Healthcare IT Security and Compliance

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
EHR Privacy & Security. Missouri’s Federally-designated Regional Extension Center  University of Missouri:  Department of Health Management and Informatics.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Security Controls – What Works
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
First Practice - Information Security Management System Implementation and ISO Certification.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 1 Introduction to Electronic Health Records Electronic Health.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Lecture 14 Policy, Legal, and Regulatory Issues in HIS (Chapters 18,19,20)
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
AMERICAN RECOVERY AND REINVESTMENT ACT OF 2009 Health Information Technology for Economic and Clinical Health Act (HITECH Act) Regina.
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Terminology in Health Care and Public Health Settings Unit 14 What is Health Information Management and Technology?
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Health Information Privacy & Security
In-depth look at the security risk analysis
Financial Analysis Of Electronic Health Records (EHR’s)
Lesson 1- Introduction to Electronic Health Records
Information Security based on International Standard ISO 27001
CSIA 412 Final Project 10 July 2015 By: Brandon D. Waugh
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
Disability Services Agencies Briefing On HIPAA
Chapter 8 Developing an Effective Ethics Program
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Lesson 1- Introduction to Electronic Health Records
Presentation transcript:

Healthcare IT Security and Compliance The New Trend in Healthcare IT

EHR 2.0 – Company Background Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Consulting services to secure IT systems Education to increase staff awareness Best Practices Publications on HIPAA/HITECH Security Goal: To make compliance a painless and an enjoyable experience, while building capability and confidence.

Health Care Costs Out of Control The cost of the patient care is increasing across the world; however, the increase is more pronounced in US compared to any other developed or developing country in the world. Currently, approximately 15% of the US GDP (Gross Domestic Product) is spent on healthcare (5). As a result, healthcare is distinctly the largest industry in the US economy. One trend is that the expenditure on healthcare in the US has continued to grow over time – 5% of GDP in 1960 to 15% GDP in 2010. There are many reasons for such an increase in costs – Demand for better care – The average cost for cancer treatment is near $60,000 (1). Triple drug antiretroviral cocktails used to treat HIV average $12,000 per year (2). The accumulation of costs for a heart attack victim from hospital admission to discharge is $23,000 (3). Aging population – increased life expectancy – we are living longer and some say, by being sick. 4% of population were older than 65 years in 1960 – it is forecasted to 25% by 2050. Poor Lifestyle – increasing waist lines long queues before physician offices. Chronic diseases such as diabetes, high blood pressure means continuous physician visits, daily medicines thus, increasing costs. These costs are projected to increase as baby boomer generation is now retiring. Health care in the United States is provided by many separate legal entities. Health care facilities are largely owned and operated by theprivate sector. Health insurance is now primarily provided by the government in the public sector, with 60-65% of healthcare provision and spending coming from programs such as Medicare, Medicaid, TRICARE, the Children's Health Insurance Program, and the Veterans Health Administration. In addition, health care costs are also increasing due to aging population, poor life style, misdiagnosis and slow adoption of the technology. Nuemorous research studies have demonstrated that the adoptation of technologies, for example IT, will not only improve the quality of health care but also improve work flow efficiencies of health care providers. Growth in Total Health Expenditure Per Capita, U.S. and Selected Countries, 1970-2008 Source: Organization for Economic and Co-operation and Development (OECD), 2010 The cost of patient care is rising throughout the world with little correlation to quality of care in developed countries. Nowhere is this more evident than the US.

Why breaches? Don’t know or Don’t care Steal information Use of Technology Publicity & Show off Accidents Average cost per compromised record is approximately $300 to $400 Average cost $7M plus Portable Media Account for 22% of breaches (HHS list) Service providers cause 44% of breaches

The American Recovery and Reinvestment Act of 2009 and HITECH

Medicare and Medicaid Meaningful Use Incentives Penalties after For eligible professionals

OCR/HHS Audit Policies and procedures Risk Analysis and Management Documentation Training BA Agreement and Contracts Risk Analysis and Management

Health Information Exchange (HIE) An HIE automates the transfer of health-related information that is typically stored in multiple Organizations, while maintaining the context and integrity of the information being exchanged. An HIE provides access to and retrieval of patient information to authorized users in order to provide safe, efficient, effective and timely patient care. Formal organizations have been formed in a number of states and regions that provide technology, governance and support for HIE efforts. Those formal organizations are termed health Information organizations (HIO) or even regional health information organizations (RHIO). Key- Multi-directional

HIPAA Titles - Overview

HIPAA Security Rule Brief overview of this with emphasis on where we are going later.

Information Security Model Confidentiality Limiting information access and disclosure to authorized users (the right people) Integrity Trustworthiness of information resources (no inappropriate changes) Availability Availability of information resources (at the right time) 11

Protected Health Information(PHI) Individually Identifiable Health Information PHI

Trends in Healthcare IT Informatics Collaboration Mobile Computing HIE http://www.securedgenetworks.com/secure-edge-networks-blog/bid/54690/4-Healthcare-Technology-Trends-from-HIMSS11

EMR and EHR systems CDC Survey

For Eligible Hospital & CAH

Risk Assessment Methodology Flowchart(NIST) Step 1: System Characterization Hardware, Software, System Interfaces, Data and Information, People and System mission System boundary, functions, criticality and sensitivity Step 2: Threat Identification History of system attack, Data from intelligence agencies Threat Statement Step 3: Vulnerability Identification Reports from previous risk assessments, any audit comments, security requirements, security test results List of potential vulnerabilities Step 4: Control Analysis Current controls and planned controls List of current and planned controls Step 5: Likelihood determination Threat source motivation, threat capacity, Nature of vulnerability, current controls Likelihood rating Step 6: Impact Analysis Mission impact analysis, asset criticality assessment, data criticality, data sensitivity Impact rating Step 7: Risk Determination Likelihood of threat exploitation, magnitude of impact, adequacy of planned or current controls Risk and Associated risk levels Step 8: Control Recommendation Recommended controls Risk Assessment Methodology Flowchart(NIST)

HIPAA/HITECH Security Assessment Cycle Find out where your business is weak Determine the compliance and security needs & gaps Put reasonable policies and business processes in place Implement the right technologies & processes to help with enforcement Re-evaluate on a periodic and consistent basis

Best Practices Framework EHR 2.0 HIPAA Security Best Practices Framework 4. Prioritize & Select Key Control Areas 2. Assessment of existing safeguards, policies and procedures 1. Determine ePHI Systems, Activities and People 6. Documentation, Training and Reasssesment 5. Implement HIPAA Corrective Measures 3. Gap Analysis comparing existing vs. required HIPAA security rule The New Trend in Healthcare IT

Security – A Overarching Driver Regulations &Standards Federal /State International Laws Reputation Value Compliance 19

What do we do … Education Consulting Toolkit Tools Risk Analysis for Meaningful Use HIPAA /HITECH Security Assessment Federal Audit Advisory Services 1 Healthcare IT Security and Compliance Risk Assessment Mobile & Social Media Compliance 2 Consulting Toolkit Tools Best practices Checklist Policies and Procedures 3 The New Trend in Healthcare IT

THANK YOU! www.ehr20.com info@ehr20.com The New Trend in Healthcare IT