HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com



Similar documents
HIPAA and HITECH Compliance for Cloud Applications

Preparing for HIPAA and Meaningful Use Compliance Audits

Checklist and Related Guidance for Meaningful Use Audits

Health Informa.on Technology Audits: "Meaningful Use" and HIPAA. January 23, 2015 Eli Poliakoff Gary Capps

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

EHR Incentive Programs Supporting Documentation For Audits Last Updated: February 2013

Stage 2 EHR Incentive Programs Supporting Documentation For Audits Last Updated: February 2014

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

Data Breach and Senior Living Communities May 29, 2015

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA COMPLIANCE PLAN FOR 2013

Data Breach, Electronic Health Records and Healthcare Reform

Meaningful Use Audits. NextGen Physician Consulting Services

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

Security Is Everyone s Concern:

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Interpreting the HIPAA Audit Protocol for Health Lawyers

Overview of the HIPAA Security Rule

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

How To Protect Your Health Care From Being Stolen From Your Computer Or Cell Phone

University Healthcare Physicians Compliance and Privacy Policy

Meaningful Use and Security Risk Analysis

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

HIPAA Security Risk Analysis for Meaningful Use

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

What do you need to know?

The benefits you need... from the name you know and trust

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

How to prepare for an EHR incentive audit

The Medicare and Medicaid EHR incentive

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July Tex Med. 2012;108(7):33-37.

Why Lawyers? Why Now?

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Navigating a Meaningful Use Audit: Are You Ready? Brian Flood

HIPAA Security Overview of the Regulations

Business Associates and HIPAA

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Guided HIPAA Compliance

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

SAMPLE BUSINESS ASSOCIATE AGREEMENT

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

Preparing for and Responding to an OCR HIPAA Audit

How to Leverage HIPAA for Meaningful Use

Developing HIPAA Security Compliance. Trish Lugtu CPHIMS, CHP, CHSS Health IT Consultant

What s New with HIPAA? Policy and Enforcement Update

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Can Your Diocese Afford to Fail a HIPAA Audit?

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Ready or Not: OCR s Second Round of HIPAA Audits Are Just Around the Corner

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

The Impact of HIPAA and HITECH

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Business Associates, HITECH & the Omnibus HIPAA Final Rule

HIPAA Overview. Darren Skyles, Partner McGinnis Lochridge. Darren S. Skyles

PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

Community Health Center Association of Connecticut Meaningful Use: Audit Preparedness And Other Challenges February 12, 2015

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Meaningful Use Stages 1 and 2 and How to Survive a Meaningful Use Audit. Charles Jarvis, Senior Manager

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

How To Defend An Ehr Subsidy

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Am I a Business Associate?

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits

HIPAA Risk Assessments for Physician Practices

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

OCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013

Cybersecurity in the Health Care Sector: HIPAA Responsibilities from a Legal and Compliance Perspective

Audit Alert: Are You Prepared? You Have A Good Chance of Being Selected

A s a covered entity or business associate, you have

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

Key HIPAA HITECH Changes. Gina Kastel, Partner, Health and Life Sciences

STANDARD ADMINISTRATIVE PROCEDURE

Network Security & Privacy Landscape

HIPAA Audits Are Here!

Meaningful Use Audit Red Flags: Pay Careful Attention To The Security Risk Analysis - Or Else

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

HIPAA - Breaking News!

Surviving a HIPAA Audit: What you need to know NOW So you can cope THEN. Jonathan Krasner

IAPP Practical Privacy Series. Data Breach Hypothetical

Sustainable HIPAA Compliance: Protecting Patient Privacy through Highly Leveraged Investments

Transcription:

HIT Audit Workshop Jeffrey W. Short jshort@hallrender.com 1

Audits and Investigations to be Discussed Meaningful Use Audits HIPAA Audits Data Breach Investigations Software Vendor Audits FTC Investigations 2

Meaningful Use Audits 3

Meaningful Use Audits Medicare & Medicaid Meaningful Use Incentive Payment Program provide financial incentives to qualifying practitioners and hospitals to use Certified Electronic Health Record Technology. Eligible providers must satisfy measures and objectives in Stages (1-3) to receive an incentive payment. Eligible Providers who attest for an incentive payment may be audited. Pre-Payment/Post-Payment Audits Audits will be conducted by: Designated State Contractor (Medicaid) Figliozzi and Company (Medicare & Dual-Eligible)

