The Twelfth National HIPAA Summit Security Rule Compliance Update John C. Parmigiani & Gary G. Christoph, Ph.D. April 11, 2006.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Hipaa privacy and Security
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
NAU HIPAA Awareness Training
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
1 HIPAA Privacy & Security Overview Know HIPAA Presents.
The Thirteenth National HIPAA Summit HIPAA Security Rule Compliance Update John C. Parmigiani Uday Ali Pabrai, CISSP, CSCS Gary G. Christoph, Ph.D. September.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Health Sciences.  Principles  Code of Conduct for right and wrong  Values  Core of all health care decisions.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
IT’S OFFICIAL: GOVERNMENT AUDITING OF SECURITY RULE COMPLIANCE Nancy Davis, MS, RHIA Director of Privacy/Security Officer, Ministry Health Care & Catherine.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Office of the Secretary Office for Civil Rights (OCR) Enforcement and Policy Challenges in Health Information Privacy Linda Sanches HIPAA Summit Special.
Health Insurance Portability and Accountability Act HIPAA 101
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
By: Eamon Callahan and Wilston Johnston
HIPAA.
Chapter 3: IRS and FTC Data Security Rules
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Summit Closing Plenary Session: Security Rule Compliance Update
Enforcement and Policy Challenges in Health Information Privacy
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Privacy and Security Update - 5 Years After Implementation
Introduction to the PACS Security
Presentation transcript:

The Twelfth National HIPAA Summit Security Rule Compliance Update John C. Parmigiani & Gary G. Christoph, Ph.D. April 11, 2006

The Healthcare Industry and HIPAA Security –Where it should be –Where it is and why What about Enforcement? Why the Security Rule is important –Now –Future Conclusions

Where Healthcare should be Almost one year since April 21, 2005 Security Compliance Date + Three years after Privacy Compliance Date (April 14, 2003)- included Security Safeguards

Covered Entities Should be Here! Have thoroughly read, discussed, and understood the requirements of the Security Rule (including “required” and “addressable”) and its implications to them for compliance Have obtained upper management buy-in Have appointed someone as the ISO, written a position description, provide high visibility and reporting responsibilities for the position, and communicated the name and contact information to the workforce Have set up a documentation book that chronicles your decisions and actions relative to Security Rule compliance Have determined PHI data flow and its existence in information systems Have created a complete inventory of information assets — Have a complete inventory of all hardware, software, in-house developed and vendor applications and their interfaces

Covered Entities Should be Here! Have reviewed existing information security policies, procedures, and plans for compliance with HIPAA security and created new or updated existing policies, procedures, forms, and plans as needed Have performed a Risk Analysis and developed a Risk Management Plan that delineates remediation efforts –Determined any new technologies required –Identified gaps in policies, procedures, processes –Implemented them Have maintained current documentation that supports decision-making relative to each of the security standards –Addressable specifications show the choices made and why those choices constituted “due diligence” for the business

Covered Entities Should be Here! Have verified that business associates are providing the same level of protection (safeguards and controls) –Have updated existing Business Associate Agreements that were signed for Privacy –Have engaged business associates and vendors in your compliance efforts Have established a formal information security training program –delivered the general training to the entire workforce; –developed and delivered focused training; –created methods for documentation and for various training delivery mechanisms; –established and trained staff on a security incident reporting process Have developed and implemented a process for creating user accounts that provide for access control (authentication and “need to know” for privileges)

Covered Entities Should be Here! Have formulated and implemented a “defense in depth” strategy to protect not only the network but also the internal electronic user interface from unauthorized access — Intrusion prevention/detection, malware protection, use of encryption for transmitting and storing ePHI, etc. Have implemented facility access controls to protect sensitive computing resources and data Have determined the audit capabilities of applications and systems as well as user activities and events that should trigger an entry into an audit log Have developed a Contingency/ Disaster Recovery Plan that provides for business continuity –Frequency, rotation, storage, and retention of back-ups Have established a review process for continued security compliance

Where Healthcare is According to the latest Phoenix Health/HIMMS survey: 55% of providers/ 72% of payers reportedly compliant Many smaller providers haven’t even started yet Areas of concentration have been contingency planning (spurred by Katrina and Rita); emergency access procedures; risk analysis; and workstation use/management

Why ?????  “lack of buy-in from senior leadership”  “limited resources”  lack of funding  perception that Privacy/Security compliance creates obstacles to efficient healthcare delivery  won’t happen to us (despite the ever-increasing list of security breaches and corresponding losses in confidentiality, integrity, and availability to sensitive data in other industries)  lax or no enforcement

