What to Expect and How to Prepare: Healthcare Security & Privacy Regulation and Enforcement in 2015 and Beyond.

Slides:



Advertisements
Similar presentations
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Red Flag Rules: What they are? & What you need to do
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
SCHIE Mission To improve the quality and efficiency of health care for all stakeholders in the Santa Cruz community. To deliver technology assistance,
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA Implementation. Basic HIPAA Requirements Designating a Privacy Officer Notifying patients about their privacy rights and how their information can.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Forming Your HIPAA Compliance Plan PRESENTED BY. Daniel B. Brown, Esq. Healthcare Attorney Taylor English Duma LLP Jason Karn Director Training and IT.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Managing the HIPAA & The Audit Trail Wayne Pierce, C|CISO.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
HIPAA in a Post-HITECH World
Culture of Compliance HIPAA Privacy & Security Compliance Office.
Health information security & compliance
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
Karen D. Smith, Esq. Partner Bricker & Eckler LLP 100 S. Third Street Columbus, OH (614)
OCR HITECH Enforcement Tips: Prevent, Detect and Quickly Correct HIPAA COW 2010 Spring Conference Privacy/Security Session 1 HIPAA Privacy Best Practices:
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
HIPAA PRIVACY AND SECURITY AWARENESS.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
The Implementation of HIPAA Joan M. Kiel, Ph.D., C.H.P.S. Duquesne University Pittsburgh, Pennsylvania.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
DATA PROTECTION IN THE AGO Christina Beusch Deputy Attorney General WA State Attorney General’s Office.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.
Copyright © 2011 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 3: A Blueprint for Compliance with the Privacy Rule.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
REC support is. provided under cooperative agreement 90RC0025/01 from the Office of the National Coordinator for HIT, US Dept. of Health and Human Services.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
 Ensure appropriate policies and procedures are in place to protect staff and that they are regularly reviewed and updated.  Carry out comprehensive.
Click to edit Master title style Compliance Plan Improvement For Health Systems Presented By: Scott Becker, Partner,
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
An Introduction to Compliance and HIPAA Privacy RVHIMA Spring 2016 Meeting Joshua A. Lenavitt, MHA Regional Director of Compliance and Privacy Baptist.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
1 HIPAA Privacy Rule Clean-Up Following Compliance Date Tracie Hanna & Emily McConkey American Republic Insurance Company.
HIPAA Audits are Here - Be Ready! Presenter: Diane Evans, PUBLISHER, MyHIPAA Guide Diane Evans: Phone:
Data Protection Regulation
DOL Employee Benefit Plan Audits & How to Prepare
Privacy & Information Security Basics
Rational HIPAA Woes for the CFO and Business Leaders
HIPAA.
EHRs and HIPAA: Steps to Maintain Privacy and Security of Patient Data
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Risk Management: why and how to protect your health center
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Lesson 1  7 Basic Components of an Effective Compliance Plan
Enforcement and Policy Challenges in Health Information Privacy
Auditing Compliance with the Privacy Rule
Introduction to the PACS Security
Presentation transcript:

What to Expect and How to Prepare: Healthcare Security & Privacy Regulation and Enforcement in 2015 and Beyond

2014  Data breaches  Settlements & Resolution Agreements  Approximately $5.5 million collected  Greatest number of HIPAA settlements  HIPAA Audits  Leadership changes  Complaints, compliance reviews & investigations

“OCR’s strong enforcement of the HIPAA privacy, security, and breach notification rules, remains very much on track.”

2015  HIPAA Audits  Enforcement  Complaints, compliance reviews & investigations

HIPAA Audits  Policies & procedures – daily activities  Staff knowledge & training  Cybersecurity – Risk assessments, breach notification & access controls  Privacy notice practices  Audit protocol  cement/audit/protocol.html cement/audit/protocol.html

Enforcement  6,000+ open investigations  Increased focus on negotiating settlements  Various methods for enforcement

Complaints & Investigations  Complaints volume increases each year  Record number expected for 2015  Inconsistency between regional offices  Request policies & procedures (mini audits)  Culture of compliance

How to Prepare 1. Cybersecurity 2. Business Associate Agreements

Cybersecurity  Gap analysis  Staff training  Inventory of systems & devices  Regular review of policies & procedures

Business Associate Agreements  HITECH Act  Increased negotiation surrounding BAAs  Indemnity  Which entity is responsible for breach notification & responding to patient requests  Subcontractor BAAs  Termination rights for material breach

Takeaways  Audit first  Review and negotiate BAAs  Dust off Policies & Procedures  Addressable Elements  Compliance Culture

Questions ?

Carrie S. Gilbert Dressman Benzinger LaVelle psc