Sustainable Compliance: A System for Ongoing Audit Readiness



Similar documents
View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013

HIPAA Compliance: Are you prepared for the new regulatory changes?

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

My Docs Online HIPAA Compliance

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Bridging the HIPAA/HITECH Compliance Gap

Security Is Everyone s Concern:

The HIPAA Audit Program

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

COMPLIANCE ALERT 10-12

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Security & Compliance

HIPAA Security Alert

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Our Commitment to Information Security

HIPAA Security Compliance Reviews

Lessons Learned from HIPAA Audits

Overview of the HIPAA Security Rule

Healthcare Compliance Solutions

HIPAA COMPLIANCE PLAN FOR 2013

HIPAA and Mental Health Privacy:

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA/HITECH Compliance Using VMware vcloud Air

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA PRIVACY AND SECURITY AWARENESS

SECURITY RISK ASSESSMENT SUMMARY

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

HIPAA Security Rule Compliance

What do you need to know?

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

The Impact of HIPAA and HITECH

OCR UPDATE Breach Notification Rule & Business Associates (BA)

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

HIPAA and HITECH Compliance for Cloud Applications

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Compliance Guide

Joseph Suchocki HIPAA Compliance 2015

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

2016 OCR AUDIT E-BOOK

Business Associates, HITECH & the Omnibus HIPAA Final Rule

New HIPAA regulations require action. Are you in compliance?

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Transcription:

View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013

Agenda Sustainable Compliance at St. Charles Health System Centralized Documentation Risk Analysis & Testing High Risk Areas Ongoing Compliance Activities Maximizing Your Compliance Coverage

Sustainable Compliance Judi Hofman BCRT, CHPS, CAP, CHP, CHSS St Charles Health System Bend, Oregon

Sustainable Compliance Overall sustainability of compliance Centralized documentation Policies and Procedures Current Risk Analysis Disaster recovery/emergency mode of operations plan Incident response investigation documentation Control testing and documentations of Risk Analysis Application Layer Infrastructure Layer Enterprise Controls

ID Control Description Ap 1 Ap 2 Ap 3 Ap 4 HIPAA 1 Strong password controls are enforced to safeguard against unauthorized access. FAIL PASS PASS PASS HIPAA 2 User Accounts are disabled or deleted on the key applications upon termination of an employee. HIPAA 3 Administrator access within key applications is restricted to a defined set of system administration personnel. HIPAA 4 A review of user accounts and their associated access levels is performed and adequately documented to ensure appropriate access to the system. HIPAA 5 Change requests are formally documented and authorized by management before performing the work. HIPAA 6 Monitoring procedures are designed to provide reasonable assurance around completeness and timeliness of system and data processing. HIPAA 7 Backups are scheduled and monitored for successful completion.

Sustainable Compliance Develop a Compliance Plan Engage impacted departments *IT *HR *Business *Internal Audit Combine other compliance assessment activities *PCI *Financial *HR Evidence of Compliance Design effectiveness Operational effectiveness

Sustainable Compliance Top of the list compliance focus includes: Policies and Procedures Workforce training (new and on-going) Audit program Incident response (including breach response) Risk analysis & risk mitigation

Sustainable Compliance High risk areas: On-going risk management Current disaster recovery and emergency mode of operations plan Encryption of any transmitted or transported electronic PHI Access control Risk assessment

HIPAA Security Series http://www.hhs.gov/ocr/privacy/hipaa/administrative /securityrule/securityruleguidance.html Guidance of Risk Analysis Required under the HIPAA Security Rule http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/rafinalguidancepdf.pdf

Sustainable Compliance High risk areas (continued): Compliant data backup and recovery Remote access management Wireless access Audit control Person or entity authentications Documentation plan to address OCR or state investigation and audits

Sustainable Compliance What you need to do! Current Risk Assessment Prioritize high to low risk compliance gaps Assign resources to eliminate privacy and security compliance gaps Track and document compliance project status Document mitigation activity Store all centrally

Sustainable Compliance This amounts to more than adopting required policies and procedures compliance is an on-going process Need to demonstrate continued compliance activities (not a one time event) CE bear the burden of demonstrating compliance The time is now to address compliance gaps

CHRIS ARNOLD VP OF PRODUCT MANAGEMENT

Regulatory Framework for HIPAA Compliance HIPAA Audit Protocol User Activity Monitoring 2014 OCR HIPAA Enforcement #1 Security Gap from Pilot Audits Patient Privacy Monitoring ARRA HITECH Meaningful-Use Electronic Health Records Audit Logs Required Security Risk Analysis / Correct Deficiencies Protect Your Reputation Position Yourself for HIPAA Compliance

Maximize HIPAA Audit Protocol Coverage for Investment FairWarning 3.1 Maps Directly to OCR HIPAA Audit Protocol Requirements Patient privacy monitoring: 25 of the HIPAA audit protocols HIPAA Protocol sections Audit Controls Security Incident Procedures Security Management Process Breach Assessment & Notification Security Awareness and Training Access Control Administrative Requirements

Compliance Dashboard

164.312(b): Audit Controls

164.308(a)(6): Security Incident Procedures & 164.308(a)(1): Security Management Process

164.402: Breach Risk Assessment

164.404 & 406: Breach Notification

164.308(a)(5): Security Awareness & Training

164.312(a): Access Control

164.414 & 530: Administrative Requirements - Burden of Proof & Training Documentation

164.530: Administrative Requirements - Complaints, Sanctions & Mitigation

More Information A full mapping of FairWarning to the HIPAA Audit Protocols is available online: http://www.fairwarning.com/whitepapers/20 12-07-WP-OCR-PROTOCOL-MAPPING.pdf

CMS Meaningful Use Audits 5-10% of Eligible Providers audited Failing an audit means a complete return of all funds Biggest shortfalls include failure to have a well-documented Security Risk Assessment and to address areas of risk FairWarning addresses one of the most common risk areas identified user activity monitoring For more information: http://journal.ahima.org/2013/10/30/prepare-now-for-possible-meaningful-use-audits/

PPM Business Case Available after today s webinar: The Business Case for Patient Privacy Monitoring OCR HIPAA Audit Protocol Mapping Benefits of FairWarning Patient Privacy Monitoring CMS Meaningful Use Audit Exposure Privacy Incident Risk Estimator HIPAA Omnibus Implications FairWarning Return on Investment Available by emailing Solutions@Fairwarning.com

Questions? Additional Questions? Contact Solutions@FairWarning.com @FairWarningInc