Healthcare Information and Management Systems Society. U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2006

Size: px
Start display at page:

Download "Healthcare Information and Management Systems Society. U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2006"

Transcription

1 Healthcare Information and Management Systems Society U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2006

2 U.S. Healthcare Industry HIPAA Survey Results: Summer 2006 EXECUTIVE OVERVIEW In some quarters, HIPAA, as a compliance issue, is old news. Congress passed the legislation ten years ago, and the compliance deadlines for HIPAA s central regulations have come and gone. Most covered entities have complied to some extent with most of the regulations and those who haven t, as we will report, often don t have HIPAA compliance on their top priority lists. Some non-compliant organizations remain challenged by roadblocks such as budget constraints, and the complexities of integrating HIPAA into existing systems and processes. It is also arguable that HIPAA inaction, particularly in the area of Privacy, is related to the fact that over 19,000 formal Privacy-related grievances have been registered with the Federal government, and none have resulted in HIPAA s promised enforcement fines. When HIPAA news was in the press every day, many predicted that it would have a cataclysmic impact on healthcare Providers, including putting some out of business. In over six years of conducting this Survey, we have yet to learn of any Providers felled by the expenditures and operational jolts generated by HIPAA implementation. Similarly, many said that adopting HIPAA s Privacy, Security, and Transactions and Code Sets standards would be impossible or next to it for most organizations. However, those who committed to implementing HIPAA have done so, frequently with a new organizational mindset that embraces security, privacy, and process improvements. If HIPAA compliance is not news per se, the need for security and streamlined healthcare communications definitely is. In fact, any hospital director of information systems, medical records or the business office will tell us today that HIPAA, as a facilitator of information security and efficient electronic transactions, is an increasingly significant factor in everyday healthcare. Despite the Privacy provisions, which remain a thorn in the sides of many healthcare workers and some patients many healthcare leaders agree that implementation of HIPAA standards is making a difference that is undeniably positive. Where implemented, HIPAA Security provisions are providing a strong framework for protecting sensitive information against ever-increasing data security threats, including disasters. HIPAA Transactions and Code Sets standards have substantially increased the electronic flow of healthcare business transactions, thereby providing for time savings, clarity in transaction conventions, simplification of manual processes, and decreases in paper and postage use. As unwelcome as its forms and processes have been to some, even the Privacy Rule has increased public confidence in healthcare and provided a conduit for registering privacy concerns and seeing them resolved. Further, the emergence of health information networks such as regional health information organizations (RHIOs) designed to enable collaboration of hospitals, physicians, payers and other healthcare organizations to streamline processes and information sharing relies on HIPAA standards as a building block. As we have done for the last six years, this semi-annual Survey continues to follow through on our mission to monitor and report on industry HIPAA compliance, as an informational and educational service. Also, reflecting the spirit of a growing industry culture that is not as anxious about compliance as it is committed to safe, secure healthcare communications and transactions, we have expanded our focus to explore the direct and indirect impacts of HIPAA, post-implementation. Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

3 Key Findings of the Summer 2006 Survey include: HIPAA Security Both Providers and Payers have made little progress in Security initiatives since our Winter 2006 Survey conducted in January. Of particular concern is Providers: only 56% have implemented the Security standards, as compared to 55% in January Eighty percent (8) of Payers, up from 72% in January 2006, reported compliance. Despite claims of full compliance with the Security Rule, gaps remain; many compliant Providers and Payers could not confirm that they had implemented all key Security standards. Data security breaches remain a serious reality for Providers and Payers. Thirty-nine percent (39%) of Providers and 33% of Payers reported having experienced security incidents in the last six months. These percentages are consistent with those reported in our January 2006 Survey. HIPAA Transactions and National Provider Identifier Implementation of the Transactions and Code Sets (TCS) standards across the industry appears to be stalled. Providers reporting full compliance with TCS actually dropped from 84% in January 2006 to 72%. Seventy-three percent (73%) of Payers reported compliance both in this Survey and in the January 2006 Survey. About 42% of Providers and 45% of Payers are conducting all HIPAA-required transactions. Both groups cite the other s lack of readiness as the primary reason for not conducting more standard transactions. Healthcare Providers are taking the necessary steps to convert to the National Provider Identifier (NPI), a move required by May 23, Almost 67% of participating Providers have already applied for their NPI, and 77% have identified the internal changes needed for the conversion. HIPAA Privacy A substantial percentage of Providers (22%) and Payers (13%) remain non-compliant with the Privacy regulations. These results are consistent with findings in all preceding Surveys since 2004, suggesting that a core group of covered entities either cannot or will not implement the Privacy standards. Even among compliant organizations, significant implementation gaps remain in certain areas, including establishing Business Associate Agreements, monitoring internal Privacy compliance, and maintaining minimum necessary information disclosure restrictions. The percentage of reportedly compliant Provider organizations that has experienced privacy breaches decreased from January 2006, from 6 to 52%. Reportedly non-compliant Providers experienced more privacy breaches (64%) than compliant Providers, consistent with January 2006 Survey findings. HIPAA Impacts and Opportunities Less than half of participants have measured direct return on investment (ROI) from their investment in standard Transactions and Code Sets, but 4% of both Providers and Payers indicated that they have achieved significant ROI. Both Provider and Payer Survey participants agree that HIPAA implementation has resulted in greater attention to patient privacy and data security by their workforces, as well as increased consumer confidence. Close to 3 of Provider and Payer participants are currently participating in health information networks, such as a Regional Health Information Organization (RHIO), and about Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

