How much HIPAA is enough? Session 2: What to Do - HIPAA-compliance with Datto.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Office of Provider Adoption Support (OPAS): Supporting Primary Care Providers to Achieve Meaningful Use February 29, 2012.
HIPAA AWARENESS TRAINING
2009 Data Protection Seminar
Planning for Progress Judith Lindenau, CAE, RCE
1 Health Insurance Portability and Accountability Act of 1996 IS&C Expo October 16 & 17, 2002 John Wagner Governor’s Office of Technology.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
SCHIE Mission To improve the quality and efficiency of health care for all stakeholders in the Santa Cruz community. To deliver technology assistance,
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Westbrook Technologies from Document Management’s Role in HIPAA.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
ICD-10 Planning and Assessment
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Privacy, Security, Confidentiality, and Legal Issues
EHR Privacy & Security. Missouri’s Federally-designated Regional Extension Center  University of Missouri:  Department of Health Management and Informatics.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
2 The Use of Health Information Technology in Physician Practices.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Steps to Compliance: Risk Assessment PRESENTED BY.
Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Presented by HIPAA Pros 5th Annual HIPAA.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
| Establishing a Contingency Plan.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
What is HIPAA? H ealth I nsurance P ortability and A ccountability A ct (Kennedy-Kassenbaum Bill) nAdministrative Simplification –Privacy –Transactions.
The Use of Health Information Technology in Physician Practices
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
The PRISM Privacy Tool: A User’s Guide PHDSC Home Page  PRISM Web Page 
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
The Fifth National HIPAA Summit – October 30, 2002 What to Do Now: Operational Implementation of HIPAA Privacy and Security Training Presented by: Steven.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
Oncology Patient Enrollment Network OPEN OPEN Documentation Lucille Patrichuk OPEN Implementation Manager OPEN Conference September 18, 2008.
Review of The Wonderful World of HIPAA Compliance.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Phone:
The Health Insurance Portability and Accountability Act 
Moving Health Information In An Emergency
HIPAA.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
2 Selecting a Healthcare Information System.
HIPAA.
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Strategies to Comply with the HPAA Privacy Rule Before the HIPAA Security and Enforcement Rules are Final Presented by: Steven S. Lazarus, PhD, FHIMSS.
Introduction to the PACS Security
Presentation transcript:

How much HIPAA is enough? Session 2: What to Do - HIPAA-compliance with Datto

Focus on physician practices, hospitals and Business Associates Regulatory Compliance Experts on staff, HIT experts on-staff Privacy and Security Analysis (Meaningful Use, HIPAA) EHR Consulting – Emphasis on workflow efficiencies We Untangle Healthcare Technology

Why do HIPAA at all? Because Datto feels it is critical for their channel partners to understand how the backup and restore process impacts HIPAA compliance. Because Datto feels it is critical for their channel partners to understand the relationship between Datto products and HIPAA requirements. Because you must be able to do 3 compliance-critical things, and this ability starts by learning what is in this session.

Things that are backed up that are ePHI…

Enforcement Countdown Business Associates must comply with the final rule by September 23, However, there is a special one-year transition period for implementing business associate agreements to comply with the final rule. What this doesnt say is September 23, 2014 enforcement and settlement agreements begin.

The 3 Compliance-critical things to do with Datto The Datto solution must be HIPAA-Compliant The Datto solution must be installed in HIPAA- Compliant Fashion Must be Installed by HIPAA-Compliant Datto Solution Providers

Compliance-critical thing #1: You Must Have a HIPAA-Compliant Solution Datto Appliance SIRIS or ALTO 2 Cross walk that Maps Datto to HIPAA security rule HITECH? Is the Datto Solution non-compliant with any of the following applicable security rule safeguards: -Administrative -Physical -Technical

Drilldown – HIPAA-Compliant Solutions HIPAA Security Rule, ePHI, Safeguards and Controls that you implement when you install Datto products

A HIPAA-Compliant solution: Do a safeguard review Ask this for every client Does the presence of the Datto Solution cause non-compliance with this safeguard?

Ask this for every client Does the presence of the Datto Solution cause non-compliance with this safeguard?

Ask this for every client Does the presence of the Datto Solution cause non-compliance with this safeguard?

Ask this for every client Does the presence of the Datto Solution cause non-compliance with this safeguard?

Compliance-critical thing #2: It Must-Be Installed in a HIPAA- Compliant Fashion HIPAA Security Rule, ePHI, Safeguards and Controls that you implement when you install Datto products

Drilldown – Installed in HIPAA- Compliant Fashion Datto Appliance SIRIS or ALTO 2 Map to HIPAA Citations -Administrative -Physical -Technical

A HIPAA-Compliant Installation: Do a safeguard review Ask this for every client Does the usage of the Datto Solution cause non- compliance with these safeguards?

