31-10-2013 Welcome to Compliance2go Live Web Seminar Responsibilities of the HIPAA Privacy and Security Officer - Managing and Documenting HIPAA Compliance Jim Sheldon-Dean © Copyright 2013 www.compliance2go.com 1 Agenda • • Learn about being a HIPAA Privacy and Security Officer Responsibilities of the HIPAA Officer • Privacy Rule: Patient Rights and Controls on Entities • Security Rule: Having a Security Management Process • Breach Notification: Sooner or later… • Find out about the new, higher enforcement penalties • • Discuss what is required to be in compliance and show it Learn about being prepared for a HIPAA Compliance Audit • Q&A session • Disclaimer: I am not a lawyer and this is not legal advice – I am only providing information and resources © Copyright 2013 www.compliance2go.com 2 My Background • • • • • • • BSCE (Civil Engineering) from UVM, MST (Transportation) from MIT Three decades in consulting, information systems, and software development Process, problem-solving oriented 8 years as Vermont EMT, crew chief 12 years specializing in HIPAA and health information privacy and security regulatory compliance Involved in WEDI, HIMSS, frequent speaker about HIPAA and information privacy and security See www.lewiscreeksystems.com for more details, resources, information security compliance news, etc. © Copyright 2013 www.compliance2go.com 3 1 31-10-2013 Who is the HIPAA Privacy and Security Officer? • The person responsible for making sure – All the right policies and procedures are in place – Application of policies and procedures is documented – Compliance is reviewed – Compliance documentation is maintained • The person answering the call from HHS • The person answering the call from the CEO © Copyright 2013 www.compliance2go.com 4 HIPAA Privacy & Security Rules • Privacy Rule – – – – – 45 CFR Part 164 Subpart E; 45 CFR §164.5xx Enforceable since 2003 Establishes Rights of Individuals Controls on Uses and Disclosures Several changes under the new rules • Security Rule – – – – – – 45 CFR Part 164 Subpart C; 45 CFR §164.3xx Enforceable since 2005 Applies to all electronic PHI Flexible, customizable approach to health information security Uses Risk Analysis to identify and plan the mitigation of security risks Unchanged in new rules, except to apply to Business Associates • Now being enforced more, including identity theft cases © Copyright 2013 www.compliance2go.com 5 HIPAA Breach Notification Rule • 45 CFR Part 164 Subpart D; 45 CFR §164.4xx • Enforceable since February 2010, Final Rule now in effect, with new changes in how to determine if a breach must be reported • “Harm Standard” replaced by risk assessment showing “Probability of Compromise” • Requires reporting of all PHI breaches to HHS and individuals • Extensive/expensive obligations • Provides great examples of what not to do; HHS Wall of Shame: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachn otificationrule/breachtool.html © Copyright 2013 www.compliance2go.com 6 2 31-10-2013 HIPAA Omnibus Update Implements the HITECH Act • Health Information Technology for Economic and Clinical Health Act, or the HITECH Act, under consideration already in 2008 • Became Title XIII of the American Recovery and Reinvestment Act of 2009, or ARRA, signed February 17, 2009 • Title XIII, Subtitle D-Privacy (all the sections 134xx of ARRA) • Most of the interim final and proposed rules now finalized in the big HIPAA Omnibus Update published January 25, 2013, effective March 26, 2013, enforceable September 23, 2013 • Omnibus Update Rule, with Preamble, available at: http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf • New Combined Rules published by HHS OCR, available at: http://www.hhs.gov/ocr/privacy/hipaa/administrative/combined/index.html © Copyright 2013 www.compliance2go.com 7 What is a Breach Under HIPAA? • §164.402 Breach is acquisition, access, use, or disclosure in violation of the Privacy Rule • Exceptions by law: Not Reportable if secured or destroyed; unintentional, in good faith, with no further use (within the entity); inadvertent and within job scope (within the entity); or, info cannot be retained • Not reportable if risk assessment shows “low probability of compromise” based on four factors: – what is the data, how identifiable is it, and might its release have an “adverse impact” on the individuals – to whom was it disclosed – was it actually accessed or viewed – has it been mitigated © Copyright 2013 www.compliance2go.com 8 Statistics on