The simplified guide to. HIPAA compliance

Similar documents
HIPAA Security and Privacy Policies & Procedures

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Putting It All Together:

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Policy and Procedure: SDM Guidance for HIPAA Business Associates

HIPAA Cloud Computing Guidance

Healthcare Privacy and Security:

EXHIBIT A. - HIPAA Security Assessment Template -

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

efolder White Paper: HIPAA Compliance

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

Data Backup and Contingency Planning Procedure

HIPAA Federal Security Rule H I P A A

HIPAA / HITECH Overview of Capabilities and Protected Health Information

HIPAA Security Checklist

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

HIPAA Security Checklist

HIPAA Compliance Checklist

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

HIPAA Compliance & Privacy What You Need to Know Now

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

Vendor Security Questionnaire

HIPAA COMPLIANCE FOR VOYANCE

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

HIPAA Compliance and OBS Online Backup

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Avanade s Approach to Client Data Protection

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Managed File Transfer Addresses HIPAA Requirements for ephi

Support for the HIPAA Security Rule

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

The ABCs of HIPAA Security

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Checklist: Credit Union Information Security and Privacy Policies

HIPAA COMPLIANCE AND

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

HIPAA FINAL SECURITY RULE 2004 WIGGIN AND DANA LLP

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

The Relationship Between HIPAA Compliance and Business Associates

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Security Audit What Why

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

NMHC HIPAA Security Training Version

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

What s New with HIPAA? Policy and Enforcement Update

Altius IT Policy Collection Compliance and Standards Matrix

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Seven gray areas of HIPAA you can t ignore

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance

HIPAA Enforcement Training for State Attorneys General

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards

HIPAA For Assisted Living WALA iii

HIPAA FOR BROKERS. revised 10/17

Altius IT Policy Collection Compliance and Standards Matrix

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017

01.0 Policy Responsibilities and Oversight

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

HIPAA Tips and Advice for Your. Medical Practice

Security Information & Policies

Security and Privacy Governance Program Guidelines

HIPAA Security and Research VALERIE GOLDEN, HIPAA SECURITY OFFICER

Meeting the Meaningful Use Security and Privacy Measure

A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP,

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

The Common Controls Framework BY ADOBE

Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Cloud & Managed Server Hosting for Healthcare Professionals

[DATA SYSTEM]: Privacy and Security October 2013

Altius IT Policy Collection

Building Cloud Trust. Ioannis Stavrinides. Technical Evangelist MS Cyprus

Security and Privacy Breach Notification

Employee Security Awareness Training Program

HIPAA & Privacy Compliance Update

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Physician Office Name Ambulatory EHR Security Risk Analysis

All Aboard the HIPAA Omnibus An Auditor s Perspective

Start the Security Walkthrough

Google Cloud & the General Data Protection Regulation (GDPR)

Department of Public Health O F S A N F R A N C I S C O

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

MultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions

Transcription:

The simplified guide to HIPAA compliance

Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act with teeth. In the last few years HIPAA data breach settlements have ranged from $1 million to $4.8 million with a significant number also falling within these two figures. Any company that deals with protected health information (usually shortened to PHI) must ensure it has the appropriate security measures in place to ensure HIPAA compliance. Compliance doesn t just apply to healthcare organizations. It also extends to service providers and sub-contractors that have access to health information. If your data is hosted by a service provider the company must be HIPAA-compliant. For hosting providers, HIPAA specifies a detailed series of administrative, physical and technical requirements to meet the requisite security criteria. This guide provides you with a high level overview of the HIPAA compliance issues you need to consider and what to look for in a cloud hosting provider as part of your overall HIPAA compliance strategy.