4 2 are planning to do so. The majority of participants agreed that HIPAA standards have facilitated the execution of such networks. Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

5 THE SURVEY Phoenix Health Systems and HIMSS conducted the Summer 2006 US Healthcare Industry HIPAA Compliance Survey from July 15 to August 9, A total of 220 healthcare industry representatives (Providers and Payers) responded to notices about the Survey that were sent to HIMSS members and to Phoenix HIPAAlert newsletter subscribers. The online Survey was anonymously completed via Phoenix HIPAA-focused web resource, HIPAAdvisory.com. The Participants Provider organizations accounted for 81% (178) of participants, and Payers for 19% (42). The distribution of Survey participants follows: Providers 81% Hospitals with 400+ beds: 31% of Providers Hospitals with beds: 21% Hospitals with less than 100 beds, or other similarly-sized Providers: 19% Medium-sized physician practices (11 to 29 physicians) / other providers: 1 Small physician practices (10 or fewer physicians) / other providers: 19% Payers 19% Covering fewer than 150,000 lives: 29% of Payers Covering 150, ,000 lives: 22% Covering 501,000-1,500,000 lives: 32% Covering more than 1,500,000 lives: 17% Eighty-seven percent (87%) of Provider respondents and 78% of Payer respondents hold an official role within their organization for HIPAA compliance, and have such positions as Senior / Department Manager (including CIO), Security Officer, and Privacy Officer. Note: The percentages provided in this report are based on the total number of respondents for each question, unless noted otherwise. Some participants did not complete all questions. SECURITY COMPLIANCE Concerns about information security have grown steadily across most industries, including healthcare, as a result of ever-changing technologies and increasing incidence of security breaches. To manage these issues, as well as in response to the HIPAA Security Rule (which became effective April 20, 2005), 56% of Providers participating in this Survey reported that they have achieved compliance with Security Rule provisions. From a more negative perspective, the percentage of Providers who had implemented all required Security provisions by January 2006 (as reported in our Winter 2006 Survey) increased only one point by July 2006, from 55%. (See table below.) Eighty percent (8) of Payers (up from 72% in January 2006) reported compliance. Given the significantly poor results among Providers, we drilled down into individual Provider groups to identify the most obvious trouble spots. Forty-nine percent (49%) of hospitals with 400 or more beds were in compliance with the Security Rule, along with just 44% of hospitals with 100 to 400 beds representing the two least compliant groups. Neither group showed significant improvement since January 2006, when average compliance levels were approximately 4. Hospitals with less than 100 beds and large physician practices were the most compliant Provider groups (7), reflecting a significant increase from 48% in January Fifty-four (54%) percent of medium-sized practices reported compliance (up from 33% in January 2006) and 68% of small practices (compared to 4 in January 2006) also reported compliance. Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

6 Forty-three percent (43%) of non-compliant Providers predicted that they will complete HIPAA Security implementation within six months, but the remainder anticipates a longer timeline. Among non-compliant Payers, 6 expect to take seven months or longer to complete implementation. It must be noted that these groups have made like predictions in all three semi-annual Surveys published since the April 2005 Security Rule deadline. In response to our questions regarding the reasons behind their incomplete Security Rule compliance, both Providers (15%) and Payers (17%) cited, among the top three obstacles, the fact that their organizations are placing higher priority on other projects. Providers greatest roadblocks, however, were reported to be budgeting constraints (2) and difficulties in achieving successful integration of new systems and procedures across their organizations (also 2). The latter issue is of particular significance relative to the low Security Rule performance of large hospitals, which typically have the most complex systems infrastructures. Anecdotal data indicates that infrastructural complexities, in fact, may be the larger problem: for example, one participant noted that dealing with a mix of legacy systems, new systems and technology backbone issues requires strong strategic direction, in addition to time and money. Another noted that physicians maintenance of independently managed databases on desktops and portable devices presents an additional infrastructure-related complication. As a double check, reportedly compliant Survey participants were asked to list the specific Security standards their organizations had implemented. While most participating organizations had implemented most Security Rule provisions, numerous gaps remain. For example, only 61% of Providers reported they had implemented emergency access procedures, and 68% had implemented required audit controls. Just 75% of Providers had completed contingency planning and programs for security incident response and reporting. While Payers have made more progress in implementing security protections than Providers, at least 2 of participants reported that their organizations had not yet implemented audit controls, person/entity authentication procedures, or media disposal/reuse procedures. No reportedly compliant Provider or Payer was able to demonstrate compliance with every requirement. Industry Security Compliance Comparison: Summer 2006 with Winter Summer 2006 Winter 2006 Providers Payers Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