HIPAA Breach Notification • For reported breaches of 500 or more individuals’ PHI in the first year of the reporting requirement: 76% of breaches involve loss (15%), theft (56%), or improper disposal (5%) – Old-fashioned physical security of valuable data 17% are caused by unauthorized access or disclosure 6% are caused by hacking Portable data, laptops, smart phones, memory sticks the leaders for larger breaches of PHI • For smaller breaches: Largely single individuals affected Misdirected fax, e-mail, or hard copy communication © Copyright 2013 www.compliance2go.com 9 3 31-10-2013 Breach Notification Deadlines • New breach determination rules now in effect • Must report breaches to individuals within 60 days • Must report breaches affecting 500 or more individuals to HHS and press within 60 days • Must report ALL breaches of any size to HHS within 60 days of the end of the calendar year (by March 1 st every year for the preceding year) • To file breaches with HHS go to: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breach notificationrule/index.html or http://tinyurl.com/yemwev8 © Copyright 2013 www.compliance2go.com 10 PHI, Uses, and Disclosures • Protected Health Information (PHI): Individually identifiable information about health, health care or payment for healthcare services • Disclosure: the release, transfer, provision of, access to, or divulging in any other manner of information outside the entity holding the information • As distinct from Use: the sharing, employment, application, utilization, examination, or analysis of individually identifiable health information within an entity that maintains such information © Copyright 2013 www.compliance2go.com 11 More Definitions: DRS, TPO • Designated Record Set – The medical records and billing records about individuals maintained by or for a covered health care provider; – The enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or – Used, in whole or in part, by or for the covered entity to make decisions about individuals. • TPO: Treatment, Payment, and Healthcare Operations – Relating to provision, coordination, and management of healthcare services – Reviews, determinations, billing, collection – Case management, workforce evaluation, peer review, outcomes analysis, etc. related to YOUR operations – http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/usesand disclosuresfortpo.html © Copyright 2013 www.compliance2go.com 12 4 31-10-2013 Accounting of Disclosures • Individual has right to an accounting of all disclosures of health information in last six years • Except for disclosures: • For Treatment, Payment, and Healthcare Operations • To the individual; under authorization; associated with disclosures under §164.502; for facility directories; for national security; law enforcement; limited data set… • Proposed Rule to implement changes under HITECH Act §13405(c) NOT included in the Omnibus HIPAA Update Final Rule • To be finalized at a point uncertain in the future; hearings are under way to devise new proposed rules © Copyright 2013 www.compliance2go.com 13 Restriction of Disclosures • Minimum Necessary is the basic rule http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/min imumnecessary.html • HITECH §13405(a) Individual may request no disclosure to insurer if paid out of pocket; provider must comply • (b)(1) Disclosers must provide only limited data set or “minimum necessary,” • (b)(2) Disclosers will need to determine “minimum necessary,” • (d) No sale of PHI without authorization specifically allowing remuneration • Changes to HIPAA §164.522(a)(1)(vi), 502(b), 514(e), 508(a)(4) to implement the new rules – Guidance on “minimum necessary” will supersede (b)(1) above – Was formerly requester’s responsibility © Copyright 2013 www.compliance2go.com 14 Requests for Restrictions • Must have a process for individuals to request restrictions on use and disclosure – Need not honor requests – Do what you reasonably can • • New: Individual may request no information shared with insurer if paid in full out of pocket; MUST honor! Impacts of new restriction: – – – – – – – – Must have a policy/procedure/process Required in your EHR to meet the law Can you flag such encounters? What about pass-through effects? Issues with aggregated data What about contracts with insurers? May need to update BA Agreements Will need to update the Notice of Privacy Practices © Copyright 2013 www.compliance2go.com 15 5 31-10-2013 Individual Access of PHI • Must have a