HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
David Assee BBA, MCSE Florida International University
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA Security NWOAHU Presented by Barb Gerken 11/12/2013.
HIPAA Security Training 2005
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 TECO ENERGY, INC. HIPAA PRIVACY AND SECURITY REQUIREMENTS April 29, 2014 Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Security Risk Overview Lynne Shoemaker, RHIA, CHP, CHC OCHIN Integrity Officer Daniel M. Briley, CISSP, CIPP Summit Security Group.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Security Controls – What Works
Information Security Policies and Standards
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
What is HIPAA? H ealth I nsurance P ortability and A ccountability A ct (Kennedy-Kassenbaum Bill) nAdministrative Simplification –Privacy –Transactions.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
MU and HIPAA Compliance 101 Robert Morris VP Business Services Ion IT Group, Inc
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Unit 6a System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
1 Security Planning (From a CISO’s perspective) by Todd Plesco 24OCT2007
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
HIPAA Security Final Rule Overview
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
© 2016 Health Information Management Technology: An Applied Approach Chapter 10 Data Security.
The Health Insurance Portability and Accountability Act 
iSecurity Compliance with HIPAA
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY

Underlying principles for security  Ensure the confidentiality, integrity & availability of electronic Protected Health Information (ePHI)  Use safeguards to protect ePHI

Core requirements of HIPAA security  Designate a security official  Ensure the confidentiality, integrity & availablity of all ePHI that a covered entity creates, receives, maintains or transmits  Protect against any reasonably anticipated threats or hazards to the security or integrity of ePHI  Protect against any reasonably anticipated uses or disclosures of ePHI that are not permitted or required by the HIPAA Privacy Rule  Ensure compliance by the workforce

Security standards  Effective April 21, 2005  Contains 18 standards under three safeguard categories  14 required specifications  22 addressable specifications

Security Standards  HITECH - The Health Information Technology for Economic and Clinical Health  Effective February 18, 2009  To promote the adoption and meaningful use of health information technology  You can be held criminally liable for knowingly obtaining and disclosing PHI in violation of HIPAA Fines up to $250,000 Up to 10 years in prison  You can be personally sued by a patient claiming that the privacy of their PHI was violated

Three protection categories  Confidentiality  Data is used or disclosed by authorized persons for authorized purposes  Integrity  Data has not been altered or destroyed in an unauthorized manner  Availability  Data is accessible & useable upon demand by authorized persons

Three safeguard categories  Administrative  Physical  Technical

Administrative safeguards  Maintain security through risk analysis & management  Conduct regular system activity reviews  Audit logs, access reports, incident tracking  Enforce workforce security through clearance procedures, authorization & access controls  Train all workforce members on computer security  Track, report & respond to suspected or known security incidents  Establish a contingency plan to ensure availability of ePHI during emergencies or natural disasters

Physical safeguards  Limit physical access to electronic information systems to appropriate persons to prevent tampering or theft  Allow facility access to support disaster recovery efforts & emergency operations  Document repairs to the physical components of the security system & facilities  Restrict workstation access & activity to authorized users & authorized functions  Manage receipt, removal & disposal of hardware & electronic media

Technical safeguards  Use technical measures to control access to systems that maintain ePHI  Provide for unique user identification  Ensure necessary access to ePHI during emergencies  Implement audit controls that record & examine system activity  Protect ePHI from improper alteration or destruction  Ensure transmission security

Risk assessment  Must be “accurate and thorough”  Provides rationale for decisions about addressable specifications  Basic components  Threats & vulnerabilities  Likelihood of exploitation  Existing countermeasures  Control recommendations

KUMC Approach  Adapt existing assessment tools (NIST )  Conduct risk assessment (every two years)  Network  Servers  Departments Workstations Applications  Evaluate administrative, physical & technical safeguards in each of the above areas

Existing practices (to name a few)  Firewalls  Remote access through VPN  Limited public “visibility”  Ongoing intrusion detection  Role-based access  Anti-virus plan  Patch management  Background checks  Electronic signature  Unique user IDs  Strong passwords  Disaster recovery plans  Established backup procedures  Documented policies & procedures  Transmission encryption methods  Biometrics  Proximity sensors  Implanted chips

QUESTIONS Sherry Callahan, CISSP, CISA, CISM Director of Information Security Juli Gardner, MHSA KUMC Compliance Program Manager