Community Health Center Security Risk Management

Slides:



Advertisements
Similar presentations
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Advertisements

Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA Security Risk Overview Lynne Shoemaker, RHIA, CHP, CHC OCHIN Integrity Officer Daniel M. Briley, CISSP, CIPP Summit Security Group.
Understanding Meaningful Use Presented by: Allison Bryan MS, CHES December 7, 2012 Purdue Research Foundation 2012 Review of Stage 1 and Stage 2.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Minnesota Law and Health Information Exchange Oversight Activities James I. Golden, PhD State Government Health IT Coordinator Director, Health Policy.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
IT’S OFFICIAL: GOVERNMENT AUDITING OF SECURITY RULE COMPLIANCE Nancy Davis, MS, RHIA Director of Privacy/Security Officer, Ministry Health Care & Catherine.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Medicaid EHR Incentive Program For Eligible Professionals Overview of the Proposed 2015 Modification Rule Kim Davis-Allen Outreach Coordinator
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Meaningful Use Security Risk Assessment (SRA): Resources for Eligible Professionals (EPs) Kim Bell, MHA, FACHE, PCMH-CCE Executive Director Georgia Health.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
Meaningful Use Security Risk Analysis Passing Your Audit.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Eliza de Guzman HTM 520 Health Information Exchange.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
Working with HIT Systems
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Western Asset Protection
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
HITEQ Highlights: Community Health Center Privacy & Security Best Practices Good afternoon everyone and welcome to this webinar on Privacy and Security.
DOL Employee Benefit Plan Audits & How to Prepare
Privacy & Information Security Basics
Enforcement, Business Associates and Breach Notification. Oh my!
Randall (Randy) Snyder, PT, MBA Division Director January 27, 2016
What is HIPAA in 2016? Presented By: Suze Shaffer, CHSP
Health Information Privacy & Security
In-depth look at the security risk analysis
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
By: Eamon Callahan and Wilston Johnston
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
2017 Modified Stage 2 Meaningful Use Objectives Overview Massachusetts Medicaid EHR Incentive Program September 19 & 20, 2017 September 19,
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
The Practical Side of Meaningful Use:
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
Enforcement and Policy Challenges in Health Information Privacy
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
HIPAA Security Risk Assessment (SRA)
Presentation transcript:

Community Health Center Security Risk Management Overview of the Security Risk Assessment Policies, Practices and Tools HITEQ Workshop for the AUCH Annual Primary Care Conference May 12, 2017

HITEQ Purpose The Health Information Technology Evaluation and Quality (HITEQ) Center is a HRSA-funded Cooperative Agreement that collaborates with HRSA partners to support health centers in full optimization of their EHR/Health IT systems

HITEQ Services Web-based health IT knowledgebase Workshops and webinars Targeted technical assistance

HITEQ Focus Areas Health IT Enabled Quality Improvement EHR Selection and Implementation Health Information Exchange QI/HIT Workforce Development Value-Based Payment Privacy and Security Electronic Patient Engagement Population Health Management

Legal Disclaimer The information included in this presentation is for informational purposes only and is not a substitute for legal advice. Please consult an appropriate attorney if you have any particular questions regarding a legal issue.

Your Presenter Nathan Botts, PhD, MSIS Senior Study Director – Healthcare Delivery, Research, and Evaluation, Westat Privacy & Security domain lead for the HRSA HITEQ Center project. Health informatics specialist, with over 11 years of clinical software and systems research and development experience. Served as Knowledge Integrator for the Privacy and Security Community of Practice, for the Office of the National Coordinator’s Knowledge Sharing Network for Regional Extension Centers.

Security Risk Assessment Agenda Overview of Healthcare Privacy & Security Policies related to SRA Implications for Health Center SRA requirements Review of the Office of the National Coordinator SRA Toolkit Office for Civil Rights Audits Questions and Discussion

Problem Statement Privacy and Security management covers just about every aspect of a healthcare organization Risk measures cover a broad range of physical, analog, and digital systems and include both internally and externally housed systems Settings and technologies deployed vary to such a high degree that there are no singular tests that can be conducted to ensure compliance The Security Risk Assessment is one method for auditing the measures and mitigation strategies in place at a healthcare site.

