HITRUST CSF and CSF Assurance Program Requirements for Health Information Exchanges Version 1.1

Size: px
Start display at page:

Download "HITRUST CSF and CSF Assurance Program Requirements for Health Information Exchanges Version 1.1"

Transcription

1 HITRUST CSF and CSF Assurance Program Requirements for Health Information Exchanges Version 1.1

2 Table of Contents 1 Introduction Purpose External References Background HITRUST Common Security Framework (CSF) CSF Assurance Program for HIEs Roles and Responsibilities Health Information Exchanges (HIEs) Connecting Organizations CSF Changes for HIEs and Connecting Organizations Organizational Risk Factors for HIEs System Risk Factors for Connecting Organizations HIE Specific Requirements CSF Assurance Program for HIEs Overview Assessment Assessment Schedule Overview Phase 1 Requirements Phase 2 Requirements Phase 3 Requirements Recourse for Non-compliance Appendix A Assurance Program for HIEs Timeline Appendix B Phase 2 Assurance Level Requirements Appendix C Phase 3 Assurance Level Requirements

3 1 Introduction 1.1 Purpose Health Information Exchanges (HIEs) provide the capability to more expansively share information between healthcare organizations. With this increase and ease in exchange of protected health information (PHI) comes the risk of experiencing a breach in security, exposing patients sensitive information to unauthorized and potentially malicious individuals. HITRUST, in conjunction with industry participants, established an HIE Working Group and HIE Task Force (subcommittee) to address the challenges faced by HIEs, which, in turn, recommended changes to the HITRUST Common Security Framework (CSF) and CSF Assurance Program. The objective is to provide leading guidance to the industry on acceptable controls to manage the confidentiality, integrity and availability of PHI with HIEs and connecting organizations, which includes: 1. Changes to the HITRUST CSF To ensure relevancy of the HITRUST CSF to HIEs and connecting organizations, the Task Force identified gaps and proposed areas for improvement to the CSF. These, at a high level, include new risk factors for HIEs, new risk factors for the systems of connecting organizations, and new HIE segment-specific requirements. 2. Third Party Information Security Governance Program To ensure a common approach by HIEs and for connecting organization in satisfying necessary information security governance requirements, the Task Force set forth a CSF Assurance Program for HIEs. This program leverages existing requirements and practices, providing a set of processes, methodologies and tools to mitigate this risk without impeding the growth of the HIE. The purpose of the Task Force, Working Group and this document is to define the requirements for HIEs in managing their internal security programs and the third parties which connect to the HIE. This guidance also establishes a set of requirements for those organizations connecting with the exchanges to ensure they maintain the adequate controls required to protect information across the continuum. 1.2 External References A key tenet in HITRUST s activities is to reduce the complexity in the environment by leveraging existing programs and requirements. In accordance with this objective, HITRUST leverages and references the following for this program: HITRUST Common Security Framework 1 HITRUST CSF Assurance Program Requirements 2 Centers for Medicare & Medicaid Services (CMS) EHR Incentive Program

4 1.3 Background HITRUST The Health Information Trust Alliance (HITRUST) exists to ensure that information security becomes a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. All organizations within the healthcare industry currently face multiple challenges regarding information security. These challenges include: Public and regulatory concern over the increasing number of breaches in the industry Redundant and inconsistent requirements and standards for healthcare organizations Inconsistent adoption of minimum controls Inability to implement security in medical devices and healthcare applications Rapidly changing business, technology and regulatory environment Ineffective and inefficient internal compliance management processes Inconsistent business partner requirements and compliance expectations Increasing scrutiny from regulators, auditors, underwriters, customers and business partners Growing risk and liability associated with information security Common Security Framework (CSF) HITRUST is collaborating with healthcare, business, technology, and information security leaders to establish the CSF to be used by any and all organizations that create, access, store, or exchange protected health information. The CSF is not a new standard. The HITRUST CSF is a framework that normalizes the security requirements of Healthcare organizations including federal (e.g., HITECH Act and HIPAA), state, 3 rd party (e.g., PCI and COBIT) and government (e.g., NIST, FTC and CMS), so the burden of compliance with the CSF is no more than what already applies to healthcare organizations. HIPAA is not prescriptive, which makes it difficult to apply and open to interpretation. Organizations will need to reference additional standards for specific guidance on requirements specified by HIPAA. It is also not the only set of security requirements healthcare organization will need to address (e.g., PCI, state or business partner requirements). The CSF was built to simplify these issues by providing direction for security tailored for the needs of the organization. The CSF is the only framework that is built to provide scalable security requirements based on the different risks and exposures of organizations in the industry. With the leadership and guidance from the HIE Working Group and Task Force, the CSF continues to be relevant to HIEs and connecting organizations through specific factors that drive risk and specific requirements unique to the operating environment. 4

5 1.3.3 CSF Assurance Program for HIEs The HITRUST CSF Assurance Program for HIEs utilizes a common set of information security requirements with standardized assessment and reporting processes accepted and adopted by HIEs and connecting organizations. Through the Assurance Program for HIEs, HIEs and connecting organizations can manage risk of a breach of PHI through an efficient, cost effective process. The Assurance Program for HIEs provides a practical mechanism for validating an organization s compliance with the CSF. The standard requirements, methodology and tools developed and maintained by HITRUST, in collaboration with healthcare and information security professionals, enables both relying and assessed entities to implement a consistent approach to information security. The Assurance Program for HIEs allows HIEs and connecting organizations to receive immediate and incremental value by defining a logical approach to information security over time. 1.4 Roles and Responsibilities The following organizations and their respective responsibilities are defined below. This is in addition to those organizations named in the CSF Assurance Program Requirements document Health Information Exchanges (HIEs) HIEs within the scope of this program are the organizations responsible for managing the security over their own environment and the protections in place with third parties connecting and sharing information Connecting Organizations Connecting organizations within the scope of this program typically are those organizations joining the exchange to send and receive PHI generated or needed to provide healthcare services. Examples of connecting organizations include hospitals, physician practices, labs, pharmacies, health insurance providers, and other HIEs. 2 CSF Changes for HIEs and Connecting Organizations 2.1 Organizational Risk Factors for HIEs The CSF evaluates certain risk factors about an organization type to determine the relative risk of the organization and required level of controls. For HIEs, the following organizational risk factors are proposed to be added to the CSF: Small organization (Level 1): <1M transactions per year Medium organization (Level 2): 1-6M transactions per year Large organization (Level 3): >6M transactions per year Under HIPAA, a transaction is the exchange of information between two parties to carry out financial or administrative activities related to health care. HHS further defines the process of health information exchange as the electronic movement of health-related information among organizations according to nationally recognized standards. 5

