HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Similar documents
HIPAA COMPLIANCE AND

HIPAA Compliance and OBS Online Backup

HIPAA Security and Privacy Policies & Procedures

efolder White Paper: HIPAA Compliance

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Federal Security Rule H I P A A

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

HIPAA AND SECURITY. For Healthcare Organizations

Data Backup and Contingency Planning Procedure

HIPAA Compliance & Privacy What You Need to Know Now

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

Putting It All Together:

The Relationship Between HIPAA Compliance and Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates

HIPAA Security Checklist

HIPAA Security Checklist

HIPAA Privacy, Security and Breach Notification

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

The simplified guide to. HIPAA compliance

HIPAA Compliance Checklist

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

HIPAA Cloud Computing Guidance

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.


Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Seven gray areas of HIPAA you can t ignore

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

HIPAA Security Rule Policy Map

HIPAA COMPLIANCE FOR VOYANCE

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

Securing IT Infrastructure Improve information exchange and comply with HIPAA, HITECH, and ACA mandates

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

Support for the HIPAA Security Rule

HIPAA-HITECH: Privacy & Security Updates for 2015

HIPAA FINAL SECURITY RULE 2004 WIGGIN AND DANA LLP

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

PULSE TAKING THE PHYSICIAN S

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA & Privacy Compliance Update

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards

EXHIBIT A. - HIPAA Security Assessment Template -

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

HIPAA Security Manual

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

The HIPAA Omnibus Rule

PCI DSS COMPLIANCE DATA

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

Healthcare Privacy and Security:

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Regulatory Compliance

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

What is HIPPA/PCI? Understanding HIPAA. Understanding PCI DSS

Policy. Policy Information. Purpose. Scope. Background

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Is Your Compliance Strategy Putting Your Business at Risk?

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

How Managed File Transfer Addresses HIPAA Requirements for ephi

NOTICE OF PRIVACY PRACTICES

All Aboard the HIPAA Omnibus An Auditor s Perspective

Critical HIPAA Privacy & Security Crossover Areas

The ABCs of HIPAA Security

DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE

HIPAA / HITECH Overview of Capabilities and Protected Health Information

HIPAA Security Rule s Technical Safeguards - Compliance

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017

Integrating HIPAA into Your Managed Care Compliance Program

HIPAA ( ) HIPAA 2017 Compliancy Group, LLC

HIPAA FOR BROKERS. revised 10/17

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

It s still very important that you take some steps to help keep up security when you re online:

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

Cybersecurity and Hospitals: A Board Perspective

HIPAA UPDATE. Michael L. Brody, DPM

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

Cloud Brief. Understanding Compliance in the Cloud. Introduction PCI DSS THE CLOUD STRATEGY COMPANY TM

HIPAA Privacy and Security Training Program

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Cloud & Managed Server Hosting for Healthcare Professionals

Hospital Council of Western Pennsylvania. June 21, 2012

Regulation P & GLBA Training

Summary Analysis: The Final HIPAA Security Rule

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.

American Academy of Audiology Responses to Questions from HIPAA Webinar

Website Privacy Policy

Transcription:

HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1

CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud Backup and Recovery... 7 Security Encryption... 7 Logging and Archiving... 9 Backing Up and Restoring... 9 HIPAA and Your Organization... 10 info@resultstechnology.com 877.435.8877 Page 2