Meaningful Use Audits What do Auditors Look For: An audit may include a review of any of the documentation needed to support the information that was entered in the attestation. Red Flags: Incomplete EHR Mismatched Denominator & Numerator Misaligned reporting periods Failure to conduct a HIPAA Risk Analysis

Meaningful Use Audits Risks for an Audit Failure: Repayment of Meaningful Use Incentive Payment. Payment Adjustment for Medicare Meaningful Use Eligible Providers: Eligible Professionals: 1%-5% reduction in Medicare physician fees schedule. Eligible Hospitals: reduction in the percentage increase to the IPPS payment rate. Critical Access Hospital: reduction in reimbursement to cost report. Possible Legal Risks: False Claims Act HIPAA investigation & Penalty

Audit Preparation Meaningful Use Audits Build a Meaningful Use Compliance Team Audit preparation begins before the applicable reporting period. Eligible providers should retain documentation to support: 1. Attestation data for all objectives and clinical quality measures; and 2. payment calculations, such as cost report data, that follows applicable documentation retention processes. Eligible provider should be able to provide documentation to support each measure to which he or she attested, including any exclusions claimed.

Meaningful Use Objectives Clinical Decision Support Rule Generate Lists of Patients by Specific Conditions Meaningful Use Audits Audit Validation Functionality is available, enabled, and active in the system for the duration of the EHR reporting period. One report listing patients of the provider with a specific condition. Suggested Documentation One or more screenshots from the certified EHR system that are dated during the EHR reporting period selected for attestation. Report with a specific condition that is from the certified EHR system and is dated during the EHR reporting period selected for attestation. Patient identifiable information may be masked/blurred before submission.

Meaningful Use Objectives Electronic Exchange of Clinical Information Meaningful Use Audits Audit Validation One test of certified EHR technology s capacity to electronically exchange key clinical information to another provider of care with a distinct certified EHR or other system capable of receiving the information was performed during the EHR reporting period. Suggested Documentation Dated screenshots from the EHR system that document a test exchange of key clinical information (successful or unsuccessful) with another provider of care during the reporting period. A dated record of successful or unsuccessful electronic transmission (e.g., email, screenshot from another system, etc.). A letter or email from the receiving provider confirming a successful exchange, including specific information such as the date of the exchange, name of providers, and whether the test was successful.

HIPAA Audits 10

Audit Requirement The HITECH Act requires HHS to conduct periodic audits to ensure HIPAA compliance by covered entities and business associates. The Office for Civil Rights (OCR) piloted a program in 2012 where it performed 115 audits of covered entities. OCR plans to start the audit program back up in 2015, utilizing a combination of desk and field audits. The 2015 version of the audit program will involve both covered entities and business associates. OCR will identify covered entity audit subjects through a survey that will be sent out in late 2014, and will identify business associate audit subjects based on lists provided by covered entities.

Audit Program Objectives The purposes of the Audit Program include: assessing the current level of HIPAA compliance at covered entities and business associates Examining mechanisms of HIPAA compliance Identifying best practices to share with other covered entities and business associates Identifying risks, weaknesses, and vulnerabilities for appropriate corrective action OCR may initiate an enforcement action if an audit reveals serious compliance issues.

Audit Risks/Concerns Could expose HIPAA compliance issues to OCR that otherwise wouldn t be known to OCR Could expose patterns or trends of non-compliance Cooperation with audits will require substantial time and resources. Inability to respond to audit requests in a timely manner could demonstrate organization s lack of preparedness to effectively coordinate and communicate HIPAA matters.

How to Prepare for an Audit Ready your personnel Subject matter experts Which individuals can speak to each aspect of HIPAA implementation? Who handles access requests? Who monitors system activity? Who is responsible for business associate contracts? Who handles privacy complaints? All levels of workforce HIPAA Awareness and Practices

How to Prepare for an Audit Mock Audit Conduct a HIPAA audit based on the OCR audit protocol. Consider protecting under the attorney-client privilege Risk Analysis If an entity has not assessed HIPAA compliance and conducted an IT security risk analysis in the last 12 months, it should do so now. Failure to conduct and document a security risk analysis was a common finding in the pilot audits. Incident Response Conduct a trial run of the organization s Incident Response Plan and make any adjustments needed.

