Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
1 Privacy and Security Tiger Team Meeting Discussion Materials Topics Patient Authentication Hearing Questions for RFC on Meaningful Use Stage 3 October.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
1 HIT Policy Committee HIT Standards Committee Privacy and Security Workgroup: Status Report Dixie Baker, SAIC July 16, 2009.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
Privacy and Security Tiger Team Subgroup Discussion: MU3 RFC July 29, 2013.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange and MU3 RFC Comments April 30, 2013.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Request for Comment Summary Health IT Policy Committee February 20, 2013.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 12, 2013.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
1 Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topics Governance RFI Prioritized Questions June 4, 2012.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange and MU3 RFC Comments Summary April 15, 2013.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 18, 2013.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
HIPAA Security Final Rule Overview
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Query Health Operations Workgroup Standards & Interoperability (S&I) Framework October 13, :00am – 12:00pm ET.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
Presentation transcript:

Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013

Agenda Wrap up RFC Comments (backup slides) Further discussion of MU Stage 3 Attestation of Security Tiger Team Next Steps 2

MU3 RFC Comments The Tiger Team’s goal is to determine if there are relevant policy considerations to discuss, based on the feedback received from the MU3 Request for Comments period, and whether previous Tiger Team recommendations address the questions. In addition, it should determine whether particular questions assigned to the Tiger Team would be better served by a discussion and response by the HIT Standards Committee and its Privacy and Security Workgroup. Goal is to finalize recommendations for MU3. 3

PSTT04 Summary What, if any, security risk issues (or Health Insurance Portability and Accountability Act (HIPAA) Security Rule provisions) should be subject to Meaningful Use attestation in Stage 3? Question: Should this be in lieu of, or added to, the existing attestation requirements (completion of security risk assessment and addressing encryption of data at rest)? 4 PSTT04 Summary: MU Attestation for Security Risks

Overview of HIPAA Privacy & Security Rule Workforce Training Requirements & Findings of the HITECH Audit Program David Holtzman U.S. Department of Health and Human Services Office for Civil Rights 5

Privacy Rule Workforce Training Covered entities must train all members of workforce on the organization’s policies and procedures implemented to comply with Privacy Rule Scope/breadth of training commensurate with workforce functions or role Document workforce member training Additional training must be provided when material changes to covered entity’s policies & procedures U.S. Department of Health and Human Services, Office for Civil Rights May 8, 2013 page 6

Security Rule Training Security Awareness and Training Standard requires covered entities and business associates to train each individual with access to e-PHI of the organization’s security measures to reduce the risk of improper access, uses, and disclosures Addressable implementation specifications require CE/BA to put into place reasonable and appropriate measures to implement –Periodic updates or security reminders –Procedures for guarding against malicious software –Monitoring log-in attempts and reporting discrepancies –Procedures for creating, changing and safeguarding passwords Scope/breadth/refresher training commensurate with functions or role U.S. Department of Health and Human Services, Office for Civil Rights May 8, 2013 page 7

Level 1 Entities Large Provider / Payer Extensive use of HIT - complicated HIT enabled clinical /business work streams Revenues and or assets greater than $1 billion Level 2 Entities Large regional hospital system (3-10 hospitals/region) / Regional Insurance Company Paper and HIT enabled work flows Revenues and or assets between $300 million and $1 billion Level 2 Entities Large regional hospital system (3-10 hospitals/region) / Regional Insurance Company Paper and HIT enabled work flows Revenues and or assets between $300 million and $1 billion U.S. Department of Health and Human Services, Office for Civil Rights May 8, 2013 | page 8 Level 3 Entities Community hospitals, outpatient surgery, regional pharmacy / All Self- Insured entities that don’t adjudicate their claims Some but not extensive use of HIT – mostly paper based workflows Revenues between $50 million and $300 million Level 3 Entities Community hospitals, outpatient surgery, regional pharmacy / All Self- Insured entities that don’t adjudicate their claims Some but not extensive use of HIT – mostly paper based workflows Revenues between $50 million and $300 million Level 4 Entities Small Providers (10 to 50 Provider Practices, Community or rural pharmacy) Little to no use of HIT – almost exclusively paper based workflows Revenues less than $50 million Summary of Entities Audited

Size/Type of Entities Audited U.S. Department of Health and Human Services, Office for Civil Rights May 8, 2013 | page 9 Level 1 Level 2 Level 3 Level 4Total Health Plans Healthcare Providers Healthcare Clearinghouses Total Data as of December 2012.

Overall Findings & Observations No findings or observations for 13 entities (11%) 2 Providers, 9 Health Plans, 2 Clearinghouse s Security accounted for 60% of the findings and observations— although only 28% of potential total Providers had a greater proportion of findings & observations (65%) than reflected by their proportion of the total set (53%) Smaller, Level 4 entities struggle with all three areas NIST / OCR May 22,

Types of Privacy Rule Audit Findings U.S. Department of Health and Human Services, Office for Civil Rights May 8, 2013 | page 11 Data as of December 2012.

