privacy and security briefing 10-16-14-handout · q safeguard phi from unauthorized uses and...

87
www.sbasinfo.com The Impact of EMR/EHR Technologies on Privacy and Security SBAS Training Series Larry C Delone CHTS-IM, CHPSE

Upload: others

Post on 10-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

The Impact of EMR/EHR

Technologies on Privacy and Security

SBAS Training Series

Larry C Delone CHTS-IM, CHPSE

Page 2: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

qSession 1 – Introduction to Privacy and Security

qSession 2 – HIPAA Privacy and Security Rule Standards

qSession 3 – Methods and Processes that Constitute a Strong Information Security Program

Page 3: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Session 1

Introduce audience to Privacy andSecurity terminology, acronyms anddefinitions; and provide a basicunderstanding of why security matters.Also discuss the differences betweensafeguarding protected healthinformation (PHI) stored on paper,versus electronic protected healthinformation (ePHI) stored in electronicmedical records (EMR)/electronic healthrecords (EHR) technologies.

Page 4: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Definitions…..

Page 5: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Privacy and Security

“Privacy” – an individual’s right to control the use or disclosure of personal information

“Security” – refers to the mechanisms in place to protect the confidentiality and privacy of personal information

“Confidentiality” – set of rules or promises that limits access or places restrictions on certain types of information [personal or health]

Page 6: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

• “Electronic Medical Records (EMR)” is a digital version of a paper chart that contains all of a patients medical history from one practice, primarily used by providers for diagnosis and treatment. Information in EMRs don’t typically or easily travel outside provider practice.

• “Electronic Health Records (EHR)” are EMRs that focus on total health of patient and goes beyond standard clinical data collected in providers office and includes a broader view of patients care: ie.• Built to share information with other health care

providers ie. lab and specialists• Patient information moves with the patient• Patient information is easily shared with all stakeholders

Page 7: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

• “Personally Identifiable Information (PII)” as used in US Privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. There are approximately 15 primary examples of PII identifiers.

• “Protected Health Information (PHI)” is any information about the health status, provision of health care, or payment for health care that can be linked to a specific individual. Under HIPAA, PHI is based upon 18 identifiers.

HIPAA/HITECH laws protect both PII and PHI from unauthorized uses and disclosures-other laws

supplement protection provisions

Page 8: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Full Name (if not common)q Home Addressq Email addressq National Identification

Number (SSN)q Internet Protocol (IP) address

numbers (in some cases)q Vehicle registration plate

numberq Drivers license numberq Face, fingerprints, or

handwritingq Credit Card Numbers

Fifteen (15) PII Examplesq Digital Identityq Date of birthq Birthplaceq Genetic Informationq Login name, screen

name, nickname, or handle

q Telephone number

q Country, State or City of residence

q Age q Gender or Raceq Name of Schoolq Grades, salary, or job

positionq Criminal Record

Used but less common

Page 9: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Nameq Addressq Dates related to an

individualq Telephone numbersq Fax numberq Email addressq Social Security Numberq Medical Record Numberq Health plan beneficiary

numberq Account numberq Certificate/license

number

Eighteen (18) ePHI Elements

q Any vehicle or other device serial number

q Device identifiers or serial numbers

q Web URLq Internet Protocol (IP)

address numbersq Finger or voice printsq Photographic imagesq Any other characteristics

that could uniquely identify the individual

Page 10: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

“Threat” is any circumstance or event with the potential toadversely impact assets, operations, individuals ororganizations. Threat are categorized by threat sources:

q Natural-floods, earthquakes, tornadoes, etc.q Human-enabled or caused by peopleq Environmental-power failure, pollution, chemical, etc.

