HIPAA Security and Privacy Policies & Procedures

Similar documents
Policy and Procedure: SDM Guidance for HIPAA Business Associates

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

HIPAA Security Checklist

HIPAA Security Checklist

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

HIPAA Federal Security Rule H I P A A

Healthcare Privacy and Security:

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Security Rule Policy Map

EXHIBIT A. - HIPAA Security Assessment Template -

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

Putting It All Together:

HIPAA Compliance Checklist

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

A Security Risk Analysis is More Than Meaningful Use

Support for the HIPAA Security Rule

The simplified guide to. HIPAA compliance

Checklist: Credit Union Information Security and Privacy Policies

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

HIPAA FINAL SECURITY RULE 2004 WIGGIN AND DANA LLP

HIPAA FOR BROKERS. revised 10/17

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

HIPAA COMPLIANCE FOR VOYANCE

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Summary Analysis: The Final HIPAA Security Rule

Texas Health Resources

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Data Backup and Contingency Planning Procedure

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security Manual

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Meaningful Use & Security Protecting Electronic Health Information in Accordance with the HIPAA Security Rule

HIPAA For Assisted Living WALA iii

HIPAA Controls. Powered by Auditor Mapping.

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance

Implementing an Audit Program for HIPAA Compliance

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

HIPAA Privacy, Security and Breach Notification 2018

The ABCs of HIPAA Security

Hospital Council of Western Pennsylvania. June 21, 2012

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

HIPAA Privacy, Security and Breach Notification 2017

NOTICE OF PRIVACY PRACTICES

HIPAA Compliance and OBS Online Backup

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Vendor Security Questionnaire

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

HIPAA Regulatory Compliance

The Common Controls Framework BY ADOBE

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Information Security Policy

HIPAA Omnibus Notice of Privacy Practices

Steffanie Hall, RHIA HIM Director/Privacy Officer 1201 West 12 th Emporia, Kansas ext

Red Flags/Identity Theft Prevention Policy: Purpose

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

01.0 Policy Responsibilities and Oversight

University of Pittsburgh Security Assessment Questionnaire (v1.7)

HIPAA & Privacy Compliance Update

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA Enforcement Training for State Attorneys General

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures

Integrating HIPAA into Your Managed Care Compliance Program

HIPAA COMPLIANCE AND

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

HIPAA Privacy, Security and Breach Notification

Employee Security Awareness Training Program

UNIVERSITY OF WISCONSIN MADISON POLICY AND PROCEDURE

SECURITY & PRIVACY DOCUMENTATION

Federal Breach Notification Decision Tree and Tools

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

HIPAA Security & Privacy

ADIENT VENDOR SECURITY STANDARD

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Department of Public Health O F S A N F R A N C I S C O

Regulation P & GLBA Training

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

The HIPAA Omnibus Rule

HIPAA Security Compliance for Konica Minolta bizhub MFPs

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Remediation Steps Post Preliminary Security Risk Assessment for FQHCs

Internet of Things Toolkit for Small and Medium Businesses

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

HPE DATA PRIVACY AND SECURITY

How Managed File Transfer Addresses HIPAA Requirements for ephi

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Pilot Audits

efolder White Paper: HIPAA Compliance

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

2015 HFMA What Healthcare Can Learn from the Banking Industry

Transcription:

Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400 work hours and are everything you need for rapid development and implementation of HIPAA Security policies. Our templates are created based on HIPAA requirements, updates from HITECH act, Omnibus rule, NIST standards and security best practices. The key objectives in formulating the policies were to ensure that they are congruent with the HIPAA Security regulations, integrate industry-established best practices for security, and are tailored to the healthcare provider environment. Our HIPAA Security policy and procedures templates are ideally suited for following categories of organizations: covered entities and business associates. The 71 HIPAA Security policies in the template suite (updated in May 2013 for Omnibus rule) are organized into following five major categories: Category of HIPAA Policies & Procedures Total HIPAA Policies and Procedures Administrative Safeguards 31 Physical Safeguards 13 Technical Safeguards 12 Organizational Requirements 04 Supplemental Polices to required policy 11 I. HIPAA SECURITY POLICIES ON THE STANDARDS FOR ADMINISTRATIVE SAFEGUARDS Sr. No Policy Description 1 Breach Notification Policy 2 Security Management Process The purpose of this policy is to define how Covered Entity will respond to security and/or privacy incidents or suspected privacy and/or security incidents that result in a breach of protected health information (PHI). (Standard.) Describes processes the organization implements to prevent, detect, contain, and correct security violations relative to its ephi. Page 1 of 10

