Implementing the HIPAA Security Rule John Parmigiani National Practice Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
HIPAA Security Standards What’s happening in your office?
Security Controls – What Works
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
IT’S OFFICIAL: GOVERNMENT AUDITING OF SECURITY RULE COMPLIANCE Nancy Davis, MS, RHIA Director of Privacy/Security Officer, Ministry Health Care & Catherine.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
© by Seclarity Inc. 2005, Slide: 1 Seclarity, Inc Lightfall Court Columbia, MD A Blumberg Capital, Valley Ventures and Intel Capital Funded.
Basics of OHSAS Occupational Health & Safety Management System
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Eliza de Guzman HTM 520 Health Information Exchange.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
Working with HIT Systems
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
HIPAA Health Insurance Portability and Accountability Act of 1996.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
HIPAA Security Final Rule Overview
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Healthcare Security Professional Roundtable John Parmigiani National Practice Director Regulatory and Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Health Insurance Portability and Accountability Act HIPAA 101
Understanding HIPAA Dr. Jennifer Lu.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Introduction to the Federal Defense Acquisition Regulation
Paul T. Smith Davis Wright Tremaine LLP
I have many checklists: how do I get started with cyber security?
County HIPAA Review All Rights Reserved 2002.
Thursday, June 5 10: :45 AM Session 1.01 Tom Walsh, CISSP
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Healthcare Security Rule Compliance: Afternoon Plenary Session
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
Presentation transcript:

Implementing the HIPAA Security Rule John Parmigiani National Practice Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.

2  Introduction  Final Security Rule  Key Concepts  Benefits and Impacts  Steps & Tools Toward Compliance  Conclusions

3

4 John Parmigiani  CTGHS National Director of HIPAA Compliance Services  HCS Director of Compliance Programs  HIPAA Security Standards Government Chair/ HIPAA Infrastructure Group  Directed development and implementation of security initiatives for HCFA (now CMS)  Security architecture  Security awareness and training program  Systems security policies and procedures  E-commerce/Internet  Directed development and implementation of agency-wide information systems policy and standards and information resources management  AMC Workgroup on HIPAA Security and Privacy;Content Committee of CPRI-HOST/HIMSS Security and Privacy Toolkit; Editorial Advisory Boards of HIPAA Compliance Alert’s HIPAA Answer Book and HIPAA Training Line; Chair,HIPAA-Watch Advisory Board; Train for HIPAA Advisory Board

5

6 Security Goals  Confidentiality  Integrity  Availability of protected health information

7 Good Security Practices  Access Controls- restrict user access to PHI based on need-to-know  Authentication- verify identity and allow access to PHI by only authorized users  Audit Controls- identify who did what and when relative to PHI

8 Security Axioms  There is no such thing as 100% security  Security is a business process  Security is an investment, not an expense  It is difficult to calculate the on return on investment for security  Threats and risks are constantly changing  Know your real risks  Determine the probability and impact  Prioritize your efforts  Manage risks to an acceptable level  Some security is better than no security  Keep it simple and straightforward  Security should be transparent to the user  Security tools and products are like safety devices:  Most of the time, you do not need them;  But those few times when you do need them…  Your overall security is only as good as your weakest link

9 So…Security is Good Business  “ Reasonable measures” need to be taken to protect confidential information (due diligence)  A balanced security approach provides due diligence without impeding health care  Good security can reduce liabilities- patient safety, fines, lawsuits, bad public relations  Can have security by itself, but Cannot have Privacy without Security!

10 Consequences of Inadequate Security  Civil Lawsuit Financial loss  Criminal Penalties Fines and prison time  Reputation Lack of confidence and trust Violation of patient privacy may result in: Major threats: Dissatisfied Employees and Dissatisfied Patients

11 Or Worse… A breach in security could damage your organization’s reputation and continued viability. “There is a news crew from 60 Minutes in the lobby. They want to speak to to you about an incident that violated a patient’s privacy.”

12 Security Rule Timeline  Originally posted to the Federal Register on August 12, 1998  Rule was sent to the Office of Management and Budget (OMB) on January 13, 2003  Published in Federal Register on February 20, 2003  Compliance by April 21, 2005  An extra year for small payers – Below $5 million: April 21, 2006

13 HIPAA Security Standards  Are based upon good business practices and  Have these basic characteristics:  Comprehensive  Flexible  Scalable  Technology Neutral

14 Comparison of Rules Old Proposed Rule –  24 Requirements  69 Implementation Features New Final Rule –  18 Standards  42 Implementation Specifications:  20 Required  22 Addressable

15 Comparison of Rules Old vs. New Terminology  “Requirement” “Standard”  “Implementation Feature” “Implementation Specification” “Required” or “Addressable”

16 Comparison of Rules Old Proposed Rule –  Section headings, Requirements and Implementation Features were listed in alphabetical order so as not to imply the importance of one requirement over another New Final Rule –  Standards and Implementation Specifications are grouped in a logical order within each of the three areas: Administrative, Physical and Technical Safeguards

17 Other Changes  Removes the Electronic signature standards  Incorporates standards that parallel those in the Privacy Rule thus helping organizations meet a number of the security standards through the implementation of the privacy rule  Covers only electronic protected health information (More limited than Privacy Rule)  Requires a minimum level of documentation that must be periodically updated to reflect currently practices

18 Terminologies Removed  Formal – Was used to convey documentation rather than word-of-mouth  Breaches – Replaced by “security incident”  Open Networks – Now up to the entity to determine when to apply encryption (addressable because there is not a simple solution to encrypting s with patients) Consider industry best practices.

