ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Similar documents
Policy and Procedure: SDM Guidance for HIPAA Business Associates

HIPAA Security Checklist

HIPAA Security Checklist

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

EXHIBIT A. - HIPAA Security Assessment Template -

HIPAA Security Rule Policy Map

HIPAA Security and Privacy Policies & Procedures

HIPAA Federal Security Rule H I P A A

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Compliance Checklist

Healthcare Privacy and Security:

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

SECURITY & PRIVACY DOCUMENTATION

Summary Analysis: The Final HIPAA Security Rule

Data Backup and Contingency Planning Procedure

Employee Security Awareness Training Program

Security and Privacy Breach Notification

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

The simplified guide to. HIPAA compliance

Checklist: Credit Union Information Security and Privacy Policies

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

HIPAA Security Manual

Information Security Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

HIPAA Regulatory Compliance

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Integrating HIPAA into Your Managed Care Compliance Program

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

HIPAA FINAL SECURITY RULE 2004 WIGGIN AND DANA LLP

Virginia Commonwealth University School of Medicine Information Security Standard

Department of Public Health O F S A N F R A N C I S C O

Implementing an Audit Program for HIPAA Compliance

Red Flags/Identity Theft Prevention Policy: Purpose

Department of Public Health O F S A N F R A N C I S C O

Privacy Breach Policy

Security Standards for Electric Market Participants

Apex Information Security Policy

Support for the HIPAA Security Rule

Putting It All Together:

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

UTAH VALLEY UNIVERSITY Policies and Procedures

A Security Risk Analysis is More Than Meaningful Use

Network Security Policy

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

01.0 Policy Responsibilities and Oversight

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

HIPAA Privacy and Security Training Program

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Subject: University Information Technology Resource Security Policy: OUTDATED

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA FOR BROKERS. revised 10/17

HIPAA COMPLIANCE FOR VOYANCE

The Common Controls Framework BY ADOBE

Lakeshore Technical College Official Policy

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Identity Theft Prevention Policy

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

efolder White Paper: HIPAA Compliance

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Meaningful Use & Security Protecting Electronic Health Information in Accordance with the HIPAA Security Rule

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

PRIVACY-SECURITY INCIDENT REPORT

NMHC HIPAA Security Training Version

ISSP Network Security Plan

Data Privacy Breach Policy and Procedure

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Access to University Data Policy

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Security Policies and Procedures Principles and Practices

Red Flags Program. Purpose

Physical and Environmental Security Standards

Information Security for Mail Processing/Mail Handling Equipment

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

HIPAA-HITECH: Privacy & Security Updates for 2015

ADIENT VENDOR SECURITY STANDARD

Information Security Management Criteria for Our Business Partners

Baseline Information Security and Privacy Requirements for Suppliers

Altius IT Policy Collection Compliance and Standards Matrix

Donor Credit Card Security Policy

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

PTLGateway Data Breach Policy

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

HIPAA Compliance and OBS Online Backup

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Transcription:

All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision - 1) Purpose: Researchers will comply with the HIPAA Rule requirements as articulated in this policy and in the Lifespan corporate policies and procedures. Lifespan is committed to ensuring the security of electronic patient health information () as required by 45 CFR Parts 160,162 and 164. 2) Scope: This policy applies to Research Administration, all Researchers and their staff. 3) Policy: a) Lifespan HIPAA policies and procedures apply to the security of all and IT resources used to create, access, store and/or transmit. Lifespan has approved 18 policies and procedures that apply to HIPAA. These policies and procedures can be found on, or cross referenced on, http://intra.lifespan.orcz/compliance/sec~ty/documents b) Please refer to the policy for complete details and Lifespan's compliance guidelines. The table below summarizes Lifespan's corporate policies relating to the 18 HIPAA corporate standards. Management Policy Statement violations involving Electronic Protected Health Information () should be prevented and, to the extent possible, detected, contained and corrected. Administrative, organizational, technical, and physical controls should be in place to support Lifespan's operational implementation of this policy. SUMMARY Identify systems that store 0 Assess risks 0 Apply sanctions for failure to comply 0 Review audit logs, if available, regularly Review policies & procedures; make them available to workforce; maintain for 6 years