Training How to Prepare for an Audit Employee training should be consistent and current. Employee training should be documented. Business Associates HITECH-compliant Business Associate Agreements should be in place with all vendors that access PHI while performing services on covered entity s behalf. Timely Response Ensure that the necessary people will receive OCR s notice of intent to audit in a timely fashion. Prepare for absences and vacations of key people.

Data Breach Audits 17

HIPAA Breach Notification Rule Covered Entities are required to give notice to individuals, HHS, and in some cases the media when there is a breach: An acquisition, access, use, or disclosure not permitted by the HIPAA Privacy Rule of personal health information ( PHI ) That is unsecured No exception applies, and It compromises security or privacy per risk assessment Business Associate must give notice of breach to Covered Entity Covered Entity or Business Associate must rebut presumption of breach and document the risk assessment

Data Involved in Breach Critical Data Demographic Information Social Security Number Drivers License Number Birth Date Protected Health Information Clinical Information Diagnosis Procedure Codes Sensitive PHI Threat Actions Malware Hacking Social Misuse Physical Error Environmental

Next Steps Activate data breach response team and confirm leader Devise an investigation plan Determine applicable state and federal law requirements Submit notice of claim to insurance agency Engage outside resources as needed for forensics, legal call center, breach notification mailing and credit monitoring services Prepare breach notification letters to individuals Prepare press release and website posting Submit breach report to Office for Civil Rights and state agency Create or review call center scripts Train internal staff and external call center staff as needed

Tasks for Legal Counsel Determine the breach notifications laws that are applicable in the jurisdictions in which the client operates Review the entity s breach notification policy in conjunction with these applicable laws and regulations, making changes as appropriate Be conscious of documents and communications that are subject to attorney-client privilege and those that are not Advise on application of breach notification rules to data breach incidents

Practice Tips Perform system risk assessment Implement company-wide security training Enable network security monitoring Review access and security log files Require physical access controls for facilities and computers Review hardware and software contracts for security obligations and liabilities Secure cyber liability insurance Conduct a mock breach investigation and response

Software Vendor Audits 23

Software Vendor Rights Frequently, Vendor license agreements contain provision granting the vendor the right to audit for license compliance Vendor s that do not have specific contract rights to conduct an audit will contact with allegations of non-compliance and ask for an audit to avoid a legal claim of copyright infringement being filed But how did they find out? 24

What you should do Carefully consider any contractual language granting audit rights to ensure appropriate scope, processes and remedies for non-compliance Educate your IT staff to involve legal whenever any software audit or license review is requested by a vendor 25

What to do during an audit Require a pre-conference that limits scope of audit to identified contracts and their audit provisions Discuss and mutually agree to audit tools and processes in advance, with assignments and deliverables Have all iterations of audit analytics mutually reviewed Reserve right to submit a statement of disagreement with license entitlement process or tabulations Draft and execute an NDA that outlines the audit scope 26

FTC Investigations 27

FTC Enforcement Action against LabMD Background LabMd is a clinical laboratory company that handles PHI and other sensitive personal information The FTC filed complaint against LabMD in August of 2013 alleging that it failed to take appropriate measures to protect sensitive, personal information LabMD claimed that the FTC did not have authority to address these types of data security issues The FTC rejected LabMD s arguments and is moving forward with its complaint

FTC Enforcement Action against LabMD, cont. The Implications of the FTC s Actions against LabMD In its denial of LabMD s motion to dismiss, the FTC was clear that it has authority to address these types of issues to protect consumers from unwanted privacy intrusions, fraudulent misuse of their personal information, or identity theft. Despite the absence of regulations, the FTC will continue to institute enforcement actions against companies with inadequate data security protocols. Companies that store, transmit and use consumer information are expected to reasonable and appropriate data security safeguards to protect consumer information.

FTC Enforcement Action against LabMD, cont. What can you do to avoid this? Review your data security practices for compliance not only with HIPAA, but with other applicable data security standards such as the FTC, SEC, PCI, etc. Make certain your policies are consistent with your capabilities as an organization. Train your employees. Address any deficiencies promptly when brought to your attention Document your data security practices and remedial measures that you take

Questions? 31