcription service, and of transcribed notes back to the provider. In some cases files containing PHI are maintained long term in My Docs Online, in which case the customer should request My Docs Online enter into a Business Associate Agreement. A Business Associate must report security incidents, including breaches, to its respective Business Associate. My Docs Online will report relevant security incidents, if any, to its customers regardless of whether My Docs Online is considered a BA, or the "conduit exception" is considered to be in effect. The impermissible use or disclosure of Protected Health Information (i.e. a violation of the HIPAA Privacy Rule) is now presumed to be a breach unless the Covered Entity or Business Associate, as applicable, demonstrates that there is a low probability that the Protected Health Information has been comprised. Although My Docs Online has always encrypted data during transport, and keeps disk copies in a highly secure environment (and for approximately 72 hours following "deletion") the product has been enhanced to support "Encryption At Rest". This means even in the unlikely event that stored temporary files would be misplaced or stolen they are encrypted with AES 256, with keys etc. separately

stored elsewhere. In the unlikely event of a breach My Docs Online will notify its affected customer or customers and together with the customer comply with all relevant regulations regarding notification, mitigation, etc. Important definitions: HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA established and continues to govern Privacy and Security Rules for the handling of medical information, by Covered Entities and their Business Associates. Covered Entities include health care providers (doctors, hospitals, etc.) and health plans. Business Associates include companies and consultants that perform services for covered entities. Medical Transcription services are an example of a Business Associate, and these MT services are often My Docs Online customers, which makes My Docs Online a business associate by extension. In other cases a Covered Entity is a My Docs Online customer, which makes us the Covered Entity s Business Associate. In these cases it is common for a Business Associate Agreement to be in place between the Covered Entity and My Docs Online. ARRA: American Recovery and Reinvestment Act of 2009 (commonly known as the Stimulus Package ) The most significant change brought about by ARRA as it relates to HIPAA and My Docs Online is that, beginning in 2010, as a Business Associate, MDO is directly subject to HIPAA under the ARRA and is governed by the same requirements under HIPAA as covered entities. Business Associates such as MDO were previously subject to security and privacy requirements through their contracts with covered entities. HITECH: The Health Information Technology for Economic and Clinical Health Act Requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information.

The HIPAA Privacy Rule Provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes. The HIPAA Security Rule Specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information. Maintaining proper security is the main goal of My Docs Online s HIPAA Policies and the My Docs Online Security Policies and Procedures Plan. Security Breach Notification Requirements ARRA established more stringent security breach notification requirements and gives increased notification to patients. Under the ARRA, covered entities and business associates must provide notification to any person whose protected health information has been breached. The ARRA also provides requirements for such notifications. HIPAA Security Rule Goals and Objectives and How My Docs Online Complies As required by the Security standards: General rules section of the HIPAA Security Rule, each covered entity (and beginning in 2010, each Business Associate) must: Ensure the confidentiality, integrity, and availability of EPHI (Electronic Protected Health Information) that it creates, receives, maintains, or transmits Protect against any reasonably anticipated threats and hazards to the security or integrity of EPHI Protect against reasonably anticipated uses or disclosures of such information that are not permitted by the Privacy Rule Security Rule Standard Components Administrative Safeguards Defined in the Security Rule as the administrative actions and policies, and procedures to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity's workforce in relation to the protection of that information. Physical Safeguards Defined as the physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. Technical Safeguards Defined as the the technology and the policy and procedures for its use that protect electronic protected health information and control access to it. Organizational Requirements Includes standards for business associate contracts and other arrangements, including memoranda of understanding between a covered entity and a business associate when both entities are government organizations; and requirements for group health plans. Policies and Procedures and Documentation Requirements

Requires implementation of reasonable and appropriate policies and procedures to comply with the standards, implementation specifications and other requirements of the Security Rule; maintenance of written (which may be electronic) documentation and/or records that includes policies, procedures, actions, activities, or assessments required by the Security Rule; and retention, availability, and update requirements related to the documentation. These security rule components, safeguards, and requirements are met by the policies and procedures documented in the My Docs Online Security Policies and Procedures Plan, which can be made available to our customers as needed. Breach Notification A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. There are three exceptions to the definition of breach 1. The first exception applies to the unintentional acquisition, access, or use of protected health information by a workforce member acting under the authority of a covered entity or business associate. 2. The second exceptions applies to the inadvertent disclosure of protected health information from a person authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the covered entity or business associate. In both cases, the information cannot be further used or disclosed in a manner not permitted by the Privacy Rule. 3. The final exception to breach applies if the covered entity or business associate has a good faith belief that the unauthorized individual, to whom the impermissible disclosure was made, would not have been able to retain the information. If a breach has occurred, covered entities and business associates must demonstrate that all required notifications have been provided or that a use or disclosure of unsecured protected health information did not constitute a breach. Covered entities must have in place written policies and procedures regarding breach notification. The My Docs Online policies and procedures for handling breach notification are contained in the My Docs Online Security Policies and Procedures Plan, which can be made available to our customers as needed.