Assigned Responsibility 81 Workforce 82 Information Access Management 83 Awareness and Training 84 Incident Readiness 85 Contingency Plan 86 Evaluation 87 The Lifespan Official is responsible for the development, implementation, maintenance and monitoring of policies, procedures, and information infrastructure required to maintain compliance with the HIPAA regulations. Members of Lifespan s workforce should have appropriate access to based on their job descriptions, responsibilities and approval of the individual to whom they report. Access to should be restricted to the workforce members whose job description and responsibilities necessitate the use. Access to should be controlled based on business and security requirements. Privileges granted should be based on need-to-know, minimum necessary andor least privilege criteria A security awareness and training program for Lifespan workforce members and their contractors should be developed and supported on an on-going basis. Lifespan members should be able to identify and respond to suspected or known information security incidents and attempt to mitigate, to the extent practicable, harmful effects of security incidents. A Contingency Plan or Plans should be developed, periodically tested, managed and maintained for all critical business functions and systems with the goal of maintaining availability, integrity, and confidentiality of during an emergency or other occurrence that damages systems that contain. In order to identify and address environmental or operational changes that could affect the security of Electronic Protected Health Information (), Lifespan should periodically conduct a technical and non-technical evaluation to assess compliance of security policies and procedures against HIPAA Standards. 0 Identify security official to ensure accountability. 0 Mike Izzo is Corporate HIPAA Officer 0 restricted to specific workforce, define who Workforce ID badges, access granted 0 restricted to job description 0 Monitor for only authorized access of Grant access to PHI 0 Lists standards for granting access Evaluate process 0 All members of workforce required to have HIPAA training 0 Address unauthorized access, use, disclosure and/or destruction of an IS system 0 Document process and outcome 0 Have a back up retrievable plan 0 Have a disaster recover plan 0 Periodically evaluate compliance 2

Use of Business Associate Agreements (BAAS) CCPM-56 Facility Access 89 Workstation Use 90 Workstation 91 Device & Media 92 Lifespan department managers and directors are responsible for identifying BA relationships (see CCPM-56A for help). They should notify Lifespan IS or Corporate Compliance when a new BA is identified so that one of these departments can initiate and document the BAA contracting process. Lifespan has a model BAA that contains all provisions mandated by HIPAA privacy and security. This model should always be used when contracting with a BA, unless specific permission to do otherwise is granted by IS, Corporate Compliance or the Office of the General Counsel. Lifespan s Information Technology (IT) equipment, information processing facilities, user computers and records should be physically protected from security threats and environmental hazards. safeguards and controls should be in place to prevent unauthorized access to electronic information, loss or damage to physical assets or interruption to business activities. Workstations should be configured and maintained with appropriate security controls to protect confidentiality, integrity, and availability of. safeguards and controls should be implemented to protect unattended workstations from unauthorized access and to secure the physical surroundings of the workstations. safeguards and controls should be implemented for the physical protection of workstations that access so that confidentiality, integrity, and availability of are not compromised. safeguards and controls should be adopted for protecting in the event of re-use, transfer, storage or disposal of electronic media or devices. D B BAA revised to include all provisions mandated by HIPAA privacy and security Need to identify BAS NotifyIS or Corporate Compliance of new BA Limit physical access to facility and equipment 0 Contingency facility access plan 0 Prevent unauthorized use and disclosure of from workstations. Firewall protection Theft deterrent device or tracking software for public computers 0 Utilize security controls-logon, etc 0 Physical safeguards 0 Laptops - screen guards, secure from theft, secure in locked cabinets 0 PDAencrypt, password protect 0 Storage, disposal, reuse, accountability, data back-up & storage of equipment with 0 Delete files, reformat

