HEALTH & HUMAN SERVICES OFFICE FOR CIVIL RIGHTS HIPAA COMPLIANCE AUDITS. What do I need to know?

Similar documents
6/7/2018. HIPAA Compliance Simplified. HHS Wall of Shame. Marc Haskelson, President Compliancy Group

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc

AFTER THE OMNIBUS RULE

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

HIPAA & The Medical Practice

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

BREACH NOTIFICATION POLICY

HIPAA Privacy Overview

LEGAL ISSUES IN HEALTH IT SECURITY

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

ARE YOU HIP WITH HIPAA?

Changes to HIPAA Privacy and Security Rules

Interim Date: July 21, 2015 Revised: July 1, 2015

503 SURVIVING A HIPAA BREACH INVESTIGATION

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

H E A L T H C A R E L A W U P D A T E

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

Business Associate Risk

Determining Whether You Are a Business Associate

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

Industry leading Education. Certified Partner Program. Please ask questions Todays slides are available group.

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

To: Our Clients and Friends January 25, 2013

HIPAA / HITECH. Ed Massey Affiliated Marketing Group

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T

2016 Business Associate Workforce Member HIPAA Training Handbook

HIPAA Breach Notice Rules New notice requirements for HIPAA covered entities when there is a breach of Protected Health Information (PHI)

ALERT. November 20, 2009

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

Effective Date: 4/3/17

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Compliance Guide

HIPAA, Privacy, and Security Oh My!

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

HIPAA Basic Training for Health & Welfare Plan Administrators

Priciest HIPAA Incidents of 2015

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

"HIPAA RULES AND COMPLIANCE"

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

"HIPAA FOR LAW FIRMS" WHAT EVERY LAW FIRM NEEDS TO KNOW ABOUT HIPAA

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

HIPAA Data Breach ITPC

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

The Audits are coming!

8/30/2016 HIPAA: WHAT S CHANGED?

OMNIBUS RULE ARRIVES

What Does The New Omnibus HIPAA/HITECH Final Rule Really Mean For Employers And Their Service Providers?

Getting a Grip on HIPAA

HIPAA OMNIBUS FINAL RULE

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

HIPAA and Lawyers: Your stakes have just been raised

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Key Legal Issues in EMR, EMR Subsidy and HIPAA and Privacy Click Issues to edit Master title style

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

It s as AWESOME as You Think It Is!

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS

Privacy Rule Primer. 45 CFR Part 160 and Subparts A and E of Part CFR , 45 CFR CFR

CLIENT UPDATE. HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors

HIPAA Background and History

ARRA s Amendments to HIPAA Privacy & Security Rules

HIPAA: Impact on Corporate Compliance

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

EXCERPT. Do the Right Thing R1112 P1112

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

Be Careful What You Wish For: The Final Rule Is Out

HIPAA Privacy and Security Rules

Patient Breach Letter Content Requirements

Business Associates: How to become HIPAA compliant, increase revenue, and gain new clients

HIPAA Compliance Under the Magnifying Glass

Fifth National HIPAA Summit West

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

The American Recovery Reinvestment Act. and Health Care Reform Puzzle

PATTERSON MEDICAL SUPPLY, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT WITH CUSTOMERS

HIPAA Notice of Privacy Practices

The wait is over HHS releases final omnibus HIPAA privacy and security regulations

UNDERSTANDING HIPAA COMPLIANCE IN 2014: ETHICS, TECHNOLOGY, HEALTHCARE & LIFE

Privacy Rule - Complaint Investigations

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

Highlights of the Omnibus HIPAA/HITECH Final Rule

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees

4/15/2016. What we strive for. Reality

Transcription:

HEALTH & HUMAN SERVICES OFFICE FOR CIVIL RIGHTS HIPAA COMPLIANCE AUDITS What do I need to know?