6 In general, there are two basic types of HIE transactions: 1. Push one-directional push or send of the information directly between two known entities e.g., from a specialist to a primary care provider, or through the use of an intermediary such as a Health Information Organization (HIO). (Note the term HIE is often used to refer to the HIO.) 2. Pull a bi-directional pull of the information that involves: 1) a query for information about a patient, and 2) a response with information on the location and/or the content of a patient s records, which generally requires access to record locator services (RLS) and can usually only be done through an HIO. Either type will constitute a transaction for the purposes of calculating the appropriate risk factor for an HIO as long as the information transits the HIO. (Note there would be two messages in a pull transaction as opposed to one message in a push transaction for the purpose of calculating the risk factor.) And in both cases, the exchange must generally contain ephi to qualify. To help understand what constitutes an electronic transaction (i.e., an exchange of ephi for our purposes), we refer to the discipline of computer programming in which a transaction usually means a sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request. For a transaction to be completed, a transaction has to be completed in its entirety (and includes one or more data elements). For example, a catalog merchandise order may involve checking an inventory database, confirming that the item is available, placing the order, and confirming that the order has been placed and the expected time of shipment. An example of a healthcare transaction could be a clinician s query for and receipt of a patient s electronic medical record or part of a medical record, e.g., a list of known allergies. Another could be the entry of one or more prescriptions into an e-prescription system during a patient visit, in which the receiving retail pharmacy is a member (connecting organization) of the HIE. As stated previously, an HIE transaction must conform to one of several nationally recognized message standards or formats. Two of the most predominate formats in the U.S. are X12 EDI and HL7. 1. X12 EDI is an ANSI standard XML schema based for the transfer of structured data, by agreed message standards, from one computer system to another without human intervention. X12 EDI electronic data exchange consists of multiple formats supporting multiple industries. Insurance/Health is one of sixteen functional or industry-specific series of standards documents and includes Patient Information, Health Care Claim Status Request and Notification, and Medical Event Reporting, among others HL7 is a syntax standard specifically designed by the healthcare industry to facilitate patient data exchange between computer applications and systems typically systems within or connected to one healthcare enterprise. HL7 is the de facto standard for patient data exchange, specifying the format, structure, and sequence of that data, and provides a common language

7 among computer applications regardless of platform, architecture, or programming language. Although the actual syntaxes are different, HL7 is similar in concept to the X12 EDI standard used for HIPAA-compliant data transfer. Other standards such as generic XML schemas could conceivably provide a reasonable format for HIE transactions, but again the messages must be related to healthcare, including administrative or financial activities, and subsequently contain one or more elements of ephi. Once again, the messages (transactions) must transit an HIO s boundary, either to or from an external organization, to be used in the calculation of an HIO s risk factors. These factors shall be aligned with those controls of the CSF with existing organizational risk factors in accordance with the existing thresholds. 2.2 System Risk Factors for Connecting Organizations The systems of organizations that connect to and exchange data with an HIE are seen to be more risky than systems that do not connect to or exchange data with an HIE and so require a greater level of control in certain instances. As such, the following system risk factor will be added to the CSF: System Connects with or Exchanges Data with an HIE: YES This factor shall be aligned with the following controls of the CSF: 01.k Equipment Identification in Networks 01.u Limitation of Connection Time 01.p Secure Log-on Procedures 01.r Password Management System 01.s Use of System Utilities 10.d Message Integrity It is important to note that these are not the only requirements a connecting organization or its system would be required to meet. This simply is a list of specific controls whereby a higher level of control should be required because the connecting organization s system connects to or exchanges data with an HIE. Basic controls such as access control, logging and monitoring will still be required in accordance with existing system or organization risk factors. 7

8 2.3 HIE Specific Requirements The HITRUST CSF allows segment-specific requirements as part of the controls. These are requirements unique to a particular industry segment, such as HIEs, that do not apply to other segments of the industry. The following segment-specific requirements were added to the CSF: Access Controls 01.c Privilege Management HIEs shall, for all employees and for all employees of connecting organizations, define and assign roles to each individual with access to the HIE. The roles shall be based on the individual's job function and responsibilities. The roles shall specify the type of access and level of access. 01.e Review of User Access Rights HIEs shall, for all employees and for all employees of connecting organizations, review users with access and the appropriateness of each user's role every 90 days. Any discrepancies shall be remediated immediately following the review. Third Party Agreements/Contracts 05.e Confidentiality Agreements As part of the agreement with the connecting organizations, the HIE shall specify which organization owns the data and any restrictions as part of that ownership such as retention, integrity, and accuracy of data. If the HIE is the owner of the data, all federal and state requirements associated with the patients' information shall be met. 05.k Addressing Security in Third Party Agreements As part of the agreement with the connecting organizations, the HIE shall specify the requirements of the connecting organizations to define and communicate to the HIE access roles for the connecting organization's employees. The agreement shall specify that it is the sole responsibility of the connecting organizations to appropriately restrict access in accordance with federal and state requirements (e.g., mental health information). 05.k Addressing Security in Third Party Agreements As part of the agreement with the connecting organizations, the HIE shall specify the requirements of connecting organizations to request and receive detailed access logs (see 09.aa) related to the connecting organization s records. These requirements shall be applicable to all HIEs irrespective of the previously mentioned organization risk factors. These requirements are in addition to the existing set of controls listed in the CSF. 3 CSF Assurance Program for HIEs 3.1 Overview The CSF Assurance Program for HIEs enables trust in health information protection through an efficient and manageable approach by identifying incremental steps for an HIE to implement and demonstrate acceptable information security controls. 8

