Www.lbmc.com HITRUST, HIPAA, & HITECH TURNING COMPLIANCE INTO COMPETITIVE ADVANTAGE Mark Fulford, Partner Thomas Lewis, Partner LBMC Risk Services.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
© HIPAA Continuity Planners HIPAA Mandates a PLAN! (beyond hardware and software) Presented in Partnership with.
CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST.
200 International Dr., Buffalo, NY (716) Lifting the Fog to See the Cloud Information Security.
Data Breach Risks Overview Heather Pixton www2.idexpertscorp.com
CSF Roadmap 2015 and Beyond Presented By Bryan S. Cline, Ph.D.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Health Information Technology (“HIT”) Bobby Gladd. M.A., HealthInsight Regional Extension Center HIT Project Coordinator This material was prepared by.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Expanded Version of COSO a presentation by Steve Wadleigh Expanded Version of COSO a presentation by Steve Wadleigh Standards for Internal Control in the.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
The Institutionalization of Business Ethics
Postgraduate Educational Course in radiation protection and the Safety of Radiation sources PGEC Part IV The International System of Radiation Protection.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Individual Experience Advisory Group July 24, 2012.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Local Public Health System Assessment using the NPHPSP Local Instrument Essential Service 6 Enforce Laws and Regulations that Protect Health and Ensure.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Eliza de Guzman HTM 520 Health Information Exchange.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Western Asset Protection
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
1 Emerging Issues in Internal Audit Charles Ndegwa.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
The real reason why physicians must comply with HIPAA. What the government does not tell you? © CureMD Healthcare.
1Third Party Assurance Optimization and Control RationalizationCopyright © 2016 Deloitte Development LLC. All rights reserved. Third-Party Assurance (TPA)
Presenter Gene Geiger, A-LIGN Partner -HITRUST Practitioner -CPA -CISSP -CCSK -QSA -PCIP -ISO 27K LA.
An Information Security Management System
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
The Institutionalization of Business Ethics
Regulatory Compliance
HIPAA/HITECH – The Final Omnibus Rule
Microsoft 365 Get help with regulatory compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
GDPR Awareness and Training Workshop
Health Advocate HIPAA Privacy Information
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Presentation transcript:

HITRUST, HIPAA, & HITECH TURNING COMPLIANCE INTO COMPETITIVE ADVANTAGE Mark Fulford, Partner Thomas Lewis, Partner LBMC Risk Services

Welcome and Presentation Topics Why you should care HIPAA & HITECH - update on new regulation Insight into the HITRUST Common Security Framework How independent assurance can result in fewer audits and a competitive advantage for your organization How LBMC can help

90% Of organizations have experienced a computer security incident in the last 12 months. Cybercrime statistics from 12 th Annual Computer Crime and Security Survey

71% Of organizations have no external insurance coverage to cover computer security incidents losses. Cybercrime statistics from 12 th Annual Computer Crime and Security Survey

$1B Cybercrime profits – that have surpassed those of drug smuggling in a year. Cybercrime statistics from 12 th Annual Computer Crime and Security Survey

$234,244 Annual average loss due to security incidents per respondent Cybercrime statistics from 2009 CSI Computer Crime and Security Survey

What is HIPAA?

What is HITECH? The HITECH Act is legislation that anticipates a massive expansion in the exchange of electronic protected health information (ePHI). As part of the American Recovery and Reinvestment Act of 2009, the HITECH Act widens the scope of privacy and security protections available under HIPAA; increases potential legal liability for non-compliance; and provides more enforcement of HIPAA rules. 8

What is HITECH? Extends HIPAA directly to Business Associates Establishes first national data security breach notification law (500 or more records is nasty) Grants State AGs authority to bring civil actions 9

What is HITECH? HITECH authorizes increased civil monetary penalties for HIPAA violations. The Act establishes tiers of penalties based upon: whether or not a covered entity (including physicians) knew of a breach of privacy; whether the breach was due to reasonable cause and not willful neglect; or whether the breach was due to willful neglect. The tiers of penalties are as follows: – $100/violation not to exceed $25,000/calendar year. – $1,000/violation not to exceed $100,000/calendar year. – $10,000/violation not to exceed $250,000/calendar year. – $50,000/violation not to exceed $1,500,000/calendar year. 10

What is HITRUST The Health Information Trust Alliance (HITRUST) has been created to establish a common security framework that will allow for more effective and secure access, storage and exchange of personal health information. HITRUST is bringing together a broad array of healthcare organizations and stakeholders, who are united by the core belief that standardizing a higher level of security will build greater trust in the electronic flow of information through the healthcare system.