INITIAL AUDITS PERFORMED IN 2016 Covered Entities Business associates

AUDIT PURPOSE: SUPPORT IMPROVED COMPLIANCE Identify best practices; uncover risks & vulnerabilities; detect areas for technical assistance; encourage consistent attention to compliance Intended to be non-punitive, but OCR can open up compliance review (for example, if significant concerns are raised during an audit or an entity fails to respond) Learn from this next phase in structuring permanent audit program Develop tools and guidance for industry self-evaluation and breach prevention

AUDIT PROGRAM STATUS: Desk audits underway 166 Covered Entities 43 Business Associates Business Associate selection pool largely drawn from over 20,000 entities identified by audited CEs On-site audits of both CEs and BAs in 2017, after completion of the desk audit process, to evaluate against a comprehensive selection of controls in protocols A desk audit subject may be subject to on-site audit OCR beginning distribution of draft findings

HOW WILL I BE CONTACTED AND WHAT DO I NEED? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the protection of certain individually identifiable health information -referred to as Protected Health Information or PHI -from unauthorized use and disclosure. The Office for Civil Rights (OCR) of the Department of Health and Human Services (HHS) has responsibility for administering and enforcing the HIPAA Privacy, Security and Breach Notification Rules (altogether, "the Rules"). The Rules provide important health information privacy and security protections and specify the rights of individuals regarding their PHI. The American Recovery and Reinvestment Act of 2009 (ARRA), in Section 13411 of the Health Information Technology for Economic and Clinical Health Act (HITECH Act), requires HHS to perform periodic audits of covered entity and business associate compliance with the Rules. Covered entities include health plans, health care clearinghouses and health care providers who conduct certain administrative and payment- related transactions electronically. A business associate performs certain functions or activities on behalf of, or provides certain services to, a covered entity that involve the use or disclosure of individually identifiable health information. You are receiving this letter because your organization has been selected for a desk audit of your compliance with the HIPAA Rules. The objective of this audit is to 1) analyze the key policies, procedures and related processes and controls your entity maintains relative to the selected requirements, and 2) assess your entity's compliance efforts with regard to the selected provisions of the Rules, to ensure that covered entities and business associates are adequately safeguarding PHI and providing individuals with the rights afforded to them by the Rules. The results of our audits will enable us to identify potential areas of noncompliance across industries or in certain sectors and better target our technical assistance. For HIPAA covered entities, the desk audit will focus on the risk analysis and risk management provisions of the Security Rule, the access and notice provisions of the Privacy Rule, and the applicable content and timeliness provisions of the Breach Notification Rule. For business associates, the desk audit will focus on the risk analysis and risk management provisions of the Security Rule, and the applicable content and timeliness provisions of the Breach Notification Rule. As noted below, the documents required for the desk audit must be uploaded to OCR's audit portal; the audit portal sets fourth in greater detail the documents that will be required, consistent with our Audit Protocol. Please upload documents corresponding to the elements identified in the portal within 10 business days of the date of this letter. Only the specified documents uploaded through the audit portal will be considered by the auditor. OCR auditors will not consider documentation submitted after the deadline. Only documentation in effect as of the date of this letter will be considered during the audit. Timeframe Opening Meetings through Webinar You will be contacted by an OCR auditor with draft findings, if any, approximately 90 days after your document submission. You will have 10 business days to review the draft findings and provide a written response, if any. OCR will send you the final report once completed.

WHO HAS A COMPLETED SRA FOR 2016 & 2017?

CORNERSTONE PRINCIPLES OF HIPAA COMPLIANCE: Identify compliance team Employee training Review & update P&P s Review & update BAA s Update SRA

BUILDING THE COMPLIANCE TEAM: Most providers have someone that has been unofficially elected the Compliance Officer. Now is the time to make it official! the compliance officer will be the main contact for: 1. Identifying individuals responsible for HIPAA compliance and define responsibilities 2. Performing Updated SRA 3. Managing all BAA s and other HIPAA related documentation 4. Establishing and maintaining an ongoing HIPAA awareness training program 5. Breach and incident reporting (know the requirements and act accordingly)