Healthcare Privacy & Security Policies and Regulations Health Insurance Portability and Accountability Act of 1996 (HIPAA): required HHS to adopt national standards for electronic health care transactions and code sets, unique health identifiers, and security. At the same time, Congress recognized that advances in electronic technology could erode the privacy of health information. Consequently, Congress incorporated into HIPAA provisions that mandated the adoption of Federal privacy protections for individually identifiable health information. Health Information Technology for Economic and Clinical Health (HITECH) Act’s Meaningful Use program: required objective measures for ensuring the safety of electronic Protected Health Information (ePHI) as dictated by the Security Rule of the Health Insurance Portability and Accountability Act (HIPAA) (OCR 2009).

HIPAA Evolution from 1996 HIPAA Omnibus of January 2013 HIPAA 2016 Imposes new requirements on the language of BAs and their own practice in terms of addressing HIPAA related requirements This especially in terms of stewardship of data. All BAs responsible for protection of data according to HIPAA and providers responsible for ensuring their BAs maintain effective practices HIPAA 2016 OCR launched a platform for mobile health developers; purpose is to understand concerns of developers new to health care industry and HIPAA standards: http://hipaaqsportal.hhs.gov/

HIPAA Impact on Eligible Providers HIPAA compliance requires that providers be prepared to handle ePHI properly and follow the requirements in the HIPAA Privacy, Security, and Breach Notification Rules If a problem surfaces, an enforcement action can result—including million-dollar financial settlements, and Corrective Action Plans that can take years to complete and can cost many times the monetary settlements In order to comply with the HIPAA Security Rule, providers need to maintain an ongoing security program.

General OCR HIPAA Settlements Issues: Lack of risk analysis/risk management Large breaches (e.g., 300,000 or more) Improper disposal Unencrypted mobile devices Widespread snooping Triggers: Media attention Breach report DOJ/OIG referral Complaints Reference: http://www.dwt.com/people/adamhgreene/

Meaningful Use and SRA MU supports the HIPAA Security Rule MU Objective: Protect electronic health information created or maintained by the certified EHR technology (CEHRT) through the implementation of appropriate technical capabilities MU Measure: Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1), including addressing the security (to include encryption) of ePHI created or maintained by CEHRT in accordance with requirements under 45 CFR 164.312(a)(2)(iv) and 45 CFR 164.306(d)(3), and implement security updates as necessary and correct identified security deficiencies as part of its risk management process MU Stage 3 2018 Updates: – Protected Patient Health Information: EPs must attest YES to conducting the security risk analysis upon installation or update to the new Edition of certified EHR Technology.

MU Impact on Eligible Providers In order to successfully attest, providers must conduct a security risk assessment (SRA), implement updates as needed, and correctly identify security deficiencies. By conducting an SRA regularly, providers can identify and document potential threats and vulnerabilities related to data security, and develop a plan of action to mitigate them.

Security Rule Requirements Reference: Michigan Center for Effective IT Adoption

ONC Meaningful Use and SRA Meaningful use incorporates and supports HIPAA. To successfully attest, you must conduct a security risk assessment (SRA), a component of the Security Rule in effect since 2005. In order to comply with the 2013 Health Insurance Portability and Accountability Act (HIPAA) final omnibus rule, you need to maintain an ongoing security program. HIPAA mandates security standards to safeguard electronic protected health information (ePHI) maintained by certified electronic health record (EHR) technology. The omnibus rule pays detailed attention to how ePHI is stored, accessed, transmitted, and audited.

