Achieving Continuous HIPAA Compliance Tips & Tricks Gary Swindon RiskWatch, Inc.

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

Electronic Medical Records: Implications of HIPAA for Selecting and Implementing an EMR Todd Frech Senior Partner
Steve Meier. What is Strategic Planning Determines Where an organization is going over the next year or more, How it's going to get there How it'll know.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
Internal Control.
U.Va.’s IT Security Risk Management Program (ITS-RM) April 2004 LSP Conference Brian Davis OIT, Security and Policy.
 Board of Trustees has asked for more focus on financial controls  CES Audit Committee has requested more departmental audits  Likely that one or.
INSTITUTIONAL PHARMACY PRACTICE STANDARDS
Quality evaluation and improvement for Internal Audit
Delmar Learning Copyright © 2003 Delmar Learning, a Thomson Learning company Nursing Leadership & Management Patricia Kelly-Heidenthal
Purpose of the Standards
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
Confidentiality and Conflict of Interest Fall 2013.
Control environment and control activities. Day II Session III and IV.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Effectively applying ISO9001:2000 clauses 5 and 8
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SESSION ONE PERFORMANCE MANAGEMENT & APPRAISALS.
The Key Process Areas for Level 2: Repeatable Ralph Covington David Wang.
DAA and GEP Orlando Audit & Compliance or Audit vs. Compliance.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Risk Assessments/Risk Appetite Judith Gruenbaum 1.
Implementing and Auditing Ethics Programs
Basics of OHSAS Occupational Health & Safety Management System
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
HIPAA PRIVACY AND SECURITY AWARENESS.
Erica Cummings Grant Coordinator 1.  The New Mexico Department of Homeland Security and Emergency Management (DHSEM) is responsible for:  Monitoring.
Case Study: Five ways to energize your information security program By Jim Reiner, ISO, HIPAA Security Manager County of.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Conservation Districts Supervisor Accreditation Module 9: Employer/Employee Relations.
Implementing and Auditing Ethics Programs
Agency Risk Management & Internal Control Standards (ARMICS)
Corporate Responsibility Regulatory Compliance “Systems that ensure all students are aware of laws and regulations and act in accordance of those regulations”
Steps for Success in EHR Planning Bill French, VP eHealth Strategies Wisconsin Office of Rural Health HIT Implementation Workshop Stevens Point, WI August.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
ISO GENERAL REQUIREMENTS. ISO Environmental Management Systems 2 Lesson Learning Goals At the end of this lesson you should be able to: 
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Teambuilding For Supervisors. © Business & Legal Reports, Inc Session Objectives You will be able to: Recognize the value of team efforts Identify.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
Connecting the Dots A Practical Approach to Integrating Compliance, Risk and Quality Jody Ann Noon RN, JD Partner Health Care Regulatory Practice.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Eleventh National HIPAA Summit 5.04 Security Incident Response – What to do if a breach occurs and how to mitigate damages Chris Apgar, CISSP.
Safety Management System Implementation Michael Niels Thorsen Moscow 15 September 2005.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
Copyright © Emerson Strategic Group, Inc. All Rights Reserved 1 Ninth National HIPAA Summit Auditing for Privacy Compliance: A Case Study September.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
AML O FFICER STR working Committee. S UBJECTS Technical aspects Aspects of day-to-day compliance AML Officer duties & responsibility Challenging facing.
Solutions4Business Inc. “Your Consulting Partner for Strategic Supply Chain Initiatives” Mark Hehl Senior Consultant Solutions4Business Inc.
Compliance August 18, Agenda Outline Status Draft of Answers.
ISO Most Common Problems May 25, 2000 Underwriters Laboratories Inc. May 25, 2000 Underwriters Laboratories Inc.
EVALUATION RESEARCH To know if Social programs, training programs, medical treatments, or other interventions work, we have to evaluate the outcomes systematically.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Section Topics Determine appropriate follow-up activity by the internal audit activity Identify appropriate method to monitor engagement outcomes Conduct.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Hospital Accreditation Documentation Process & Standard Requirements
Achieving Continuous HIPAA Compliance Tips & Tricks Gary Swindon RiskWatch, Inc.
CPA Gilberto Rivera, VP Compliance and Operational Risk
Corporate Responsibility
IS4680 Security Auditing for Compliance
Drew Hunt Network Security Analyst Valley Medical Center
INTERNAL CONTROLS AND THE ASSESSMENT OF CONTROL RISK
Presentation transcript:

Achieving Continuous HIPAA Compliance Tips & Tricks Gary Swindon RiskWatch, Inc.