WHAT IS A HIPAA AWARENESS PROGRAM: Formalizing a HIPAA awareness program is how you communicate HIPAA policies and guidelines with your employees. The program should include the following at a minimum: 1. Provide all employees a copy of your companies HIPAA P&P s and require a signature acknowledging they understand the rules 2. Quarterly quizzes 3. Well defined escalation procedures

Employee training ENTER YOUR WORKFORCE AND DEPLOY YOUR HIPAA COMPLIANCE TRAINING

BREACH AND INCIDENT REPORTING: Breach Notification Requirements for CE's: Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media. In addition, business associates must notify covered entities if a breach occurs at or by the business associate. Individual Notice: Covered entities must notify affected individuals following the discovery of a breach of unsecured protected health information. Covered entities must provide this individual notice in written form by first-class mail, or alternatively, by e-mail if the affected individual has agreed to receive such notices electronically. If the covered entity has insufficient or out-of-date contact information for 10 or more individuals, the covered entity must provide substitute individual notice by either posting the notice on the home page of its web site for at least 90 days or by providing the notice in major print or broadcast media where the affected individuals likely reside. The covered entity must include a toll-free phone number that remains active for at least 90 days where individuals can learn if their information was involved in the breach. These individual notifications must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach and must include, to the extent possible, a brief description of the breach, a description of the types of information that were involved in the breach, the steps affected individuals should take to protect themselves from potential harm, a brief description of what the covered entity is doing to investigate the breach, mitigate the harm, and prevent further breaches, as well as contact information for the covered entity (or business associate, as applicable). Media Notice: Covered entities that experience a breach affecting more than 500 residents of a State or jurisdiction are, in addition to notifying the affected individuals, required to provide notice to prominent media outlets serving the State or jurisdiction. Covered entities will likely provide this notification in the form of a press release to appropriate media outlets serving the affected area. Like individual notice, this media notification must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach and must include the same information required for the individual notice. Notice to the Secretary: In addition to notifying affected individuals and the media (where appropriate), covered entities must notify the Secretary of breaches of unsecured protected health information. Covered entities will notify the Secretary by visiting the HHS web site and filling out and electronically submitting a breach report form. If a breach affects 500 or more individuals, covered entities must notify the Secretary without unreasonable delay and in no case later than 60 days following a breach. If, however, a breach affects fewer than 500 individuals, the covered entity may notify the Secretary of such breaches on an annual basis. Reports of breaches affecting fewer than 500 individuals are due to the Secretary no later than 60 days after the end of the calendar year in which the breaches are discovered.

BREACH AND INCIDENT REPORTING: Administrative Requirements and Burden of Proof: Covered entities and business associates, as applicable, have the burden of demonstrating that all required notifications have been provided or that a use or disclosure of unsecured protected health information did not constitute a breach. Thus, with respect to an impermissible use or disclosure, a covered entity (or business associate) should maintain documentation that all required notifications were made, or, alternatively, documentation to demonstrate that notification was not required: (1) its risk assessment demonstrating a low probability that the protected health information has been compromised by the impermissible use or disclosure; or (2) the application of any other exceptions to the definition of breach. Covered entities are also required to comply with certain administrative requirements with respect to breach notification. For example, covered entities must have in place written policies and procedures regarding breach notification, must train employees on these policies and procedures, and must develop and apply appropriate sanctions against workforce members who do not comply with these policies and procedures. Notification by a Business Associate: If a breach of unsecured protected health information occurs at or by a business associate, the business associate must notify the covered entity following the discovery of the breach. A business associate must provide notice to the covered entity without unreasonable delay and no later than 60 days from the discovery of the breach. To the extent possible, the business associate should provide the covered entity with the identification of each individual affected by the breach as well as any other available information required to be provided by the covered entity in its notification to affected individuals.