process for individual to request access, for reasonable cost-based fee • Must provide the entire record in the Designated Record Set if requested: – Medical and billing records used in whole or in part to make decisions related to health care – Information kept electronically must be available electronically if requested – Exceptions for Psychotherapy notes, CLIA, others – Changes to HIPAA and CLIA proposed to allow access of lab information by individuals, not finalized yet • 30-day extension for offsite data no longer allowed © Copyright 2013 www.compliance2go.com 16 Individual Preferences for Communication §164.522(b)(1) Standard: Confidential Communications Requirements (i) A covered health care provider must permit individuals to request and must accommodate reasonable requests by individuals to receive communications of protected health information from the covered health care provider by alternative means or at alternative locations. §164.524(c) Provision of Access (2) Form of access requested. (i) The covered entity must provide the individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. New (c)(2)(i): If PHI is electronic, individual may request electronic copy. Process: Must accommodate reasonable requests Provide ability to mail to alternate addresses, not receive telephone calls, etc. May refuse if request is unreasonable Individuals may want to use e-mail, texting, social media Use Risk Analysis to determine suitability, obtain agreements © Copyright 2013 www.compliance2go.com 17 Calculating/Evaluating Risk • Each Risk Issue has an Impact and Likelihood – Impact is how great the damage would be; more information about more people with more detail has a greater Impact – Likelihood is how likely it is that the risk issue would become a reality • Risk = Impact x Likelihood • If risk level appears low, it may be acceptable to both the entity and the individual – An informed risk decision can be made about the importance of mitigating certain risks – Rights can not be given up under HIPAA, but individuals can make an informed risk decision © Copyright 2013 www.compliance2go.com 18 6 31-10-2013 System Vendor Questions Can disclosures to insurers be properly restricted if requested? Can systems provide access to DRS PHI for individuals? Does your Business Associate agreement with the vendor supplying your systems require them to provide the abilities you need to meet the new requirements? What about proposed changes in Accounting of Disclosures (not in this final rule, but coming someday)? Can systems provide an access audit report good enough to satisfy HIPAA Security Rule requirements? © Copyright 2013 www.compliance2go.com 19 Marketing Changes • Marketing is still marketing and still requires an authorization • Treatment and Healthcare Operations are not marketing, but… • Authorizations are now required for all treatment and healthcare operations where the Covered Entity receives financial remuneration from a third party whose product or service is being marketed • New guidance available at: http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/ma rketingrefillreminder.html • Exemptions: • Face to Face communication • Refill reminders or other info about a drug or biologic that is currently prescribed but not exempt if remuneration above costs is involved • Communications promoting health in general, such as routine tests • Communications about government and government-sponsored programs © Copyright 2013 www.compliance2go.com 20 Sale of PHI • HIPAA §164.508(a)(4): If you disclose for remuneration, you must have an authorization stating that the disclosure results in remuneration • Exceptions for public health, research, treatment and payment purposes, sale of practice, transfer to a BA providing services, to the individual, etc. © Copyright 2013 www.compliance2go.com 21 7 31-10-2013 Fundraising Changes • HITECH §13406(b) and HIPAA §164.514(f)(1) Opportunity to Opt Out of Fundraising • Demographic information, dates of healthcare services, department providing services, physician, health plan status, and outcome can be used for fundraising without authorization • Notice of Privacy Practices must state so • Easy Opt-out must be provided, by campaign or for all campaigns, must be honored, and can’t be used to condition treatment or payment © Copyright 2013 www.compliance2go.com 22 Additional Changes to HIPAA: Genetic Information Nondiscrimination Act (GINA) • New changes to §164.502(a)(5)(i) • Genetic information