7 Incidents of Data Security Breaches Survey results indicate that security incidents and breaches are a continuing problem within the healthcare industry. Providers and Payers were asked how many data security breaches their organizations had experienced in the six-month period since the Winter 2006 Survey. Thirty-two percent (32%) of Providers (up from 24% reported in January 2006) experienced between one and five incidents, and another 7% reported six to eleven incidents (down from 13%). Generally consistent with our January 2006 data, 29% of Payers experienced between one and five security incidents, and another 4% experienced between six and eleven breaches. Drivers of Security Rule Compliance Among both Providers and Payers, the strongest single driver behind their implementation of security protections was reported to be an organizational mindset that embraces the concepts of information security and regulatory compliance. Other major drivers include the influence of accrediting bodies, such as the Joint Commission on Accreditation of Healthcare Organizations (JCAHO) and National Committee for Quality Assurance (NCQA), and the increasing occurrence of security threats and incidents. TRANSACTIONS AND CODE SETS COMPLIANCE The original deadline for compliance with the HIPAA Transactions and Code Sets (TCS) Rule was October 16, 2003, but the Centers for Medicare and Medicaid Services (CMS) implemented a temporary Contingency Plan that essentially allowed non-compliance until July Compliance includes implementation of all necessary policies, procedures, processes, and systems in order to test and then conduct the standard HIPAA transactions required for healthcare business functions. Overall TCS compliance including actual conversion to HIPAA standardized transactions has shown little, if any, improvement over the past year, and appears to be stalled. Unlike implementation of the Privacy and Security Rules, the successful conducting of standardized transactions between entities can only be achieved by an individual organization if its internal actions are coordinated with complementary actions of other entities. Unfortunately, as our data below shows, inadequate collaboration among Providers, Payers, software vendors, and clearinghouses remains a major stumbling block in compliance efforts. Though 84% of Providers indicated they were fully compliant with the TCS Rule in January 2006, and 8 in July 2005, only 72% reported full compliance in July Further, only 42% of Providers are actually conducting all HIPAA standard transactions (down from 46% in January 2006), and 65% indicated they were conducting approximately half of the standard transactions. Demonstrating the significance of industry collaboration in this effort, Providers cited such issues as not having received compliant software from vendors, and many Payers lack of readiness, (as well as perceived ambiguities in HIPAA transaction requirements) as the major roadblocks preventing more progress. Seventy-three percent (73%) of Payers reported full compliance with the TCS Rule in this Survey the same percentage reporting compliance in January 2006, but down from the 8 that reported compliance in July However, only 45% of Payers are currently conducting all standard transactions. Again, reflecting collaborative difficulties, over 9 of Payers cited Providers lack of readiness as the key reason for not conducting more standard transactions, and noted that lack of readiness among clearinghouses and software vendors was also a significant roadblock. Of those Providers who reported non-compliance with the TCS Rule, about 4 anticipate compliance within four to seven months, or, in some cases, even longer. However, another 41% do Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

8 not know when or if their organizations will fully implement the standard transactions. Among the Payers who are reportedly non-compliant, 66% noted that they expect to complete TCS implementation within four to seven months or longer, but another 33% indicated that their organizations have no current plans to complete TCS remediation. (See table below for overall compliance comparison.) Industry TCS Compliance Comparison: Summer 2006 with Winter Summer 2006 Winter 2006 Providers Payers PRIVACY COMPLIANCE Compliance with the HIPAA Privacy Rule was required by April 2003, but, as we have consistently observed in all Survey results since then, a substantial percentage of Providers and Payers remain non-compliant. In our Winter 2006 Survey, 8 of Providers and 86% of Payers indicated they were compliant with the HIPAA Privacy Regulations; as of July 2006 Providers reporting compliance have decreased to 78%, and Payers have increased by just one point to 87%. These results are also generally consistent with Summer 2005 Survey data and our preceding Surveys throughout 2005 and It is reasonable to conclude that a core group of approximately 2 of Providers and 13% of Payers have had insufficient incentive to implement required Privacy practices within their organizations. (See table below for a comparison of Summer 2006 and Winter 2006 Survey results.) Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

9 Industry Privacy Compliance Comparison: Summer 2006 with Winter Summer 2006 Winter 2006 Providers Payers Among Providers, 81% of hospitals with more than 400 beds reported full compliance, down from 85% reporting compliance in January Among hospitals with 100 to 400 beds, the percentage reporting compliance also decreased from 84% in January 2006 to 7 in July Seventy-three percent (73%) of hospitals with less than 100 beds and large physician practices reported compliance in July 2006, as compared to 8 in January For the first time, medium-sized physician practices and other similarly-sized Providers reported 10 compliance, compared to 8 in January (Note: only 17 Providers in this category responded to the current Survey). Finally, 73% of participating small Provider practices said they were currently compliant with the Privacy regulations in July 2006, as compared to 7 in January Within the Payer sector, compliance levels reported in the current Survey ranged from 83% to 92%, with Payers that serve between 500,000 and 1.5 million lives indicating the highest level of compliance (92%). The Summer 2006 Survey Privacy compliance results for Payers are generally comparable to the 8 to 9 range reported in the Winter 2006 Survey. Despite many Providers and Payers reports that they have fully implemented HIPAA Privacy requirements, a more detailed inspection indicates otherwise. In fact, NO participating Provider organization was able to show in this Survey or in past Surveys that it had complied with every key Privacy Rule provision, and Payers performance was only marginally better. As in past Surveys, we asked reportedly compliant Provider and Payer representatives to indicate their success in implementing several specific HIPAA Privacy requirements as a reality check. The table below comparing responses from the Summer 2006 Survey to the Winter 2006 Survey confirms that gaps remain between actual privacy practices and the specific requirements of the Privacy standards most significantly in the areas of completing Business Associate Agreements and monitoring organizational compliance with Privacy regulations. Summary of Key Privacy Practices Implemented by Compliant Organizations Areas of Privacy Compliance: Obtain patient authorizations for use and disclosure of PHI Providers Summer 2006 Winter 2006 Summer 2006 Payers Winter % % Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

