How to prepare your organization for an OCR HIPAA audit



Similar documents
HIPAA Audits Are Here!

Overview of the HIPAA Security Rule

Preparing for HIPAA and Meaningful Use Compliance Audits

Interpreting the HIPAA Audit Protocol for Health Lawyers

Lessons Learned from OCR Privacy and Security Audits

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

The HIPAA Audit Program

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

2016 OCR AUDIT E-BOOK

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Creating Stable Security & Compliance Relationships

Can Your Diocese Afford to Fail a HIPAA Audit?

HIPAA Privacy, Security and Breach Notification Audits

Lessons Learned from HIPAA Audits

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

2012 HIPAA Privacy and Security Audits

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

Sustainable HIPAA Compliance: Protecting Patient Privacy through Highly Leveraged Investments

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

VMware vcloud Air HIPAA Matrix

HIPAA and Mental Health Privacy:

Preparing for and Responding to an OCR HIPAA Audit

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

HIPAA Compliance: Are you prepared for the new regulatory changes?

What do you need to know?

SECURITY RISK ASSESSMENT SUMMARY

Developing HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

HIPAA Audits: Preparing for Phase 2 Audits for Covered Entities and Business Associates

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

HIPAA Audits For Covered Entities and Business Associates

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Logging and Auditing in a Healthcare Environment

Use & Disclosure of Protected Health Information by Business Associates

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Security Is Everyone s Concern:

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

BUSINESS ASSOCIATE AGREEMENT. Recitals

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Security Rule Compliance

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

The Impact of HIPAA and HITECH

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA: Compliance Essentials

Sustainable Compliance: A System for Ongoing Audit Readiness

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

HIPAA 101. March 18, 2015 Webinar

It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing?

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Risk Assessments for Physician Practices

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Are You Prepared for an OCR HIPAA Audit or Investigation? February 15, 2012 ID Experts Webinar

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Cybersecurity in the Health Care Sector: HIPAA Responsibilities from a Legal and Compliance Perspective

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Security Considerations for the Cloud

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Intelligent Vendor Risk Management

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell. Topics Covered Part One. Topics Covered Part Two.

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

Why Lawyers? Why Now?

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

HIPAA Workshop Ensuring PHI: Creating a Comprehensive Office Policy

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Healthcare Compliance Solutions

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

University Healthcare Physicians Compliance and Privacy Policy

An Independent Member of Baker Tilly International

Isaac Willett April 5, 2011

BUSINESS ASSOCIATE AGREEMENT

Add a section in the back of your HIPAA Privacy Manual and HIPAA Security Manual.

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA Changes Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

Transcription:

How to prepare your organization for an OCR HIPAA audit Presented By: Mac McMillan, FHIMSS, CISM CEO, CynergisTek, Inc. Technical Assistance: 978-674-8121 or Amanda.Howell@iatric.com Audio Options: Telephone 1-562-247-8321 l Access Code 366-675-060 Computer Microphone and Speakers This teleconference will be muted while we wait for all attendees to join. Thank you for your patience.

Webinar Guidelines Technical Assistance Amanda.Howell@iatric.com 978-674-8121 Participation Select preferred Audio Mode Submit text questions Recorded session Survey Please take the short survey at the conclusion of the webinar

How to Prepare for an OCR HIPAA Audit Presented by: Mac McMillan CEO, CynergisTek CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek

Today s Presenter Co- founder & CEO CynergisTek, Inc. Chair, HIMSS P&S Policy Task Force CHIME, AEHIS Advisory Board Healthcare Most Wired Advisory Board HCPro Editorial Advisory Board HealthInfoSecurity.com Editorial Advisory Board Top 10 Influencers in Health IT 2013 Top 50 Leaders in Health IT 2015 Director of Security, DoD Excellence in Government Fellow US Marine Intelligence Officer, Retired Mac McMillan FHIMSS, CISM CEO, CynergisTek, Inc. CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 4

Agenda Introduction OCR HIPAA Audit Program OCR HIPAA Desk Audits OCR HIPAA Compliance Performance Audits Creating An OCR Audit Toolkit Questions CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 5

OCR HIPAA Audit Program CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 6

HIPAA/HITECH Audits HITECH Act Sec. 13411 Periodic audits to ensure covered entities and business associates comply with requirements of HIPAA and HITECH Examine mechanisms for compliance Identify best practices Discover risks and vulnerabilities that may not have come to light through complaint investigations and compliance reviews Renew attention of covered entities to health information privacy and security compliance activities CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 7

Audit Selection Criteria Size and Use of HIT Geographic Location Criteria Used in Pool of CEs Affiliations with Other CEs Type of Entity CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 8

Overview of 2012 HIPAA/HITECH Audits On- site audits of 115 covered entities 61 providers, 47 health plans, 7 clearinghouses No findings or observations for 13 entities (11%) 2 providers, 9 health plans, 2 clearinghouses Total 979 audit findings and observations 293 Privacy 592 Security 94 Breach Notification Percentage of Security Rule findings and observations was double what would have been expected based on protocol Smaller entities struggle with all three areas CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 9

