COMING TO THE HIPAA PARTY: TIPS FOR IT SUPERHEROES &

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
Steps to Compliance: Managing Business Associates PRESENTED BY.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Security NWOAHU Presented by Barb Gerken 11/12/2013.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
1 HIPAA Privacy & Security Overview Know HIPAA Presents.
Health information security & compliance
Welcome to UF We’re from the Privacy Office and we’re here to help you… HIPAA Orientation College of Nursing– Fall 2014 Cheryl Webber, MS, RHIA University.
Karen D. Smith, Esq. Partner Bricker & Eckler LLP 100 S. Third Street Columbus, OH (614)
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Session 3 – Information Security Policies
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
HIPAA Trading Partners, Legal Relationships October 2, 2001 presented by Peter B. Goldstein, Esq. Cap Gemini Ernst & Young, US LLC.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
© 2016 Health Information Management Technology: An Applied Approach Chapter 10 Data Security.
Data Security and Privacy Overview: NJDOE’s Approach to Cybersecurity
Data Minimization Framework
Moving Health Information In An Emergency
Schenck Price Smith & King, LLP HARASSMENT & DISCRIMINATION –
Security Standard: “reasonable security”
HIPAA Administrative Simplification
Understanding HIPAA Dr. Jennifer Lu.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Schenck Price Smith & King, LLP PROTECT YOUR ORGANIZATION
Paul T. Smith Davis Wright Tremaine LLP
Chapter 3: IRS and FTC Data Security Rules
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Cybersecurity compliance for attorneys
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
HIPAA Privacy & Security- The OCR, Audits, and Sanctions 2018
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
Making Your IRBs and Clinical Investigators HIPAA-Ready
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Privacy and Security Update - 5 Years After Implementation
Strategies to Comply with the HPAA Privacy Rule Before the HIPAA Security and Enforcement Rules are Final Presented by: Steven S. Lazarus, PhD, FHIMSS.
HIPAA WORKFORCE TRAINING
WELCOME.
Presentation transcript:

COMING TO THE HIPAA PARTY: TIPS FOR IT SUPERHEROES & Schenck Price Smith & King, LLP COMING TO THE HIPAA PARTY: TIPS FOR IT SUPERHEROES & COMPLIANCE TO COEXIST Presented by: Deborah A. Cmielewski, Esq. March 2, 2016 © Schenck Price Smith & King, LLP

AGENDA 1. Background: How did we get here? 2. The Security Rule 3. 45 C.F.R. § 164.308 4. Where do we go from here?

SETTING THE STAGE “…all the major healthcare data breaches of 2015 … were the result of the actions of hackers.”

HUMAN ERROR RESULTED IN BREACHES Loss of devices Equipment theft Unauthorized disclosures Improper disposal

RECENT ENFORCEMENT CONTINUES Lahey Triple-S UWM Lincare

“REQUIRED” vs. “ADDRESSABLE” SPECIFICATIONS Required means you must do it Addressable Reasonable and appropriate Must document decisions

45 C.F.R. § 164.308 Administrative Safeguards The Security Rule is flexible and scalable

SECURITY MANAGEMENT PROCESS (45 C.F.R. § 164.308(a)(1)(ii)) - Sanction Policy (R): Apply appropriate sanctions for failure to comply - IS Activity Review (R): Regularly review records of IS activity

ID SECURITY OFFICIAL

WORKFORCE SECURITY (45 C.F.R. § 164.308(a)(3)(ii) Authorization Supervision Workforce Clearance Termination Procedures

INFORMATION ACCESS MANAGEMENT (45 C.F.R. § 164.308(a)(4)(ii) - Consistent with “minimum necessary” - Role-based access

SECURITY AWARENESS AND TRAINING 45 C.F.R. § 164.308(a)(5) - Training must be effective - Often cited in regulatory actions

“Security Incident means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.”

OCR CYBER-AWARENESS INITIATIVE

QUESTIONS?

Serving Our Clients And Community For Over 100 Years www. spsk Serving Our Clients And Community For Over 100 Years www.spsk.com Deborah A. Cmielewski, Esq. (973) 540-7327 dac@spsk.com