10 Summary of Key Privacy Practices Implemented by Compliant Organizations Enable mandated patients rights (review, amend, restrict records) Obtain acknowledgement of receipt of Notice of Privacy Practices Providers Payers 96% 98% 94% 97% 92% 97% N/A N/A Post and distribute Notice of Privacy Practices 98% 97% 88% 97% Provide ongoing workforce Privacy training 96% 93% 10 94% Maintain accounting of disclosures 93% 94% 91% 94% Use minimum necessary restrictions 88% 95% N/A N/A Monitor organizational compliance with Privacy regulations Have obtained all required Business Associate Agreements 78% 9 85% 89% 72% 87% 94% 91% The majority of Providers and Payers who have not completed implementation of Privacy requirements indicated that they expect to do so within the next six months. However, at least a third of non-compliant participating organizations anticipate they will need seven months or longer to implement the Privacy regulations, and another third did not know when their organizations would be compliant. Again, it must be noted that similar projections for final implementation have been reported by non-compliant Providers and Payers in every Survey we have undertaken since January Adapting internal systems and processes to the requirements of the HIPAA Privacy Rule has proven difficult for many, if not most, covered entity organizations. We asked Survey participants to rank in order the provisions that have challenged them the most. For Providers, training staff was listed as the most difficult task (23%), followed by managing accounting of disclosures (22%) and maintaining Business Associate Agreements (15%). For Payers, maintaining minimum necessary when handling requests for protected health information by third parties has been the most difficult task (33%). Training staff (23%) and managing accounting of disclosures (13%) also ranked in the top three challenges Payers have experienced. Patient Privacy Breaches and Formal Complaints In order to assess how much, if at all, Privacy Rule implementation has impacted the incidence of privacy breaches, we asked both the participating organizations that were reportedly Privacy compliant and those that were NOT reportedly compliant about their experiences with privacy breaches in the preceding six months since our last Survey. Both Providers and Payers that stated they were Privacy-compliant have experienced numerous incidents of patient privacy breaches since January 2006; non-compliant Providers, in particular, experienced more incidents than compliant Providers. Fifty-two percent (52%) of compliant Providers indicated that they had experienced privacy breaches between January and July 2006, down from 6 during the preceding six-month period. Thirty-one percent (31%) experienced between one and five privacy breaches, down from 41% in January Another 21% experienced six or more breaches, slightly up from the 19% reported in January On the other hand, among reportedly NON-compliant Providers, 64% experienced privacy breaches between January and July 2006, with 31% experiencing six or more breaches. It can be inferred that Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

11 ensuring that HIPAA Privacy practices are in place may very well reduce the number of breaches that occur within a Provider organization. Sixty percent (6) of reportedly compliant Payers (down from 66% in January 2006) reported privacy breaches, and just 6% experienced more than five incidents, down from 12% in January Among NON-compliant Payers, 5 were aware of Privacy incidents that had occurred since January 2006, and half of these participating organizations had experienced six or more incidents. Again, there is some indication from these results that implementation of Privacy Rule protections is reducing the incidence of Privacy breaches. Historically, healthcare organizations have experienced fewer formal privacy complaints than actual privacy breaches; this remained true for the period between January and July Overall, the number of participating organizations that have received formal complaints has decreased significantly since January Providers (both compliant and non-compliant) experiencing formal complaints decreased from 24% in January 2006 to 17% in July Formal privacy complaints against compliant Payers during the period decreased from 26% to 15%, with NON-compliant Payers reporting no complaints. None of our respondents reported more than five formal privacy complaints between July 2005 and January No organization participating in this Survey was assessed any penalties for a Privacy violation either between January and July 2006, or during any of our preceding Survey periods. This finding reflects recent disclosures by the Federal government that it has not yet imposed any fines for HIPAA violations, despite the fact that over 19,000 grievances have been filed since the Privacy regulations became effective in According to the Department of Health and Human Services Office for Civil Rights, its first approach to dealing with any complaint is to work for voluntary compliance, (Washington Post, June 5, 2006). While this approach may be effective with organizations that have received complaints, our Survey results suggest that it may serve as a disincentive to implementing Privacy protections for organizations that have neither complied with the Privacy Rule nor experienced formal complaints. Impact of HIPAA Privacy Now that the HIPAA Privacy Rule has been in place for over three years, with most Providers and Payers compliant in most areas, we asked Survey participants to rate both the benefits and the negative impacts their organizations have experienced. Both Providers (85%) and Payers (83%) strongly indicated that the foremost benefit achieved has been greater attention to patient privacy by their staffs. They also agreed on the second and third greatest benefits increased patient privacy overall (Providers: 75%, Payers: 67%), and more effective systems and processes (Providers: 43%, Payers: 4). Providers in particular (35%) noted that new Privacy practices have increased consumer satisfaction and confidence. Both groups agreed on the biggest negatives of implementing the Privacy regulations excessive work by staff in relation to patient privacy (Providers: 4, Payers: 43%); negative responses by patients towards HIPAA processes and forms (Providers: 38%, Payers: 37%), and negative attitudes by staff in relation to privacy (Providers; 35%, Payers: 4). ROADBLOCKS TO HIPAA COMPLIANCE Covered entities have experienced many obstacles on their roads toward implementation of HIPAA Privacy, Security, and standardized Transactions and Code Sets. In recent years, we have seen the significance of some early roadblocks decrease. For example, lack of organizational support, once considered the toughest roadblock, is a problem for only 4% of Providers and 7% of Payers. Similarly, lack of adequate expertise, formally a major problem for Providers, in particular, was cited by less than 1 of Providers and Payers in this Survey. Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