Achieving Compliance  Compliance Rules & Characteristics  The Keys to Achieving Compliance Goals  The Other Interested Groups  Steps to Creating a Common Focus-for Superior Results  Sleeping Well at Night-or: ‘Do You Know Where Your Data Is?’  Compliance as a Way of Life

Compliance Rules & Characteristics  Rule #1: If you believe that you can achieve compliance once-for all time; you are doomed and YOU WILL FAIL! Decide to change your mindset now and the mindset of those around you Decide to change your mindset now and the mindset of those around you Be willing to look beyond HIPAA compliance and those who have been ‘blessed’ with Privacy & Security duties as a result Be willing to look beyond HIPAA compliance and those who have been ‘blessed’ with Privacy & Security duties as a result

Compliance Rules & Characteristics-Continued  Rule #2: Continuous compliance is a process not a destination. The last person known to have a ‘silver bullet’ was the Lone Ranger The last person known to have a ‘silver bullet’ was the Lone Ranger Success is going to involve many other people and functional areas Success is going to involve many other people and functional areas

Compliance Rules & Characteristics-Continued  Rule #3: If you believe that you can do it by yourself you need clinical help. It truly does not matter how effective you are in your job-you are one person It truly does not matter how effective you are in your job-you are one person You can be a beacon, a guide, and a focal point but others will determine your success You can be a beacon, a guide, and a focal point but others will determine your success

Compliance Rules & Characteristics-Continued  Rule #4: Checklists are not compliance. The most critical aspect of continuous compliance is risk assessment; without it you are flying blind (paragraph requires both risk assessment and risk management) The most critical aspect of continuous compliance is risk assessment; without it you are flying blind (paragraph requires both risk assessment and risk management) You need a stable base from which to measure your success You need a stable base from which to measure your success

The Keys to Achieving Compliance Goals  As the song says: ‘Get a plan Stan’ Document your goals and expected outcomes Document your goals and expected outcomes Pay attention to the baseline HIPAA rules: but don’t neglect other laws etc. Pay attention to the baseline HIPAA rules: but don’t neglect other laws etc. Identify those who will gain and lose from the effort Identify those who will gain and lose from the effort Get senior management buy in Get senior management buy in Document the financial and organizational impacts from your efforts Document the financial and organizational impacts from your efforts

The Keys to Achieving Compliance Goals-Continued  Perform a good risk assessment: Ideally, it should be quantitative not qualitative Ideally, it should be quantitative not qualitative The results should provide things you need: The results should provide things you need: Identify weaknesses, threats, & exposuresIdentify weaknesses, threats, & exposures Identify mitigation effortsIdentify mitigation efforts Identify potential costs of mitigationIdentify potential costs of mitigation Identify the level of risk that the organization is willing to acceptIdentify the level of risk that the organization is willing to accept Provide a stable ‘baseline’ from which to measure the impact of your effortsProvide a stable ‘baseline’ from which to measure the impact of your efforts

The Keys to Achieving Compliance Goals-Continued  Tie the desired outcomes to the efforts of others-where should help come from?  Get resources committed to the process: Management Support Management Support People People Money Money  Provide feedback and measurement

The Other Interested Groups  Remember that there are others with a goal set similar to yours-and they can help: Internal Audit Internal Audit Information Security Information Security Privacy Group Privacy Group Patient Care Advocates/Patient Care Coordinators Patient Care Advocates/Patient Care Coordinators Human Resources Human Resources Health Information Management etc. Health Information Management etc.