9 The security requirements for the Assurance Program for HIEs are based on the CSF and the multiple levels within the CSF as determined by defined risk factors. The objective is to provide requirements to an organization that are reasonable and appropriate based on the organization s risk. Security is evaluated and assurance is provided through initial and subsequent information security risk assessments of an organization. 3.2 Assessment The assessment allows the assessed entity to determine and communicate to relying entities its security maturity and risk relative to the industry and expectations as defined by the CSF. HITRUST allows for multiple assessment options including self and third-party assessments. Organizations may also be CSF Validated or CSF Certified depending on the type of assessment and results of the assessment. For the Assurance Program for HIEs, these options can be implemented in stages to increase the assessment s level of rigor (e.g., self-assessment versus on-site) and requirements (e.g., Validated versus Certified) over time Assessment Schedule Overview Phase 1 Conduct assessment and provide CSF Validated Report Phase 2 Remediate policy, mobile computing and removable media gaps Phase 3 Conduct assessment and provide CSF Validated Report Continuous Monitoring Conduct assessment and provide CSF Validated Report Repeat Phase 3 every 2 years Provide CAP Provide Cap Provide Cap Within 12 months of the start of the phase. Within 18 months of the start of the phase. Within 24 months of the start of the phase. 9

10 The following sections describe each phase in detail including what it required. A full timeline is included in Appendix A Phase 1 Requirements HIEs and connecting organizations are required in Phase 1 of the Assurance Program for HIEs to conduct, at a minimum, a self assessment in accordance with the process and requirements of the broader HITRUST CSF Assurance Program. These requirements are designed to focus on the high risk areas to the industry based on feedback from member organizations and breach data from sources including the Department of Health and Human Services (HHS) and DataLossDB.org. A full list of the required areas to be assessed is included as an addendum to this document. HIEs and connecting organizations may receive a CSF Self-Assessment or Validated Report from HITRUST including maturity for each domain, recommendations for improvement and the beginnings of a CAP. The assessment must be conducted within the first 12 months of connecting to an HIE. Connecting organizations are required to provide a copy of the report to the HIEs to which they are connecting. HIEs shall include the requirements for conducting an assessment and receiving a report as part of the contract with the connecting organization in lieu of alternative security mechanisms. HIEs and connecting organizations shall maintain the reports as evidence of their assessment for a period of six (6) years in accordance with the HIPAA requirements. Following the assessment and within an 18 month period from joining the HIE the assessed entity will document and provide a complete CAP including milestones, responsibility, deadlines and risk/priority Phase 2 Requirements HIEs and connecting organizations are required in Phase 2 of the Assurance Program for HIEs to conduct an assessment in accordance with the process and requirements of the broader HITRUST CSF Assurance Program for the year in which the assessment is conducted. The assessment must meet the assurance level as described in Appendix B. Part of the assessment must evaluate the organization s prior CAP and the progress towards the items contained therein at the time of the assessment. The organization must demonstrate reasonable progress towards all items. Any corrective actions related to policies, mobile device security (e.g., laptops), and removable media security (e.g., CDs, DVDs, USB drives, backup tapes) must be addressed (i.e., fully remediated). HIEs and connecting organizations are expected to receive a CSF Validated Report from HITRUST including maturity for each domain, recommendations for improvement and an updated CAP. 10

11 The assessment must be conducted within 12 months following the end of Phase 1 for the assessed entity. Connecting organizations are required to provide a copy of the report and updated CAP to the HIEs to which they are connecting. HIEs shall include the requirements for conducting an assessment, receiving a report and requirements regarding remediation as part of the contract with the connecting organization in lieu of alternative security mechanisms. HIEs and connecting organizations shall maintain the reports as evidence of their assessment for a period of six (6) years in accordance with the HIPAA requirements Phase 3 Requirements HIEs and connecting organizations are required in Phase 3 of the Assurance Program for HIEs to conduct an assessment in accordance with the process and requirements of the broader HITRUST CSF Assurance Program for the year in which the assessment is conducted. The assessment must meet the assurance requirements as described in Appendix C. Part of the assessment must evaluate the organization s prior CAP and the progress towards the items contained therein at the time of the assessment. The organization must demonstrate reasonable progress towards the remaining items from the prior review. HIEs and connecting organizations are expected to receive a CSF Validated or Certified, Report where applicable, from HITRUST including maturity for each domain, recommendations for improvement and an updated CAP. The assessment must be conducted within 12 months following the end of Phase 2 for the assessed entity. Connecting organizations are required to provide a copy of the report and updated CAP to the HIEs to which they are connecting. HIEs shall include the requirements for conducting an assessment, receiving a report and requirements regarding remediation as part of the contract with the connecting organization in lieu of alternative security mechanisms. HIEs and connecting organizations shall maintain the reports as evidence of their assessment for a period of six (6) years in accordance with the HIPAA requirements. Following the completion of Phase 3, all connecting organizations will be expected to conduct an assessment according to the requirements of Phase 3 every two (2) years Recourse for Non-compliance Organizations that do not meet all of the requirements set forth for any Phase are required to send a designated individual responsible for information security and, if a separate person, an individual responsible for compliance to an approved HIPAA training program. The individual(s) must attend the course and provide evidence of completion to the HIE no later than ninety (90) days following the Assessment deadline of the Phase in which the organization is in. The organization will not advance to the next Phase until the current Phase has been completed as set forth in the original requirements. 11

12 Appendix A Assurance Program for HIEs Timeline Join the HIE Conduct Phase 1 Assessment Provide CSF Validated Report to HIE Provide CAP to HIE Remediate Policy, Mobile Computing and Removable Media Gaps Conduct Phase 2 Assessment Provide CSF Validated Report to HIE Provide Updated CAP to HIE Conduct Phase 3 Assessment Provide CSF Validated / Certified Report to HIE Provide Updated CAP to HIE Repeat Phase months months months months months months months 12 NOT FOR DISTRIBUTION OUTSIDE WORKING GROUP