12 On the other hand, an early obstacle for many Providers budget constraints tied in the Summer 2006 Survey with difficulties in achieving successful integration of new systems and practices as the second key obstacle encountered (2). The latter issue, in the current Survey, was noted by Payers as the number one obstacle they have faced (2). Conflicts with projects that have had higher priority, and difficulties in interpreting HIPAA regulations were listed by Providers as the third and fourth most challenging issues with Payers ranking these as the second and third most difficult. In the January 2006 Survey, changes/potential changes in regulations ranked among Providers as the greatest obstacle they had faced, and interpretation of regulations ranked highest among Payers. HIPAA COMPLIANCE DRIVERS According to the Centers for Medicare and Medicaid Services (CMS) and the Office for Civil Rights (OCR), enforcement of HIPAA Security and Privacy is complaint-driven. However, Survey participants noted that key drivers of compliance by their organizations are somewhat different. Peers/trading partners (including attorneys), press stories, and internal whistle blowers were ranked as the most significant factors influencing their organizations compliance efforts. Both Providers and Payers rely on a variety of industry resources to support their HIPAA compliance efforts. Phoenix Health Systems HIPAAdvisory.com, the CMS web site, and the Department of Health and Human Services (HHS) were ranked, in order, as the top three most helpful resources used. NATIONAL PROVIDER IDENTIFIER Healthcare Providers are required under HIPAA to obtain and use a unique identifier by May 23, 2007, when filing electronic claims, in order to help streamline related electronic processes. We asked Survey participants what steps they have taken to prepare for conversion to the standard identifier. Almost 67% of Providers, up from 39% in January 2006, reported that their organizations have already applied for their National Provider Identifier (NPI). Seventy-seven percent (77%) of Providers have identified the system and software changes they will need to make, and 32% have already completed related internal testing. Seventy-six percent (76%) of Payers have finished identifying the systems, software, and business process changes they will need to make to enable Providers to convert successfully to the NPI. NATIONAL PATIENT IDENTIFIER SYSTEM The concept of establishing a National Patient Identifier system remains under consideration by HHS, but continues to be controversial. We asked both Providers and Payers if their organizations would find that the value of National Patient Identifiers would outweigh such concerns as potential errors or threats to patient privacy. Forty-two percent (42%) of Providers (up from 3 in January 2006) felt that the benefits would outweigh potential negatives. Thirty-six percent (36%) had no opinion and 22% were opposed to a patient identifier system. Payers were less positive, with only 3 supporting such a system (down from 45% in January 2006), 52% opposing it, and 17% undecided. Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

13 HIPAA IMPACTS AND OPPORTUNITIES Though HIPAA is often referred to as a compliance responsibility, the achievement of long-term benefits was the original driver of HIPAA in 1996 when it was legislated by Congress. The HIPAA standards for Privacy, Security, and Transactions were intended to work together as an industry-wide foundation for lowering healthcare costs and reducing errors through safe, universal electronic communication of healthcare information. Therefore, we focused one section of this Survey on exploring the impact of HIPAA on participating organizations, post-hipaa implementation; and the opportunities for return on investment. Transactions and Code Sets ROI Survey participants were asked if their organizations have realized any direct return on their investment in the standardization of Transactions and Code Sets. Forty-seven percent (47%) of Providers and 25% of Payers had not measured this. Twenty-one percent (21%) of Providers and 29% of Payers indicated they had measured for ROI, but have realized little or none. About 4% of both Providers and Payers stated that their measurements had indicated they had achieved significant ROI. When asked if their organizations have begun, or plan to begin to implement initiatives intended to achieve ROI on their HIPAA implementations, 15% of Providers and 8% of Payers answered positively, and approximately half responded negatively. The remainder stated that the question was either not applicable to their organization, or they did not know. Reported examples of ROI initiatives that are underway include moving to totally electronic transactions, conversion to electronic medical records, educating employees, performing activities formerly handled by clearinghouses, reducing use of postage and paper, ensuring faster billing and collections, and creating better pre-billing reports to reduce file rejections. Participation in Health Information Networks/RHIOs Many healthcare organizations have made decisions to join the growing number of regional health information organizations (RHIOs) and other health information networks. The adoption of standardized Privacy, Security, and Transactions practices has often been considered an important factor in healthcare organizations ability to make such networks viable and effective. If this is the case, it would be reasonable to believe that the benefits of health information networks are one form of indirect return on an organization s HIPAA investment. We asked our Survey participants if they were involved in health information network initiatives, what benefits they were realizing, and to what extent HIPAA had helped or hindered these initiatives. Approximately 3 of both Providers and Payers reported that they are currently participating in a health information network, and 22% of Providers and 17% of Payers are considering involvement in the next year. About 5 of Providers and 84% of Payers indicated that implementation of HIPAA Privacy and Security standards had facilitated the execution of such networks, and in many cases been essential to their success. Some participants (15% of Providers, of Payers) felt that Privacy and Security requirements had presented unnecessary obstacles. With regard to the Transactions and Code Sets standards, 48% of Providers and 67% of Payers felt TCS adoption had facilitated their information network initiative or been essential to its success. Nine percent (9%) of Providers felt TCS had been a hindrance, but no Payer agreed. When asked what benefits Survey participants were realizing from their involvement in a health information network or RHIO, 35% of Providers and 5 of Payers agreed that streamlined flow of patient information was the most significant benefit thus far. Improvement in overall community health, Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