Core considerations The essence of HIPAA for any company working with electronic medical records is privacy and security. The HIPAA Privacy Rule and Security Rule require organizations to provide safeguards to protect ephi. This applies to hosting companies too. Specifically, the requirements are: Ensure the confidentiality, integrity and availability of all relevant data that is created, received, maintained or transmitted Identify and protect against threats to the security or integrity of the information Protect against impermissible use or disclosure of data Ensure compliance by an organization s workforce This can be boiled down to ensuring data confidentiality, safeguarding data so it is not altered or destroyed, data risk management and making sure employees are security aware. However, HIPAA doesn t advocate a one size fits all approach rather it recognizes that not all organizations are equal and each will implement solutions appropriate to their business, size and resources. As such, measures aren t dictated. But that said each organization must: Evaluate the likelihood and impact of potential risks Implement appropriate security measures Document the chosen security measures Maintain continuous, reasonable and appropriate security protections

Value of a HIPAA-compliant hosting company By using a HIPAA-compliant hosting company you can largely address privacy and security requirements by leveraging the following benefits: Private hosted Environment Your data is not stored in a shared environment with other s systems or apps, especially those that aren t subject to HIPAA requirements. Further, each technology stack within the cloud provider s environment will be HIPAA-compliant. Increased security A dedicated hosting platform keeps your data separate and more secure than a shared or public hosting environment. Deploying and managing data on dedicated hardware helps you avoid the risk of security breaches from a shared environment. Location You know where your servers are located and the dedicated hosting environment keeps your data together to ensure security and privacy. HIPAA specialists A HIPAA-compliant hosting provider must meet or exceed the same requirements that healthcare organizations do. As such you have a team of HIPAA certified security compliance experts who can help make sure you achieve and maintain compliance.

Requirements for HIPAA-compliant hosting providers HIPAA stipulates that hosting providers must meet administrative, physical and technical requirements. As such a dedicated HIPAA hosting provider must address a number of points in their data centers to ensure compliance. When choosing a hosting company you need to be assured that they address each of the following points. Physical safeguards This requires that authorized access safeguards are put in place so only those who need to access data can do so. It requires a well thought out policy about use and access, for instance, restricting who can use workstations that hold data and usage of removable electronic media such as USB sticks. Policy should also cover how data is transferred, removed, stored and disposed of. Technical safeguards In essence this is the use of tools that govern access to data and is widely known as access control. It includes using unique user IDs, an emergency access procedure, automatic log off, the use of virtual private networks and data encryption and decryption. Audit reports Audit reports provide detailed insight into who has accessed data, when and where it was accessed and what specific data was accessed. In short, audit reports provide a record and route of all activity across different types of hardware and software. It s especially important in helping identify the source of a security violation. Technical policies This covers measures put in place to confirm that data hasn t been altered or destroyed. Importantly it covers disaster recovery and offsite data backups. In the event of some form of emergency or mishap such as a power outage, storage systems crash, fire or flood it s essential that all data can be recovered quickly, accurately and intact. Network transmissions Data will travel between your organization and the hosting company. This data must be protected whether it s transmitted via email, over a private network or the internet. Typically this means high levels of data encryption to protect against unauthorized access to data.

Questions to ask a hosting provider A dedicated HIPAA-compliant hosting provider will be able to answer the following questions with ease. If not you should reconsider your choices. Have you been independently audited? A hosting provider needs to be fully compliant with the latest OCR HIPAA Audit Protocol across all of its technology stacks. What IT services do you use to meet required security standards? You should receive an answer that provides detailed insight into the tools that are used. These will include things like a private firewall, VPN for remote access, SSL certificates for data encryption, two-factor authentication, offsite backups and a private hosted environment. What are your documented policies and procedures? A hosting provider should have policies that lay down required responses in the event of a data breach, for instance, notifying you within a stipulated time period. Do you have a business associate agreement? If you use a hosting company you must have a business associate agreement (BAA) signed with that organization. This delineates the role the hosting company and its responsibilities. A HIPAA BAA is a legal contract and a compliance requirement. Are your employees trained? HIPAA requires all employees to be trained in good security practices. This includes policies, physical security, auditing, the use of secure passwords, data protection and more. This requirement also applies to BAA partners such as hosting companies. With over 19 years of cloud hosting experience, Hostway has a rich history of helping industry leading SaaS and software companies run their mission-critical applications in the cloud. Hostway offers a portfolio of secure and reliable BAA-backed, 3rd party audited and approved HIPAA-compliant cloud hosting solutions - designed to support a wide range of use cases and budgets for organizations managing electronic protected health information (ephi). Contact a Hostway cloud hosting expert to discuss building a HIPAA-compliant cloud hosting solution for your business. Call us at: +1.866.680.7556 www.hostway.com