Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information



Similar documents
HIPAA Security Rule Compliance

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

HIPAA: AN OVERVIEW September 2013

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Compliance Calendar

HIPAA in an Omnibus World. Presented by

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

Presented by Jack Kolk President ACR 2 Solutions, Inc.

ELECTRONIC HEALTH RECORDS

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Overview of the HIPAA Security Rule

Data Breach, Electronic Health Records and Healthcare Reform

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

New HIPAA regulations require action. Are you in compliance?

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

BUSINESS ASSOCIATE AGREEMENT. Recitals

Bridging the HIPAA/HITECH Compliance Gap

Legislative & Regulatory Information

Dissecting New HIPAA Rules and What Compliance Means For You

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

University Healthcare Physicians Compliance and Privacy Policy

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

COMPLIANCE ALERT 10-12

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Summit. March 10, Phyllis A. Patrick, MBA, FACHE, CHC Phyllis A. Patrick & Associates LLC

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

ACKNOWLEDGMENT OF RECEIPT OF NOTICE OF PRIVACY PRACTICES

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

THE STATE OF HEALTHCARE COMPLIANCE: Keeping up with HIPAA, Advancements in EHR & Additional Regulations

My Docs Online HIPAA Compliance

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA The Law Explained. Click here to view the HIPAA information.

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell. Topics Covered Part One. Topics Covered Part Two.

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Business Associate Management Methodology

How to Use the NYeC Privacy and Security Toolkit V 1.1

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

AMWELL SERVICE PROVIDER SUBSCRIPTION AGREEMENT

Somansa Data Security and Regulatory Compliance for Healthcare

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

Easing the Burden of Healthcare Compliance

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

The Basics of HIPAA Privacy and Security and HITECH

HIPAA Compliance Guide

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

How To Write A Community Based Care Coordination Program Agreement

Business Associates, HITECH & the Omnibus HIPAA Final Rule

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

The HIPAA Audit Program

HIPAA Enforcement Training for State Attorneys General

Sample Business Associate Agreement Provisions

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION

HIPAA and Mental Health Privacy:

Transcription:

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how they relate to one another, and how they impact meaningful use and data analytics.

To understand the impact Meaningful Use has on privacy and security, one must first understand HIPAA, the Health Insurance Portability and Accountability Act of 1996. HIPAA serves to ensure health insurance portability, establish standards for electronic claims and national identifiers, protect against fraud and abuse, and assure the privacy and security of protected health information (PHI). Title II of HIPAA contains the Privacy and Security Rules. The Privacy Rule was established to assure the protection of health information, and focuses on patient rights to access and control of their information, restoring trust in the healthcare system to improve the quality of care, and improve the

efficiency and effectiveness of healthcare delivery.

The Security Rule specifies procedures to protect the confidentiality, integrity, and availability of electronic PHI, or e-phi. It identifies administrative safeguards to manage the activities needed to establish security measures, physical safeguards, to identify measures to protect information systems, buildings, and equipment from natural and environmental hazards, technical safeguards, to protect ephi and control access to it, and organizational safeguards so that arrangements are made to protect ephi between organizations.

When HITECH was enacted to promote the adoption and meaningful use of health information technology, it established more detailed provisions and strengthened the requirements included in the HIPAA Privacy and Security Rules by establishing mandatory breach reporting requirements and several tiers of penalties for breaches, establishing new enforcement responsibilities, new privacy requirements such as new accounting requirements for the EHR, and extending requirements to the business associates of covered entities. In response, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published the final omnibus rules in January of 2013 to address many of the HITECH requirements. The rule is officially titled Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rule Under the Health Information Technology for Economic and Clinical Health Act, and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rule, but is often referred to as the HITECH- HIPAA Omnibus Privacy Act. The HITECH-HIPAA Omnibus Privacy Act strengthens the privacy and security of patient health information, modifies the breach notification rule, strengthens privacy protections for genetic information by prohibiting health plans for using or disclosing such information for underwriting, makes business associates of HIPAA covered entities liable for compliance, strengthens limitations on the use and disclosure of PHI for marketing and fundraising, and allows patients increased restriction rights. The new requirements took effect on March 26, 2013, and the compliance

date for HIPAA-covered entities and business associates was September 23, 2013. It is important to note that this omnibus rule does not address all of the HITECH privacy requirements. For example, the requirement for accounting of disclosure, which would require facilities to track every access of health information, is not included. The OCR indicates that this will be released at a later date.

The HIPAA privacy and security requirements are embedded in the EHR Incentive Programs through the following stage 1 meaningful use requirements. Eligible professional core objective and measure 12 requires that patients are provided with an electronic copy of their health information upon request, and more than 50% of patients who make such requests should receive it within 3 business days. This corresponds with the HIPAA requirement that patients have the right to view and obtain a copy of their health information.

Eligible professional core objective and measure 15, and eligible hospital and critical access hospital core objective and measure 14 both require that appropriate technical capabilities are in place to protect health information, and is measured by conducting or reviewing a security risk analysis and implementing security updates. This corresponds with the HIPAA requirement that policies and procedures are in place to prevent, detect, contain and correct security violations. These meaningful use requirements are not intended to supersede or substitute for HIPAA compliance. Covered entities are still required to comply with the HIPAA Privacy and Security Rules.

Data analytics in healthcare is essential for quality care, effective and efficient processes, and decision making. With big data on the rise, and patient health information residing in multiple locations in multiple formats, maintaining the privacy and security of this sensitive, confidential data is complicated. With the HITECH-HIPAA Omnibus Privacy Act strengthening privacy and security requirements, keeping data secure remains a priority. Organizations analyzing PHI should consider the role of the patient in their data analytics process, and how they might be empowered to share their

data for a cause or a process they support. It is also important to be aware of the de-identification standard in the HIPAA Privacy Rule which indicates the requirements for anonymizing health data for analysis. Organizations should have a data classification policy in place to inventory their data and how that data is handled, and become familiar with the U.S. Federal Trade Commission s Fair Information Practice Principles (FIPPs) as a guide when working with large quantities of patient data.