Privacy Rule Findings 50% 45% 44% 40% 35% 30% 25% 20% 15% 20% 16% 18% 10% 5% 2% 0% Notice of Privacy Practices Restriction Requests & Alternative Communications Individual Right of Access Administrative Standards Uses and Disclosures of PHI CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 10

Security Rule Findings 20% 18% 18% 16% 14% 12% 12% 14% 14% 14% 10% 9% 8% 6% 4% 2% 0% Risk Analysis Access Management Security Incident Procedures Contingency Planning Audit Controls and Monitoring Movement and Destruction of Media CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 11

OCR Desk Audit Program CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek

OCR s Permanent Audit Program Permanent audit program includes desk audits and comprehensive, onsite audits ~200 Covered Entities to be selected for desk audits Equal number or less BAs selected for desk audits Greater number of on- site (comprehensive) audits, but no specific number given yet Updating audit protocol Audits will be performed by HHS contractors but program to be managed by OCR personnel CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 13

The Desk Audit Process Pre- Audit Survey Notification and data request to selected entities Desk review and draft findings to entity Entity provides management review Final Report CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 14

Scope of OCR Desk Audits 2015 Desk Audits of Covered Entities Security Risk Analysis and risk management Breach Content and timeliness of breach notifications Privacy Notice of Privacy Practices and Access 2015 Desk Audits of Business Associates Security Risk Analysis and risk management Breach Breach reporting to Covered Entities 2016 On- site Comprehensive Audits Covered Entities Business Associates CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 15

Comprehensive Audit Process Notice & Document Request On- Site Activity Draft Report Review & Respond Final Report CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 16

Scope of OCR Onsite Audits Security Device and media controls Transmission security Encryption of data at rest Facility access controls Privacy Administrative and physical safeguards Workforce training to HIPAA policies & procedures Other Areas High risk areas identified through: 2015 audits Breach reports submitted to OCR Consumer complaints CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 17

OCR Performance Audit CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 18

On- site Audits are Performance Audits Conducted in accordance with Generally Accepted Government Audit Standards (GAGAS) Provides findings, observations, or conclusions from evaluation of evidence against established criteria Objective assessment of variety of attributes Program effectiveness, economy, and efficiency Internal controls Compliance CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 19

Audit Process CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 20

Planning the Audit Send notification letter to the covered entity Information request list Entity survey Make initial telephone contact with Covered Entity Confirm notification letter receipt Respond to questions and concerns Confirm due date for documentation requests CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 21

Documentation Request CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 22

Preparation Work Conduct kick- off call Confirm Covered Entity type (e.g. provider, health plan), applicable scope, audit location(s) Discuss on- site visit and logistics Perform analysis of documentation provided by CE What documents have been received and which are missing Review documentation for compliance with appropriate regulatory standard or specification CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 23

On- Site Field Work Conduct entrance conference Discuss performance audit scope, objective and approach Set expectations Execute and document applicable audit procedures Complete on- site testing Conduct interviews Review documentation Observe appropriate facilities and workstations Conduct exit conference Preliminary identification of compliance issues CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 24

Post Field Work Document results of the audit Finalize draft identified findings Issue draft performance report to CE for comment and correction Issue final performance audit report that includes CE comments and response CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 25

Sample Audit Protocol - Provider Breach Notification Assessment for breach Notification to individuals Notification to Secretary Notification to media Privacy Notice of Privacy Practices Request Restrictions Right to Access Administrative Requirements Amendment Uses & Disclosures Accounting of Disclosures Security Administrative Safeguards Physical Safeguards Technical Safeguards CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 26

HIPAA Security Risk Assessment Required element for Security Rule and Meaningful Use An assessment of threats and vulnerabilities to information systems that handle e- PHI This provides the starting point for determining what is appropriate and reasonable Organizations determine their own technology and administrative choices to mitigate their risks The risk analysis process should be ongoing and repeated as needed when the organization experiences changes in technology or operating environment CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 27

Performing a Risk Analysis Gather Information Prepare inventory lists of information assets- data, hardware and software. Determine potential threats to information assets. Identify organizational and information system vulnerabilities. Document existing security controls and processes. Develop plans for targeted security controls. Analyze Information Evaluate and measure risks associated with information assets. Rank information assets based on asset criticality and business value. Develop and analyze multiple potential threat scenarios. Develop Remedial Plans Prioritize potential threats based on importance and criticality. Develop remedial plans to combat potential threat scenarios. Repeat risk analysis to evaluate success of remediation and when there are changes in technology or operating environment. CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 28

Creating an OCR Audit Toolkit CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 29

Building an Audit Tool Kit Prepare a plan to perform mock audits Replicate what documentation would be required under audit conditions and the timelines for production Use OCR s 2012 Pilot Audit Protocol http://www.hhs.gov/ocr/privacy/hipaa/enforcement /audit/protocol.html Update the 2012 audit protocol for changes in the HIPAA Privacy, Security and Breach Notification Rules CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 30