13 Required Assurance Level Appendix B Phase 2 Assurance Level Requirements CSF Self- Assessment CSF Validated via Third Party Assessment Health Plan / Insurance / PBM Covered Lives Fewer than 1 Greater than 1 Medical Facility / Hospital Licensed Beds Fewer than 1,000 Greater than 1,000 Physician Practice visits per year Fewer than 60,000 Greater than 60,000 Third Party Processor records processed per year Fewer than 10 Greater than 10 Pharmacy Companies prescriptions per year Fewer than 10 Greater than 10 BioTech Companies Annual spend on R&D Less than $100,000 Greater than $100,000 IT Service Provider / Vendor employees Fewer than 500 Greater than NOT FOR DISTRIBUTION OUTSIDE WORKING GROUP

14 Required Assurance Level Appendix C Phase 3 Assurance Level Requirements CSF Self- Assessment CSF Validated CSF Certified Health Plan / Insurance / PBM Covered Lives Fewer than 1 1 to 7½ Greater than 7½ Medical Facility / Hospital Licensed Beds Physician Practice visits per year Fewer than 1,000 Fewer than 60,000 1,000 to 10,000 60,000 to 180,000 Greater than Greater than 10, ,000 Third Party Processor records processed per year Fewer than to 60 Greater than 60 Pharmacy Companies prescriptions per year Fewer than to 70 Greater than 70 BioTech Companies Annual spend on R&D Less than $100,000 $100,000 to $200 More than $200 IT Service Provider / Vendor employees Fewer than to 2,500 Greater than 2, NOT FOR DISTRIBUTION OUTSIDE WORKING GROUP

HITRUST CSF Assurance Program. Simplifying the information protection of healthcare data

HITRUST CSF Assurance Program. Simplifying the information protection of healthcare data HITRUST CSF Assurance Program Simplifying the information protection of healthcare data May 2013 Table of Contents Background CSF Assurance Program Overview Compliance Challenges Key Components of the

More information

Georgia Health Information Network, Inc. Georgia ConnectedCare Policies

Georgia Health Information Network, Inc. Georgia ConnectedCare Policies Georgia Health Information Network, Inc. Georgia ConnectedCare Policies Version History Effective Date: August 28, 2013 Revision Date: August 2014 Originating Work Unit: Health Information Technology Health

More information

Industry leading Education. Certified Partner Program. Please ask questions Todays slides are available group.

Industry leading Education. Certified Partner Program. Please ask questions Todays slides are available   group. Industry leading Education Certified Partner Program Please ask questions Todays slides are available http://compliancy- group.com/slides023/ Past webinars and recordings http://compliancy- group.com/webinar/

More information

RISK ANALYSIS VERSUS RISK ASSESSMENT:

RISK ANALYSIS VERSUS RISK ASSESSMENT: WHITEPAPER RISK ANALYSIS VERSUS RISK ASSESSMENT: WHAT S THE DIFFERENCE? ANDREW HICKS MBA, CISA, CCM, CRISC, HCISSP, HITRUST CSF PRACTITIONER PRINCIPAL, HEALTHCARE AND LIFE SCIENCES TABLE OF CONTENTS Overview...

More information

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees San Antonio IIA: I HEART AUDIT CONFERENCE February 24,

More information

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule Breach Policy To provide guidance for breach notification when impressive or unauthorized access, acquisition, use and/or disclosure of the ephi occurs. Breach notification will be carried out in compliance

More information

Healthcare Data Breaches: Handle with Care.

Healthcare Data Breaches: Handle with Care. Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice

More information

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile

More information

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights HIPAA Update Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights New Mexico Health Information Management Association Conference April 11, 2014 Albuquerque, NM Recent Enforcement

More information

Business Associate Risk

Business Associate Risk Business Associate Risk Assessing and Managing Business Associate Risk Presented by CJ Wolf, MD, COC, CPC, CHC, CCEP, CIA Healthicity Senior Compliance Executive Disclaimer: Nothing in this presentation

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

Leveraging the CSF to Assess HIPAA Privacy Nadia Fahim-Koster Director, IT Risk Management Meditology Services April 2016

Leveraging the CSF to Assess HIPAA Privacy Nadia Fahim-Koster Director, IT Risk Management Meditology Services April 2016 Leveraging the CSF to Assess HIPAA Privacy Nadia Fahim-Koster Director, IT Risk Management Meditology Services April 2016 Agenda Introduction HITRUST and Privacy Controls Privacy Rule core requirements

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

6/7/2018. HIPAA Compliance Simplified. HHS Wall of Shame. Marc Haskelson, President Compliancy Group

6/7/2018. HIPAA Compliance Simplified. HHS Wall of Shame. Marc Haskelson, President Compliancy Group 855 85 HIPAA (855-854-4722) www.compliancygroup.com 1 HIPAA Compliance Simplified Marc Haskelson, President Compliancy Group Agenda Why HIPAA? Common misunderstandings What is a Audit? Real World Stories

More information

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT Effective Date: September 23, 2013 RECITALS WHEREAS a relationship exists between the Covered Entity and the Business Associate that performs certain functions

More information

2. HIPAA was introduced in There are many facets to the law. Which includes the facets of HIPAA that have been implemented?

2. HIPAA was introduced in There are many facets to the law. Which includes the facets of HIPAA that have been implemented? Chapter 9 Review Questions 1. What does Administrative Simplification include? Please mark all that apply. a. Privacy rule b. Code sets c. Security rule d. Electronic Transactions e. Identifiers f. Total

More information

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

AMA Practice Management Center, What you need to know about the new health privacy and security requirements 1. HIPAA Security Rule Johns, Merida L., Information Security, in Johns, Merida L. (ed.) Health Information Management Technology, an Applied Approach, AHIMA: Chicago, IL, 2nd ed. 2007, chapter 19, pp.

