Somansa Data Security and Regulatory Compliance for Healthcare

Similar documents
Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

COMPLIANCE ALERT 10-12

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

The Impact of HIPAA and HITECH

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

HIPAA Compliance and the Protection of Patient Health Information

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Data Breach, Electronic Health Records and Healthcare Reform

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Neither You Nor Your Business Associates Can Afford to be Lax About Complying with HIPAA Requirements

OCR/HHS HIPAA/HITECH Audit Preparation

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Best Practices for DLP Implementation in Healthcare Organizations

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND

Joe Dylewski President, ATMP Solutions

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

Overview of the HIPAA Security Rule

HIPAA Security Rule Compliance

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

BENCHMARK MEDICAL LLC, BUSINESS ASSOCIATE AGREEMENT

University Healthcare Physicians Compliance and Privacy Policy

HIPAA and HITECH Compliance for Cloud Applications

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

BUSINESS ASSOCIATE AGREEMENT

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

BUSINESS ASSOCIATE AGREEMENT

My Docs Online HIPAA Compliance

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

HIPAA Violations Incur Multi-Million Dollar Penalties

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Bridging the HIPAA/HITECH Compliance Gap

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

BUSINESS ASSOCIATE AGREEMENT. Recitals

SAMPLE BUSINESS ASSOCIATE AGREEMENT

The Basics of HIPAA Privacy and Security and HITECH

Definitions: Policy: Duties and Responsibilities: The Privacy Officer will have the following responsibilities and duties:

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

HIPAA PRIVACY OVERVIEW

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Easing the Burden of Healthcare Compliance

HIPAA Business Associate Agreement

HIPAA WEBINAR HANDOUT

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

HIPAA Compliance Guide

New HIPAA regulations require action. Are you in compliance?

HIPAA Compliance Guide

Patient Privacy and HIPAA/HITECH

HIPAA Compliance: Are you prepared for the new regulatory changes?

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

MCCP Online Orientation

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Transcription:

Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances, HIPAA and HITECH Act.

CONTENTS Introduction.. 3 Healthcare Regulatory Compliance. 4 HIPAA Compliance HITECH Act Other Regulations Somansa.. 5 Data Security and Healthcare Compliance Solution

INTRODUCTION Healthcare compliance is required by law throughout the United States which regulates billing and coding compliance for treatments, risk assessment, practice ethics, referral laws, and patient rights legislation. The proper billing for services rendered needs to be accurate to ensure that problems with the government do not arise. Proper documentation and itemization of charges for treatments and services are important to provide proof of service during an audit or adjustment by integrity contractors. The compliance of healthcare providers also prevents improper treatments, lawsuits and various problems which occur between patients and insurance claims. Protection of the organization of healthcare providers can only be done by following the strict laws and regulations set for compliance. To prevent government examination and inquiries, healthcare organizations must analyze and correct all factors which could lead to such audits and adjustments. Proper compliance also leads to less conflicts with insurance claims and offers efficient processing for healthcare providers. As patient medical records are in electronic format and being transferred via email, FTP, and other electronic mediums, healthcare organizations face a host of HIPAA Security Rule compliance and HITECH Act challenges, including securing Electronic Protected Health Information (EPHI) Who is required to follow the HIPAA requirements? Healthcare providers Private sector health plans Government health plans Personal Information must be protected by Healthcare Organizations. Social Security Numbers Medical ID Numbers Credit Card Numbers Drivers License Numbers Home Address and Telephone Numbers Diseases, Medical Record Numbers

