2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents



Similar documents
2012 HIPAA Privacy and Security Audits

Lessons Learned from OCR Privacy and Security Audits

The HIPAA Audit Program

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Overview of the HIPAA Security Rule

COMPLIANCE ALERT 10-12

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Lessons Learned from HIPAA Audits

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

HIPAA Compliance: Are you prepared for the new regulatory changes?

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Healthcare Compliance Solutions

University Healthcare Physicians Compliance and Privacy Policy

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

Sustainable Compliance: A System for Ongoing Audit Readiness

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

HIPAA Compliance Guide

HIPAA and Mental Health Privacy:

HIPAA Compliance and the Protection of Patient Health Information

Bridging the HIPAA/HITECH Compliance Gap

HIPAA Security Rule Compliance

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA Compliance Guide

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

HIPAA: In Plain English

Data Breach, Electronic Health Records and Healthcare Reform

SECURITY RISK ASSESSMENT SUMMARY

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

General HIPAA Implementation FAQ

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA Security Alert

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

New HIPAA regulations require action. Are you in compliance?

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

OCR HIPAA Audits. Disclaimer. Message. I am here for your benefit. If you have questions, please ask. 1. Background 2. The Audit 3.

Health Informa.on Technology Audits: "Meaningful Use" and HIPAA. January 23, 2015 Eli Poliakoff Gary Capps

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Business Associate Management Methodology

The Impact of HIPAA and HITECH

What Virginia s Free Clinics Need to Know About HIPAA and HITECH

Health Information Privacy Refresher Training. March 2013

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

Use & Disclosure of Protected Health Information by Business Associates

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Our Commitment to Information Security

Security Is Everyone s Concern:

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA COMPLIANCE PLAN FOR 2013

HIPAA PRIVACY AND SECURITY AWARENESS

Business Associates and HIPAA

2016 OCR AUDIT E-BOOK

HIPAA and HITECH Compliance for Cloud Applications

The Basics of HIPAA Privacy and Security and HITECH

Dissecting New HIPAA Rules and What Compliance Means For You

HIPAA: AN OVERVIEW September 2013

Transcription:

2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR) HIPAA audit program 6 Meaningful Use Requirements 13 None Compliance Risks and Next Steps 14 Contact information 17 1 1

Background The American Recovery and Reinvestment Act HITECH Act 13411(2009): Requires Health & Human Services (HHS) to provide for periodic audits to ensure that covered entities and business associates comply with HIPAA Privacy and Security Rules and Breach Notification standards. HHS Office of Civil Rights (OCR) awards two audit contracts (2011) $180,000 contract with Booz Allen Hamilton Identify audit candidates Provide background and recommendations for audit program $9.2 million contract with KPMG Develop an audit protocol Assess compliance with HIPAA privacy and security regulations Conduct pilot audit program for up to 150 audits of covered entities. Business Associates in subsequent years Identification is based upon Unique Identifiers for Covered Entities 2 Regulatory Background - Five Key Areas of Privacy Standards Boundaries Safeguards Consumer Control Accountability Public Responsibility Information used only for intended purpose and only as much information as required for the intended purpose Consumer use and disclosure statement Administrative, technical, and physical mechanisms to keep information private, confidential and secure within internal operating systems and external communications Informed consent to use information Right to access and amend information Authorization for disclosures Record of disclosures Federal penalties for violations Effective compliance activities to deter, identify, and punish violations Process for disclosing information for public health, research & legal purposes Frequently Asked Questions (FAQs) What information is covered by the final rule? The final rule covers all Individually Identifiable Health Information (IIHI) regardless of media (electronic, written or oral). 3 2

Regulatory Background - Security Rule Standards Administrative Procedures Physical Safeguards Technical Standards and Mechanisms (Data at rest & data in transit) Security Management Process Assigned Security Responsibility Workforce Security Information Access Management Security Awareness and Training Security Incident Procedures Contingency Plan Evaluation Business Associate Contracts and Other Arrangements Facility Access Controls Disaster recovery Emergency Mode Equipment transfers Facility security plan Access Authorization process (physical access) Maintenance records Need to know access Sign in and escort visitors Testing and revision Workstation Use Workstation Security Device and Media controls over hardware and software Access and Authorization controls Context based, role based, or user based Encryption Audit controls (suspect access attempts) Integrity Data authentication Personal and Entity Authentication Unique User ID Authentication Technique PIN Token Biometric Call Back Automatic Logoff Transmission Controls Access Controls Audit Trail Encryption 4 HITECH Act Impact HITECH Act (Subcomponent of American Recovery and Reinvestment Act) of 2009 Though outside of HIPAA title II, this is additional & direct legislation to improve the original HIPAA title II requirements and to define and tighten some open gaps Establishes Breach requirement for Privacy Rule Violation Effective date was September 23, 2009 Establishes Scope and Timeline Clarifies definition of Breach Likelihood of harm must be determines/assessed Establishes New Penalty Levels Uncorrected willful neglect $1.5 million to Unknowing $25K Establishes compliance requirements for all PHI and PHR, whether included in a BA agreement or not. Enforcement Broadened to include State A.G. s and Local Law enforcement 5 3