“Vulnerability” are flaws or weakness in a systems securitysystem, design, implementation or control that could beintentionally or unintentionally exercised by a “Threat”

“Risk” is the potential impact that a “Threat” can have on theconfidentiality, integrity, and availability on ePHI by exploiting a“Vulnerability”

Page 11: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

“Breach” is a impermissible use or disclosure under the PrivacyRule that compromises the security or privacy of the protectedhealth information (PHI). An impermissible use or disclosure ofPHI is presumed to be a BREACH unless the ‘covered entity’demonstrates via a Risk Assessment, that there is a lowprobability that the PHI has been compromised.

Risk Assessment elements:

1. The nature and extent of the PHI involved2. The unauthorized person who viewed the PHI3. Whether the PHI was actually viewed or acquired4. The extent to which the risk to the PHI was

mitigated

Page 12: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Typical Clinical Operations

Page 13: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Patient’s individually identifiable healthcare

informationPatient

Hospital or Other

Physician (s)

q Protect patients Rights – Uses and Disclosures

q Safeguard PHI from unauthorized uses and Disclosures

q Develop and Manage Administrative, Technical and Physical Safeguards to protect confidentiality, integrity and availability of ePHI

Integrating Privacy and Security into PracticeInformation Security Program

PHI or ePHI

Page 14: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q PHI must be protected at rest (created or maintained) or transmitted or received

q Confidentiality must be protected –”unauthorized use or disclosures”

q Integrity must be protected – “free from unauthorized modification or destruction”

q Availability must be protected – “information is available to those authorized to access when needed”

Conversion from Paper to Electronic

Creation of electronic PHI or ePHI

Basic Security Rule Principals

Page 15: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Existing Privacy and Security Mandates} It is a mandate imposed by the Health Insurance Portability

and Accountability Act of 1996 (HIPAA) for ‘coveredentities’ (health care providers)

} If you are providing customer service as authorized by theAffordable Care Act (ACA), It is a mandate imposed by ACAIAW the MARS-E document suite for protecting theconfidentiality, integrity and availability of PII

} If you are a participant in CMS’s EHR Meaning UseIncentive payment program, it is a mandate imposed byCore Measure ‘Protect PHI’ objective IAW 45 CFR164.308(a)(1) – Conduct a thorough Risk Analysis

q HITECH Act improved privacy and security provisions of HIPAA

q Omnibus Rule strengthen privacy and security provisions of the HITECH Act

Page 16: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

HITECH9/2009

OMINBUS9/2013

Administrative Simplification

(Accountability)

Health Insurance Portability and Accountability Act (HIPAA) of 1996

Transactions, Code Sets, & Identifiers

Privacy Rule

Security Rule

Insurance Reform

(Accountability)

Fraud and Abuse

(Accountability)

HIPAA Protocol and Structure

Page 17: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

The Real Reason for Privacy and Security

Many industry experts believe that the mandates merelyestablishes the “HOW TO”, but the real reason Privacy andSecurity Matters is:

In the real world, patients/people have a problemsharing sensitive information (specifically health related)if they can’t trust that it will be kept private and secure.When they trust you, they are more willing to discuss‘accurate’ symptoms, conditions, and past and presentrisk behaviors!

TRUST by patients that YOU will honor their Confidentiality!

Page 18: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

qChallenges, old and new!• More policing, more penalties, more regulations

– initiated by HIPAA, HITECT, Omnibus-regulated by OCR

• Increase reporting of healthcare data breaches –w/significant fines

• Tremendous use of mobile devices in healthcare – new technologies, new threats >produces new risks

• Greater patient awareness – outreach for patient engagement and satisfaction

• More data, more sharing of data, more data on the cloud – changing IT model

Addressing Overall Security Compliance

Page 19: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Information Security Modelq Confidential – Limiting

information access and disclosure to authorized users (the right people)

q Integrity – Trustworthiness of information resources (no inappropriate changes

q Availability – Availability of information resources (at the right time)

Page 20: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 21: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Session 2

Provide audience with information that detailsthe Health Information Portability andAccountability Act of 1996 (HIPAA) Privacy Ruleand Security Rule standards and implementationspecifications, including standards andspecifications related to both PHI and ePHI.This session will clearly describe the differencesbetween the Privacy Rule and Security Rule asthey relate to both PHI and ePHI, and provide aclear understanding of HIPAA in general.