INTRODUCTION Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority of patient information is transferred over to digital format, organizations realize that they are exposed to certain risks. These hazards include disaster that may cause physical damage to computers that store patient information, corruption by virus attacks, and even stolen data by unauthorized personnel. Prior to the institution of the Health Insurance Portability and Accountability Act ( HIPAA ) by Congress in 1996, there were no universal standards set in place to identify whether a healthcare provider was properly securing patient information. HIPAA was designed to promote the confidentiality and portability of patient records, as well as to develop standards for consistency in the health care industry. Under HIPAA, organizations adhere to standards related to protecting their systems, and patients can feel confident that their personal medical information will remain private. After reading this white paper, you will better understand the This act applies to any health care provider, health plan or clearinghouse (collectively HIPAA data security Covered Entities ) that electronically maintains or transmits health information pertaining standards so you can then compare your to patients. If you are a Covered Entity, you must establish appropriate measures that organization s security address the physical, technical and administrative components of patient data privacy. The with the current Security Rule requires health care providers to put in place certain administrative, physical requirements. You will and technical safeguards for electronic patient data. Among other things, Covered Entities also learn how RESULTS Data are required to have a Data Backup Plan, a Disaster Recovery Plan, and an Emergency Mode Protection helps you Operation Plan. become HIPAA compliant. Why should your organization be concerned with this compliance? In 2009, Congress passed the Health Information Technology for Economic and Clinical Health ( HITECH ) Act, which implemented stricter penalties for HIPAA violations and expands the organizations bound by HIPAA regulations to include business associates of medical offices. Business associates include software vendors providing EHR (Electronic Health Records), though there is room within the law to interpret other potential parties responsible for upholding HIPAA standards. 1 If you are a health care provider or handle health information pertaining to patients, ensuring that you observe HIPAA rules is necessary for your business. By complying with HIPAA standards, you can maintain trust with your customers and prevent security breaches as well as financial loss. 1 http://www.hipaasurvivalguide.com/hitech-act-summary.php info@resultstechnology.com 877.435.8877 Page 3

What happens to organizations that do not secure their electronic protected health information? HIPAA carries serious penalties for non-compliance. Civil penalties for willful neglect under the HITECH act can extend up to $250,000 with repeat/uncorrected violations up to $1.5 million. 2 Criminal penalties range from $50,000 in fines and one year in prison up to $250,000 in fines and 10 years in jail. Non-compliant organizations also face losing customers and business partners who refrain from working with companies who do not sufficiently safeguard their electronic protected health information. Additionally, these organizations can suffer from negative publicity and legal liabilities. The HIPAA Security Rule The Security Rule applies to protected patient health information in electronic formats. This is protected patient information either transmitted by electronic media or maintained on electronic media. Covered entities that maintain or transmit protected health information are required by the Security Rule (see 45 C.F.R. 164.306) to: Ensure the confidentiality, integrity, and availability of all electronic protected health information the Covered Entity creates, receives, maintains, or transmits. Protect against any reasonably anticipated threats or hazards to the security or integrity of such information. Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under subpart E of this part. Ensure compliance with this subpart by its workforce. According to the HIPAA regulations, Covered Entities are allowed to use a flexible approach when implementing the above requirements. Specifically, Covered Entities may use any security measures that allow the Covered Entity to reasonably and appropriately implement the standards and implementation specifications as specified in this subpart. In deciding which security measures to use, a Covered Entity must take into account the following factors: The size, complexity, and capabilities of the Covered Entity. The Covered Entity s technical infrastructure, hardware, and software security capabilities. The costs of security measures. The probability and criticality of potential risks to electronic protected health information. 2 http://www.hipaasurvivalguide.com/hitech-act-summary.php info@resultstechnology.com 877.435.8877 Page 4

With this information in mind, organizations must adhere to the Security Rule s standards and specifications for backing up and safekeeping electronic data. Covered Entities also need to institute a contingency plan to be prepared for an emergency, such as a natural disaster or computer virus attack that results in a major data loss. The contingency plan must: Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information (Administrative Safeguards - 164.308(a)(7)(i)). This contingency plan must be implemented as follows: Data backup plan (Required). Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information. Disaster recovery plan (Required). Establish and implement procedures to restore any loss of data. Emergency mode operation plan (Required). Establish and implement procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode. Covered Entities must also have certain physical safeguards, such as facility access controls. They must: Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed (Physical Safeguards - 164.310(a)(1)). The contingency operations should establish and implement procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency ( 164.310(a)(2)(i)). In addition, Covered Entities must implement specific technical safeguards ( 164.312) to, among other things: Limit access to and electronic protected health information. Encrypt and decrypt electronic protected health information. Put into place audit controls that record and examine activity in information systems that contain or use electronic protected health information. Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network. info@resultstechnology.com 877.435.8877 Page 5