HIPAA Privacy/Security Enforcement Stats At the end of February, 2006: 18,300 complaints to OCR –second highest consistently is for “inappropriate safeguards” –approximately 500+/month –72% closed with no fines imposed for noncompliance –292 cases referred to DOJ for possible criminal prosecution (approx.10/month); one in the works (wrongfully using a unique health identifier with the intent to sell individually identifiable health information for personal gain) –controversial decision by DOJ in June, 2005 that criminal provisions do not apply to individuals only covered entities

HIPAA Privacy/Security Enforcement Stats At the end of February, 2006: 51 security complaints to CMS; one closed note: Security complaints have a smaller universe for their source – employees, ex-employees, contractors are more likely to detect and report than patients and beneficiaries Only conviction to-date: Gibson case in Seattle in November, 2004; considered a “toss-up” between HIPPA and identity theft prosecution Statistics courtesy of Melamedia, LLC

Final Enforcement Rule Still encourages “voluntary compliance” as the most effective and quickest method Complaint-driven process Covered entity must have knowledge that a violation occurred to result in monetary penalties Cannot be cited for multiple violations related to one violation of a regulatory provision Stressed the importance of performing a risk analysis Must document decisions relative to adoption of addressable implementation standards

Other Drivers SOX; GLBA; 21 CFR Part 11; 42 CFR Part 2; CA 1386-like, PCI, etc. represent a certain “standard of care” to sensitive and personally- identifiable data –Going after certain directors, officers, and employees of these entities to hold them directly liable Penalties in 2005 for privacy/security violations; consumer awareness: ChoicePoint; LexisNexis; DSW; Time Warner; Bank of America; BJs; etc. Litigation; bad PR; accrediting bodies; competition from peers

Other Drivers E-commerce both nationally and internationally: business needs may be more powerful than regulatory enforcement –Governance and compliance may become performance metrics –Investment may be dependent on legal exposure to security data risks HIT initiatives – Congress and the President have used non-regulatory means to encourage the use of IT to improve health care delivery; bi-partisan; a number of bills proposed over the last year (most require HIPAA Privacy and Security Rules to be applicable)

E-Health Requirements Heavily dependent on Privacy and Security –Trusted relationships and communications –Real-time interoperability for effectiveness and efficiency –Accuracy (integrity) of ePHI to those systems and people with a “need to know” (confidentiality) and accessible when they need it (availability) Authentication Access controls to allowed data Monitoring and recording access requests

HIPAA Rules Shortcomings Scope Issue –Covered entities: health plans, healthcare clearinghouses, health insurers, and healthcare providers that electronically pay or process medical claims, or that electronically transmit information associated with claims –Not covered are: PHR and EHR organizations, online medical info providers, or RHIOs—any collector of private medical information that do not provide care nor are involved in insurance or payment Investigative organizations that do not deal in payment or healthcare delivery Researchers State Health or Reporting Agencies that only collect PHI

HIPAA Rules Shortcomings Enforcement Issue: –Enforcement Promise Actions with significant civil penalties Office of Civil Rights charged with investigation and enforcement of Privacy Reg CMS Office charged with investigation and enforcement of Security Reg –Enforcement Reality Many complaints, only one prosecution Individuals not held accountable, only organizations No individual right of action--Actions only can be undertaken by Secretary of HHS

HIPAA Rules Shortcomings Real Threats to Privacy/Security Possible: –Identifiable data is permitted in de-identified data sets –Improvements in availability and sophistication of data matching software –EHR data sharing initiatives create more opportunities for loss

State Security/Privacy Legislation Many more States have privacy breach legislation Some States include PHI as personal data to be protected Too few States have any private right of action Enforcement activity—too early to tell

What is the real ROI of HIPAA Security/Privacy Controls With no enforcement, financial consequences are highly unlikely to non-existent Federal agency officials more focused on “helping” organizations become compliant than on catching and prosecuting miscreants Notification and reporting requirements are costly; extra steps are irritating to consumers Value of “no bad publicity” is very hard to quantify Rampant disclosures of breaches make “bad publicity” so commonplace as to be ignored by consumers

Why Are We Here? Fundamentally, the driver for security/privacy controls is consumer trust in our business, not threat of enforcement –Our business will suffer if our improper releases are made public –Security/Privacy will continue to be seen as a cost center, not a profit center Thus our job is to: –Educate our management –Secure systems and processes as best we can –Deal with inappropriate failures/disclosures of PHI –Develop business cases for security/privacy that include intangibles –Work with Public Relations to improve public perceptions of true risks

John C. Parmigiani Gary G. Christoph, Ph.D.