THE BAD STUFF: The HHS OCR has implemented this program to ensure that all providers comply with the HIPAA/HITECH standards The main focus is to safeguard against willful neglect!!! The OCR portal is complete and the audits are ramping up The following slides show examples of the fines and give a brief description of what happened:

TEXAS HEALTH SYSTEM SETTLES POTENTIAL HIPAA VIOLATIONS FOR DISCLOSING PATIENT INFORMATION Memorial Hermann Health System (MHHS) has agreed to pay $2.4 million to the U.S. Department of Health and Human Services (HHS) and adopt a comprehensive corrective action plan to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. MHHS is a not-for-profit health system located in Southeast Texas, comprised of 16 hospitals and specialty services in the Greater Houston area MHHS senior management approved the impermissible disclosure of the patient s PHI by adding the patient s name in the title of a press release. In addition, MHHS failed to timely document the sanctioning of its workforce members for impermissibly disclosing the patient s name in the title of the press release In addition to a $2.4 million monetary settlement, a corrective action plan requires MHHS to update its policies and procedures on safeguarding PHI from impermissible uses and disclosures and to train its workforce members. The corrective action plan also requires all MHHS facilities to attest to their understanding of permissible uses and disclosures of PHI, including disclosures to the media

TEXAS HEALTH SYSTEM SETTLES POTENTIAL HIPAA VIOLATIONS FOR DISCLOSING PATIENT INFORMATION They included a patients name in the press release They didn t document the corrective action given to the employees responsible for including patients name Cost = $2.4mm

$2.5 MILLION SETTLEMENT SHOWS THAT NOT UNDERSTANDING HIPAA REQUIREMENTS CREATES RISK APRIL 24, 2017 The U.S. Department of Health and Human Services, Office for Civil Rights (OCR), has announced a Health Insurance Portability and Accountability Act of 1996 (HIPAA) settlement based on the impermissible disclosure of unsecured electronic protected health information (ephi). CardioNet has agreed to settle potential noncompliance with the HIPAA Privacy and Security Rules by paying $2.5 million and implementing a corrective action plan. This settlement is the first involving a wireless health services provider, as CardioNet provides remote mobile monitoring of and rapid response to patients at risk for cardiac arrhythmias. In January 2012, CardioNet reported to the HHS Office for Civil Rights (OCR) that a workforce member s laptop was stolen from a parked vehicle outside of the employee s home. The laptop contained the ephi of 1,391 individuals. OCR s investigation into the impermissible disclosure revealed that CardioNet had an insufficient risk analysis and risk management processes in place at the time of the theft. Additionally, CardioNet s policies and procedures implementing the standards of the HIPAA Security Rule were in draft form and had not been implemented. Further, the Pennsylvania based organization was unable to produce any final policies or procedures regarding the implementation of safeguards for ephi, including those for mobile devices.

$2.5 MILLION SETTLEMENT SHOWS THAT NOT UNDERSTANDING HIPAA REQUIREMENTS CREATES RISK APRIL 24, 2017 Laptop containing PHI of 1391 patients stolen from a parked car Insufficient risk analysis Insufficient risk management processes Policies & Procedures still in draft form No P&P related to HIPAA awareness training and employee understanding the HIPAA rules Cost = $2.5mm

NO BUSINESS ASSOCIATE AGREEMENT? $31K MISTAKE APRIL 20, 2017 The Center for Children s Digestive Health (CCDH) has paid the U.S. Department of Health and Human Services (HHS) $31,000 to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule and agreed to implement a corrective action plan. CCDH is a small, for-profit health care provider with a pediatric subspecialty practice that operates its practice in seven clinic locations in Illinois. In August 2015, the HHS Office for Civil Rights (OCR) initiated a compliance review of the Center for Children s Digestive Health (CCDH) following an initiation of an investigation of a business associate, FileFax, Inc., which stored records containing protected health information (PHI) for CCDH. While CCDH began disclosing PHI to Filefax in 2003, neither party could produce a signed Business Associate Agreement (BAA) prior to Oct. 12, 2015.

NO BUSINESS ASSOCIATE AGREEMENT? $31K MISTAKE APRIL 20, 2017 Business associate investigated Covered entity receives notice of compliance review Doing business since 2003 Neither party can produce fully executed BAA BAA submitted was from 2015 Cost = $31k!!!!!!!!!!!!!!!