Page 22: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Health Insurance Portability Act of 1996(HIPAA) is administered by the US Departmentof Health and Human Services (HHS) andmandates that patient medical records andother healthcare information be protectedagainst security breaches and unauthorizeduse or disclosure while stored, processed, andexchanged between healthcare organizationsand third parties.

What is HIPAA?

Page 23: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Health Insurance Portability and Accountability Act

Page 24: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

qMake health insurance portable – makes it easier for people to keep health insurance when they change jobs

q Reduce healthcare fraud – wastes nearly 1/3 of every dollar spent on healthcare in the US

q Improve efficiency – payments, claims, and similar transactions

q Protect personal medical information –mandatory privacy and security safeguards

q Gather statistical data about diseases – to better protect the public

Five Major Goals of HIPAA

http://www.youtube.com/watch?v=s_1CZYK8qb8&index=71&list=UUhHTRPxz8awulGaTMh3SAkA

Page 25: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

1996 HIPAA2003 Privacy Rule2005 Security Rule

2006 Enforcement Rule02.2009 HITECH

09.2009 Interim Breach Notification Rule10.2009 Interim Final Enforcement Rule

07.2010 Proposed Omibus Rule01.2013 Final Omibus Rule

09.23.2013 Final General Compliance Date (CEs)09.22.2014 CEs must bring BAAs into compliance

HIPAA Related Rules - Timeline

Page 26: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q HIPAA is the main U.S. law dealing with medical information privacy

q HIPAA laws covers the United States and its territories, ie. Puerto Rico, Guam, the Virgin Islands, American Samoa, and the Northern Marianna Islands

q HIPAA applies to all patient data including data about visitors and non-US citizens, (only collected and used in the US and its territories)

Basic HIPAA Facts

Page 27: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

In accordance with HIPAA Title II Subtitle F –Administrative Simplification provisions:

The security and privacy of healthcare data apply to “covered entities”, which includes all healthcare organizations that create, receive, maintain, or transmit patient healthcare information.q Healthcare providersq Health plansq Healthcare clearinghousesq Medicare prescription drug card sponsorsq Covered business associates

Who must be HIPAA Compliant?

Page 28: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

} The “Health Information Technology for Economic and Clinical Health Act (HITECH Act)”, signed into Law on February 17, 2009 by President Obama, is part of the American Recovery and Reinvestment Act of 2009 (ARRA). ◦ Beginning in 2011, healthcare providers will be offered financial

incentives for demonstrating “meaningful use” of EHRs

◦ Improved privacy and security provisions under HIPAA; established new rules for the disclosure of PHI; imposed new notification requirements on covered entities, business associates and vendors

◦ Grants, loans and demonstration programs to assist providers and the health community to adopt, implement, and use certified EHR technology.

The HITECH Act of 2009The HITECH Act of 2009

Page 29: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

} New Federal Breach Notification Rule◦ Applies to all electronic “unsecured Protected Health Information”

– “encryption required”

◦ Unauthorized acquisition, access, use or disclosure is presumedto be a reportable breach unless a risk assessment demonstrates a low probability that the PHI was compromised

◦ Requires immediate (60 days) notification to HHS if more than 500 individuals effected

� Annual Notification if less that 500 individuals

◦ Requires notification to patients & appropriate remediation

◦ May require notification to a major media outlet and listing on organizations website

Page 30: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Effective Date [became law] – March 26, 2013q Compliance Date – September 23, 2013§ Modified Breach Notification Rule for unsecured PHI§ Strengthen Privacy Rule regarding genetic info -GINA§ Outlined OCR’s privacy and security enforcement

strategies§ Elevated Business Associates to same standards for

protecting PHI as covered entities§ New Patients Rights§ Electronic Access to PHI§ Right to limit disclosure for services paid out of

pocket§ Uses & Disclosures of PHI§ Fundraising, Marketing, & Sale of PHI

§ Decedent Information-no longer PHI after 50 years§ Student Immunizations-easier for parents w/verbal auth.