14 improved quality of patient care, and reduction in redundant processes were also cited as key benefits. HOSPITAL SPENDING FOR HIPAA 2005 Actual Spending vs Budgets See tables below for a comparison of reported spending in 2005 against 2006 budgets, based on hospital size Actual Spending Hospitals (400+ Beds) 2006 Budget Hospitals (400+ Beds) 24% 8% 3% 8% 16% 25% 8% 5% 3% < $30,000 $30,000 - $50,000 $50,000 - $100,000 $100,000 - $250,000 $250,000 - $500,000 $500,000 - $1 million $1 million - $2 million $2 million + Do not know 27% 3% 11% 14% 11% 8% 5% 3% 19% < $30,000 $30,000 - $50,000 $50,000 - $100,000 $100,000 - $250,000 $250,000 - $500,000 $500,000 - $1 million $1 million - $2 million $2 million + Do not know 2005 Actual Spending Hospitals ( Beds) 2006 Budget Hospitals ( Beds) 27% 15% 4% 19% 19% 15% < $30,000 $30,000 - $50,000 $50,000 - $100,000 $100,000 - $250,000 $250,000 - $500,000 $500,000 - $1 million $1 million - $2 million $2 million + Do not know 31% 19% 8% 15% 27% < $30,000 $30,000 - $50,000 $50,000 - $100,000 $100,000 - $250,000 $250,000 - $500,000 $500,000 - $1 million $1 million - $2 million $2 million + Do not know 2005 Actual Spending Hospitals (< 100 Beds) 2006 Budget Hospitals (< 100 Beds) 5% 2 2 5% 5% 15% 3 < $30,000 $30,000 - $50,000 $50,000 - $100,000 $100,000 - $250,000 $250,000 - $500,000 $500,000 - $1 million $1 million - $2 million $2 million + Do not know 25% 5% 5% % 3 < $30,000 $30,000 - $50,000 $50,000 - $100,000 $100,000 - $250,000 $250,000 - $500,000 $500,000 - $1 million $1 million - $2 million $2 million + Do not know Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

15 Specialists in Healthcare Information Systems Consulting and Outsourcing Services Healthcare Information and Management Systems Society Comprehensive IT Outsourcing Services IT-Based Clinical Transformation Solutions HIMSS (Healthcare Information and Management Revenue Cycle Improvement Systems Society) is the healthcare industry s Strategic IT Planning and Procurement membership organization exclusively Systems Implementation focused on providing leadership for the Information Security optimal use of healthcare information HIPAA Compliance technology and management systems for the betterment of human health. Visit for more information on Phoenix services. Visit for daily updates on HIPAA-related news Wightman Road, Suite 400 Montgomery Village, MD Visit for more information. 230 East Ohio Street Suite 500 Chicago, IL HIMSS Copyright 2006 Phoenix Health Systems, Inc. All rights reserved

Healthcare Information and Management Systems Society. U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2005

Healthcare Information and Management Systems Society. U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2005 Healthcare Information and Management Systems Society U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2005 U.S. Healthcare Industry HIPAA Survey Results: Summer 2005 Executive Overview

More information

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 Healthcare Information and Management Systems Society HIMSS U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 HIMSS / Phoenix Health Systems Healthcare Industry Quarterly

More information

Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003

Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003 Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003 Presentation to HIPAA Summit West 6 June 2003 Vice-President, Research Area Director Gartner Page 0 Definition: Gartner s Compliance

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Life Science Leading Indicators 2010 (July - December)

Life Science Leading Indicators 2010 (July - December) Life Science Leading Indicators 2010 (July - December) Eric Newmark, Research Manager July 20, 2010 Methodology Health Industry Insights' Leading Indicators in Life Science IT Spending Survey is a bi-annual

More information

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Vulnerability Management Survey

Vulnerability Management Survey Vulnerability Management Survey Executive Summary November 1 st, 2006 Conducted by Trusted Strategies for Shavlik Technologies LLC Author: Bill Bosen About Trusted Strategies is a research and advisory

More information

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty By Jill Brooks, MD, CHCO and Katelyn Byrne, BSN, RN Data Breaches