Ask this for every client Does the usage of the Datto Solution cause non- compliance with these safeguards?

Ask this for every client Does the usage of the Datto Solution cause non- compliance with these safeguards?

Ask this for every client Does the usage of the Datto Solution cause non- compliance with these safeguards?

Compliance-critical thing #3: It Must-Be Installed By HIPAA- Compliant Solution Providers We are all BAs whether we like it or not as it pertains to implementing, managing and supporting Datto solutions in environments where ePHI is maintained or stored.

Drilldown – By HIPAA- Compliant Solution Providers We are all BAs whether we like it or not as it pertains to implementing, managing and supporting Datto solutions in environments where ePHI is maintained or stored. BA Assurance Evergreen Program

A HIPAA-Compliant Business Associate: Do a safeguard review Can you give assurances to every client about how your company meets every single one of these compliance safeguards?

How can you give assurances? Security Rule 18 Standards has 18 Standards Safeguards to Implement defines Safeguards to Implement 36 Specifications have

Administrative example Column 1 shows the standards (9) Column 2 shows the security rule citation Column 3 shows the specifications for implementing the standards (21 specifications for 9 standards)

Physical example Column 1 shows the standards (4) Column 2 shows the security rule citation Column 3 shows the specifications for implementing the standards (8 specifications for 4 standards)

Technical example Column 1 shows the standards (5) Column 2 shows the security rule citation Column 3 shows the specifications for implementing the standards (7 specifications for 5 standards)

Wrap up: Doing The 3 Compliance-critical things with Datto Profile of a HIPAA-Compliant Datto solution Repeatable process for installing Datto solutions in a HIPAA-Compliant Fashion According to a compliance management system adopted by HIPAA-Compliant Datto Solution Provider

Datto meets HIPAA key takeaways Start Now– CEs have been subject to the HIPAA OMNIBUS Rule since September BAs are now subject to enforcement under the same rule on September 23, 2014.

Datto meets HIPAA key takeaways Secure Backups and Restores are both required Covered Entities and Business Associates must backup retrievable exact copies of electronic protected health information (CFR (7)(ii) (A)) and be able to restore any loss of data. (CFR (7)(ii) (B))

Datto meets HIPAA key takeaways Security Requirements are in effect during emergencies compliance requires the protection of the security of electronic protected health information while operating in emergency mode. (CFR (7)(ii) (C))

Datto meets HIPAA key takeaways A Backup policy is not a procedure, a backup procedure is not a backup plan, a backup plan is not a contingency plan (neither is it a disaster recovery plan) - Policies, procedures and plans (CFR (b)(1)) are not interchangeable forms of documentation (CFR (b)(2)(i))is a huge part of HIPAA. Ask me about our HIPAA Book of Evidence Tool

How to use this slide deck as a workbook Step 1 Review CE/BA client solution stacks by following slides 9-12 Step 2 Review Completed CE/BA client implementations by following slides Step 3 Create a repeatable CE/BA new client implementation procedure from slides Step 4 Do a self-Assessment by following slides Step 5 Provide Assurances to each CE/BA client by describing how you implement the standards according to the specifications on slides ( me for PDF of the safeguards in these slides)

Ask Me About these Webinars Ask Me About HIPAA Evergreen for BAs Phone (909) x2101 Chris Johnson is CEO and founder of Untangled Solutions, his motto, We untangle healthcare technology has catapulted his company on to the go to short list for healthcare providers across the United States. With more than fifteen years of experience in IT services and web development, he specializes in helping medical practices make strategic HIT decisions that improve how providers safely treat their patients, productively run their practice and profitably manage their business. A thought leader in his industry and a desire to give back, Chris is the current Vice Chair for CompTIAs IT Security Community, an active CompTIA Ambassador and is the former chairperson of the Healthcare IT Community. Chris Johnson is CEO and founder of Untangled Solutions, his motto, We untangle healthcare technology has catapulted his company on to the go to short list for healthcare providers across the United States. With more than fifteen years of experience in IT services and web development, he specializes in helping medical practices make strategic HIT decisions that improve how providers safely treat their patients, productively run their practice and profitably manage their business. A thought leader in his industry and a desire to give back, Chris is the current Vice Chair for CompTIAs IT Security Community, an active CompTIA Ambassador and is the former chairperson of the Healthcare IT Community.

Ask Me About these Webinars Ask Me About HIPAA Evergreen for BAs Upcoming events: HIPAA Resources User Conference ww.Dattopartnerconference.com/ww.Dattopartnerconference.com/ Phone (909) x2101