Attesting to Meaningful Use Risk assessment requirements Occurs during the calendar year of the EHR reporting period and no later than the provider attestation date Assesses certified EHR technology (CEHRT) and any devices using ePHI (e.g. laptops, desktops, tablets, smartphones) Process is repeated for every reporting period Do not attest until after you have conducted your Security Risk Assessment Reference: Michigan Center for Effective IT Adoption

SRA Frequency Practices that participate in MU must conduct an SRA for every year of attestation SRAs should be updated after major changes or upgrades to practice, technology, or environment Recommendation is at least annually for HIPAA compliance Risk management and assessment is a continuous process, so make sure you have documentation to support your ongoing risk assessment and management process Conducting SRA is worth the money, hire a consultant if outside of your organization’s abilities

SRA Fact Check Reference: ACR 2 Solutions

Enter the ONC Security Risk Assessment (SRA) Tool Designed to help health care providers and business associates that handle patient information to evaluate risks, vulnerabilities and adherence to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. The Office of the National Coordinator for Health Information Technology (ONC) worked together with the Office for Civil Rights (OCR), which enforces the HIPAA Security Rule, to develop this tool to enable providers and other entities to meet their HIPAA Security Rule compliance responsibilities.

ONC SRA Limitations Use of this tool is neither required by nor guarantees compliance with federal, state or local laws. The Security Risk Assessment Tool is not intended to be an exhaustive or definitive source on safeguarding health information from privacy and security risks.

NIST 800 Series: Primary Resource for ONC SRA Toolkit

NIST Risk Assessment Steps

Primary SRA Sections 1-6 Maintaining Your Security Program Identifying Your Assets Managing Access to Your Assets Managing the Integrity of Your ePHI Managing Your Media Managing Your Facilities Each section broke down into subcategories: Administrative Physical Technical

Primary SRA Sections 7-12 Managing Your Workforce Educating Your Workforce Managing Your Vendors Continuing Your Operations When Emergencies Occur Auditing Your Operations Managing Incidents Each section broke down into subcategories: Administrative Physical Technical

ONC SRA Tool Main Menu

ONC SRA Tool Interview

ONC SRA Toolkit Glossary

SRA Dashboard

OCR Audit Schedule OCR has been enforcing HIPAA since 2003 The OCR conducted its first set of audits in 2012 The second phase began in 2016 Provider compliance with Security, Privacy, and Breach Rules is audited Most common Security deficiencies from 2012- 2013 pilot audits: Lack of or incomplete SRA (47 out of 59 (79%)) Unaware of Security Rule requirements 2017 Comprehensive onsite audits to begin Reference: Source: IAPP Conference March 7, 2013

Reasons for Compliance Covered entities that suffer a breach and have not performed a SRA, or otherwise do not have an effective risk management program, face the steepest penalties from the OCR A lack of or incomplete SRA is the main reason providers fail Meaningful Use (MU) audits, resulting in loss of incentive money Further costs due to ineffective security plans may include: Breach victims may pursue legal action for damages Many healthcare providers have lost access to their data due to ransomware attacks or contract disputes Reference: Michigan Center for Effective IT Adoption

SRA Checklist There are many ways to conduct a SRA but methods should at the very least encompass facets such as: Scope must include all ePHI in organization Data collection and methods must be documented Identify and document anticipated threats and vulnerabilities Assess current security measures in place Establish likelihood of threat occurrence Establish potential impact of threat occurrence Determine level of risk Document complete risk analysis Periodic review and update

SRA Summary Security Risk Assessments required for compliance with HIPAA and Meaningful Use Risk and regulatory oversight increasing and expected to continue Practices are expected to take security seriously and put forth a good faith effort Required: Hard work, diligence, integrity An SRA is the first step of a continuous, comprehensive Risk Management Program that will benefit your patients and your practice

Comments, Questions, and Discussion

Want more information?

Contact HITEQ at: hiteqcenter.org Help Us Help You!   Contact HITEQ at: hiteqcenter.org hiteqinfo@jsi.com @HITEQCenter 1- 844-305-7440

HITEQ Project Funding This project was supported by the Health Resources and Services Administration (HRSA) of the U.S. Department of Health and Human Services (HHS) under cooperative agreement number U30CS29366, Training and Technical Assistance National Cooperative Agreement for $ 1,954,318 with 0% of the total NCA project financed with non-federal sources.  This information or content and conclusions are those of the author and should not be construed as the official position or policy of, nor should any endorsements be inferred by HRSA, HHS or the US Government.