These regulations are in place to ensure that healthcare organizations properly secure their electronic protected health information. Based on these directives, an organization should evaluate their system and then implement a secure backup, archiving and recovery solution to comply with HIPAA standards. The HIPAA Omnibus Rule Announced January 17, 2013, the HIPAA final omnibus rule implemented a number of new privacy protections, expanding some of the obligations of Covered Entities to Business Associates, the definition for which was also expanded under the omnibus rule. As defined by the Department of Health and Human Services (HHS), Business Associates are defined as a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or provides services to, a covered entity. HHS provides the following examples of Business Associates: A third party administrator that assists a health plan with claims processing. A CPA firm whose accounting services to a health care provider involve access to protected health information. An attorney whose legal services to a health plan involve access to protected health information. A consultant that performs utilization reviews for a hospital. A health care clearinghouse that translates a claim from a non-standard format into a standard transaction on behalf of a health care provider and forwards the processed transaction to a payer. An independent medical transcriptionist that provides transcription services to a physician. A pharmacy benefits manager that manages a health plan s pharmacist network. HIPAA includes a conduit exception for business associates, exempting businesses that only those entities providing mere courier services, such as the U.S. Postal Service or United Parcel Service and their electronic equivalents, such as internet service providers (ISPs) providing mere data transmission services. As we have stated in prior guidance, a conduit transports information but does not access it other than on a random or infrequent basis as necessary to perform the transportation service or as required by other law. info@resultstechnology.com 877.435.8877 Page 6

As part of the omnibus rule, the conduit exception was further restricted to eliminate the exception for organizations that maintain EPHI, such as cloud backup or data storage providers. As a result, cloud backup and online data storage providers are liable for HIPAA as business associates, and must enter into a Business Associate Agreement with the covered entities they serve. According to HHS, this contract must: Describe the permitted and required uses of protected health information by the business associate Provide that the business associate will not use or further disclose the protected health information other than as permitted or required by the contract or as required by law Require the business associate to use appropriate safeguards to prevent a use or disclosure of the protected health information other than as provided for by the contract 3. HIPAA Compliance and RESULTS Cloud Backup and Recovery RESULTS Cloud Backup and Recovery can help organizations meet HIPAA compliance requirements, specifically those of the Security Rule. RESULTS Cloud Backup and Recovery is a cloud backup, archiving and recovery solution that automates the process of securely backing up electronic data and file recovery. It was created, with healthcare providers in mind, to satisfy the broad need for a safe, reliable, and costeffective method of backing up data offsite and allowing full file restoration at any time from any authorized location. The RESULTS Technology solution ensures that all electronic protected health information is fully protected when it is backed up and stored. It encrypts all data and stores the information in militarygrade facilities. The HIPAA security standards require your practice to appoint someone as the security manager, thus only this designated individual in charge of the security management process will have access to this data, hence preventing unauthorized access or corruption. Furthermore, in the event of a natural disaster or system failure, the data will be recoverable, thus, assuring that patient medical records will not be lost. Security and Encryption Why is it important to secure and encrypt your data? Businesses need to protect electronic protected health information from unauthorized access and corruption. David Kibbe of the American Academy of Family Physicians explains, The basic idea behind cryptography, of which electronic data encryption is a branch, is that a group needs to 3 http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/businessassociates.html info@resultstechnology.com 877.435.8877 Page 7

