Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use



Similar documents
Meaningful Use Audits. NextGen Physician Consulting Services

HIPAA COMPLIANCE PLAN FOR 2013

Overview of the HIPAA Security Rule

HIPAA: Compliance Essentials

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

How to Use the NYeC Privacy and Security Toolkit V 1.1

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

InfoGard Healthcare Services InfoGard Laboratories Inc.

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA Compliance Review Analysis and Summary of Results

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Security Is Everyone s Concern:

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

What s New with HIPAA? Policy and Enforcement Update

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

2016 OCR AUDIT E-BOOK

Sustainable Compliance: A System for Ongoing Audit Readiness

View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

The Impact of HIPAA and HITECH

SECURITY RISK ASSESSMENT SUMMARY

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

HIPAA Security Series

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA Security Rule Compliance

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HIPAA COMPLIANCE AND

Nine Network Considerations in the New HIPAA Landscape

Security Compliance, Vendor Questions, a Word on Encryption

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

MEANINGFUL USE DESK AUDIT

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

HIPAA and HITECH Compliance for Cloud Applications

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

What is required of a compliant Risk Assessment?

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Joe Dylewski President, ATMP Solutions

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

The HIPAA Audit Program

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Compliance and the Protection of Patient Health Information

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Our Commitment to Information Security

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

HIPAA Security & Compliance

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Transcription:

Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1

Who is M-CEITA? Michigan Center for Effective Information Technology Adoption (M-CEITA) One of 62 ONC Regional Extension Centers (REC) providing education & technical assistance to primary care providers across the country Founded as part of the HITECH Act to accelerate the adoption, implementation, and effective use of electronic health records (EHR), e.g. 90-days of MU Funded by ARRA of 2009 (Stimulus Plan) Purpose: support the Triple Aim by achieving 5 overall performance goals THE TRIPLE AIM Improve patient experience Improve population health 3Reduce costs Improve Quality, Safety & Efficiency Engage Patients & Families Performance Measurement Improve Care Coordination Improve Population And Public Health Meaningful Use Ensure Privacy And Security Protections Certified Technology Infrastructure 2

M-CEITA's Performance 5,700+ providers enrolled for M-CEITA support, impacting 1.6 million patients 4,500+ providers are live on EHR 3,800+ have achieved Meaningful Use standards Latest survey shows 99% of M-CEITA customers are satisfied with services 3

M-CEITA s Services Our services are highly subsidized for qualified physicians. These Health IT services include: Meaningful Use Support Security Risk Assessment Targeted Process Optimization (Lean) Attestation/Audit Preparation 4

Security Risk Assessment 5

Risk People want to get value from the world The world can be dangerous People want to be secure from dangers How do we get security in an insecure world? 6

HIPAA Security Rule Title II Administrative Simplification Security Rule Security Standards Administrative Safeguards Physical Safeguards Technical Safeguards Organizational Requirements Policies and Procedures Documentation Requirements 7

Security Rule Requirements Security Components Example Variables Example Security Measures Physical Safeguards Facility structure Data storage center Computer hardware Building alarm system Locked doors Monitors shielded from view Administrative Safeguards Designated security officer Staff training and oversight Information security control Security Risk Assessment / review Technical Safeguards Controls on access to EHR Audit log monitoring Secure electronic exchanges Policies and Procedures Written P&P addressing HIPAA Security requirements Documentation of security measures Staff training Monthly review of user activity Policy enforcement New hire background checks Secure passwords Data backup Virus scans Encryption Written protocols on safeguards Record retention Periodic policy and procedure review Organizational Requirements Breach notification and other policies Business Associate agreements Periodic Business Associate Agreement review and updates 8

Why Complete a Security Risk Assessment? Consider three reasons to complete an SRA: Patient Safety Public Perception Compliance All good reasons, but which is the top priority for your practice? 9

Patient Safety First, do no harm. Breached medical records of over 90 million people have been reported in March, 2015 alone Average of 11.5 million identities stolen every year (this will increase in 2015) Average cost: $4,930 per household 10

Public Perception Patients want access to their information and they want it to be safe 81% of patients have concerns about privacy and security of EHR 60% of patients believe that EHR use will result in more information being lost or stolen Patients, like any consumer, vote with their feet 11

Risk is on the Rise Protected Health Information breaches expected to increase 25%* in 2014 The majority of PHI breaches now involve hacking attacks Healthcare is the leading US industry for data breaches This is despite increased awareness of the HIPAA Security Rule due to Meaningful Use programs Factors resulting in increased risk: Lax security practices in health care Increased interconnectivity Changing landscape (ACO, HIE) 12

Recent Major Breaches Anthem Premera Community Health Systems Sony Pictures Entertainment 80 million patient records March, 2015 11 million patient records March, 2015 4.5 million patient records August, 2014 47,000 unique SSN s November, 2014 13

Security Risk Assessment HIPAA Security Rule 45 CFR 164.308(a)(1) Risk Assessment Risk Management Sanction Policy Information System Activity Review Risk Assessment (or Analysis) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. 14

SRA as a Meaningful Use requirement: Core Objective Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities Measure Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process. 15