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix

More information

HIPAA Security. An Ounce of Prevention is Worth a Pound of Cure

HIPAA Security. An Ounce of Prevention is Worth a Pound of Cure HIPAA Security An Ounce of Prevention is Worth a Pound of Cure Presented by CJ Wolf, MD, COC, CPC, CHC, CCEP, CIA Healthicity Senior Compliance Executive Paul R. Hales, Attorney at Law Subject Matter Expert

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice

Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security

More information

NHS Fife. 2015/16 Audit Computer Service Review Follow Up

NHS Fife. 2015/16 Audit Computer Service Review Follow Up NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute October 1, 2014 10/1/2014 1 1 Who is

More information

HCISPP HealthCare Information Security and Privacy Practitioner

HCISPP HealthCare Information Security and Privacy Practitioner HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com

More information

Evolution of IT in the Finance Industry. Europe

Evolution of IT in the Finance Industry. Europe 2011 Evolution of IT in the Finance Industry Europe CONTENTS Evolution of IT in the Finance Industry... 4 Methodology... 6 Focus... 8 Finding 1: Finance Industry Has Mature View on IT Trends...10 Finding

More information

2014 HIMSS Analytics Report The Perfect Storm: Navigating the Health IT Archiving and Data Management Challenge

2014 HIMSS Analytics Report The Perfect Storm: Navigating the Health IT Archiving and Data Management Challenge 2014 HIMSS Analytics Report The Perfect Storm: Navigating the Health IT Archiving and Data Management Challenge February 2014 Sponsored by www.himssanalytics.org Background and Purpose What health information

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017 HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting

More information

IT Risk & Compliance Federal

IT Risk & Compliance Federal Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,

More information

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute Health Law Institute Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More Brooke Bennett Aziere October 18, 2017 Agenda Enforcement Trends Phase 2 HIPAA Audits Upcoming Initiatives 1 Enforcement

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

The next generation of knowledge and expertise

The next generation of knowledge and expertise The next generation of knowledge and expertise UNDERSTANDING FISMA REPORTING REQUIREMENTS 1 HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

The ABCs of HIPAA Security

The ABCs of HIPAA Security The ABCs of HIPAA Security Daniel F. Shay, Esq 24 th Annual Health Law Institute Pennsylvania Bar Institute March 13, 2018 c. 2018 Alice G. Gosfield and Associates PC 1 Daniel F. Shay, Esq. Alice G. Gosfield

More information

CLOSING IN FEDERAL ENDPOINT SECURITY

CLOSING IN FEDERAL ENDPOINT SECURITY CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage

More information

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers AUSTRALIA Building Digital Trust with Australian Healthcare Consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Consumers in Australia trust healthcare organisations

More information

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911

More information

PULSE TAKING THE PHYSICIAN S

PULSE TAKING THE PHYSICIAN S TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity.

More information

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization

More information

Uncovering the Risk of SAP Cyber Breaches

Uncovering the Risk of SAP Cyber Breaches Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016 1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches

More information

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

July 13, Via  to RE: International Internet Policy Priorities [Docket No ] July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,

More information

The Cost of Denial-of-Services Attacks

The Cost of Denial-of-Services Attacks The Cost of Denial-of-Services Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report The Cost of Denial-of-Service

More information

2015 HFMA What Healthcare Can Learn from the Banking Industry

2015 HFMA What Healthcare Can Learn from the Banking Industry 2015 HFMA What Healthcare Can Learn from the Banking Industry Agenda Introduction- Background and Experience Healthcare vs. Banking The Results OCR Audit Results Healthcare vs. Banking The Theories Practical

More information

GLOBAL ENCRYPTION TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.

More information

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Marissa Gordon-Nguyen Office for Civil Rights (OCR) U.S. Department of Health and Human Services June

More information

The Role of IT in HIPAA Security & Compliance

The Role of IT in HIPAA Security & Compliance The Role of IT in HIPAA Security & Compliance Mario Cruz OFMQ Chief Information Officer For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Mario Cruz Mario Cruz

More information

Modern Compute Is The Foundation For Your IT Transformation

Modern Compute Is The Foundation For Your IT Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

The Relationship Between HIPAA Compliance and Business Associates

The Relationship Between HIPAA Compliance and Business Associates The Relationship Between HIPAA Compliance and Business Associates 1 HHS Wall of Shame 20% Involved Business Associates Based on HHS Breach Portal: Breaches Affecting 500 or More Individuals, Type of Breach

More information

Statement of HIPAA Readiness February 2003

Statement of HIPAA Readiness February 2003 Statement of HIPAA Readiness February 2003 Copyright 2003 WebMD Envoy Corporation. All Rights Reserved. Rev. 02/03 Table of Contents 1 Meeting the HIPAA Challenge...1 Overview...1 WebMD Envoy HIPAA Readiness...2

More information

WHO-ITU National ehealth Strategy Toolkit

WHO-ITU National ehealth Strategy Toolkit WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information

More information

Prior Authorization and Clinician Burden: Updates from ONC

Prior Authorization and Clinician Burden: Updates from ONC Prior Authorization and Clinician Burden: Updates from ONC Thomas A. Mason, MD, FACP Chief Medical Officer Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of