2013 HIPAA “Final (Omnibus) Rule

Page 31: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 32: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

HIPAA - Administrative Simplification

qPrivacy Ruleq Security Ruleq Electronic Transactions and Code Set Ruleq National Identifiersq Breach Notification Ruleq Enforcement Rule

Patient RightsPatient Rights

Page 33: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q General Principle for Uses and Disclosuresq Permitted Uses and Disclosuresq Authorized Uses and Disclosuresq Limiting Uses and Disclosures to the Minimum

Necessaryq Notice and Other Individual Rightsq Administrative Requirementsq Organizational Optionsq Other Provisions: Personal Representatives

and Minorsq State Lawq Enforcement and Penalties for Noncomplianceq Compliance Dates

Uses and Disclosures

Page 34: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Basic Principle§ CE’s may not use or disclose individual’s PHI

except:§ As the Privacy Rule permits or requires§ As the individual who is subject to the

information authorizes in writing§ Required Disclosure§ A CE must disclose PHI in only two situations:§ The individual – when they request access

to, or an accounting of disclosures§ To HHS – when it is undertaking a

compliance investigation or review or enforcement action

General Principle – Uses and Disclosures

Page 35: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ To the individual§ Treatment, payment,

healthcare operations§ Uses and disclosures with

opportunity to agree or object§ Incidental Use and Disclosure§ Public interest and benefit

activities > see list*§ Limited data sets

Permitted Uses and Disclosures

Page 36: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

• Required by Law• Public Health Activities• Victims of Abuse, Neglect or Domestic Violence• Health Oversight Activities• Judicial and Administrative Proceedings• Law Enforcement Purposes• Decedents• Cadaveric Organ, Eye or Tissue Donation• Research• Serious Threat to Health or Safety• Essential Government Functions• Worker’s Compensation

*List of Public Interest and Benefit Activities

Page 37: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Authorized Uses and Disclosureso Authorizationo Psychotherapy Noteso Marketing

Authorized/Limited Uses and Disclosures

§ Limited Uses and Disclosures to Minimum Necessaryo Minimum Necessaryo Access and Useso Disclosures and Request for

Disclosureso Reasonable Reliance

Page 38: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Notice of Privacy Practice (NPP)o Notice Distributiono Acknowledgement of Notice

Receipt§ Access§ Amendment§ Disclosure Accounting§ Restriction Request§ Confidential Communications

Requirement

Notices and Other Individual Rights

Page 39: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Privacy Policies and Procedures§ Privacy Personnel§ Workforce Training and Management§ Mitigation§ Data Safeguards§ Complaints§ Retaliation and Waiver§ Documentation and Record Retention§ Fully-insured health group plan

exception

Administrative Requirements

Page 40: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Hybrid Entity§ Affiliated Covered Entity§ Organized Health Care

Arrangement§ Covered Entity with Multiple

Covered Entities§ Group Health Plan disclosures to

Plan Sponsors

Organization Options

Page 41: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Personal Representatives and Minorso Personal Representativeso Special Case: Minors

Other Provisions

§ State Lawo Preemptiono Exception Determination

§ Enforcement and Penalties o Complianceo Civil Money Penaltieso Criminal Penalties

Page 42: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 43: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

HIPAA - Administrative Simplification

q Privacy RuleqSecurity Ruleq Electronic Transactions and Code Set Ruleq National Identifiersq Breach Notification Ruleq Enforcement Rule

Addresses ePHI onlyAddresses ePHI only

Page 44: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

qSecurity Rule [electronic PHI ‘ePHI’]• Ensure the “confidentiality, integrity, and

availability” of ePHI• Protect ePHI “against any reasonably

anticipated threats; and• Protect ePHI against uses or

disclosures that are not permitted by HIPAA

What Constitute Security Compliance?