More information

Application for Certificate of Authority to Operate an Approved Health Information Organization In the State Of Kansas

Application for Certificate of Authority to Operate an Approved Health Information Organization In the State Of Kansas Application for Certificate of Authority to perate an Approved Health Information rganization In the State f Kansas This application and all supporting documentation are subject to public disclosure under

More information

2016 Business Associate Workforce Member HIPAA Training Handbook

2016 Business Associate Workforce Member HIPAA Training Handbook 2016 Business Associate Workforce Member HIPAA Training Handbook Using the Training Handbook The material in this handbook is designed to deliver required initial, and/or annual HIPAA training for all

More information

Membership Contract. Juliet K. Mavromatis MD, FACP and Phyllis S. Tong, MD, FACP

Membership Contract. Juliet K. Mavromatis MD, FACP and Phyllis S. Tong, MD, FACP Membership Contract Dear Patient: Personalized Primary Care Atlanta, LLC ( PPC Atlanta ) is committed to delivering high quality healthcare services to each and every patient. PPC Atlanta treats far fewer

More information

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist The Security Risk Analysis Requirement for MIPS August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist Today s Speaker Peter Mercuri Peter Mercuri, MBA, HCISPP, CHSA,CMQP,CEHR,CHTS,CHWP

More information

The HHS Breach Final Rule Is Out What s Next?

The HHS Breach Final Rule Is Out What s Next? The HHS Breach Final Rule Is Out What s Next? Webinar September 16, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer

More information

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013 HIPAA Privacy & Security 2013 Omnibus Final Rule update Dan Taylor, Infinisource Copyright 2013 All rights reserved. Highlights from Final Rules January 25, 2013 Made business associates directly liable

More information

The Audits are coming!

The Audits are coming! HIPAA and Meaningful Use (MU) Governmental Program Audits The Audits are coming! The Audits are coming! 1 Audit Readiness Meaningful Use and HIPAA Both CMS and the Office for Civil Rights (OCR) have been

More information

HITRUST Third Party Assurance (TPA) Risk Triage Methodology

HITRUST Third Party Assurance (TPA) Risk Triage Methodology HITRUST Third Party Assurance (TPA) Risk Triage Methodology A streamlined approach to assessing the inherent risk posed by a third party and selecting an appropriate assurance mechanism leveraging the

More information

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below. Subject: Protected Health Information Breach Notification Policy Department: Enterprise Risk Management Services Executive Sponsor: SVP/Chief Risk Officer Approved by: Rod Hochman, MD President/CEO Policy

More information

Request for Information:

Request for Information: Request for Information: Enable electronic provision of patients release of information (ROI) through health information exchanges (HIE s) to support insurance companies, law firms and transition of care.

More information

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia HIPAA in the Digital Age Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia Virginia MGMA reminds attendees that the program is not intended to provide legal advice and advises participants

More information

IBM Phytel Cloud Services

IBM Phytel Cloud Services Service Description IBM Phytel Cloud Services This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

Cyber ERM Proposal Form

Cyber ERM Proposal Form Cyber ERM Proposal Form This document allows Chubb to gather the needed information to assess the risks related to the information systems of the prospective insured. Please note that completing this proposal

More information

North Carolina Health Information Exchange Authority FULL NC HIEA PARTICIPATION AGREEMENT INSTRUCTIONS

North Carolina Health Information Exchange Authority FULL NC HIEA PARTICIPATION AGREEMENT INSTRUCTIONS North Carolina Health Information Exchange Authority FULL NC HIEA PARTICIPATION AGREEMENT INSTRUCTIONS Please read these instructions carefully. Missing or inaccurate information will delay processing

More information

The Road Ahead. Diane Meyer Chief Compliance and Privacy Officer Stanford University Medical Center

The Road Ahead. Diane Meyer Chief Compliance and Privacy Officer Stanford University Medical Center The Road Ahead Kevin Lyles, Esq. Partner, Jones Day kdlyles@jonesday.com (614) 281-3821 Diane Meyer Chief Compliance and Privacy Officer Stanford University Medical Center DMeyer@stanfordmed.org (650)

More information

Chesapeake Regional Information System for Our Patients, Inc. ( CRISP ) HIE Participation Agreement (HIE and Direct Service)

Chesapeake Regional Information System for Our Patients, Inc. ( CRISP ) HIE Participation Agreement (HIE and Direct Service) Chesapeake Regional Information System for Our Patients, Inc. ( CRISP ) HIE Participation Agreement (HIE and Direct Service) A. CRISP is a private Maryland non-stock membership corporation which is tax

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

104 Delaware Health Care Claims Database Data Access Regulation

104 Delaware Health Care Claims Database Data Access Regulation 104 Delaware Health Care Claims Database Data Access Regulation 1.0 Authority and Purpose 1.1 Statutory Authority. 16 Del.C. 10306 authorizes the Delaware Health Information Network (DHIN) to promulgate

More information

HIPAA Basic Training for Health & Welfare Plan Administrators

HIPAA Basic Training for Health & Welfare Plan Administrators 2010 Human Resources Seminar HIPAA Basic Training for Health & Welfare Plan Administrators Norbert F. Kugele What We re going to Cover Important basic concepts Who needs to worry about HIPAA? Complying

More information

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT WITH THE DOCTORS CLINIC, PART OF FRANCISCAN MEDICAL GROUP

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT WITH THE DOCTORS CLINIC, PART OF FRANCISCAN MEDICAL GROUP ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT WITH THE DOCTORS CLINIC, PART OF FRANCISCAN MEDICAL GROUP and THIS AGREEMENT ( Agreement ) is made and entered into this day of, 20, by and between The Doctors

More information

No change from proposed rule. healthcare providers and suppliers of services (e.g.,

No change from proposed rule. healthcare providers and suppliers of services (e.g., American College of Physicians Medicare Shared Savings/Accountable Care Organization (ACO) Final Rule Summary Analysis Category Final Rule Summary Change from Proposed Rule and Comments ACO refers to a

More information

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013! Coping with, and Taking Advantage of, HIPAA s New Rules!!! Deven McGraw Director, Health Privacy Project April 19, 2013! Status of Federal Privacy Regulations! Omnibus Rule (Data Breach, Enforcement, HITECH,

More information

HIPAA COMPLIANCE PLAN FOR OHIO EYE ASSOCIATES, INC.

