How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment

Similar documents
a physicians guide to security risk assessment

Meaningful Use Audit Process: Focus on Outcomes and Security

View the Recording. Webinar: Accounting of Disclosures: Practical Approaches & Enforcement Update. November 17 th, FairWarning, Inc.

ADDING VALUE BY AUDITING HEALTH INFORMATION IMPLEMENTATIONS ALEX ROBISON DAVID ZAVALA

Top 5 Must Do IT Audits

HIPAA Demystified: Strategies to Bullet Proof Your Compliance Plan. Chris Apgar, CISSP Ron Moser, CISA, CRISC

HIPAA and Electronic Information

How to Secure Your Healthcare Communications in a World of Security and Compliance Threats

OCR Audits: 2012 Results Overview

HIPAA Compliance. Mandatory for 7 MILLION Covered Entities (CE) & Business Associates (BA) 70% of the market is NOT compliant!

Preparing for an OCR Audit: What is Expected of You

Do You Know What Your Business Associates Subcontractors & Vendors Are Doing With Your PHI & ephi?

Do You Know What Your Business Associates Subcontractors & Vendors Are Doing With Your PHI & ephi?

EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY Created for mike elfassi

The Relationship Between HIPAA Compliance and Business Associates

HIPAA Compliance and Mistakes:

HIPAA PRIVACY RULE IMPLEMENTATION WHAT S UP AFTER 4/14/03?

Big Data, Security and Privacy: The EHR Vendor View

On the Alert: Incident Response Plan for Healthcare 111/13/2017

Role Based Access Governance and HIPAA Compliance: A Pragmatic Approach

THE FIVE ELEMENTS OF AN EFFECTIVE HIPAA AUDIT PREPARATION PROGRAM

E. FOCUS: The electronic medical record system and billing platform utilized by MCCMH.

Sharp HealthCare s 2017 Compliance Education. Compliance and Ethics Module 1

Walter E. Johnson Director of Compliance & Ethics Kforce Government Solutions

You Might Have a HIPAA Breach. Now What?

You Might Have a HIPAA Breach. Now What?

Clearwater and Encompass Case Study Creating an OCR-Quality Risk Management Plan

Managing the Business Associate Relationship: From Onboarding to Breaches. March 27, 2016

Meaningful Use Audit

Contents. Primer Series: HIPAA Privacy, Security, and the Omnibus Final Rule

From the Front Lines: Navigating the OCR Phase 2 HIPAA Audits

Certified Identity Governance Expert (CIGE) Overview & Curriculum

CONSULTING & CYBERSECURITY SOLUTIONS

Collaboration with Business Associates on Compliance

Securing Access of Health Information Using Identity Management

Quality Insights Quality Innovation Network Security Risk Assessments: Meaningful Use and HIPAA Perspectives Webinar August 26, 2015

Visualize Your Compliance

Meaningful Use Audits

table of contents INTRODUCTION...3 CHAPTER 1: WHAT IS HITRUST?...4 CHAPTER 2: THE BENEFITS OF USING HITRUST...6

How to Prevent Workplace Violence Incidents and Improve Security Using Baseline Security Assessments

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference

AN ANALYSIS OF TITLE I - QUALITY, AFFORDABLE HEALTH CARE FOR ALL AMERICANS

An Integrated Solution to Your Medical Billing & Collection Needs

Text. What the Heck is a HIPAA AUDIT? Presented by Sue Miller

3/21/2017. How and when should you leverage internal audit? March 28, Agenda. What are your initial thoughts on internal audit?

2017 Healthcare Compliance Benchmark Study

Governance & Total Compliance

How to Stand Up a Privacy Program: Privacy in a Box

Ensuring the health of endpoints in healthcare IT

Privacy Assessment: Beginning the Process

General Data Protection Regulation

These seminars are a collaborative work of NIATx, SAAS and The National Council supported by SAMHSA.

Industry Planning for Implementation of HIPAA Modifications: Versions 5010, D.0, 3.0 and the ICD-10 code sets

ELECTRONIC DISTRIBUTION RULES

ELECTRONIC MEDICAL RECORDS. Selec g and zing an Electronic Medical Records. A WHITE PAPER by CureMD. CureMD Healthcare

Unified SaaS Solution for Cybersecurity and Risk. Curran Data Technologies

Welcome to today s Live Event we will begin shortly. Please feel free to use Chat or Q&A to tell us any burning questions you may have in advance

HIPAA Summit VII. Preconference III. Advanced Strategies to Achieve ROI in Implementing HIPAA

a. When access is requested for non-clinical staff, the appropriate supervisory staff will be the staff s direct supervisor.