The Security Rule protects electronic forms of patient information and covers computers, networks, and any other electronic device that handles or store patient date – i.e. smart phones and other portable devices

Page 45: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

qAdministrative Safeguards

qPhysical Safeguards

qTechnical Safeguards

qOrganizational Requirements

qPolicies and Procedures and Documentation Requirements

Five Categories of Security Rule

Page 46: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Security Rule StandardsStandards Sections Implementation Specifications (R) = Required, (A) = Addressable

Administrative SafeguardsSecurity Management Process 164.308(a)(1) Risk Analysis [R]

Risk Management [R]Sanction Policy [R]Information System Activity Review [R]

Assigned Security Responsibility 164.308(a)(2) [R]..

Implementation specifications are detailed instructions for implementing a particular Standard.

“Required” – covered entity must implement policies and/or procedures to meet requirements of specification “Addressable” – covered entity must assess whether it is reasonable and appropriate in the entity’s environment (your organization) . Addressable does not mean optional.

Page 47: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Security Management Process (S)§ Risk Analysis (R) § Risk Management (R) § Sanction Policy (R) § Information System Activity Review (R)

Administrative Safeguards

Protect electronic PHI - Conduct a security Risk Analysis in accordance with the requirements under 45 CFR 164.308 (a)(1)

MU Core Measure # 11

In order to ATTEST to MU Stage 1 and Stage 2 Core Measure entitled –“Protect electronic PHI”; providers are required to conduct an accurate and thorough analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI. <CMS MU security analysis TIP Sheet>

Note: a security risk analysis must be conducted during each reporting period for Stage 1 and Stage 2

Page 48: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

How do we Visualize Risk?

Copyright of the Supremus Group Venture

Page 49: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Assign Security ResponsibilityRisk Analysis Process

Vulnerability exploited by Threat = Risk

Page 50: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Step 1 – System CharacterizationStep 2 – Threat IdentificationStep 3 – Vulnerability IdentificationStep 4 – Control(s) AnalysisStep 5 – Likelihood DeterminationStep 6 – Impact AnalysisStep 7 – Risk DeterminationStep 8 – Control(s) RecommendationsStep 9 – Results Documentation

Risk Analysis GuidelinesNIST

SP800-30NIST

SP800-30 MU Core Measure 11 – “Protect PHI”

Page 51: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Assign Security Responsibility (S)§ Identify and Assign Security

Officer (R) qWorkforce Security (S)§ Authorization and/or Supervision (A)§ Workforce clearance procedure (A)§ Termination procedure (A)

q Information Access Management (S)§ Isolating Healthcare Clearinghouse

Function (R) § Access Authorization (A)§ Access Establishment and Modification (A)

Administrative Safeguards (cont.)

Page 52: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Security Awareness & Training (S)§ Security Reminders (A)§ Protection from Malicious Software (A)§ Log-in Monitoring (A)§ Password Management (A)

q Security Incident Procedures (S)§ Response and Reporting (R)

q Contingency Plan(S)§ Data back-up Plan (R)§ Disaster Recovery Plan (R)§ Emergency Mode Operation Plan (R)§ Testing and Revision Plan (R)

q Evaluation (S)§ Technical and Non-Technical Evaluation (R)

q Business Associate Contract & Other Arrangements (S)§ Written Contract or Other Arrangement

Administrative Safeguards (cont.)

Page 53: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

§ Data back-up Plan (R)§ Disaster Recovery Plan (R)§ Emergency Mode Operation Plan (R)§ Testing and Revision Procedure (A)

Contingency Plan Standard“Establish policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information (ePHI).”