Access HSP-93 Audit HSP-94 Integrity HSP-95 PersodEntity Authenticatio n HSP-96 Transmission (email) HSP-97 Access to electronic information systems that maintain should be restricted and controlled. Access to should be granted on a minimum necessary basis that reflects the minimum amount of information necessary for an authorized person to complete the tasks and responsibilities of his or her job function. safeguards and controls should be in place to protect against unauthorized access attempts. Access and changes to in certain designated information systems should be periodically monitored and logged. Where appropriate, activity logs should be maintained. safeguards and controls should be established to protect from unauthorized alteration or destruction. Access to Electronic Protected Health Information () should be provided to a person or an entity only after verifylng that the person or entity seeking the access is the one claimed and that the person or entity has been authorized to receive access. Confidentiality, availability, and integrity of should be maintained by implementing security safeguards and controls when transmitting information between authenticated parties over electronic communications networks. 0 Unique user ID Encrypt, decrypt, auto logo 0 IS specific policy 0 Encrypt laptops and PDAs 0 If feasible log user activity 0 If not feasible document why no audit trail (software does not have ability to audit trail, etc.) Technical controls - no unauthorized software on computers 0 Verify authorized user 0 Email - use only Lifespan email, will be encrypted 0 Log on to secure sites only 0 Brownemail addresses should not be used to transmit 4) Procedure: a. Researchers will, whenever possible, follow the above 18 HIPAA policies and procedures adopted by Lifespan. 0 The corporate policies and procedures will apply to all Lifespan employees, all researchers and their staff, and all equipment and software issued and maintained by Lifespan and its affiliates. When using Lifespan computers and software or any other computer or software it is recommended researchers double protect the documents by password protecting the documents. b. When researchers use non-lifespan equipment and/or software, not issued or maintained by the Lifespan IS department, it is recommended that the software andor equipment be HIPAA

compliant. The recommendations and requirements listed in the 18 policies and procedures referenced above should be applied, whenever possible, to this equipment andor software. a. Password protection to all computers and equipment should be instituted. b. Password protect all documents whenever possible. c. PDA and laptops - Password protect equipment and double protect by password protecting documents on equipment d. Encryption software, whenever possible, should be installed on equipment and used for storinghransmitting. e. Take security precautions for theft or loss of equipment, locked cabinets, etc. c. When researchers log on to a sponsor or multi-site website, or any other website used for the purposes of this research protocol, to upload it is recommended this be uploaded to secure websites. If websites are not secure it is recommended researchers use alternate methods of transmission of such as: de-identify data if possible, paper fax whenever possible, copy to CD and carry or secure mail to recipient. d. Audit trails should be turned on and monitored. When audit trails are not possible because the software does not support audit trails this should be documented. Examples would be - Excel spreadsheets, Access spreadsheets, etc. e. Email, file transfer and encryption - It is recommended researchers use Lifespan email when sending as an attachment. The attachment should have an additional level of protection by password protecting the document. a. Use of other email for sending attachments containing is not recommended. However, if use of non-lifespan email for attachments is employed encrypt document. b. De-Identify document whenever possible prior to email c. Copy to CD and carry or secure mail to recipient d. Paper fax document if unable to de-identify data or use secure method f. Only authorized personnel, researcher/staff/sponsor, etc., should have access to Research data. Reports of unauthorized user access, disclosure or destruction should be reported to the ORA, g. Researchers should back up their research data, i.e., CD/floppy, if not stored on Lifespan computer share drive or Sponsor site. h. Researchers will certify on an annual basis to comply with recommendations and requirements, whenever feasible, as listed on the ORA HIPAA Certification Form. i. The HIPAA Investigator Certification form will be provided to all investigators annually on or near re-certification date when new or continuing applications are submitted to the Office of Research Administration Research Review Committee and Communications for review. j. This HIPAA Policy will be provided to all investigators with the annual Certification form. Investigators are encouraged to review this policy and the 18 HIPAA policies prior to certifying compliance. k. Annual HIPAA Privacy and training for researchers is required of Research Administration and all researchers and their staff. HIPAA training certification will continue to be addressed on IRB submission forms.