HIPAA COMPLIANCE PLAN FOR OHIO EYE ASSOCIATES, INC. HIPAA COMPLIANCE PLAN FOR OHIO EYE ASSOCIATES, INC. Adopted August 2016 PREPARED BY STACEY A. BOROWICZ, ESQ. DINSMORE & SHOHL LLP 614-227-4212 STACEY.BOROWICZ@DINSMORE.COM 10600677V1 75602.1 i OHIO EYE

More information

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform Preparing for a HIPAA Audit & Hot Topics in Health Care Reform 2013 San Francisco Mid-Sized Retirement & Healthcare Plan Management Conference March 17-20, 2013 Elizabeth Loh, Esq. Copyright Trucker Huss,

More information

Meaningful Use Requirement for HIPAA Security Risk Assessment

Meaningful Use Requirement for HIPAA Security Risk Assessment Meaningful Use Requirement for HIPAA Security Risk Assessment The MU attestation requirement does not state that any gaps must be resolved prior to meaningful use attestation. Mary Sirois, MBA, PT, CPHIMSS

More information

HITECH and Stimulus Payment Update

HITECH and Stimulus Payment Update HITECH and Stimulus Payment Update David S. Szabo Agenda HIPAA Breach Notification Rules HITECH and Meaningful Use Open Question Period 2 Data Security Breaches A total of 245,216,093 records containing

More information

Health Law Diagnosis

Health Law Diagnosis February Page 1 of 2013 11 Health Law Diagnosis HHS Releases Final HITECH Omnibus Rule After waiting over two years from the publication of the Notice of Proposed Rulemaking to implement provisions of

More information

CY 2018 Quality Payment Program Final Rule Summary

CY 2018 Quality Payment Program Final Rule Summary CY 2018 Quality Payment Program Final Rule Summary On November 2, 2017, the Centers for Medicare and Medicaid Services (CMS) released its final rule outlining the requirements for year two of the Quality

More information

Eastern Iowa Mental Health and Disability Services. HIPAA Policies and Procedures Manual

Eastern Iowa Mental Health and Disability Services. HIPAA Policies and Procedures Manual Eastern Iowa Mental Health and Disability Services HIPAA Policies and Procedures Manual This HIPAA Master Manual has been reviewed, accepted and approved by: Eastern Iowa MH/DS Region Governing Board of

More information

LEGAL ISSUES IN HEALTH IT SECURITY

LEGAL ISSUES IN HEALTH IT SECURITY LEGAL ISSUES IN HEALTH IT SECURITY Webinar Hosted by Uluro, a Product of Transformations, Inc. March 28, 2013 Presented by: Kathie McDonald-McClure, Esq. Wyatt, Tarrant & Combs, LLP 500 West Jefferson

More information

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry HIPAA FUNDAMENTALS For Substance abuse Treatment Industry (c)firststepcounselingonline2014 1 At the conclusion of the course/unit/study the student will... ANALYZE THE EFFECTS OF TRANSFERING INFORMATION

More information

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA ALLISON SHUREN, J D, MSN Financial Disclosure Gerald Meltzer is a consultant for imedicware Allison Shuren co-chairs the Life Sciences and Healthcare Regulatory

More information

HIPAA BUSINESS ASSOCIATE ADDENDUM

HIPAA BUSINESS ASSOCIATE ADDENDUM HIPAA BUSINESS ASSOCIATE ADDENDUM This Business Associate Addendum ( BAA ) is made between Cognito, LLC., a South Carolina corporation ( Cognito Forms ) and {OrganizationLegalName} ( Covered Entity or

More information

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

HIPAA Security. ible. isions. Requirements, and their implementation. reader has HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

HIPAA Implementation: The Case for a Rational Roll-Out Plan. Released: July 19, 2004

HIPAA Implementation: The Case for a Rational Roll-Out Plan. Released: July 19, 2004 HIPAA Implementation: The Case for a Rational Roll-Out Plan Released: July 19, 2004 1 1. Summary HIPAA Administrative Simplification, as it is currently being implemented, is increasing complexity and

More information

RECITALS. WHEREAS, this Amendment incorporates the various amendments, technical and conforming changes to HIPAA implemented by the Final Rule; and

RECITALS. WHEREAS, this Amendment incorporates the various amendments, technical and conforming changes to HIPAA implemented by the Final Rule; and Amendment to Business Associate Agreements and All Other Contracts Containing Embedded Business Associate Provisions as stated in a Health Insurance Portability and Accountability Act Section between Independent

More information

BREACH NOTIFICATION POLICY

BREACH NOTIFICATION POLICY PRIVACY 2.0 BREACH NOTIFICATION POLICY Scope: All subsidiaries of Universal Health Services, Inc., including facilities and UHS of Delaware Inc. (collectively, UHS ), including UHS covered entities ( Facilities

More information

Standard Companion Guide

Standard Companion Guide Standard Companion Guide Refers to the Implementation Guide Based on X12 Version 005010X279A1 Health Care Eligibility Benefit Inquiry and Response (270/271) Companion Guide Version Number 3.0 November

More information

HIPAA Electronic Transactions & Code Sets

HIPAA Electronic Transactions & Code Sets P R O V II D E R H II P A A C H E C K L II S T Moving Toward Compliance The Administrative Simplification Requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) will have

More information

Interim Date: July 21, 2015 Revised: July 1, 2015

Interim Date: July 21, 2015 Revised: July 1, 2015 HIPAA/HITECH Page 1 of 7 Effective Date: September 23, 2009 Interim Date: July 21, 2015 Revised: July 1, 2015 Approved by: James E. K. Hildreth, Ph.D., M.D. President and Chief Executive Officer Subject:

More information

How to mitigate risks, liabilities and costs of data breach of health information by third parties

How to mitigate risks, liabilities and costs of data breach of health information by third parties How to mitigate risks, liabilities and costs of data breach of health information by third parties April 17, 2012 ID Experts Webinar www.idexpertscorp.com Rick Kam President and Co-Founder richard.kam@idexpertscorp.com

More information

"HIPAA RULES AND COMPLIANCE"