HHS Office for Civil Rights (OCR) Final Guidance Scope must include all ephi in organization Data collection and methods must be documented Identify and document anticipated threats and vulnerabilities Assess current security measures in place Establish likelihood of threat occurrence Establish potential impact of threat occurrence Determine level of risk Document complete risk analysis Periodic review and update There is no one way to do an SRA, but every method must meet these objectives 16

Risk Defined Risk is the potential (likelihood) of a negative outcome (impact) toward an asset, due to a vulnerability being exploited by a threat that would reduce the value of the asset to the organization. (NIST SP 800-30) 17

What is at risk? Confidentiality Integrity Availability 18

Vulnerabilities and Controls For valuable assets, we need access to utilize the value Systems are designed to permit access, but all have vulnerabilities Controls reduce or eliminate unauthorized access 19

Threats and Threat Sources Hostile outsiders Theft / Sabotage Malicious insider Poorly trained staff External Business Associates Internal Infrastructure failures Natural disasters Shadow IT Lax enforcement of P&P 20

Business Associates All vendors who process, store, or transmit PHI need to sign a Business Associate Agreement Disputes between vendors and providers have serious implications: Maine small clinic dispute with EHR vendor Malicious Outsider/Insider: Think Edward Snowden Getting the Business Associate Agreement in place is the first step Equally important is ongoing vendor management, including security Would your vendors pass a HIPAA audit? They might have to. 21

Encryption Addressable Specification found at CFR 45 164.312(a)(2)(iv)...but not optional! ephi must be encrypted when at rest (stored) and in transmission 22

Good Faith Effort Compliance isn t enough You can be compliant and still suffer a breach Risk can never be eliminated Reduce risk to a reasonable and appropriate level The expectation is for organizations to put forth a good faith effort 23

HIPAA Audit Program OCR has been enforcing HIPAA since 2003 OCR random audit program set to begin in 2015 Provider compliance with Security, Privacy, and Breach Rules will be audited Most common Security deficiencies from 2012-2013 pilot audits: Lack of or incomplete SRA Unaware of Security Rule requirements On-site and remote audits to be performed Covered Entities and Business Associates 24

Meaningful Use Audits vs HIPAA Audits Meaningful Use Audits Performed by Figliozzi and Co. under contract with CMS 1 / 10 MU attesting providers audited Random and based on prior audit results, if applicable Focus on timing and scope of SRA, key remediation activities (audit logs, compare previous results to current) HIPAA Audits Performed by OCR Comprehensive examination of organization s risk management program Only a few hundred random audits Most OCR investigations occur following a breach 25

Best Practices Security is an investment in your business. Your stakeholders benefit. Educate employees, managers, and ownership on security threats and protocols. Build a culture of security awareness from top to bottom. Involve everyone! Establish, refine, and enhance security policies and practices. Treat your business associates like insiders. Be confident you can trust them by getting the right information. 26

Security Risk Assessment Process Step 1: Identify and Classify Assets Step 2: Identify and Classify Threats and Vulnerabilities Step 3: Assess Current Controls Step 4: Determine Likelihood of Threat Occurrence Step 5: Analyze Impact to Organization Step 6: Determine Level of Risk Step 7: Implement Security Controls Step 8: Ongoing Risk Management Program and Recurring SRA Review All Steps: Documentation! 27

Attesting to Meaningful Use Risk assessment requirements Must take place no earlier than the start of the EHR reporting year and no later than the provider attestation date. Must assess certified EHR technology (CEHRT). Repeat for each reporting period (see: CMS FAQ #10754) Attest after you have conducted your Security Risk Assessment You do not have to correct deficiencies identified in the SRA before you attest to Meaningful Use 28

How frequently do I need to do a Risk Assessment? For practices participating in Meaningful Use, a Security Risk Assessment needs to be completed for every year of attestation. Also, after major changes or upgrades to practice, technology, or environment For HIPAA compliance, recommendation is at least annually 29

SRA Service and Tools M-CEITA Security Risk Assessment Toolkit Follows NIST guidance (800-30 & 800-66) Work on-site with practice leaders Guide through every step of SRA process Deliver analysis and recommended plan of action to improve compliance 30

Risk Assessment Tool Sample Page 31

Sample Policy Breach Notification and Reporting Customizable to your practice 32

Conclusion Security Risk Assessments required for compliance with HIPAA and Meaningful Use Risk and regulatory oversight increasing Practices are expected to take security seriously and put forth a good faith effort Required: Hard work, diligence, integrity An SRA is the first step of a continuous, comprehensive Risk Management Program that will benefit your patients and your practice 33

Resources NIST SP 800-30 NIST SP 800-39 NIST SP 800-66 ONC Guide to Privacy and Security of Health Information OCR Wall of Shame HHS Final Guidance on Risk Analysis HIPAA Administrative Simplification 34

Questions? Upcoming webinars: April 15, 2015, 12-1pm April 17, 2015 9-10am April 21, 2015 12-1pm April 23, 2015 3-4pm Managing Hypertension and Diabetes by Mastering IT ADDITIONAL CONTACT INFO: MEANINGFUL USE www.mceita.org 888-MICH-EHR mceita@altarum.org SRA Security Risk Assessment Andy Petrovich 734-302-4780 andy.petrovich@altarum.org 35