More information

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Wandah Hardy, RN BSN, MPA Equal Opportunity Specialist/Investigator Office for Civil Rights (OCR)

More information

Maryland Health Care Commission

Maryland Health Care Commission Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Projecting and Budgeting Costs and Savings of HIPAA Compliance

Projecting and Budgeting Costs and Savings of HIPAA Compliance Projecting and Budgeting Costs and Savings of HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911 sslazarus@aol.com

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute June 21, 2016 6/21/2016 1 1 Disclaimer

More information

Security Lessons Learned from HIPAA Enforcement

Security Lessons Learned from HIPAA Enforcement Security Lessons Learned from HIPAA Enforcement Presentation to HealthSec 12 August 7, 2012 Adam H. Greene, J.D., M.P.H. Partner, Davis Wright Tremaine Enforcement of the Security Rule HIPAA Security Rule

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

Cloud Communications for Healthcare

Cloud Communications for Healthcare Cloud Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization

More information

Integrating HIPAA into Your Managed Care Compliance Program

Integrating HIPAA into Your Managed Care Compliance Program Integrating HIPAA into Your Managed Care Compliance Program The First National HIPAA Summit October 16, 2000 Mark E. Lutes, Esq. Epstein Becker & Green, P.C. 1227 25th Street, N.W., Suite 700 Washington,

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan Ready, Willing & Able Michael Cover, Manager, Blue Cross Blue Shield of Michigan Agenda 1. Organization Overview 2. GRC Journey Story 3. GRC Program Roadmap 4. Program Objectives and Guiding Principals

More information

Fact Or Fiction: The State Of GDPR Compliance

Fact Or Fiction: The State Of GDPR Compliance A Forrester Consulting Thought Leadership Paper Commissioned By RSA December 2017 Fact Or Fiction: The State Of GDPR Compliance GDPR Compliance Requires More Than IT Table Of Contents 1 2 6 9 12 13 Executive

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED HEALTHCARE ORGANIZATIONS ARE UNDER INTENSE SCRUTINY BY THE US FEDERAL GOVERNMENT TO ENSURE PATIENT DATA IS PROTECTED Within

More information

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information

More information

a publication of the health care compliance association MARCH 2018

a publication of the health care compliance association MARCH 2018 hcca-info.org Compliance TODAY a publication of the health care compliance association MARCH 2018 On improv and improving communication an interview with Alan Alda This article, published in Compliance

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011 HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking

More information

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from

More information

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Presented by HIPAA Pros 5th Annual HIPAA Summit Baltimore, Maryland October 31. 2002 Living

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

CYBERSECURITY RESILIENCE

CYBERSECURITY RESILIENCE CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Hospital Council of Western Pennsylvania. June 21, 2012

Hospital Council of Western Pennsylvania. June 21, 2012 Updates on OCR s HIPAA Enforcement and Regulations Hospital Council of Western Pennsylvania June 21, 2012 Topics HIPAA Privacy and Security Rule Enforcement HITECH Breach Notification OCR Audit Program

More information

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Welcome! Thank you for joining us today. In today s call we ll cover the Security Assessment and next steps. If you want

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+ CompTIA Security Research Study 2007 Trends and Observations on Organizational Security Carol Balkcom, Product Manager, Security+ Goals of this session To share some trends and observations related to

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

Healthcare HIPAA and Cybersecurity Update

Healthcare HIPAA and Cybersecurity Update Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity

More information

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY WHITEPAPER PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY CONTENTS Executive Summary........................................ 3 The Cybersecurity and Business Risk Survey..........................

More information

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing & Reimbursement Revenue Cycle Management 8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing and Reimbursement for Physician Offices, Ambulatory Surgery Centers and Hospitals Billings & Reimbursements

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Getting Security Right: The CISO of the Future

Getting Security Right: The CISO of the Future Getting Security Right: The CISO of the Future Presented by: Mac McMillan CEO, CynergisTek CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

2016 Survey: A Pulse on Mobility in Healthcare

2016 Survey: A Pulse on Mobility in Healthcare 2016 Survey: A Pulse on Mobility in Healthcare Introduction Mobile Trends in Healthcare Mobility in Healthcare Top Motivation for Implementing a Mobile Solution Impact of Mobility on Patient Experience

More information

Certification for Meaningful Use Experiences and Observations from the Field June 2011

Certification for Meaningful Use Experiences and Observations from the Field June 2011 Certification for Meaningful Use Experiences and Observations from the Field June 2011 Principles for Certification to Support Meaningful Use Certification should promote EHR adoption by giving providers

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016 Update on HIPAA Administration and Enforcement Marissa Gordon-Nguyen, JD, MPH October 7, 2016 Updates Policy Development Breaches Enforcement Audit 2 POLICY DEVELOPMENT RECENTLY PUBLISHED: RIGHT OF ACCESS,

More information

Is Your Compliance Strategy Putting Your Business at Risk?

Is Your Compliance Strategy Putting Your Business at Risk? Is Your Compliance Strategy Putting Your Business at Risk? January 20, 2015 2015 NASDAQ-LISTED: EGHT Today s Speakers Michael McAlpen Exec. Dir. of Security & Compliance, 8x8, Inc. David Leach Business

More information