HIPAA RULES AND COMPLIANCE PRESENTER'S GUIDE "HIPAA RULES AND COMPLIANCE" Training for HIPAA REGULATIONS Quality Safety and Health Products, for Today...and Tomorrow OUTLINE OF MAJOR PROGRAM POINTS OUTLINE OF MAJOR PROGRAM POINTS

More information

INTERMEDIATE ADMINISTRATIVE SIMPLIFICATION CENTERS FOR MEDICARE & MEDICAID SERVICES. Online Guide to: ADMINISTRATIVE SIMPLIFICATION

INTERMEDIATE ADMINISTRATIVE SIMPLIFICATION CENTERS FOR MEDICARE & MEDICAID SERVICES. Online Guide to: ADMINISTRATIVE SIMPLIFICATION 02 INTERMEDIATE» Online Guide to: CENTERS FOR MEDICARE & MEDICAID SERVICES Last Updated: February 2014 TABLE OF CONTENTS INTRODUCTION: ABOUT THIS GUIDE... i About Administrative Simplification... 2 Why

More information

Fifth National HIPAA Summit West

Fifth National HIPAA Summit West Fifth National HIPAA Summit West Privacy and Security under the HITECH Act W. Reece Hirsch Paul T. Smith, Partner, Partner, Hooper, Lundy & Bookman 1 Developments The Health Information Technology for

More information

NCPDP Electronic Prescribing Standards

NCPDP Electronic Prescribing Standards NCPDP Electronic Prescribing Standards May 2014 1 What is NCPDP? An ANSI-accredited standards development organization. Provides a forum and marketplace for a diverse membership focused on health care

More information

Legislative Update HIPAA/HITECH

Legislative Update HIPAA/HITECH Legislative Update HIPAA/HITECH Richard C. Stevens, Attorney Martin, Pringle, Oliver, Wallace & Bauer, LLP http://martinpringle.com Topics Legislative Update HIPAA/HITECH q Enforcement Activities q Meaningful

More information

Privacy Rule Primer. 45 CFR Part 160 and Subparts A and E of Part CFR , 45 CFR CFR

Privacy Rule Primer. 45 CFR Part 160 and Subparts A and E of Part CFR , 45 CFR CFR Resource provided by Page 1 of 10 Contents I. The Privacy Rule The Fundamental HIPAA Rule... 1 II. Privacy Rule Overview... 1 III. Privacy Rule Standards and Implementation Specifications Covered in Section

More information

The Challenge of Implementing Interoperable Electronic Medical Records

The Challenge of Implementing Interoperable Electronic Medical Records Annals of Health Law Volume 19 Issue 1 Special Edition 2010 Article 37 2010 The Challenge of Implementing Interoperable Electronic Medical Records James C. Dechene Follow this and additional works at:

More information

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA The Health Insurance Portability and Accountability Act of 1996 Results Physiotherapy s policy regarding privacy and security of protected health information (PHI) is a reflection of our commitment

More information

March 1. HIPAA Privacy Policy

March 1. HIPAA Privacy Policy March 1 HIPAA Privacy Policy 2016 1 PRIVACY POLICY STATEMENT Purpose: The following privacy policy is adopted by the Florida College System Risk Management Consortium (FCSRMC) Health Program and its member

More information

Version 5010 Regulatory Impact Analysis Supplement

Version 5010 Regulatory Impact Analysis Supplement Version 5010 Regulatory Impact Analysis Supplement September 2008 This document was prepared by Gartner, Inc., under a contract to the Centers for Medicare & Medicaid Services (CMS), to conduct primary

More information

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Training Module provided as a component of the Stericycle HIPAA Compliance Program Goals for Training Understand how Texas

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES January 23, 2014 I. Executive Summary I: The HIPAA Final Rule

More information

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017 HIPAA Tool Kit 2017 Contents Introduction...1 About This Manual... 1 A Word About Covered Entities... 1 A Brief Refresher Course on HIPAA... 2 A Brief Update on HIPAA... 2 Progress Report... 4 Ongoing

More information

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school ASPPR The omnibus rule greatly enhances a patient s privacy protections, provides individuals new rights to their health information, and strengthens the government s ability to enforce the law. The changes

More information

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: UPDATE 2015 February 20, 2015 I. Executive Summary HIPAA is a federal law passed by Congress to protect medical patient data privacy from misuse or disclosure

More information

Problems with Current Health Plans

Problems with Current Health Plans Problems with Current Health Plans Poor Integration, Coordination and Collaboration - Current plans offer limited coordination between the health plan, Providers, and the Members, as well as limited mobile

More information

Key Legal Issues in EMR, EMR Subsidy and HIPAA and Privacy Click Issues to edit Master title style

Key Legal Issues in EMR, EMR Subsidy and HIPAA and Privacy Click Issues to edit Master title style Key Legal Issues in EMR, EMR Subsidy and HIPAA and Privacy Click Issues to edit Master title style July 27, 2016 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP hcarnell@mcguirewoods.com

More information

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T COMPLIANCE TRAINING 2015 QUALITY MANAGEMENT COMPLIANCE DEPARTMENT 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T Compliance Program why? Ensure ongoing education

More information

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know 1801 California Street Suite 4900 Denver, CO 80202 303-830-1776 Facsimile 303-894-9239 MEMORANDUM To: Adam Finkel, Assistant Director, Government Relations, NCRA From: Mel Gates Date: December 23, 2013

More information

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018 1 HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier March 22, 2018 2 Today s Panel: Kimberly Holmes - Moderator - Vice President, Health Care, Cyber Liability & Emerging Risks, TDC Specialty Underwriters,

More information

Ensuring HIPAA Compliance When Transmitting PHI Via Patient Portals, and Texting

Ensuring HIPAA Compliance When Transmitting PHI Via Patient Portals,  and Texting Presenting a live 90-minute webinar with interactive Q&A Ensuring HIPAA Compliance When Transmitting PHI Via Patient Portals, Email and Texting Protecting Patient Privacy, Complying with State and Federal

More information

HEALTHCARE BREACH TRIAGE

HEALTHCARE BREACH TRIAGE IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards

More information

AFTER THE OMNIBUS RULE

AFTER THE OMNIBUS RULE AFTER THE OMNIBUS RULE 1 Agenda Omnibus Rule Business Associates (BAs) Agreement Breach Notification Change Breach Reporting Requirements (Federal and State) Notification to Care1st Health Plan Member

More information

Overview of HIPAA and Administrative Simplification

Overview of HIPAA and Administrative Simplification Overview of HIPAA and Administrative Simplification Denise M. Buenning, MsM, Director Administrative Simplification Group Office of E-Health Standards and Services Centers for Medicare & Medicaid Services

More information

HIPAA, HITECH & Meaningful Use

HIPAA, HITECH & Meaningful Use HIPAA, HITECH & Meaningful Use October 21, 2011 presented by Helen Oscislawski, Esq. Overview - What Has Changed? HITECH Act: Increased Penalties for non-compliance, effective 11/30/2009 New federal requirements

More information

The Real-Time Benefit Check Key to Closing the Gaps in Eligibility Driven Formulary. Tony Schueth Chief Executive Officer & Managing Partner

The Real-Time Benefit Check Key to Closing the Gaps in Eligibility Driven Formulary. Tony Schueth Chief Executive Officer & Managing Partner The Real-Time Benefit Check Key to Closing the Gaps in Eligibility Driven Formulary Tony Schueth Chief Executive Officer & Managing Partner Eligibility-Informed Formulary Information Flow Current Workflow

More information

Compliance Program. Health First Health Plans Medicare Parts C & D Training

Compliance Program. Health First Health Plans Medicare Parts C & D Training Compliance Program Health First Health Plans Medicare Parts C & D Training Compliance Training Objectives Meeting regulatory requirements Defining an effective compliance program Communicating the obligation

More information

HIPAA Privacy, Breach, & Security Rules

HIPAA Privacy, Breach, & Security Rules HIPAA Privacy, Breach, & Security Rules An Eagle Associates Presentation Eagle Associates, Inc. www.eagleassociates.net info@eagleassociates.net P.O. Box 1356 Ann Arbor, MI 48106 800-777-2337 Eagle Associates,

More information

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Legal and Privacy Implications of the HIPAA Final Omnibus Rule Legal and Privacy Implications of the HIPAA Final Omnibus Rule February 19, 2013 Pillsbury Winthrop Shaw Pittman LLP Faculty Gerry Hinkley Partner Pillsbury Winthrop Shaw Pittman LLP Deven McGraw Director,

More information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule 1 IMPORTANCE OF STAFF TRAINING HIPAA staff training is a key, required element in a covered entity's HIPAA

More information

The Impact of the Stimulus Act on HIPAA Privacy and Security

The Impact of the Stimulus Act on HIPAA Privacy and Security The Impact of the Stimulus Act on Webinar March 12, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer The American

More information

Policies Targeting Administrative Simplification. Harry Reynolds Blue Cross Blue Shield of North Carolina

Policies Targeting Administrative Simplification. Harry Reynolds Blue Cross Blue Shield of North Carolina Policies Targeting Administrative Simplification September 10, 2009 Harry Reynolds Blue Cross Blue Shield of North Carolina Discussion Successful payer harmonization is occurring via industry-driven efforts

More information

Compliance Steps for the Final HIPAA Rule

Compliance Steps for the Final HIPAA Rule Brought to you by The Alpha Group for the Final HIPAA Rule On Jan. 25, 2013, the Department of Health and Human Services (HHS) issued a final rule under HIPAA s administrative simplification provisions.

More information

Individual and Third-Party Access to Medical Records

Individual and Third-Party Access to Medical Records ISMS Medical Legal Guidelines January 2018 Individual and Third-Party Access to Medical Records www.isms.org Illinois State Medical Society Individual and Third-Party Access to Medical Records Recently,

More information

H E A L T H C A R E L A W U P D A T E

H E A L T H C A R E L A W U P D A T E L O U I S V I L L E. K Y S E P T E M B E R 2 0 0 9 H E A L T H C A R E L A W U P D A T E L E X I N G T O N. K Y B O W L I N G G R E E N. K Y N E W A L B A N Y. I N N A S H V I L L E. T N M E M P H I S.

More information

Privacy & Security in 2011

Privacy & Security in 2011 Privacy & Security in 2011 Sarah Meshak, JD Vice President & General Council Linda Minghella Vice President & Chief Information Officer 1 Agenda HITECH Act New Accounting Rules Meaningful Use Other Notices

More information

The American Recovery Reinvestment Act. and Health Care Reform Puzzle

The American Recovery Reinvestment Act. and Health Care Reform Puzzle The American Recovery Reinvestment Act and Health Care Reform Puzzle Carolyn Heyman-Layne Alaska HCCA Conference March 1, 2012 Comparison of Breach Notification Provisions in the HITECH Act 1 and the Alaska

More information

503 SURVIVING A HIPAA BREACH INVESTIGATION

503 SURVIVING A HIPAA BREACH INVESTIGATION 503 SURVIVING A HIPAA BREACH INVESTIGATION Presented by Nicole Hughes Waid, Esq. Mark J. Swearingen, Esq. Celeste H. Davis, Esq. Regional Manager 1 Surviving a HIPAA Breach Investigation: Enforcement Presented

More information

Participant Webinar: DURSA Amendment Summary. March 23, 2018

Participant Webinar: DURSA Amendment Summary. March 23, 2018 Participant Webinar: DURSA Amendment Summary March 23, 2018 How Do I Participate? Problems or Questions? Contact Dawn Van Dyke dvandyke@sequoiaproject.org ` 2 DURSA Historical Milestones Jul Nov 2009 May

More information

HIPAA and Lawyers: Your stakes have just been raised

HIPAA and Lawyers: Your stakes have just been raised HIPAA and Lawyers: Your stakes have just been raised October 16, 2013 Presented by: Harry Nelson e: hnelson@fentonnelson.com Claire Marblestone e: cmarblestone@fentonnelson.com AGENDA Statutory & Regulatory

More information