Page 54: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Contingency Planning Mindset

Page 55: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Causes of Disasters

Page 56: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Data Backupü What is the ePHI that must be

backed up?ü Does the plan include all

important sources of dataü Has the organization

considered the various methods of backups, including tape, disk, or CD?

ü Does the backup plan include storage of backups in a safe, secure place?

ü Is the organization’s frequency of backups appropriate for its environment?

Page 57: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Disaster Recovery

üDoes the disaster recovery plan address issues specific to your operating environment?ü Does the plan address

what data is to be restored?ü Is a copy of the disaster

recovery plan readily accessible at more than one location or possibly on-line?

Page 58: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Emergency Mode Operationsü Does the organization’s plan balance the need to

protect the data with the organization’s need to access the data?

ü Will alternative security measures be used to protect the EPHI?

ü Does the emergency mode operation plan include possible manual procedures for security protection that can be implemented as needed?

ü Does the emergency mode operation plan include telephone numbers and contact names for all persons that must be notified in the event of a disaster, as well as roles and responsibilities of those people involved in the restoration process?

Page 59: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Testing and Revisions PlanningüDo those responsible for

performing contingency planning tasks understand their responsibilities?ü Have those responsible

actually performed a test of the procedures?ü Have the results of each

test been documented and any problems reviewed and corrected?

When determined to be reasonable and appropriate,

the testing and revision procedures will vary in

frequency and comprehensiveness.

Page 60: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Facility Access Controls (S)§ Contingency Operations (A)§ Facility Security Plan (A)§ Access Control and Validation Procedures (A)§ Maintenance Records (A)

qWorkstation Use (S)§ Function and Attributes (R)

qWorkstation Security (S)§ Restrict Access (R)

q Device and Media Controls (S)§ Disposal (R)§ Media Re-use (R)§ Accountability (A)§ Data back-up and Storage (A)

Physical Safeguards

Page 61: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Access Controls (S)§ Unique User Identification (R)§ Emergency Access Procedure (R)§ Automatic Log-off (A)§ Encryption and Decryption (A)*

q Audit Controls (S)(R)q Integrity (S)q Mechanism to Authenticate

electronic PHI (A)q Person or Entity Authentication (S)(R)q Transmission Security§ Integrity Controls (A)§ Encryption (A)*

Technical Safeguards

*Addressable, but an absolute must for meeting MU Protect PHI requirement for data at rest or

in transit

Page 62: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Business Associate Contracts or Other Agreementsq Business Associate Contracts (R)q Other Agreements (R)

q Requirements for Group Health Plans (R)

Other Security Rule Requirements

q Policies and Proceduresq Documentationq Time Limit (R)q Availability (R)q Updates (R)

Organizational Requirements

Policies & Procedures and Documentation Requirements

Page 63: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 64: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

HIPAA - Administrative Simplification

q Privacy Ruleq Security Ruleq Electronic Transactions and Code Set Ruleq National Identifiers

qBreach Notification Ruleq Enforcement Rule

Page 65: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

--Requires Covered entities and Business Associates to provide notification following a breach of unsecured PHI--

Breach Notification Rule

“Breach” – unauthorized acquisition, access, use, disclosure of unsecured PHI

“Unsecured PHI” – PHI that has not been rendered unusable, unreadable, or indecipherable to unauthorized individuals

Burden of proof is on the CE or BA

Page 66: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Covered entity must provide notification following a breach of unsecured protected health information as follows:

Breach Notification Requirements

1. Individual Noticei. In written form ie. first class mail or emailii. Must occur no later than 60 days

2. Media Noticei. Breach effecting >500 individuals NLT 60 days

3. Notice to the Secretaryi. Breach effecting >500 individuals NLT 60 daysii. Breach effecting <500 individuals; annually

4. Notification by a Business Associatei. Notify CE NLT 60 days; CE or BA may notify

individual

Page 67: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

The impermissible use of PHI under the Privacy Rule is assumed to be a “breach” unless the CE Or BA perform a Risk Assessment on the following factors:

Risk Assessment - Breach

1. The nature and extent of the PHI involved2. The unauthorized person who used the PHI3. Whether the PHI was actually acquired or

viewed4. The extent to which the PHI has been

mitigated

Page 68: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q 571 reports involving over 500 individualsq Over 79,000 reports involving under 500

individualsq Top types of large breaches§ Theft § Unauthorized access/disclosures§ Loss

q Top locations for large breaches§ Laptops§ Paper records§ Desktop computers§ Portable electronic devices

September 2009 thru April 15, 2013

*Data extracted from Office of Civil Rights Briefing/Reports

Page 69: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

September 2009 thru April 15, 2013

E-mail2%

Network Server11% EMR

2%

Portable Electronic Devices

14%Desktop Computers

15%Laptops

24%

Paper Records22%

Other10%

Breaches by Location >500+

*Data extracted from Office of Civil Rights Briefing/Reports

Page 70: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

September 2009 thru April 15, 2013

Loss13% Hacking/IT Incident

8% Improper Disposal

5%Unknown

2%

Unauthorized Access/Disclosure

20%

Theft52%

Breaches by Type > 500+

*Data extracted from Office of Civil Rights Briefing/Reports

Page 71: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 72: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

HIPAA - Administrative Simplification

q Privacy Ruleq Security Ruleq Electronic Transactions and Code Set Ruleq National Identifiersq Breach Notification RuleqEnforcement Rule

Page 73: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

HITECH Act of 2009 strengthen provisions for civil and criminal enforcement for violations of HIPAA Administrative Simplification Rules by establishing:

Enforcement Rule

q Four categories of violations reflecting increasing levels of culpability

q Four corresponding tiers of penalty amountsq A maximum penalty amount of $1.5 millionq Eliminated the exception on “did not know” or “would

not have known” provisions previously acceptableq Prohibits imposing penalties if violation is corrected

within 30 days (if not due to willful neglect)

Page 74: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

qThe minimum fine for a minor HIPAA violation is $100/violationqThe maximum fine for a serious HIPAA

violation is $50,000/violation – capped at $1.5 million per yearqCriminal HIPAA violations can also

include prison sentences up to ten years per violation

HIPAA Penalties

Because ePHI resides on computers/smart devices, everyone using them must practice

“safe computing” at all times!!

Page 75: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 76: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Session 3

Discuss methods and processes toestablish a framework for developing andimplementing a Privacy and SecurityProgram that demonstrates a “culture ofcompliance” at the organizational level;and specifically discuss techniques thatare required to meet Safeguard Standardsthat address technology advancementsinherent in EMR/EHR technologies.

Page 77: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Risk Management§ Inventory assets vulnerable to risks, Analyze and quantify

risks, perform threat and vulnerability analysis, assess non-technical and technical risk mitigation strategies

q Security Governance§ Assign security responsibilities, develop policies and

procedures, institute internal and external audit processes

q Security Operations§ Establish processes to safeguard ePHI, implement policy

and procedural instructions, monitor effectiveness of all safeguards established

q Security Awareness§ Provide initial and periodic HIPAA awareness training to

workforce members, provide safeguard specific training as required, establish communication channels and venues for discussing trends, updates and compliance progress/challenges

Effective Security Program

Page 78: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Risk ManagementInventory assets vulnerable to risks, Analyze and quantify risks, perform threat and vulnerability analysis, assess non-technical and technical risk mitigation strategies

Risk Management

Risk Management is a key component of the “Security Management Process” Standard which also includes the Risk Analysis Implementation Specification.

