Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015...

23
Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA

Transcript of Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015...

Page 1: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Building a Blueprint for HIPAA HITECH Privacy and Security Compliance

PACHC October 7, 2015

Lancaster, PA

Page 2: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Learning Objectives

1. Recognize critical security and privacy risks affecting organizations serving underserved communities.

2. Determine how to perform a risk assessment and develop a Risk Management Strategy.

3. Understand the critical success factors in building an organizational culture of privacy and security compliance.

Page 3: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

3

Health Care Transformation Requires Security and Privacy Integration

New technologies New Care Models

Growing Consumer Engagement

HIPAARequirementsand Penalties

Meaningful UseRequirements

OCR Auditsfor HIPAA

Compliance

HITECH ActTransparency,

ReportingRequirements

Increased Regulatory Scrutiny

Page 4: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

4

Connected Clinicians and Consumers

Page 5: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

ePHIEMR /PHR

Payers

HIEs

ACOs

Rev Cycle/ 3rd Party Billing

Clinicians

Consumers

Big Data/ AnalyticsEmployers

Other Health Systems

Electronic healthcare interactions involve more data from multiple sources

Page 6: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

6

Understa

nding

Risk

Page 7: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

What is the greatest risk?

75% of organizations say the greatest risk to security and privacy of patient information is employee negligence.

Page 8: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Phishing season

Healthcare organizations are 74% more likely to receive phishing e-mails than other industries.

Page 9: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

PHI DATA BREACH IS LURKING

• “If you think compliance is expensive, try noncompliance.”

-Paul McNulty, Former U.S. Deputy Attorney General

Page 10: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

2

HIPAA Guidance Can Be Overwhelming

Risk AssessmentEncryption

Mobile Media

Breach NotificationFines

Audits

Authentication

HIPAA Privacy

Business AssociatesAccess Control

Disaster RecoveryConfidentiality

Integrity Availability

Patient Access

Risk Management

Contingency Planning

Page 11: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Needed: Step-by-Step Risk Management

Risk Analysis

Gap Analysis

Remedia

tion

Monitoring

Execution • BAAs• Access Control• Training• Contingency Planning•Encryption• etc

Team • Management• Human Resources• Facilities• IT Services• Staff

Plan • Policies• Procedures• Implementation• Monitoring

Page 12: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Assess Organization readiness and

compliance

Prioritize and mitigate

security and privacy

risks and gaps

Develop an ongoing security

and privacy program including

policies and training

A Simplified prioritized approachto security and privacy compliance

Risk Assessmen

t

Gap Analysis

Remediation and

Monitoring

Page 13: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

• Guided Questions

• Yes/No only. No ambiguity!

• Built-in help, integrated training

• Quickly move from Assessment to Action

13

Rapid Risk Analysis: Quick How Am I Doing Diagnostic

Page 14: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

• Expert-guided

• Priority based on Risk, Cost and Impact

• Built-in help, integrated training

• Accommodates varying organizational Goals and Objectives

14

Gap Analysis: Prioritize Risks to Focus on What’s Important

Page 15: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Rapid Risk Remediation: Mitigate Risks and Develop Required Documentation• Detailed Task-by-

Task Work plan

• Simple Workflow

• Web and email integration

• Task ownership and scheduling

• Self-documenting

15

Page 16: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Who is my BA?

Are you a Covered Entity (Healthcare Provider, Health Plan, Healthcare Clearinghouse)?

Do you perform services to or activities for a Covered Entity?

Not a Business Associate.

No

Yes

Not a Business Associate.

Do services or functions involve access to Protected Health Information?

Yes

No

No

Yes

You are a Business Associate.

Page 17: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Who are Business Associates?Healthcare Entity Business

AssociateComment

Claims Clearinghouse no Covered entityHospital Systems no Covered entityHealth Information Exchange yesIT Service Provider yesReference lab no Covered entityRadiology Service Provider no Covered entityReferring/Referred to Provider (any specialty)

no Covered Entity

Answering Service yesCommercial Insurer No/Yes Covered Entity/if adm self-

insured benefit planLawyer yes If litigating patient casesAccounting Firm yes If reviewing/managing

claims dataOff-site Med Records Storage Facility

yes

Housekeeping Service no Incidental contact with PHI

Page 18: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

The Ten BAA Essentials BAA Essentials1. Establish Permitted Uses

and Disclosures.2. State BA will not use or

disclose PHI for reasons not permitted or required.

3. Require BA implement HIPAA safeguards to prevent unauthorized use or disclosure.

4. Require BA to report to CE unauthorized use or disclosure.

5. Require BA to disclose PHI to satisfy CE’s obligation to provide individuals access to their PHI, for amendments, and accountings.

6. Require BA to comply with CE’s Privacy Rule obligations, as agreed.

7. Require BA to make available to HHS information needed to show CE’s compliance with HIPAA.

8. At the termination of the contract, require BA to return or destroy the PHI.

9. Require BAs ensure their subcontractors agree to the same provisions as the BA agreed.

10.Authorize the termination of the contract if BA violates any material term, (i.e. #’s 1-9).

Page 19: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Business Associate Essentials

• Have a Business Associate Agreement.• Know your Business Associates.

How are they protecting PHI?• Know what PHI your Business

Associates access.

Page 20: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Top Risk Areas That you should CONSIDER And MITIGATE

1. Do you have a complete and up-to-date set of security and privacy policies?

2. Do you have an inventory that identifies the devices, network and software that process, store and transmit PHI?

3. Have you conducted a risk assessment in the past 12 months and acted on it?

4. Do you have business associate agreements in place with all BAs you share PHI with?

5. Do you have a Business Continuity plan in place in case of a disaster or breach?

6. Do you conduct required security and privacy awareness training?

7. Is all patient information encrypted on mobile devices?

8. Do you have a documented policy for granting, changing or terminating PHI access?

9. Have you designated one person as security officer in your organization?

10. Do you track who has been assigned/has access to mobile devices, keys and physical tokens?

Page 21: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Increase Security Literacy: Support Your Staff in Understanding their Role in HIPAA

HITECH Compliance

Who •Employees (full-time, part-time, temp) with access to PHI (electronic or paper)

When •Onboarding new employees•Supplemental training throughout the year (targeted reminders, or new job duty, new policy, new procedure, new technology, a security incident )•Annual review of general HIPAA concepts

How •Onsite – classroom training•Virtual – elearning (videos, interactive online training software, kiosk)•Email, posters, flyers

Page 22: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

22

Thank You!!

Page 23: Building a Blueprint for HIPAA HITECH Privacy and Security Compliance PACHC October 7, 2015 Lancaster, PA.

Anna Gard, RN, FNP-BCHealth IT and Quality ConsultantDPM Healthcare [email protected]

Adam Bullian, JDDirector QiP [email protected]