Privacy Administrative Elements 12

Security Results 58 of 59 providers had at least one Security finding or observation No complete & accurate risk assessment in two thirds of entities 47 of 59 providers, 20 out of 35 health plans and 2 out of 7 clearinghouses Security addressable implementation specifications: Almost every entity without a finding or observation met by fully implementing the addressable specification. 13

Types of Security Rule Audit Findings U.S. Department of Health and Human Services, Office for Civil Rights May 8, 2013 | page 14 Data as of December 2012.

Tiger Team Next Steps Privacy and Security Re: Cloud Computing Right of Access in an Electronic Environment 15

BACK-UP Query/Response 16

PSTT01 Summary How can the HITPC’s recommendation be reconciled with the National Strategy for Trusted Identities in Cyberspace (NSTIC) approach to identification which strongly encourages the re-use of third party credentials? Straw Response: The Tiger Team’s September 2012 recommendations on provider user identity management apply. These were adopted by the Policy Committee in September 2012 and expressly referenced NSTIC. The recommendations urged multi-factor authentication at NIST Level of Assurance (LoA) 3 for remote access to PHI; entities covered by HIPAA should also, as part of their security risk assessment, identify other access environments that may require multiple factors to authenticate an asserted identity. Provider users should continue to be identity proofed in compliance with HIPAA. Work being as part of NSTIC to establish trusted, third-party credentials is ongoing but such solutions are not yet widely available, and may not be by Stage 3. Consequently, as recommended by the Policy Committee, ONC's efforts on this issue should continue to be informed by NSTIC developments, including (but not limited to) the work being done in the NSTIC pilots.** 17 PSTT01 Summary: Re-use of 3rd Party Credentials **Source: Sept 2012 HITPC Recommendations to ONC

How would ONC test the HITPC’s recommendation (for two-factor authentication) in certification criteria? Straw Response: As the question does not request a policy-based response, the Tiger Team believes this question would be best answered by the HITSC Privacy and Security Workgroup. 18 PSTT02 Summary: Certification Criteria for Testing Authentication

Should ONC permit certification of an EHR as stand-alone and/or an EHR along with a third-party authentication service provider? Straw Response: Yes 19 PSTT03 Summary: EHR Certification - Standalone or

Is it feasible to certify the compliance of EHRs based on the prescribed [ASTM] standard for [audit logs]? Straw Response: The Tiger Team suggests that the HITSC Privacy and Security Workgroup address whether it is feasible to certify compliance of EHRs with the prescribed ASTM audit log standard. Some Tiger Team members also questioned the adequacy of the standard. 20 PSTT05 Summary: Certification Standard for Audit Logs

Is it appropriate to require attestation by meaningful users that such logs are created and maintained for a specific period of time? Straw Response: The HIPAA Security Rule does not require that audit logs are maintained for a specific period of time. Consequently, the Tiger Team does not see a reason to require additional policy specifying a timeframe. Covered entities will make their own decisions on audit trail maintenance periods based on their internal policies. 21 PSTT06 Summary: Attestation for Length of Time Logs

Is there a requirement for a standard format for the log files of EHRs to support analysis of access to health information access multiple EHRs or other clinical systems in a healthcare enterprise? Straw Response: Although there are arguments in favor of standardizing formats for log files, this is a lower priority discussion in the context of Meaningful Use. The Tiger Team recommends following the guidance of the HIPAA Security Rule, which does not require any particular audit trail format. 22 PSTT07 Summary: Standard Format for Log Files

Are there any specifications for audit log file formats that are currently in widespread use to support such applications? Straw Response: The Tiger Team recommends following the guidance of the HIPAA Security Rule, which does not require any particular format. The HITSC Privacy and Security Workgroup can determine whether particular specifications should be required for EHR certification. 23 PSTT08 Summary: Audit Log File Specifications

Some federal and state health information privacy and confidentiality laws, including but not limited to 42 CFR Part 2 (for substance abuse), establish detailed requirements for obtaining patient consent for sharing certain sensitive health information, including restricting the recipient’s further disclosure of such information. Three questions were put forth. 24 MU4 Summary: Patient Consent

1)How can EHRs and HIEs manage information that requires patient consent to disclose so that populations receiving care covered by these laws are not excluded from health information exchange? 2)How can MU help improve the capacity of EHR infrastructure to record consent, limit the disclosure of this information to those providers and organizations specified on a consent form, manage consent expiration and consent revocation, and communicate the limitations on use and restrictions on re-disclosure to receiving providers? 3)Are there existing standards, such as those identified by the Data Segmentation for Privacy Initiative Implementation Guide, that are mature enough to facilitate the exchange of this type of consent information in today’s EHRs and HIEs? 25 MU4 Summary: Patient Consent

Straw Response: The Tiger Team refers to its recent recommendations (adopted by the Policy Committee) on Query/Response re: technical mechanisms to support communication of patient consent requirements. –Data holders and requesters should comply with applicable law and policy and should have a technical way to communicate applicable consent or authorization needs and requirements. They should also have a means to maintain a record of such transactions. The HITSC should further consider technical methods for giving providers the capacity to comply with applicable patient authorization requirements or policies. The Tiger Team has deferred further discussion on data segmentation** until it has received an update on the DS4P Initiative pilot projects. 26 MU4 Summary: Patient Consent **Source: Sept 2010 HITPC Recommendations to ONC