Your resulting Information Security Program hinges on the results discovered after you’ve conducted a thorough Risk Analysis* of your operations to:

a) identify potential security risks andb) Determine the probability of occurrence and magnitude of these risks to

c) Implement security measures to reduce or mitigate these risks and/or vulnerabilities uncovered

Risk AnalysisRisk Analysis

Risk ManagementRisk Management

*Key component of Meaningful Use Program

Vulnerability exploited by Threat = Risk

Page 79: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Security GovernanceAssign security responsibilities, develop policies and procedures, institute internal and external audit processes

Security Governance

The “Assign Security Responsibility” Standard stands alone and instructs that – a covered entity must assign the security responsibility to an individual to assure that the CE complies with both the Privacy and Security Rule.

A complete suite of policies, procedures and forms comprises evidence of an effective Security Program and must be managed by the Security official.

Page 80: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Security OperationsEstablish processes to safeguard ePHI, implement policy and procedural instructions, monitor effectiveness of all safeguards established

Security Operations

Access controls, person or entity authentication, workstation use, transmission security and all other operational related security measures will be carried out routinely and effectively by personnel in an organization that promotes a “Culture of Compliance” philosophy.

Page 81: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Security AwarenessProvide initial and periodic HIPAA awareness training to workforce members, provide safeguard specific training as required, establish communication channels and venues for discussing trends, updates and compliance progress/challenges

Security Awareness

YOU cannot document or publish enough policies and procedures to mitigate “Breaches” and/or impermissible uses and disclosures of PHI or ePHI, if your workforce is not properly trained or receive periodic refresher HIPAA awareness and security measures training. This is a firm requirement and evidence that supports its implementation will be evaluated by OCR in the event of an audit, or if a “Breach” occurs and a determination of willful neglect is under evaluation.

Page 82: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Managing a patient’s right to request restrictions of Disclosures….

HIPAA-Omnibus Rule, effective Sept 2013, “requires that a CE must agree to request of patient to restrict disclosure of PHI about patient to health plan if the disclosure is for the purposes of carrying out payment or health care operations and not otherwise required by law—and the PHI pertains solely to a health care item or service for which the patient has paid the CE in full”.

New Privacy Rule Challenge

Page 83: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Managing a patient’s right to request restrictions of Disclosures......

q Re-evaluate Workflow for Challengesq Preparing for receiving request for restrictionq Defining Documentation for request for

restrictionq Notifying Workflow members of restriction

protocolsq Responding to request for restrictionq Reviewing contracts for impactq Terminating a restriction to a health planq Educating patients on restriction limitationsq EHR documentation/interoperability impacts

Privacy Rule Challenge (cont.)

Page 84: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Never access medical or billing records for family, friends or others unless authorized

q Use strong passwords and timed screen saversq Don’t access a computer or patient data using someone

else’ passwordq Don’t leave e-PHI open when you walk awayq Scan for viruses, spyware, and other threats before

installing new data or programsq Use encryption for transmitting e-PHI and also e-PHI at

restq Always close, file, lock or shred or properly dispose of

e-PHI when doneq Beware of hackers or scammers impersonating staffq Verify identities before giving access to PHI or e-PHI

“Safe Computing” Guidelines

Page 85: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

q Easily assessable HIPAA Privacy, Security, Breach policies and procedures along with other related documents, specifically updated to reflect latest Omnibus Rule additions

q Perform at least annually, a security Risk Analysis and document results along with corrective action/new security measures plans

q Develop Comprehensive Contingency Planning documents and make assessable to all responsible workforce members, perform tests/walkthrough of Emergency Operations Plan and document results

q Evidence of Workforce Awareness/refresher training activities

q Evidence of Audit log reports/resultsq Develop Audit monitoring plan (internal and

external audits) and document/show results

Evidence of Compliance Tips

*As reported by health care

attorney Susan Miller – “national

HIPAA/HITECH Act health care expert,

Concord MA”

Looks for….

Page 86: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Question and Answer slides to be presented during

Workshop!

Page 87: Privacy and Security Briefing 10-16-14-Handout · q Safeguard PHI from unauthorized uses and Disclosures q Develop and Manage Administrative, Technical and ... (HIPAA) for ˘covered

www.sbasinfo.com

Questions