not to be used in health plan underwriting, enrollment, eligibility, premium computation, consideration of pre-existing conditions, etc… • Must update and redistribute Health Plan Notice of Privacy Practices © Copyright 2013 www.compliance2go.com 23 NPP Modifications • Right to be notified in the event of a breach • New Right to restrict disclosures to insurers if services paid in full out of pocket, must comply • New Right to receive electronic copy of electronic PHI • Authorizations for sale of PHI for remuneration will say so • Changes based on new Marketing and Healthcare Operations definitions and exceptions • Changes to PHI used for Fundraising, and easy opt-out • Talk about PHI sharing, Health Information Exchanges • New Templates from HHS and AMA – http://www.hhs.gov/ocr/privacy/hipaa/modelnotices.html – http://www.ama-assn.org/go/hipaa © Copyright 2013 www.compliance2go.com 24 8 31-10-2013 Implementation • Update Policies and Procedures to match new rights and restrictions • Update NPP to include new changes and required items • Provide training in new policies and procedures, and the new Notice of Privacy Practices • Implement both NPP and P&Ps simultaneously – Post new NPP on the wall (or a summary) and Website – Have NPP readily available without having to ask – Start handing out the new one – Providers don’t have to mail a new one to everyone © Copyright 2013 www.compliance2go.com 25 What is a Business Associate? • An individual or entity, not acting as an employee, that: – Creates, receives, maintains, or transmits protected health information for a function or activity regulated by HIPAA on behalf of a covered entity (CE) or another BA – Provides legal, actuarial, accounting, consulting, data aggregation (as defined in §164.501 of this subchapter), management, administrative, accreditation, or financial services and needs PHI to do it • Anything a CE or BA could do itself but has someone else do it for them, involving using, disclosing, creating, receiving, maintaining, or transmitting PHI • May include any vendor with “persistence of custody” of PHI © Copyright 2013 www.compliance2go.com 26 What is a Business Associate? • Includes: – Billing service – Shredding service – Systems vendors who access PHI • Does not include those who would have no reason to use or disclose PHI, such as: – Tradesmen (plumber, etc.) – Housekeeping, etc. • Not Payers, other Providers, or Workforce Members • Not Conduits (USPS, FedEx, etc.) • BAs now include subcontractors, Health Information Organizations, and Patient Safety Organizations © Copyright 2013 www.compliance2go.com 27 9 31-10-2013 Business Associate Changes • Business Associates now under HIPAA – – – – – – – Security Rule safeguards apply to BAs Privacy Rule use & disclosure applies Can use info only as stated in contract Penalties can apply to BAs BAs also responsible for having BAAs Final Rule enforceable September 23, 2013 Valid BA Agreements in place under old rules executed by January 25, 2013 are OK until September 23, 2014 • New sample Business Associate Agreement language: http://www.hhs.gov/ocr/privacy/hipaa/understanding/covere dentities/contractprov.html © Copyright 2013 www.compliance2go.com 28 Information Security Management Process • Definition of Information Security: • Protecting information Confidentiality Integrity Availability • Definition of a Management Process: Define and understand what you have See how well it performs Watch for problems Review activities and issues Make changes based on bang-for-buck © Copyright 2013 www.compliance2go.com 29 Information Security Management Process Information Inventory and Flow Analysis Access and Configuration Control Know who and what’s been going on in your networks and systems Respond to and learn from Incidents Audit and review regularly, and when operations or environment change Make risk-based improvements Focus: Confidentiality, Integrity, Availability © Copyright 2013 www.compliance2go.com 30 10 31-10-2013 Security Requirements within the Privacy Rule – §164.530(c) • §164.530(c)(1): “A covered entity must have in place appropriate physical, technical, and administrative safeguards to protect the privacy of protected health information.” • §164.530(c)(2)(i): “A covered entity must reasonably safeguard protected health information from any intentional or unintentional use or disclosure that is in violation of the standards, implementation specifications, or other requirements of this subpart.” © Copyright 