HIPAA AND SECURITY. For Healthcare Organizations

Similar documents
HIPAA Compliance & Privacy What You Need to Know Now

Compliance in 5 Steps

GLBA. The Gramm-Leach-Bliley Act

Sarbanes-Oxley Act (SOX)

SARBANES-OXLEY (SOX) ACT

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA Federal Security Rule H I P A A

HIPAA COMPLIANCE AND

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

The simplified guide to. HIPAA compliance

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.

for the Dental Industry

How Managed File Transfer Addresses HIPAA Requirements for ephi

HIPAA Security and Privacy Policies & Procedures

HIPAA & Privacy Compliance Update

HIPAA Compliance Checklist

Seven gray areas of HIPAA you can t ignore

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

Policy and Procedure: SDM Guidance for HIPAA Business Associates

DeliverySlip for Dental Practices

HIPAA Enforcement Training for State Attorneys General

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

HIPAA Compliance and OBS Online Backup

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Health Insurance Portability and Accountability Act (HIPAA) Security Requirements for Mobile Healthcare Solutions

What is HIPPA/PCI? Understanding HIPAA. Understanding PCI DSS

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices

Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

HIPAA Privacy and Security Training Program

HIPAA Regulatory Compliance

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

Critical HIPAA Privacy & Security Crossover Areas

E-Share: Secure Large File Sharing

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Neil Peters-Michaud, CHAMP Cascade Asset Management ITAM Awareness Month December 2016

Meeting the Meaningful Use Security and Privacy Measure

PULSE TAKING THE PHYSICIAN S

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

Policy. Policy Information. Purpose. Scope. Background

Secure communications simplified

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Securing Health Data in a BYOD World

Putting It All Together:

efolder White Paper: HIPAA Compliance

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

The Relationship Between HIPAA Compliance and Business Associates

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Single Sign-On. Introduction

Electronic Communication of Personal Health Information

Cirius Secure Messaging Enterprise Dedicated Cloud

HIPAA Security Rule s Technical Safeguards - Compliance

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Security in Law Firms. What you need to know and how you can use secure to win more clients

Cirius Secure Messaging Single Sign-On

Beam Technologies Inc. Privacy Policy

How to Ensure Continuous Compliance?

E-Share: Secure Large File Sharing

McAfee Embedded Control for Healthcare

CipherPost Pro Enterprise Dedicated Cloud

Office 365 Buyers Guide: Best Practices for Securing Office 365

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

EXHIBIT A. - HIPAA Security Assessment Template -

Secure Messaging Large File Sharing

CipherPost Pro. Secure communications simplified. Feature Sheet

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

Single Sign-On. Introduction. Feature Sheet

CipherCloud CASB+ Connector for ServiceNow

HIPAA UPDATE. Michael L. Brody, DPM

Cybersecurity and Hospitals: A Board Perspective

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Information Security Policy

SAMPLE POLICY. Current State Assessment Criteria. 1. That EPHI that is transmitted electronically is not vulnerable to interception; and

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Protecting Health Information

Complete document security

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

The ABCs of HIPAA Security

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

Securing Office 365 with SecureCloud

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

SECURITY & PRIVACY DOCUMENTATION

Checklist: Credit Union Information Security and Privacy Policies

Sales Training for DataMotion Products. March, 2014

Compliance with CloudCheckr

Transcription:

HIPAA AND EMAIL SECURITY For Healthcare Organizations

Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08 How can my organization meet these requirements? 10 About DeliverySlip 13

for Healthcare Organizations Protecting patient information As patients demand greater protection of their information, healthcare organizations must ensure that patient privacy and data is protected throughout any digital exchange. This white paper will describe what is required to protect that information and how to go about ensuring information security. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry to assure that individuals health information is properly protected while allowing the swift flow of health information needed to provide high qual ity health care. As electronic health records (EHR) are becoming an industry standard for maintaining and transmitting health information, email emerges as the obvious choice for exchanging EHR quickly and efficiently among healthcare organizations. Such uses include: FREE TRIAL OR 1.877.404.9964 DELIVERYSLIP 3

PROVIDER-TO-PROVIDER COMMUNICATION Healthcare providers often need to communicate with other providers efficiently and effectively, transferring patients medical histories, lab results, and the like to provide quality care to patients. REQUESTING HEALTH CONSULTATION OR APPOINTMENT With patients busy schedules, and crowded waiting rooms, patients use email to request consultation and appointments before visiting a physician. SUBMITTING HEALTH CLAIMS TO PLAN PROVIDERS Healthcare plan providers are accepting and responding to claims submissions via email to streamline and expedite the claims process. MEDICAL BILLING AND INVOICING With email, healthcare providers can streamline and reduce the cost of paper billing.

Email s expediency is not without vulnerability; data can be leaked or lost through a variety of means from malware to phishing to user error. In the case of healthcare organizations, this can mean the loss or unauthorized disclosure of patient medical files or other patient information exchanged via email. As email is the choice means for exchanging patient information, HIPAA s aim to secure patient data underscores the need for healthcare organizations to secure their email communications. This white paper briefly details how HIPAA affects email security for healthcare organizations, and what technologies organizations can implement to help ensure secure, HIPAA-compliant email communication and file transfer.

