Strategic Approaches to HIPAA Access & Audit HIPAA Summit West II March 15, 2002 San Francisco, CA Mariann Yeager 561.234.9876 tel 561.913.1588 cel

Slides:



Advertisements
Similar presentations
HIPAA and Joint Commission Requirements Compared and Contrasted
Advertisements

Managing Wireless Medical Device Security Challenges in Today's Enterprise HealthCare Neil Buckley AMA-IEEE Conference March 22, 2010.
The U.S. Health Information Technology Agenda – and the Web John W. Loonsk, MD Director of Interoperability and Standards Office of the National Coordinator.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Effective Integration of HIPAA Information Security with Privacy Compliance Richard B. Boyer, Privacy Officer Jody S. Hawkins, Information Security Officer.
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Enterprise and Global Management of e-Business Technology
Regents Update New Business Architecture Project 2010 Jan00 meeting notes.doc March 17, 2004 Accelerating the New Business Architecture An Update for the.
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
Chapter 12 Strategies for Managing the Technology Infrastructure.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
Wireless Directions University of California, Davis Wireless Technology Team February, 2001.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
Enabling a Medical Home With a Patient Communication Strategy Jeanette Christopher Northwest Primary Care Group, P.C.
August 22, 2002 THE HIPAA COLLOQUIUM at Harvard University A. John Blair, III, MD Chairman and Chief Executive Officer Taconic IPA, Inc. Fishkill, NY HIPAA.
The future shape of business is being redefined through outsourcing.
Tackling the Policy Challenges of Health Information Exchange Carol Diamond, MD, MPH Managing Director, Markle Foundation.
Business Intelligence Case Study Sean Downer, Manager Decision Support Royal Children’s Hospital Melbourne.
Solution Overview for NIPDEC- CDAP July 15, 2005.
Staff Structure Support HCCA Special Interest Group New Regulations: A Strategy for Implementation Sharon Schmid Vice President, Compliance and.
12 Enterprise and Global Management of e-Business Technology.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
STEVEN S. LAZARUS, PHD, CPEHR, CPHIT, FHIMSS PRESIDENT, BOUNDARY INFORMATION GROUP AUGUST 20, – The Twelve Year Journey is Not Over.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
Enterprise and Global Management of e-Business Technology
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
PPTTEST 10/24/ :07 1 IT Ron Williams Business Innovation Through Information Technology IS Organization.
Community Connectivity The MA Experience John D. Halamka MD CIO, Harvard Medical School CIO, CareGroup Chairman, NEHEN.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
UWM CIO Office Institutional Data Privacy and Security Presenter: Steve Brukbacher, Information Security Architect Moderated by: Bruce Maas, CIO November.
Working with HIT Systems
Chapter 3 Strategic Information Systems Planning.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Copyright © Emerson Strategic Group, Inc. All Rights Reserved 1 Ninth National HIPAA Summit Auditing for Privacy Compliance: A Case Study September.
HIT Standards Committee Overview and Progress Report March 17, 2010.
U.S. Department of Agriculture eGovernment Program January 17, 2002 eGovernment Executive Council Chris Niedermayer, USDA eGovernment Executive Barbara.
1 HIPAA: Privacy Regulations Addressing HIPAA at Harvard University Tina S. Sheldon Harvard University HIPAA Summit West II San Francisco, California March.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
The U. S. Health Care System Challenges, Opportunities and Solutions Fifth National HIPAA Summit Clinical Data Standards and the Creation of an Interconnected,
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
QUESTIONS TO DEBATE Chapter 5, Instructor’s Manual.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Paperless University Initiative  Timeline of our progression as a Paperless University  Implementing our Paperless University  Supporting our Paperless.
© 2014 By Katherine Downing, MA, RHIA, CHPS, PMP.
© CGI GROUP INC. All rights reserved ERP Success: An extraordinary opportunity Gordon Bruce, City and County of Honolulu, HI.
1 Vermont Health Information Technology Plan (VHITP) Educational Presentation Personal Health Records (PHR) Overview / Strategies VITL Board Meeting May.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
Joint CIO Council and HR Deans & Directors Meeting
Segmap Solutions Mapping segments.
Vertex & EnterpriseOne
Advance Case Studies in HIPAA Implementation: Practical Application of
Electronic Health Records: Overview, Acquisition and Implementation
Privacy Project Framework & Structure
HIPAA Summit West II San Francisco, California March 13-15, 2002
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
HIPAA Policy & Procedure Strategies
Pam Matthews, FHIMSS Director of Business Information Systems Business Information Systems is focused around administrative and financial information.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Strategies to Comply with the HPAA Privacy Rule Before the HIPAA Security and Enforcement Rules are Final Presented by: Steven S. Lazarus, PhD, FHIMSS.
Presentation transcript:

Strategic Approaches to HIPAA Access & Audit HIPAA Summit West II March 15, 2002 San Francisco, CA Mariann Yeager tel cel

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 2 HIPAA Expertise Industry Leader National speaker Technology & HIPAA Background

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 3 Agenda Role of technology Access & Audit Implementation considerations Practical, Vendor & Standards Case Study Discussion

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved Strategic Benefit Technical Access Audit Administrative Policies & Procedures Training Efficiencies – automation, cost savings Trust – consumers, partners Privacy & SecurityStrategic Benefit

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 5 Intersection of Security & Privacy Role of Technology Access Minimum Necessary Access Controls – Need-to-know Audit Accounting of Disclosures Audit Controls WEDI SNIP Security & Privacy White Paper:

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 6 Implementation Decisions Access Reinforce with technology Mitigate risk Audit Usage, detail, storage Separate vs. centralized

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 7 Implementation Considerations Practical Infrastructure: Enterprise-wide Disparate systems Data: Amount & type Link users to patient Compliance: Ease of use Universal

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 8 Implementation Considerations Vendors Multiple approaches? Separate systems? Core competency? Ability to meet needs? You are still accountable

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved Infrastructure: Context Management - CCOW National Health Information Infrastructure Others – Process & Policies: Accreditation programs Best practices ASTM NIST Implementation Considerations Standards

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved Context Management Industry Standard Architecture The Role of CCOW Result: Streamlined use of applications Uptake Accepted standard Healthcare-specific

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved CCOW Architecture

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 12 HIPAA Case Study

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 13 The Environment Largest hospital in Maine: 606-bed tertiary care and teaching hospital 30,000 inpatient stays 140,000 outpatient visits 22,000 surgeries 3,200 users, 2,100 desktops, 660 systems Major systems: Medical records –100% electronic/imaged PACS and departmental CCOW Architecture

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 14 The Philosophy Broad approach Reasonable Leverage technology Existing investments Keep it simple Seek synergies Support vision

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 15 The Vision “… CPR is not a single system. It is several systems seamlessly integrated in the eyes of the user, so that it appears to be one system.” – Jerry Edson, CIO HIPAA Vision Process Systematic Enterprise-wide Leverage for greater good

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 16 The Approach Centralized oversight Gap analysis: IT Dept. Compliance office HIPAA IT team: Lead Analyst Two Technical Analysts Compliance Analyst

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 17 The Need: Access & Audit Strategy: Address access & audit Reasonable approach Requirements: Enterprise-wide Meaningful data Flexible reporting Drivers: Mitigate risk Focus on highest priority

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 18 Implementation Considerations Vendor: Multiple approaches? Separate systems? Core competency? Ability to meet needs? We are still accountable Practical: Infrastructure Compliance Data Standards-based

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 19 The Solution Vergence Privacy Auditor Sentillion: Standards-based Enterprise-wide Vendor-neutral Supports vision of integrated desktop: Single implementation Centralized management User-friendly / Vendor-friendly Flexible reports

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 20 Vergence Privacy Auditor

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 21 The Rationale Fundamental HIPAA requirement Mitigates high risk Simplifies analysis, implementation Minimizes development Supports IT vision

Copyright © 2001, Emerson Strategic Group, Inc. All Rights Reserved 22 The Results Cost-effective Reasonable approach Single, centralized solution Rapidly deployed Flexible

Strategic Approaches to HIPAA Access & Audit Discussion Mariann Yeager cel