2013 www.compliance2go.com 31 HIPAA Security Rule §164.306: General Rules • (a)(1) Ensure confidentiality, integrity, and availability of electronic PHI • (a)(2) Protect against “reasonably anticipated” threats or hazards to security of PHI • (a)(3) Protect against “reasonably anticipated” improper uses and disclosures under Privacy Rule • (a)(4) Ensure compliance by the Workforce • (b) Flexibility • (c) Requirement to meet all Standards (18) • (d) Meet Required Implementation Specifications (14); Assess Addressable Specifications (22) and Document • (e) Regularly Review © Copyright 2013 www.compliance2go.com 32 §164.306(b): The Flexibility Section • “… may use any security measures that allow the CE or BA to reasonably and appropriately implement the standards and implementation specifications as specified…” • Must consider a number of factors... – Size, Complexity, and Capabilities – Technical Infrastructure, Hardware, and Software Security Capabilities – Costs – Probability and Criticality of RISKS © Copyright 2013 www.compliance2go.com 33 11 31-10-2013 Standards and Implementation Specifications • Standards (18) Provide the Objectives and Primary Mission – All Standards are Required to be met – 12 Standards have Implementation Specifications • Implementation Specifications (36) Provide Additional Details – 14 are Required – 22 are Addressable • Required vs. Addressable Implementation Specifications – If Required, implement as specified – If Addressable, implement if “reasonable and appropriate” – If not reasonable and appropriate, implement an alternative if you can and JUSTIFY YOUR ACTIONS © Copyright 2013 www.compliance2go.com 34 Six Steps to Compliance 1. Enumerate All Your Systems 2. Information Flow Analysis 3. Preliminary Risk Analysis 4. Detailed Risk Assessment 5. Risk Determination 6. Mitigation, Policies and Procedures, and Training • And document every step of the way © Copyright 2013 www.compliance2go.com 35 Security Regulation §164.308 Administrative Safeguards • (a)(1) Security Management Process – Risk Analysis (R) and Risk Management (R) – Sanction Policy (R), Information System Activity Review (R) • (a)(2) Assigned Security Responsibility (R) • (a)(3) Workforce Security • (a)(4) Information Access Management – Authorization and/or Supervision (A), Clearance Procedure (A), Termination Procedures (A) – Access Authorization (A) – Access Establishment and Modification (A) • (a)(5) Security Awareness and Training (A) – For ALL staff, initially and continuing – a PROGRAM © Copyright 2013 www.compliance2go.com 36 12 31-10-2013 Security Regulation §164.308 Administrative Safeguards • (a)(6) Security Incident Procedures (R) – For reporting and responding to various kinds of security incidents and policy violations, with documentation • (a)(7) Contingency Plan – Data Backup (R); Disaster Recovery (R) – Emergency Mode Operation Plans (R) – Testing & Revision Procedures, Applications & Data Criticality Analyses (A) • (a)(8) Evaluation (R) – Must formally periodically evaluate compliance – By Calendar or if Changes in Systems or Environment • (b) Business Associates (R) – Must have Written Contracts; See §164.314 for details © Copyright 2013 www.compliance2go.com 37 Security Regulation §164.310 Physical Safeguards • (a) Facility Access Controls (A) – Contingency Operations; Facility Security Plan; Access Control and Validation Procedures; Maintenance Records • (b) Workstation Use (R) – Policies and Procedures Required; Acceptable Use Policy • (c) Workstation Security (R) – Must restrict access to Authorized Users only; Work area access; Monitor placement • (d) Device and Media Controls – Disposal and Re-Use (R) – Must clear old data before disposal or re-use – Accountability (A) – Record of equipment movements and responsibility © Copyright 2013 www.compliance2go.com 38 Security Regulation §164.312 Technical Safeguards • (a) Access Control • (b) Audit Controls (R) – Unique User Identification (R); Emergency Access Procedure (R); Automatic Logoff (A); Encryption and Decryption (A) – Hardware, software, or procedural means to record and examine system activity – How to accomplish? Log all activity, or sample activity for a period of time or a subset of users and systems • • • (c) Integrity (A) (d) Person or Entity Authentication (R) (e) Transmission Security – Integrity Controls (A); Encryption (A) © Copyright 2013 www.compliance2go.com 39 13 31-10-2013 Security Policy Framework • Four Basic Policies – Security