Standard Statement and Purpose

Salesforce Shield for Healthcare

PARTICIPANT RIGHTS AND PRIVACY. Tammy Stewart, CHRC & Jenny Bernhard, CHPC, CHC

Out of Order! The Risks of Being Out of Compliance

Commonwealth Health Insurance Connector Authority

Stacey Carr, Division Privacy Officer. Ram Ramadoss, Director, Privacy and Information Security oversight Catholic Health Initiatives

HIPAA Summit Presentation Practical Tips to Help AVOID Enforcement

HIPAA and Medical Device Security

Delivered by Sandra Fuller, MA, RHIA, FAHIMA. April 29, 2009

Impact of the Stimulus Package on Health IT Marketplace

North Shore LIJ Health System, Inc.

The Rye Ambulatory Surgery Center, LLC Compliance Plan

Four Rights Can t Be Wrong:

ICD-10 Regional Office Training Workshop. ICD-10 Overview. Training segments to assist State Medicaid Agencies with ICD-10 Implementation

Legacy Health Data Management, an Overview of Data Archiving & System Decommissioning with Rick Adams

THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS :

Operational Recovery in Healthcare Using Virtual Technologies. CareTech Solutions

Merge Unity HIPAA COMPLIANCE STATEMENT. Merge Healthcare 900 Walnut Ridge Drive Hartland, WI 53029

We know doctors. isalus.

six years post six years post-- attestation

Operational Impacts of Administration Simplification Lessons Learned and Practical Approaches to Compliance

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

Workplace Privacy: New Technology, New Challenges Second Quarter Roundtable June 16, 2015

A Guide to Building a Healthy Dental Practice. technology mistakes that can damage or destroy 7 your dental practice - and how to avoid them

ﺖﻴﻨﻣا ﺖﻳﺮﻳﺪﻣ ﻢﺘﺴﻴﺳ ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ يﺎﻫدراﺪﻧﺎﺘﺳا يﺎﻬﺘﺳﺎﻴﺳ ﻪﻳﺎﭘ ﺮﺑ تﺎﻋﻼﻃا BS7799 & BS15000 لوا ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ

CLINICAL MOBILITY SERVICES

Effective Data Governance & GDPR Compliance for the Nonprofit CFP

Enterprise Research Risk

New PPACA Wellness Incentives Rules

Compliance Case Studies

Policy 2 Workforce Security Policy and Procedure

Interoperability & Secure, Compliant Communications in Healthcare

Policy Policy Name: Compliance Training and Education Page: 1 of 6 Department: Medicare Compliance Policy Number: 3000_20M

Compliance Plans. Kelly S. McIntosh July 20, 2017

Healthcare Predictions for Executives and Strategists

Department of Public Health OF SAN FRANCISCO

Compliance Solutions FOR HEALTH CARE. message archive search message archive search message archive search

Report No. AHCA A February Agency Agreements EXECUTIVE SUMMARY

Sarbanes-Oxley Compliance Kit

LIBERTY Dental Plan General Compliance Training

Do I Have to Attest? What Actions Are Required?

Transcription:

How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment Caroline Hamilton caroline.r.hamilton@gmail.com Risk & Security LLC As channeled by Dr. HIPAA

Meaningful Use was the Hottest Topic at HIMSS 2012

Meaningful Use The American Recovery and Reinvestment Act of 2009 (Recovery Act) authorizes the Centers for Medicare & Medicaid Services (CMS) to provide reimbursement incentives for eligible professionals and hospitals who are successful in becoming "meaningful users" of certified electronic health record (EHR) technology. Meaningful Use of Electronic Health Records Final Rule This rule provides guidelines to health professionals and hospitals on how to adopt and use electronic health record technology in a meaningful way to help improve the quality, safety, and efficiency of patient care. The rule also provides guidelines on how providers can qualify for the Medicare and Medicaid EHR Incentive Programs. http://healthit.hhs.gov/portal/server.pt/community/healthit_hh s_gov regulations_and_guidance/1496

Required Meaningful Use Core Measure Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.

From Federal Auditors-June, 2012

#1 Deficiency in HIPAA Security Rule Compliance AND #1 Reason for Not Completing Meaningful Use! Have Not Conducted the REQUIRED Risk analysis!

RISK ANALYSIS (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the [organization]. Findings Did not perform a risk assessment Did not have a formalized, documented risk assessment process Had outdated risk assessments Did not address all potential areas of risk Recommendations Develop formal risk analysis program that is comprehensive Maintain accurate inventory of where EPHI & PHI resides Identify threats & vulnerabilities Assess the level of risk Develop a Corrective Action Plan for gaps identified

OCR Audit Issues - Security

OCR Audit Issues by Type

From the KPMG Audits, June, 2012 At the Healthcare Financial Management Association s National Institute, June 24-27 in Las Vegas, two KPMG officials walked through the audit process. It covers the full range of health care organizations, from mom and pop practices to large delivery systems, says Mark Higdon, a co-presenter and a partner in KPMG s healthcare advisory unit. Every provider needs to initiate an internal risk assessment now, Higdon advises. If they wind up being audited, That will go a long way toward smoothing the audit, he adds.