OVERLOOKING RISKS LEADS TO BREACH, $400,000 SETTLEMENT The U.S. Department of Health and Human Services, Office for Civil Rights (OCR), has announced a Health Insurance Portability and Accountability Act of 1996 (HIPAA) settlement based on the lack of a security management process to safeguard electronic protected health information (ephi). Metro Community Provider Network (MCPN), a federallyqualified health center (FQHC) of Denver, Colorado has agreed to settle potential noncompliance with the HIPAA Rules by paying $400,000 and implementing a corrective action plan. With this settlement amount, OCR considered MCPN s status as a FQHC when balancing the significance of the violation with MCPN s ability to maintain sufficient financial standing to ensure the provision of ongoing patient care. MCPN provides primary medical care, dental care, pharmacies, social work, and behavioral health care services throughout the greater Denver, Colorado metropolitan area to approximately 43,000 patients per year, a large majority of whom have incomes at or below the poverty level. On January 27, 2012, MCPN filed a breach report with OCR indicating that a hacker accessed employees' email accounts and obtained 3,200 individuals' ephi through a phishing incident. OCR s investigation revealed that MCPN took necessary corrective action related to the phishing incident; however, the investigation also revealed that MCPN failed to conduct a risk analysis until mid-february 2012. Prior to the breach incident, MCPN had not conducted a risk analysis to assess the risks and vulnerabilities in its ephi environment, and, consequently, had not implemented any corresponding risk management plans to address the risks and vulnerabilities identified in a risk analysis. When MCPN finally conducted a risk analysis, that risk analysis, as well as all subsequent risk analyses, were insufficient to meet the requirements of the Security Rule.

OVERLOOKING RISKS LEADS TO BREACH, $400,000 SETTLEMENT Breach report notifying OCR of phishing incident 3200 EPHI compromised Corrective action was taken and performed as necessary However- Covered entity could not produce completed SRA prior to the breach No risk management plan implemented Vulnerabilities not identified & addressed SRA deemed insufficient to meet requirements of the security rule Cost = $400K

$5.5 MILLION HIPAA SETTLEMENT SHINES LIGHT ON THE IMPORTANCE OF AUDIT CONTROLS Memorial Healthcare System is a nonprofit corporation which operates six hospitals, an urgent care center, a nursing home, and a variety of ancillary health care facilities throughout the South Florida area. MHS is also affiliated with physician offices through an Organized Health Care Arrangement (OHCA). MHS reported to the HHS Office for Civil Rights (OCR) that the protected health information (PHI) of 115,143 individuals had been impermissibly accessed by its employees and impermissibly disclosed to affiliated physician office staff. This information consisted of the affected individuals names, dates of birth, and social security numbers. The login credentials of a former employee of an affiliated physician s office had been used to access the ephi maintained by MHS on a daily basis without detection from April 2011 to April 2012, affecting 80,000 individuals. Although it had workforce access policies and procedures in place, MHS failed to implement procedures with respect to reviewing, modifying and/or terminating users right of access, as required by the HIPAA Rules. Further, MHS failed to regularly review records of information system activity on applications that maintain electronic protected health information by workforce users and users at affiliated physician practices, despite having identified this risk on several risk analyses conducted by MHS from 2007 to 2012.

$5.5 MILLION HIPAA SETTLEMENT SHINES LIGHT ON THE IMPORTANCE OF AUDIT CONTROLS 115,143 patients accessed by employees and impermissibly disclosed to an affiliated physician Log-in credentials of former employee used for a year Workforce access P&P in place but didn t have a policy implemented for decommissioning ex-employee accounts Provided SRA s that identified this risk but never implemented corrective action plan to fix vulnerabilities identified Cost = $5.5mm