Management Process – Information Access Controls – Data Management (Contingency-Backup-Retention) – User Policy • Include enabling language in Policy • Define details in Procedures • Documentation, Documentation, Documentation © Copyright 2013 www.compliance2go.com 40 Security Policy Help The SANS Security Policy Project Samples of several policies, guidance in policy development and deployment Available at: http://www.sans.org/resources/policies/ New York University HIPAA security policies Does provide a good level of detail Many of the concepts are directly transferable to other organizations Available at: http://www.nyu.edu/its/policies/#hipaa NIST Incident Handling Guide Computer Security Incident Handling Guide SP 800-61 Revision 2, a practical guide to responding to incidents and establishing a computer security incident policy and process: http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf In addition, the September 2012 NIST ITL Bulletin focuses on the revised SP 800-61, providing additional insights and guidance, available at: http://csrc.nist.gov/publications/nistbul/itlbul2012_09.pdf © Copyright 2013 www.compliance2go.com 41 Enforcement and Penalties • HITECH Act §13409 – Wrongful Disclosures – Law specifically applies to individuals for wrongful disclosures • HITECH Act §13410 – New Penalty Structure – (a), (b) “Willful Neglect” violations • Must be investigated, penalties mandatory – (c) Distribution of penalties • To provide more enforcement • Portion will go to those harmed, regulations overdue – (d) Higher penalties effective for violations • New, four tier penalty structure, with up to $1.5 million maximum for all violations of the same provision in a calendar year – (e) State Attorneys General may bring HIPAA action – (f) Continued corrective action allowed, even if no penalty © Copyright 2013 www.compliance2go.com 42 14 31-10-2013 New Enforcement Definitions • Reasonable Cause (revised): An act or omission in which a covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission violated an administrative simplification provision, but in which the covered entity or business associate did not act with willful neglect • Reasonable Diligence: Business care and prudence expected from a person seeking to satisfy a legal requirement under similar circumstances • Willful Neglect: Conscious, intentional failure or reckless indifference to the obligation to comply with the administrative simplification provision violated © Copyright 2013 www.compliance2go.com 43 Tiered Penalty Structure • HIPAA §160.404: Penalty Amounts • Tier 1: Did not know and, with reasonable diligence, would not have known • Tier 2: Violation due to reasonable cause and not willful neglect • Tier 3: Violation due to willful neglect and corrected within 30 days of when known or should have been known with reasonable diligence • Tier 4: Violation due to willful neglect and NOT corrected within 30 days of when known or should have been known with reasonable diligence • $1.5 million maximum for all violations of a similar type in a calendar year – $100 - $50,000 per violation – $1000 - $50,000 per violation – $10,000 - $50,000 per violation – $50,000 per violation © Copyright 2013 www.compliance2go.com 44 Affirmative Defenses and Waivers • Affirmative Defenses – §160.410: For violations after 2/17/2009: – Act is punishable under 42 USC 1320d-6 (wrongful disclosures) – Or Secretary is satisfied that violation is: • Not due to willful neglect (reasonable cause requirement now removed), and • Corrected during: – 30 days from when known or should have known – Additional period as Secretary determines • Waivers – §160.412: For violations due to reasonable cause and not willful neglect – Not corrected within the 30-day (or extended) period – Secretary may waive penalty or a portion, to the extent penalty is excessive relative to the violation © Copyright 2013 www.compliance2go.com 45 15 31-10-2013 HHS Is Serious About Enforcement • $4.3 million fine for Cignet Health of Maryland for multiple HIPAA violations including ignoring OCR investigators – the first actual fine! • $1 million settlement with Mass General Hospital in connection with a staff member’s leaving sensitive records for 192 individuals on the subway • $865K+ settlement with UCLA Medical Center for snooping in celebrity records • Multiple multi-million dollar settlements with pharmacies • $100K settlement with a physician’s office for Security Rule violations • • • • • • $1.5 million