19 Terminologies Clarified  System – "an interconnected set of information resources under the same direct management control that shares common functionality… includes hardware, software, information, data, applications, communications, and people."  Workstations – "an electronic computing device, for example, a laptop or desktop computer, or any other device that performs similar functions, and electronic media stored in its immediate environment."

20 HIPAA Security Standards  Administrative (55%)  12 Required, 11 Addressable  Physical (24%)  4 Required, 6 Addressable  Technical (21%)  4 Requirements, 5 Addressable The final rule has been modified to increase flexibility as to how protection is accomplished.

21

22 Risk Analysis  “The most appropriate means of compliance for any covered entity can only be determined by that entity assessing its own risks and deciding upon the measures that would best mitigate those risks”  Does not imply that organizations are given complete discretion to make their own rules  Organizations determine their own technology choices to mitigate their risks

23 Addressable Implementation Specifications  Covered eternities must assess if an implementation specification is reasonable and appropriate based upon factors such as:  Risk analysis and mitigation strategy  Current security controls in place  Costs of implementation Key concept: “reasonable and appropriate” Cost is not meant to free covered entities from their security responsibilities

24 Addressable Implementation Specifications If the implementation specification is reasonable and appropriate, then implement it If the implementation specification is not reasonable and appropriate, then:  Document why it would not be reasonable and appropriate to implement the implementation specification and implement an equivalent alternative measure if reasonable and appropriate or  Do not implement and explain why in documentation

25 Other Concepts  Security standards extends to the members of a covered entity’s workforce even if they work at home (transcriptionists)  Security awareness and training is a critical activity, regardless of an organization's size  Evaluation – Periodic review of technical controls and procedural review of the entity’s security program  Documentation Retention – Six years from the date of its creation or the date when it last was in effect, whichever is later

26 HIPAA = Culture Change Organizational culture will have a greater impact on security than technology. Must have people optimally interacting with technology to provide the necessary security to protect patient privacy. Open, caring-is-sharing environment replaced by “need to know” to carry out healthcare functions. Organizational Culture Technology 20% technical 80% policies & procedures

27

28 Benefits  Establishes minimum baseline  Encourages the use of EDI (increased confidence in the reliability and confidentiality)  Promotes connectivity to provide availability of information  Reduces the risks and potential cost of a security incident versus the increase in costs of additional security controls for compliance

29 Impacts – Responsibility  Responsibility must rest with one individual to ensure accountability  “More than one individual may be given specific security responsibilities, especially within a large organization, but a single individual must be designated as having the overall final responsibility for the security of the entity's electronic protected health information.”  Aligns Security Rule with the Privacy Rule provisions concerning the Privacy Official

30 Other Impacts  Impacts will be dependent upon the size, complexity, and capabilities of the covered entity  “Ensuring” protection does not mean providing protection, no matter how expensive.  Balance between the information's identifiable risks and vulnerabilities, and the cost of various protective measures  Enforcement not defined in the rule

31

32 Security Compliance Program Steps 1. Appoint an official to oversee the program 2. Set standards of expected conduct 3. Establish training, education, and awareness program 4. Create a process for receiving and responding to reports of violation 5. Audit and monitor for compliance on an on-going basis 6. Take appropriate corrective actions

33 Serendipity Effect of Privacy Compliance  Complying with the Security Rule should be fairly easy if you have done the preliminary work for Privacy- PHI flow, risk assessments  Implementation of “safeguards” to protect the privacy of PHI  Balance through synchronization and symmetry

34 Next Steps  Assign responsibility to one person-CSO  Conduct a risk analysis  Deliver security training, education, and awareness in conjunction with privacy  Develop/update policies, procedures, and documentation as needed  Review and modify access and audit controls  Establish security incident reporting and response procedures  Make sure your business associates and vendors help enable your compliance efforts

35 Risk Analysis  What needs to be protected? (Assets – Hardware, software, data, information, knowledge workers/people)  What are the possible threats? (Acts of nature, Acts of man)  What are the vulnerabilities that can be exploited by the threats?  What is the probability or likelihood of a threat exploiting a vulnerability?  What is the impact to the organization?  What controls are needed to mitigate impacts/ protect against threats

36 Information Security Policy  The foundation for an Information Security Program  Defines the expected state of security for the organization  Defines the technical security controls for implementation  Without policies, there is no plan for an organization to design and implement an effective security program  Provides a basis for training

37 Audits  Data Owners periodically receive an access control list of who has access to their systems and what privileges they have  Users are randomly selected for audit  Audit data is provided to their managers  Warning banners are displayed at logon to any system or network (“No expectation of privacy”)  Audit logs are stored on a separate system and only the Information Security Officer has access to the logs  Audit trails generated and evaluated

38 Incident Reporting and Response  Can staff identify an unauthorized use of patient information?  Do staff know how to report security incidents?  Will staff report an incident?  Is there one telephone number that staff can call to report any type of incident?  Are there trained and experienced employees responsible for collecting and preserving evidence?  Is the procedure enforced?

39

40 Reasonableness/Common Sense  Administrative Simplification Provisions are aimed at process improvement and saving money  Healthcare providers and payers should not have to go broke becoming HIPAA- compliant  Expect fine-tuning adjustments over the years

41 A Balanced Approach $ Risk  Cost of safeguards vs. the value of the information to protect  Security should not impede care  Security and Privacy are inextricably linked  Your organization’s risk aversion

42 /