Key questions for healthcare organizations that need to secure ephi and meet requirements for HIPAA and HITECH. How do you know an ephi breach occurred? How can an ephi breach be prevented? In case of an audit, can you provide an audit trail for ephi disclosure? HIPAA Compliance HIPAA is the Health Insurance Portability and Accountability Act passed in 1996. The law regulates a number of healthcare areas, including privacy of patient information and security of information systems used by healthcare organizations under U.S. jurisdiction. Individuals and organizations regulated by HIPAA include the following parties - all healthcare providers, health plans and healthcare clearing houses. Concerning digital communications, the HIPAA's most important requirement is that healthcare organizations must implement "appropriate administrative, technical and physical safeguards to protect the privacy of patient information" Email and Electronic Communications The requirement to protect the privacy of PHI extends to electronic transmission of PHI between two parties, such as an email message or file accessible to both parties. The law requires the individuals and organizations it regulates to assess the risks of using email and to take steps to reduce or eliminate risks that using email, both internally and externally, poses. Those risks include all unauthorized interception of messages in transmission and receipt of messages by unauthorized persons. Penalties HIPAA is the first federal law of U.S. to impose criminal penalties for improper use or disclosure of PHI. Criminal violations will be investigated and prosecuted by the United States Department of Justice and Federal Bureau of Investigation and can carry a fine up to 10 years in prison and $250,000 for violating the law with malice or for profit. HHS will investigate civil violations with penalties ranging up to $25,000 a year for any given type of violation.

HITECH Act The Health Information Technology for Economic and Clinical Health Act (HITECH Act) legislation created to stimulate the adoption of electronic health records (EHR) and supporting technology in the United States. President Obama signed HITECH into law on February 17, 2009 as part of the American Recovery and Reinvestment Act of 2009 (ARRA), an economic stimulus bill. The HITECH act stipulates that, beginning in 2011, healthcare providers will be offered financial incentives for demonstrating meaningful use of electronic health records (EHR). Incentives will be offered until 2015, after which time penalties may be levied for failing to demonstrate such use. The Act also establishes grants for training centers for the personnel required to support a health IT infrastructure. Other California 1386. Effective July 2003, this regulation mandates public disclosure of computer security breaches in which confidential information of California residents may have been compromised.

Somansa Data Security and Compliance solutions to protect ephi As more corporate data and confidential information is being exchanged through the network via email, instant messenger, FTP, and stored/transferred to USB s and portable storage, the liabilities and amount of resources exhausted for healthcare institutions and providers have also increased. Confidential and sensitive information leakage, meeting compliance regulations, decreased work productivity, and legal lawsuits related to email can all lead to financial and resource loss for organizations. Somansa is an affordable data security solution designed for organizations to meet regulatory compliance in the healthcare industry such as HIPAA and HITECH while protecting sensitive company data. Somansa provides healthcare organizations with a complete data security solution that includes network and endpoint DLP features to Monitor, Protect, and Discover confidential and customer data. HOW IT WORKS Somansa Monitors, Discovers, and Prevents sensitive data in the company network

POLICY SETTINGS Based on defined policies, Somansa DLP monitors and detects sensitive healthcare and patient data in motion (Network) or at rest (Endpoint). Policies can be defined according to Sender/Receiver, IP Address, Protocols, Keywords- Patterns related to specific industries or Compliances including: Social Security Numbers Credit Card Numbers Medical Record Numbers ABA Bank Routing Numbers Monitor and Prevent Data Leakage through Network Protocols, Email, Webmail, FTP, Network Share and Removable Storage, USB, ipods, and Printing. Discover on endpoints by scanning and locating confidential data on desktops and laptops based on pre-defined and customizable detection methods and polices. PROTOCOLS Somansa supports more messaging protocols than any other product

DATABASE AUDIT & PROTECTION (DAP) Plus, Data Masking

REPORTING Somansa provides status user/event reports as well as audit trails About Somansa Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements. Using its advanced packet and protocol analysis technology, Somansa provides a total security solution to Monitor, Protect, and Discover sensitive company data in motion and at rest including network protocols, email, IM, FTP, endpoints such as USB and database activity to meet regulatory compliance requirements while protecting valuable company information. www.somansatech.com For more information please contact: Tel: (408) 701-1302 Email: info@somansatech.com