Strategic Objectives of HITRUST Establish a fundamental and holistic change in the way the healthcare industry manages information security risks: Rationalize regulations and standards into a single overarching framework tailored for the industry Deliver a prescriptive, scalable and certifiable process Address inconsistent approaches to certification, risk acceptance and adoption of compensating controls to eliminate ambiguity in the process Enable ability to cost-effectively monitor compliance of organizational, business partner and governmental requirements Provide support and facilitate sharing of ideas, feedback and experiences within the industry

Who is HITRUST? HITRUST Executive Council

Why the Need? Healthcare organizations are facing multiple challenges with regards to information security: Costs and complexities of redundant and inconsistent requirements and standards Critical systems not incorporating appropriate controls or safeguards Confusion around implementation and acceptable baseline controls Information security audits subject to different interpretations of control objectives and safeguards Increasing scrutiny and similar queries from regulators, auditors, underwriters, customers and business partners Growing risk and liability

“The List” 15

HITRUST CSF The HITRUST CSF is a framework that normalizes the security requirements of healthcare organizations, including federal (e.g., HITECH Act and HIPAA), state (e.g., MA 201 CMR 17.00), third party (e.g., PCI and COBIT) and government (e.g., NIST, FTC and CMS). The CSF is built to provide scalable security requirements based on the different risks and exposures of organizations in the industry. The CSF also makes security manageable and practical by prioritizing one-third of the controls in the CSF as a starting point for organizations. These priorities are based on industry input and analysis of breach information in the industry.

Standards and Regulations Overlap ISO 27001/2 PCI COBIT NIST HIPAA Security HITECH Act Mngfl. Use States

CSF Standards and Regs Coverage ISO 27001/2 PCI COBIT NIST HIPAA Security HITECH Act Mngfl. Use States HITRUST CSF

CSF Compared with Other Standards RequirementCSFCOBITPCIISONISTHIPAA Comprehensive – general securityYes Partial Comprehensive – regulatory, statutory, and business security requirements YesNo PrescriptiveYesNoYesPartialYesNo Practical and scalableYes No Yes Audit or assessment guidelinesYes No CertifiableYes No*No Support for third-party assuranceYes No Open and transparent update processYesNoYes CostFreeSubsc.FreeSubsc.Free *Certifiable only for government agencies and organizations doing business with the government

CSF Sample Structured in accordance with ISO / standard Multiple levels of implementation requirements Risk factors tailored for healthcare organizations Cross-references to industry standards and regulations 20

Introduction to CSF Assurance Program

Overview of CSF Assurance Program Utilizes a common set of information security requirements with standardized assessment and reporting processes accepted and adopted by healthcare organizations. Through the program, healthcare organizations and their business associates can improve efficiencies and reduce the number and costs of security assessments. The oversight and governance provided by HITRUST support a process whereby organizations can trust that their third parties have essential security controls in place.

Strategic Objectives of CSF Assurance Program Provide assurance that controls to limit the exposure of a breach are in place and operating effectively. Recipients of this assurance include: Executive management Auditors Federal and state regulators Customers of business associates Simplify compliance efforts for organizations Assess once and report to many constituents: ­ Federal (e.g., HIPAA/HITECH or meaningful use information) and state regulators ­ Credit card companies (i.e., PCI requirements) ­ CMS (i.e., Core Security Requirements) ­ Internal or external auditors Comprehensively leverage assessments (i.e., leverage internal audit or other certifications such as PCI to streamline audits and testing) Provide this assurance in a more cost-effective manner with additional rigor than existing processes

Resources

HITRUST Central (HITRUSTcentral.net) Access to the CSF online. A professional network for: Understanding industry issues and events Sharing knowledge Exchanging ideas and best practices Discovering new ways to solve business problems Downloading documentation and training materials Providing support: What does this control mean? How do I implement these requirements? What do I do if I cannot meet a requirement?

Additional Resources Visit HITRUSTalliance.net for information and materials on:HITRUSTalliance.net Common Security Framework CSF Assurance Program -

For more information on HITRUST and the CSF visit: To access the CSF and HITRUST Central visit: For a list of HITRUST CSF Assessors visit: For assistance, contact: Thomas Lewis – Mark Fulford – For More Information