keep a message secret from everyone else and therefore encrypts it. Encryption is the transformation of a message from plain text into nonsensical cipher text before the message is sent. Anyone who steals the cipher text message will not be able to understand it. Only those who have the code used to encrypt the message can convert it back from cipher to plain text and reveal its meaning. 4 The following types of electronic data contain information that should be encrypted when backed up: Patient billing and administrative information exchanged with payers and health plans; Utilization and case management data, including authorizations and referrals that are exchanged with payers, hospitals and utilization management organizations; Patient health information gathered from or displayed on a Web site or portal; Lab and other clinical data electronically sent to and received from outside labs; Word-processing files used in transcription and other kinds of patient reports that are transferred electronically; E-mails between physicians and patients, and between attending and referring physicians and their offices. The RESULTS Cloud Backup and Recovery solution is a secure and trusted method to protect this private data. During a backup, all data -- including patient and billing records -- will be encrypted before leaving the user s computer(s) and is never accessible without the user s encryption key. This encryption key is stored only on the user s system and never transmitted over the Internet. Furthermore, it is not stored on the RESULTS servers, thus RESULTS cannot access files or even read the file names. Only the encryption key holder maintains control of their data, eliminating the threat of unauthorized access. Data is encrypted using a 256-bit Advanced Encryption Standard (AES) encryption technology. AES encryption was developed by the U.S. National Institute of Standards and Technology (NIST) and is now the state-of-the-art standard encryption technique for both commercial and government applications. Moreover, in June 2003, 256-AES was approved by the United States National Security Agency (NSA) for use encrypting the U.S. government s documents classified TOP SECRET. Using this secure technology, data is initially encrypted during the initial backup and then encrypted once again during the Internet transfer, to and from the RESULTS servers. 4 David C. Kibbe, 10 Steps to HIPAA Security Compliance, American Academy of Family Physicians, April 2005 info@resultstechnology.com 877.435.8877 Page 8

For added security, and to meet the Security Rule s transmission requirements, each encrypted file is sent over the Internet via a secure channel using Secure Sockets Layer (SSL) technology. The same Internet transmission technology is used for online banking and credit card applications. As a result, RESULTS Cloud Backup and Recovery is able to provide double the data encryption of typical cloud backup products. Additionally, all user data is transferred and stored in two redundant, Level 4 SSAE 16 compliant secure data centers, located thousands of miles apart from each other. Each data center has 24/7 onsite monitoring, advanced security technology such as biometric access controls, backup generators and redundant connections to the Internet. Logging and Archiving RESULTS Cloud Backup and Recovery records each file that is backed up or restored as well as additional information and statistics regarding the backups. This audit log, which can easily be searched, allows the user to verify that files were successfully backed up and help troubleshoot any issues. The service provider also has the option to receive an automated email notification at the conclusion of each successful backup. Information about recent backups and total storage usage can also be viewed via the Internet, by logging on to the user s account at manage.intronis.com. For further HIPAA compliance, hard drives of the encrypted data are available for additional archiving. Backing Up and Restoring The backup process and file recovery process are completely automated, eliminating the need for manual data handling. Backups will automatically occur according to the specific schedule that the user sets in place as long as the computer is on and functioning (not in sleep or hibernate). Backups can also be initiated by the user at any time. Restoring files can be accomplished with just a few clicks of the mouse by the individual who is designated as having overall responsibility for the security of a CE s electronic protected health information. Using RESULTS Cloud Backup and Recovery, the user simply chooses the files, folders or revisions to be retrieved by clicking on the file name. The data will then be downloaded to the user s computer, decrypted, and then restored to their original location or another specified location on the user s system. A password is required to restore any files, thus, preventing unauthorized restores, as per the HIPAA Security Rule. In the event of a complete system failure, a full recovery of the user s backed up data can be initiated in just minutes. The recovery procedure can be performed on any Windows based computer - not just the computer where the data was originally backed up. The encryption key holder can simply download and info@resultstechnology.com 877.435.8877 Page 9

reinstall the software, enter a username and password, and then enter the encryption key. Once the software installation is complete, the file catalog -- the list of all of the files backed up -- which will allow the user full control to restore their data. HIPAA and Your Organization The biggest challenge presented by HIPAA is to accurately and consistently protect individuals privacy without crippling your business, said Christopher Fuller of TechRepublic. 5 To adhere to the standards stated in the HIPAA act while also streamlining the implementation process, consider RESULTS Cloud Backup and Recovery. It is the ideal solution for fully automated backups and optimum data security. Get on the path toward HIPAA compliance by signing up for a free consultation by emailing us at mailto:info@resultstechnology.com. Please note that nothing in this white paper is intended to constitute legal advice. For more information about HIPAA and compliance with HIPAA requirements please consult your legal counsel. 5 http://www.techrepublic.com/article/internet-standards-offer-unexpected-hipaa-compliance-options/5059552 5 info@resultstechnology.com 877.435.8877 Page 10 http://www.techrepublic.com/article/internet-standards-offer-unexpected-hipaa-compliance-options/5059552