LACK OF TIMELY ACTION RISKS SECURITY AND COSTS MONEY - FEBRUARY 1, 2017 The U.S. Department of Health and Human Services, Office for Civil Rights (OCR), has announced a Health Insurance Portability and Accountability Act of 1996 (HIPAA) civil money penalty on the impermissible disclosure of unsecured electronic protected health information (ephi). Children s Medical Center of Dallas (Children s) did not file a timely request for a hearing by the date in accordance with the instructions in the Notice of Proposed Determination and have paid the full civil money penalty of $3.2 million. Children s is a pediatric hospital in Dallas, Texas, and is part of Children s Health, the seventh largest pediatric health care provider in the nation. On January 18, 2010, Children s filed a breach report with OCR indicating the loss of an unencrypted, nonpassword protected BlackBerry device at the Dallas/Fort Worth International Airport on November 19, 2009. The device contained the ephi of approximately 3,800 individuals. On July 5, 2013, Children's filed a separate HIPAA Breach Notification Report with OCR, reporting the theft of an unencrypted laptop from its premises sometime between April 4 and April 9, 2013. Children's reported the device contained the ephi of 2,462 individuals. Although Children's implemented some physical safeguards to the laptop storage area (e.g., badge access and a security camera at one of the entrances), it also provided access to the area to workforce not authorized to access ephi. OCR s investigation revealed Children s noncompliance with HIPAA Rules, specifically, a failure to implement risk management plans, contrary to prior external recommendations to do so, and a failure to deploy encryption or an equivalent alternative measure on all of its laptops, work stations, mobile devices and removable storage media until April 9, 2013. Despite Children's knowledge about the risk of maintaining unencrypted ephi on its devices as far back as 2007, Children's issued unencrypted BlackBerry devices to nurses and allowed its workforce members to continue using unencrypted laptops and other mobile devices until 2013.

LACK OF TIMELY ACTION RISKS SECURITY AND COSTS MONEY - FEBRUARY 1, 2017 2010 - Unencrypted cellphone device lost at an airport Contained EPHI of 3800 patients 2013-3 years later had an unencrypted device stolen from location Contained EPHI of 2462 patients Entity issued warnings as far back as 2007 about encrypting devices They didn t learn from their mistakes! Continued to issue unencrypted devices to staff members Failed to encrypt workstations, laptops, removable storage media, etc. Cost = $3.2mm

HIPAA SETTLEMENT DEMONSTRATES IMPORTANCE OF IMPLEMENTING SAFEGUARDS FOR EPHI The U.S. Department of Health and Human Services, Office for Civil Rights (OCR), has announced a Health Insurance Portability and Accountability Act of 1996 (HIPAA) settlement based on the impermissible disclosure of unsecured electronic protected health information (ephi). MAPFRE Life Insurance Company of Puerto Rico (MAPFRE) has agreed to settle potential noncompliance with the HIPAA Privacy and Security Rules by paying $2.2 million and implementing a corrective action plan. With this resolution amount, OCR balanced potential violations of the HIPAA Rules with evidence provided by MAPFRE with regard to its present financial standing. MAPFRE is a subsidiary company of MAPFRE S.A., a global multinational insurance company headquartered in Spain. MAPFRE underwrites and administers a variety of insurance products and services in Puerto Rico, including personal and group health insurance plans. On September 29, 2011, MAPFRE filed a breach report with OCR indicating that a USB data storage device (described as a pen drive ) containing ephi was stolen from its IT department, where the device was left without safeguards overnight. According to the report, the USB data storage device included complete names, dates of birth and Social Security numbers. The report noted that the breach affected 2,209 individuals. MAPFRE informed OCR that it was able to identify the breached ephi by reconstituting the data on the computer on which the USB data storage device was attached. OCR s investigation revealed MAPFRE s noncompliance with the HIPAA Rules, specifically a failure to conduct its risk analysis and implement risk management plans, contrary to its prior representations, and a failure to deploy encryption or an equivalent alternative measure on its laptops and removable storage media until September 1, 2014. MAPFRE also failed to implement or delayed implementing other corrective measures it informed OCR it would undertake.