settlement with BC/BS of Tennessee for lost hard drives $1.7 million settlement with Alaska Medicaid for lack of security process $1.5 million settlement with MEEI for lack of security for portable devices $500K settlement with Hospice of North Idaho for insecure laptop, no process $400K settlement with Idaho State University for insecure server, no process $275K settlement with Shasta Regional Med Center for inappropriate disclosure of PHI and lack of sanctions for violations • $1.7 million settlement with WellPoint for insecure server, no process • $1.2 million settlement with Affinity Health for improper disposal of copiers © Copyright 2013 www.compliance2go.com 46 HIPAA Audits • HITECH §13411 now requires HHS to conduct periodic audits • Initial program conducted in 2012, being revised • New program to begin in 2014 • Will focus on identified problem areas: laptops, encryption, audits, NPPs • Show you have in place all the policies and procedures required by the HIPAA Privacy and Security Rules • Show you have been using them – e.g., Show training policy, training materials, and training rosters – e.g., Show security incident policy and security incident reports • 3 week notice – you must be prepared in advance or it’s too late! • HHS site for the audit program: http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/index.html © Copyright 2013 www.compliance2go.com 47 What will they ask for in an Audit? • HIPAA Privacy, Security, and Breach Notification Rule policies and procedures and evidence of their application – 42 questions asked in first OIG HIPAA Security audit in March 2007 at: http://tinyurl.com/2ac9jm – CMS OESS 2008 Interview and Document Request for HIPAA Security Onsite Investigations and Compliance Reviews, at: http://tinyurl.com/2gaswf – Questions asked of a small provider after a data breach involving theft of a laptop and server, at: http://tinyurl.com/3jpoa4p – Questions asked in early 2012 audits, at: http://tinyurl.com/cbcllz7 – HHS’s 2012 HIPAA Audit Protocol, not revised for new rules: http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol.h tml © Copyright 2013 www.compliance2go.com 48 16 31-10-2013 How to Prepare for an Audit • Do it NOW, before they call • Be ready to answer the questions asked in prior audits • Make sure your documentation is complete and up-to-date – use tools such as the HIPAA Audit Protocol and the NIST HIPAA Security Rule Toolkit to evaluate and document compliance – HIPAA Audit Protocol (download it to a spreadsheet!): http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol.h tml – NIST HIPAA Security Rule Toolkit: http://scap.nist.gov/hipaa/ © Copyright 2013 www.compliance2go.com 49 Your to-do list… Don’t be in denial – willful neglect will cost you Review your policies and procedures per the new rights and restrictions Update your policies and Notice of Privacy Practices Review Business Associate Agreements Make sure EHR vendors can meet restriction requirements and provide electronic copies Prepare for Breach Notification Review the questions asked in prior HIPAA audits Be ready for incidents and audits – conduct drills Provide training and document compliance Always have a plan for moving forward, and follow it! © Copyright 2013 www.compliance2go.com 50 Thank You! • Numerous resources, regulations, laws, guidance, and tools are available without charge or registration at: • News items of interest to those involved with health information privacy and security are available without charge or registration at: www.lewiscreeksystems.com/resources.html www.lewiscreeksystems.com/privacy_security_and_compli.html • If there are any further questions which we are not able to get to today please feel free to contact me at: Jim Sheldon-Dean Lewis Creek Systems, LLC © Copyright 2013 www.compliance2go.com 51 17 31-10-2013 Q/A Session © Copyright 2013 www.compliance2go.com 52 Upcoming Webinar from Jim Sheldon-Dean • New HIPAA Business Associate Responsibilities and Agreements Under the HITECH Act Omnibus HIPAA Update • Wednesday, November 20, 2013 at 1:00 PM Eastern time. • For additional information and registration, please see: https://www.compliance2go.com/product/?pid=CP2013228 © Copyright 2013 www.compliance2go.com 53 Thankyou for Attending Our Live Web Seminar Please feel free to contact us for any questions on the web seminar at [email protected] /[email protected] or call us at Toll Free 877.782.4696 © Copyright 2013 www.compliance2go.com 54 18
© Copyright 2024