Using the HIPAA Pilot Audit Protocol Established Performance Criteria Key Activity Audit Procedures Implementation Specification Who Responsible? Standard or implementation specification to be measured. Plain language action to meet requirement. Review policies and procedures and interview appropriate staff or contractors responsible for carrying out activity to meet standard or specification. Some Security Rule Implementation Specifications provide flexibility through designating the requirement to be Addressable. Representative Suggestions: Every org is different. Sometimes responsibilities for compliance activities are shared. CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 31

Example: Opportunity to Object Established Performance Criteria Uses/disclosures requiring opportunity for the individual to agree or to object. A health care provider must inform individual of the PHI that it may include in a directory and to whom it may disclose such information & provide the individual with the opportunity to restrict or prohibit the uses or disclosures. Key Activity Audit Procedures Who Responsible? Opportunity to Object to Use or Disclosure Inquire of management as to whether objections by individuals to restrict or prohibit some or all of the uses or disclosures are obtained and maintained. Obtain and review Notice of Privacy Practices and evaluate the content in relation to the specified criteria for evidence of opportunity to object. Obtain evidence that staff have been trained to properly carry out this standard. Privacy Officer HIM Leader Compliance Officer CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 32

Example: HIPAA Privacy Training Established Performance Criteria A covered entity must train all members of its workforce on the policies and procedures with respect to PHI as necessary and appropriate for the members of the workforce to carry out their functions within the covered entity. 164.530(b)(2)(i)(A) Training must be provided to each member of the covered entity's workforce. Key Activity Audit Procedures Who Responsible? Training Inquire of management as to whether training is provided to the entity's workforce on HIPAA Privacy Standards. Review documentation to determine if a training process is in place for HIPAA privacy standards. Review documentation to determine if a monitoring process is in place to help ensure all members of the workforce receive training on HIPAA privacy standards. Privacy Officer HR Leader Compliance Officer CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 33

Example: Security Management Process Established Performance Criteria Key Activity Audit Procedures Implementation Specification Who Responsible? 164.308(a)(1) Conduct an accurate and thorough assessment of the Conduct potential risks and Risk vulnerabilities to the Assessment CIA of PHI held by the covered entity or business associate. Inquire of management as to whether formal or informal policies or practices exist to conduct an accurate assessment of potential risks and vulnerabilities to the CIA of ephi. Required CIO, CISO, Compliance Officer CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 34

Example: Access Controls/Encryption Established Performance Criteria Key Activity Audit Procedures Implementation Specification Who Responsible? 164.312(a)(1): Access Control - 164.312(a)(2)(i v) Implement a mechanism to encrypt and decrypt electronic protected health information. Encryption and decryption Inquire of management as to whether an encryption mechanism is in place to protect ephi. Obtain & review formal or informal policies and procedures and evaluate the content relative to the specified criteria Addressable CIO, CISO CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 35

Example: Notification of Breach Established Performance Criteria Notice to Individuals 164.404 (a) A covered entity shall, following the discovery of a breach of unsecured protected health information, notify each individual whose unsecured protected health information has been, or is reasonably believed by the covered entity to have been, accessed, acquired, used or disclosed as a result of such breach. Key Activity Audit Procedures Who Responsible? Notification to Individual of Breach Inquire of management as to whether a process exists for notifying individuals within the required time period. Obtain and review key documents that outline the process for notifying individuals of breaches. Privacy Officer HIM Leader Compliance Officer CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 36

Iatric & CynergisTek Managed Services CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek

Components of a Mature Audit Program Policies Monitoring Analysis Develop and implement policies that meet the HIPAA Privacy, Security and Breach Notification Rule standards Determine frequency of standard, behavioral and fraud detection monitoring Proactive, comprehensive auditing and monitoring that is manageable and scalable; implement ongoing analysis Reporting Documentation to communicate program effectiveness, both internally and externally CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek

CynergisTek Offers POMS Elite Managed Privacy Monitoring Service: Elite Elite level of engagement, intense ongoing monitoring by a CynergisTek analyst and use of CynergisTek advisory services. Managed Privacy Monitoring Service: Select Ongoing monitoring and reporting by a CynergisTek analyst, use of Iatric Systems SAM solution. Select POM Privacy Optimization Module Proactive auditing and monitoring optimization plan. Focuses on establishing necessary processes for effective and efficient privacy monitoring. CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 39

Questions? Questions? Mac McMillan mac.mcmillan@cynergistek.com 512.405.8555 @mmcmillan07 CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com @CynergisTek 40

How to prepare your organization for an OCR HIPAA audit Contact Us Survey Survey: Please take the survey that will appear after you leave the webinar. You could win a $100 Amazon.com Gift Card. Follow Us: http://new.iatric.com/blog-home For more information: Please contact your Iatric Systems Account Manager Send an email to info@iatric.com Thank you for attending!