HIPAA SETTLEMENT DEMONSTRATES IMPORTANCE OF IMPLEMENTING SAFEGUARDS FOR EPHI USB data storage device stolen from the IT department in an unsecured area Contained EPHI of 2209 individuals Failed to perform a SRA and implement a risk management plan even though they stated they had one in place Failure to implement physical safeguards (lock the door!) Delayed implementing other safeguards identified by the OCR Cost = $2.2mm

FIRST HIPAA ENFORCEMENT ACTION FOR LACK OF TIMELY BREACH NOTIFICATION SETTLES FOR $475,000 The U.S. Department of Health and Human Services, Office for Civil Rights (OCR), has announced the first HIPAA settlement based on the untimely reporting of a breach of unsecured protected health information. Presence Health has agreed to settle potential violations of the HIPAA Breach Notification Rule by paying $475,000 and agreeing to implement a corrective action plan. Presence Health is one of the largest health care networks serving Illinois and consists of approximately 150 locations, including 11 hospitals and 27 long-term care and senior living facilities. Presence also has multiple physicians offices and health care centers in its system and offers home care, hospice care, and behavioral health services. With this settlement amount, OCR balanced the need to emphasize the importance of timely breach reporting with the desire not to disincentive breach reporting altogether. On January 31, 2014, OCR received a breach notification report from Presence indicating that on October 22, 2013, Presence discovered that paper-based operating room schedules, which contained the PHI of 836 individuals, were missing from the Presence Surgery Center at the Presence St. Joseph Medical Center in Joliet, Illinois. The information consisted of the affected individuals names, dates of birth, medical record numbers, dates of procedures, types of procedures, surgeon names, and types of anesthesia. OCR s investigation revealed that Presence Health failed to notify, without unreasonable delay and within 60 days of discovering the breach, each of the 836 individuals affected by the breach, prominent media outlets (as required for breaches affecting 500 or more individuals), and OCR.

FIRST HIPAA ENFORCEMENT ACTION FOR LACK OF TIMELY BREACH NOTIFICATION SETTLES FOR $475,000 OCR received breach notification on 1/31/2014 that occurred on 10/22/13 Operating room documents containing PHI of 836 patients were missing Had no ability to locate missing docs and a breach was recognized What did they do wrong? Failed to provide timely written notification to the OCR & affected individuals OCR requires notice in 60 days of breach affecting 500+ individuals Notification must be made to the OCR as well as the affected individuals or media outlet Cost = $475k

THE GOOD STUFF: The OCR prefers to settle cases and assist entities in implementing corrective action plans, a lack of risk management not only costs individuals the security of their data, but it can also cost covered entities a sizable fine. Most fines that are being imposed could have been fixed with nothing more than a corrective action plan There are several entities providing HIPAA compliance training coupled with consulting and help completing the SRA although it can be pricey There are several software based options that allow providers to implement and maintain HIPAA compliance

BRIEF SUMMARY: You re HIPAA compliance program is an ongoing effort and must be addressed and updated on a regular basis The time to get started is right now! Any effort is better than doing nothing Safeguard against willful neglect Finalize policies & procedures and make sure all employees are aware Have all BAA s, finalized P&P s, HIPAA policies, SRA s, etc. in one easily accessible location

WHAT DOES ACU-SERVE USE

REMEMBER THIS? CORNERSTONE PRINCIPLES OF HIPAA COMPLIANCE: Identify compliance team Employee training Review & update P&P s Review & update BAA s Update SRA

Identify compliance team SIMPLY GO TO THE COMPLIANCE TEAM MODULE FROM THE DASHBOARD AND ENTER YOUR COMPLIANCE TEAM MEMBERS

Review & update P&P s SELECT THE POLICIES AND PROCEDURES MODULE, PERSONALIZE, REVIEW, & ADOPT

Update SRA COMPLETE THE QUICK ASSESSMENT TO GET A JUMP START ON YOUR COMPLETE SECURITY AND RISK ANALYSIS

Review & update BAA s FILL IN THE SHEET WITH BUSINESS ASSOCIATE AND COVERED ENTITY INFORMATION TO STORE ALL OF YOUR BAA S IN ONE CONVENIENT LOCATION

ANY QUESTIONS?