Who is affected by HIPAA? HIPAA applies to all organizations that directly maintain and transmit personally identifiable health information, referred to by HIPAA as protected health information (PHI), or e-phi in electronic form. These include hospitals, physician and dental practices, health insurance brokers and carriers, laboratories, and pharmacies. Additionally, HIPAA applies to third party vendors and business partners that exchange data with organizations that directly maintain and transmit PHI in any form. FREE TRIAL OR 1.877.404.9964 DELIVERYSLIP 6

? Why should healthcare providers care? It s no secret that non-compliance can be costly, or even crippling to your business. Under HIPAA, healthcare organizations that fail to secure PHI against loss or unauthorized disclosure face fines of up to $250,000 per incident while individuals responsible can face up to 10 years in prison for n oncompliance. In addition to harsh financial penalties and criminal proceedings, violators are required by the Department of Health and Human Services to report their compliance breaches to affected parties as well as the media if a breach affects 500 or more individuals. Without question, the ensuing legal entanglements, reputation damage and financial cost of HIPAA violations threaten your business s bottom line and may critically your organization s ability to do future business.

What does HIPAA require for email compliance? Two provisions under HIPAA directly impact healthcare organizations email policy and security: The Privacy Rule and the Security Rule. Together they identify what information is to be protected and provide a framework for safeguards organizations must put in place to ensure email compliance. The Privacy Rule defines what patient information is to be prote cted and places healthcare organizations responsible for the confidentiality of PHI in any form, including EHR. Under HIPAA, protected health information (PHI) is any information about health status, provision of health care, or payment for health care that can be linked to a specific individual. FREE TRIAL OR 1.877.404.9964 DELIVERYSLIP 8

Consequently, the Security Rule mandates that affected organizations implement appropriate policies, technical and physical safeguards for information systems that maintain e-phi, including email, to ensure the security and confidentiality of e-phi against loss or unauthorized disclosure. Specifically HIPAA requires that affected organizations 1 Ensure the confidentiality, integrity, and availability of all e-phi they create, receive, maintain or transmit. 2 Identify and protect e-phi against reasonably anticipated threats to the security or integrity of the information. 3 4 Protect e-phi against reasonably anticipated, impermissible uses or disclosures. Ensure compliance by their workforce.

Email security & HIPPA Considering the prevalence of accessing, sending and receiving e-phi via email, and the vulnerabilities of doing so, it is obvious that HIPAA s call for safeguards extend to email security. While the Safeguards Rule fails to explicitly detail the technologies and solutions organizations should implement to secure their messaging systems, it does outline a framework of technical controls. These include: Access Controls: A covered entity must implement technical policies and procedures that allow only authorized persons to access e-phi. Audit Controls: A covered entity must implement hardware, software, and/or procedural mechanisms to record and examine access and other activity in information systems that contain or use e-phi. Integrity Controls: A covered entity must implement policies and electronic measure to ensure that e-phi is not improperly altered or destroyed. Transmission Security: A covered entity must implement technical security measures that guard against unauthorized access to e-phi, which is being transmitted over an electronic network. FREE TRIAL OR 1.877.404.9964 DELIVERYSLIP 10

How can my organization meet these requirements? As every organization uses e-phi and email in its own way, HIPAA does not mandate the implementation of specific email solutions to meet technical requirements. Instead, HIPAA allows affected organizations to use any security measures that allow them to appropriately implement these technical controls that ensure the integrity and security of e-phi accessed via email. In the maze of email security technologies, fortunately there are several that stand out as clear solutions to HIPAA requirements: END-TO-END ENCRYPTION Securing the confidential transmission of e-phi demands an endto-end solution to ensure that data remains confidential and secure between the message sender and the intended recipient, preventing unauthorized access or loss of e-phi. DATA LEAK PREVENTION (DLP) A DLP solution for email is essential for HIPAA compliance, providing enhanced email security through content filtering, authentication, and permissions rules that limit access and transmission of sensitive information sent within and outside the organization.

ARCHIVING An effective email archiving system will enable your organization to meet control objectives for auditing by capturing, preserving and making all email traffic easily searchable for compliance auditors to evaluate. When encrypted and backed up, archiving provides additional protections for information against loss and unauthorized exposure. ANTI-SPAM & ANTI-VIREU Protections from spam, phishing, and malware at the email gateway such as email filters and antivirus software will also demonstrate adequate protections against unanticipated threats to the integrity and security of e-phi. FREE TRIAL OR 1.877.404.9964 DELIVERYSLIP 12

About DeliverySlip As healthcare moves into the digital (IT) age, the use potential for email as a business tool is enormous: Physicians can now consult without leaving the office, healthcare providers can bill patients quickly, and patients can submit claims online, just to name a few. When considering a solution for secure email, it s important that it conforms to HIPAA requirements without compromising the functionality and workflow of existing email. Email security should complement existing email, not complicate it. This means implementing a solution that allows easy and scalable deployment, simplifies management complexity, and works with your existing email infrastructure to enable user productivity and email functionality. DeliverySlip Secure Messaging is a cloud solution for email encryption, secure file sharing, and secure e-signatures that helps address HIPAA technical security safeguard standards while letting you use your email just the way it is.

DeliverySlip offers healthcare providers the most flexible solution to help address HIPAA technical security safeguard standards for email and file sharing. Helps address HIPAA technical security safeguard standards for secure and confidential email transmission of e-phi Simplifies the complexity of secure electronic communications, integrating seamlessly with any email platform including MS Outlook, MS Office 365, Gmail (for both sender and recipients regardless of their network configuration) Enables secure file sharing of large files such as medical scans (X-rays) and other large files Enables secure e-signatures in seconds right from the email window Enables secure web forms for capturing information directly from your website such as doctor consultations via email, insurance claims, etc Enables secure e-statements for secure and traceable invoicing for medical services Automates and securely delivers messages and file attachments decrypted to any email archive database or third party application through a secure API Enables anytime, anywhere secure communication and collaboration by allowing users to send, track and receive secure email and medi cal files on any mobile device FREE TRIAL OR 1.877.404.9964 DELIVERYSLIP 14

OR CALL 1.877.404.9964