HITECH Oversight & DHHS Activities Enforcement responsibility has been delegated to the Office of Civil (OCR) rights for both Privacy (as of April 13, 2003) and Security (as of July 27, 2009) HITECH mandates the creation of a pilot program to assess compliance of Covered Entities with HIPAA. Plans by OCR are to conduct up to 150 assessments a year with external service providers and a newly formed examination group. States have been additionally involved in privacy exposures and have levied fines in addition to federal guidelines, mostly leveraging State PII laws with HIPAA Title II requirements. DHHS s OIG office reviewed 7 hospitals, independent of CMS and OCR for compliance with HIPAA s regulations and found 154 findings with compliance. OIG also sighted OCR for lack of enforcement and compliance activities, which led to Congress s mandate in the HITECH Act and OCR s recent Penalty activity. 6 OCR HIPAA audit program OCR HIPAA Pilot Audits Initial Test Audits Audit protocol developed to assess compliance with the HIPAA Privacy & Security Rules will be tested on the first 20 covered entities selected Selection period began September 2011 Entities were notified during November December 2011 Site visits scheduled for January 2012 Audit protocol will be reviewed and refined for remaining pilot audits Audit protocol will be made public after the completion of the first 20 pilot audits Remainder of the Audits Selection period potentially scheduled for 1 st Qtr 2012 Auditee notification period likely in late 1 st Qtr or early 2 nd Qtr 2012 7 4

OCR HIPAA audit program (continued) OCR HIPAA Audit Objective & Scope Program Objective Examine mechanisms for compliance Identify best practices Discover risks and vulnerabilities Encourage renewed attention to compliance activities Initial Test Audits Protocol provide assessment Policies Practices Operations 8 OCR HIPAA audit pilot program OCR selected 20 Covered Entities to audit for the initial pilot phase The pool of covered entities include: Health plans of all sizes Health care clearinghouses Individual and organizational providers Business Associates will not be included in pilot phase Selection Criteria include: Public versus Private Entity s size Geographic location Type of entity and relationship to patient care Affiliation with other health care organization 9 5

OCR HIPAA audit pilot program (continued) First 20 Covered Entities grouped into 4 categories Level 1 Entities Large Provider/Payer Extensive use of HIT complicated HIT enabled clinical/business work streams Revenues and or assets greater than $1 billion Level 2 Entities Large regional hospital system (3 10 hospitals/region)/regional Insurance Company Paper and HIT enabled work flows Revenues and or assets between $300 million and $1 billion Level 3 Entities Community hospitals, outpatient surgery, regional pharmacy/all Self-Insured entities that don t adjudicate their claims Some but not extensive use of HIT mostly paper based workflows Revenues between $50 Million and $300 million Level 4 Entities Small Providers (10 to 50 Provider Practices, Community or rural pharmacy) Little to no use of HIT almost exclusively paper based workflows Revenues less than $50 million 10 Overview of HIPAA Audit Project 2011 2012 July Aug Sept Oct Nov Dec Jan Feb Apr May Dec. Initial Protocol Development Auditee Selection Test of Initial 20 Audits Auditee Notification Test of Protocol Period of Review/ Adjustment of Protocols Audit Execution Remaining Audits 11 6

Audit Timeline 12 Meaningful use: Core set 15 requirements Objective: Protect electronic health information created or maintained by the certified ehr technology through the implementation of appropriate technical capabilities. Measure: Conduct or review a security risk and implement updates as necessary and correct identified security deficiencies as part of the Eligible Provider s, Eligible Hospital s, or Critical Access Hospital s risk management process per HIPAA Security Rule 45 CFR 164.308(a)(1) Perform HIPAA Security Risk Assessment for 3 sets Controls: Application Layer: Infrastructure Layer: Enterprise Controls: Evidence of Compliance with Security Rule: Design evidence Operational evidence 13 7

Non-Compliance Risks Loss of Contracts Criminal and Civil investigation Federal and State fines Public Harm and Reputational Risk Fines and Penalties Legal Costs Cost of Notification 14 Next Steps to Consider Conduct a robust Assessment with an Annual or Bi-Annual reassessment for compliance Determine Lines of Business affected by HIPAA Consider internal employee information in evaluation Map/Flow PHI movement within your organization, as well as flows to/from third parties Perform Data discovery to find all of your PHI Establish effective technical safeguards over PHI (encryption, access management, restriction for required use only) 15 8

Next Steps to Consider Increase your Monitoring program, establish an effective ERM program as well as GRC services Leverage GRC to do exception reporting on incidence, security protection and access monitoring Don t forget your third party vendors in assessment Establish an incident response team Train affected employees annually 16 Conclusions & Final Thoughts Plan ahead for impact of HIPAA across the organization Determine possible common responsibilities and oversight of IT, Information Security, and Internal Audit Assess overlap between controls oversight and management Determine control and safeguard catalogue for HIPAA prior to remediation know what you re going after Engage impacted departments (IT, HR, Business, IA) early in the planning Assess your ability to combine HIPAA compliance activities with other compliance activities like PCI, (Unified Compliance), to increase the effectiveness & efficiency of your compliance programs 17 9

Mark M. Johnson mmjohnson@kpmg.com 2012 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. 38075WDC The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International. 10