Steps to Creating a Common Focus-for Superior Results  Committees can help do the work Standing Committees: Privacy, Security & Policy Standing Committees: Privacy, Security & Policy Involve senior directors/managers-NOT VPs Involve senior directors/managers-NOT VPs Don’t forget the clinical side Don’t forget the clinical side  Education focused on the common goals Training, Education, Awareness; who gets what & when Training, Education, Awareness; who gets what & when Remember HIPAA says everyone gets educated; there are no exceptions Remember HIPAA says everyone gets educated; there are no exceptions

Joining and Combining Focus-for Superior Results-Continued  Establish a HIPAA Privacy & Security Liaison Program: Management level people Management level people All areas of operations including food service All areas of operations including food service Assigned as an additional duty Assigned as an additional duty Conducts quick checks on departments Conducts quick checks on departments No set schedule but set goals for the number of assessments No set schedule but set goals for the number of assessments Collect the results and report them Collect the results and report them

Joining and Combining Focus-for Superior Results-Continued  Participate in awareness events or become the catalyst for them: AHIMA and others have a National Week declared for healthcare related activities AHIMA and others have a National Week declared for healthcare related activities Combine observances such as Compliance Week etc. into a once a year activity Combine observances such as Compliance Week etc. into a once a year activity Set up a booth or table near cafeterias; give away prizes for completing compliance puzzles Set up a booth or table near cafeterias; give away prizes for completing compliance puzzles Give away candy or key chains etc. ask questions at random on HIPAA issues Give away candy or key chains etc. ask questions at random on HIPAA issues

Joining and Combining Focus-for Superior Results-Continued  Start a voluntary HIPAA assessment/evaluation program: No blame activities; blame kills participation No blame activities; blame kills participation Units can request the Privacy & Information Security Officer do a walk through Units can request the Privacy & Information Security Officer do a walk through Educational support for on the spot corrections Educational support for on the spot corrections Include ‘Dumpster Diving’ activities (sometimes called the latex glove approach) Include ‘Dumpster Diving’ activities (sometimes called the latex glove approach)

Joining and Combining Focus-for Superior Results-Continued  Tie the compliance program to the internal audit program: The common basis for both should be the risk assessment process The common basis for both should be the risk assessment process Formalizes critical compliance monitoring as one more set of ‘eyes & ears’ Formalizes critical compliance monitoring as one more set of ‘eyes & ears’  Create & publish a Compliance Bulletin: Privacy, Security, Compliance & Internal Audit news and tips: make it a resource for everyone Privacy, Security, Compliance & Internal Audit news and tips: make it a resource for everyone

Sleeping Well at Night-or: ‘Do You Know Where Your Data Is?’  Acknowledge that most of your information is on or stored in a computer: Technical evaluation of the IS/IT risk is also necessary Technical evaluation of the IS/IT risk is also necessary Tie the technical security manager to the Corporate Information Security Officer at least on a dotted line Tie the technical security manager to the Corporate Information Security Officer at least on a dotted line Require regular monitoring and reporting on the technical risks to your information Require regular monitoring and reporting on the technical risks to your information

Sleeping Well at Night-or: ‘Do You Know Where Your Data Is?’  Organize for success: (if possible) Move Privacy, Security, Compliance & Internal Audit into the same organization Move Privacy, Security, Compliance & Internal Audit into the same organization Have the organization report to the audit/or management committees of your board Have the organization report to the audit/or management committees of your board Require quarterly reporting on all compliance activity to the full board Require quarterly reporting on all compliance activity to the full board Give the organization its own legal counsel independent of any corporate legal group Give the organization its own legal counsel independent of any corporate legal group

Compliance as a Way of Life  Remember: Your organization’s size does not matter when it comes to compliance Your organization’s size does not matter when it comes to compliance You can have a continuous compliance program but you have to work at it You can have a continuous compliance program but you have to work at it You cannot have an effective program without good risk assessments You cannot have an effective program without good risk assessments You have to be willing to try new ideas and you have to support them You have to be willing to try new ideas and you have to support them

Questions?