LESSONS LEARNED from HIPAA Risk Analyses in the Field 1. Risk Analyses not up to Date, or never done 2. Analyses too concentrated on technical elements 3. Input for the analysis are too limited often to just the IT security staff. 4. Business Associates are not included in the analyses. 5. Analyses don t follow NIST 800-66 guidance. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. 6. Analyses haven t been updated. 7. Didn t include paper records protection

MEGA-HIPAA RULE WILL BE RELEASED SOON The mega rule combines four separate rulemakings: the changes to HIPAA's privacy and security rules mandated by the HITECH Act; the new enforcement requirements and higher penalty requirements; the final regulations of HITECH's breach notification rule; and changes to HIPAA to incorporate the Genetic Information Nondiscrimination Act (GINA). OCR also will release guidance to help entities implement the changes, including an updated business associate agreement. OCR helped the National Institute of Standards and Technology (NIST) develop an electronic tool to help entities comply with HIPAA's security rule.

OCR issued Final Guidance on the Risk Analysis in July, 2010

Defining a Risk and Compliance Program with the HIPAA Risk Analysis Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications in the HIPAA Security Rule. Therefore, a risk analysis is foundational, and must be understood in detail.. (Office of Civil Rights Guidance, July 2010) In addition to an express requirement to conduct a risk analysis, the Rule indicates that risk analysis is a necessary tool in reaching substantial compliance with many other standards and implementation specifications. (Office of Civil Rights Guidance, July 2010)

Why Haven t Organizations Met The HIPAA Risk Analysis Requirement? Lots of work - Lots of numbers Must meet audit requirements for risk assessment Voluminous content is hard to keep updated How to administer Web-based surveys? And involve management and the user community. How do you do the Risk Calculation and QUANTIFY RISK? How to quickly put reports together for management?

California Fines for Breaches Average Cost Per Record - $2766.00 1. Community Hospital of San Bernardino: $250,000 fine; unauthorized access of 204 patients medical information by 1 employee 2. Community Hospital of San Bernardino: $75,000 fine; unauthorized access of 3 patients medical information by 1 employee 3. Enloe Medical Center: $130,000 fine; unauthorized access of 1 patient s medical information by 7 employees 4. Rideout Memorial Hospital: $100,000 fine; unauthorized access of 33 patients medical information by 17 employees 5. Ronald Reagan UCLA Medical Center: $95,000 fine; unauthorized access of 1 patient s medical information by 4 employees 6. San Joaquin Community Hospital: $25,000 fine; unauthorized access of 3 patients medical information by 2 employees

Elements of an OCR Risk Analysis Approach Assets/Values Threats/Risks Vulnerabilities/Weaknesses Losses Controls/Safeguards

Data Aggregation & Analysis Asset Loss Threat Vulnerability Applications Delays & Denials Disclosure Acceptable Use Database Fines Hackers Disaster Recovery Financial Patient Info. Data Disclosure Fraud Authentication Hardware Modification Viruses Network Controls System Direct Loss Network Attack No Security Plan Software Loss of Data Accountability Embezzlement Privacy Access Control Risk = Asset Loss Threat Vulnerability Software can Automatically Analyze the Over 3 Million Potential Linking Relationships

Creation of Risk Analysis Reports Include an Executive Summary. Include information about each individual who answered survey questions. Include relevant spreadsheets that detail the calculations and Return On Investment (ROI). Compare data from year to year. Tailor report for management, and make it easy to understand.

Use Easy to Understand Graphics to Illustrate Overall Results 46% 54% Compliant Non-Compliant

Include Recommended Controls By Return On Investment Security Plan File/Program Control Risk Assessment Contingency Plan Application Controls Security Policy Technical Surveillance Documentation Training Audit Trails 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0

Commercially Available Tools Can Make it Easier to Stay in Compliance and Validate the HIPAA Security Decision Process Regulators are dictating how to do the HIPAA Risk Analysis and it is MORE than a technical process. The HIPAA Risk Analysis is the best way to prepare for a potential audit. Ensure that all HIPAA Security Rule standards are met.

Risk & Security LLC Caroline Hamilton Direct Line: 1-301-346-9055 Caroline-hamilton@att.net www.caroline-hamilton.com www.twitter.com/riskalert