3 Risk Analysis 4 Risk Management 5 Sanction Policy 6 Information System Activity Review 7 Assigned Security Responsibility 8 Workforce Security 9 Authorization and/or Supervision 10 Workforce Clearance Procedure 11 Termination Procedures 12 Information Access Management 13 Access Authorization 14 Access Establishment and Modification 15 Security Awareness & Training Discusses what the organization should do to identify, define, and prioritize risks to the confidentiality, integrity, and availability of its ephi. (Required Implementation Specification for the Security Management Process Defines what the organization should do to reduce the risks to its ephi to reasonable and appropriate levels. (Required Implementation Specification for the Security Management Process Indicates actions that are to be taken against employees who do not comply with organizational security policies and procedures. (Required Implementation Specification for the Security Management Process Describes processes for regular organizational review of activity on its information systems containing ephi. (Required Implementation Specification for the Security Management Process (Standard.) Describes the requirements for the responsibilities of the Information Security Officer. (Standard.) Describes what the organization should do to ensure ephi access occurs only by employees who have been appropriately authorized. Identifies what the organization should do to ensure that all employees who can access its ephi are appropriately authorized or supervised. (Required Implementation Specification for the Workforce Security Reviews what the organization should do to ensure that employee access to its ephi is appropriate. (Addressable Implementation Specification for Workforce Security Defines what the organization should do to prevent unauthorized access to its ephi by former employees. (Addressable Implementation Specification for Workforce Security (Standard.) Indicates what the organization should do to ensure that only appropriate and authorized access is made to its ephi. defines how the organization provides authorized access to its ephi. (Addressable Implementation Specification for Information Access Management Discusses what the organization should do to establish, document, review, and modify access to its ephi. (Addressable Implementation Specification for Information Access Management (Standard.) Describes elements of the organizational program for regularly providing appropriate security training and awareness to its employees. Page 2 of 10

16 Security Reminders 17 Protection from Malicious Software 18 Log-in Monitoring 19 Password Management 20 Security Incident Procedures 21 Response and Reporting 22 Contingency Plan 23 Data Backup Plan 24 Disaster Recovery Plan 25 Emergency Mode Operation Plan 26 Testing and Revision Procedure Defines what the organization should do to provide ongoing security information and awareness to its employees. (Addressable Implementation Specification for Security Awareness & Training Indicates what the organization should do to provide regular training and awareness to its employees about its process for guarding against, detecting, and reporting malicious software. (Addressable Implementation Specification for Security Awareness & Training Discusses what the organization should do to inform employees about its process for monitoring log-in attempts and reporting discrepancies. (Addressable Implementation Specification for Security Awareness & Training Describes what the organization should do to maintain an effective process for appropriately creating, changing, and safeguarding passwords. (Addressable Implementation Specification for Security Awareness & Training (Standard.) Discusses what the organization should do to maintain a system for addressing security incidents that may impact the confidentiality, integrity, or availability of its ephi. Defines what the organization should do to be able to effectively respond to security incidents involving its ephi. (Required Implementation Specification for Security Incident Procedures (Standard.) Identifies what the organization should do to be able to effectively respond to emergencies or disasters that impact its ephi. Discusses organizational processes to regularly back up and securely store ephi. (Required Implementation Specification for Contingency Plan Indicates what the organization should do to create a disaster recovery plan to recover ephi that was impacted by a disaster. (Required Implementation Specification for Contingency Plan Discusses what the organization should do to establish a formal, documented emergency mode operations plan to enable the continuance of crucial business processes that protect the security of its ephi during and immediately after a crisis situation. (Required Implementation Specification for Contingency Plan Describes what the organization should do to conduct regular testing of its disaster recovery plan to ensure that it is up-to-date and effective. (Addressable Implementation Specification for Contingency Plan Page 3 of 10

27 Applications and Data Criticality Analysis 28 Evaluation 29 Business Associate Contracts and Other Arrangements 30 Business Associate Agreement Reviews what the organization should do to have a formal process for defining and identifying the criticality of its information systems. (Addressable Implementation Specification for Contingency Plan (Standard.) Describes what the organization should do to regularly conduct a technical and non-technical evaluation of its security controls and processes in order to document compliance with its own security policies and the HIPAA Security Rule. (Standard.) Describes how to establish agreements that should exist between the organization and its various business associates that create, receive, maintain, or transmit ephi on its behalf. (Standard.) Describes how to establish agreements that should exist between the organization and its various business associates that create, receive, maintain, or transmit ephi on its behalf. 31 Execution of Business Associate Agreements with Contracts Provide guidance to Covered Entity regarding execution of business associate contracts. II. HIPAA SECURITY POLICIES ON THE STANDARDS FOR PHYSICAL SAFEGUARDS (Standard.) Describes what the organization should do to appropriately limit physical access to the information systems contained within its facilities, while ensuring that properly 32 Facility Access Controls authorized employees can physically access such systems. 33 Contingency Operations Identifies what the organization should do to have formal, documented procedures for allowing authorized employees to enter its facility to take necessary actions as defined in its disaster recovery and emergency mode operations plans. (Addressable Implementation Specification for Facility Access Controls 34 Facility Security Plan Discusses what the organization should do to establish a facility security plan to protect its facilities and the equipment therein. (Addressable Implementation Specification for Facility Access Controls 35 Access Control and Validation Procedures Discusses what the organization should do to appropriately control and validate physical access to its facilities containing information systems having ephi or software programs that can access ephi. (Addressable Implementation Specification for Facility Access Controls 36 Maintenance Records Defines what the organization should do to document repairs and modifications to the physical components of its facilities related to the protection of its ephi. (Addressable Implementation Specification for Facility Access Controls 37 Workstation Use (Standard.) Indicates what the organization should do to appropriately protect its workstations. Page 4 of 10

38 Workstation Security 39 Device and Media Controls 40 Disposal 41 Media Re-use 42 Mobile Device Policy 43 Accountability 44 Data Backup and Storage (Standard.) Reviews what the organization should do to prevent unauthorized physical access to workstations that can access ephi while ensuring that authorized employees have appropriate access. (Standard.) Discusses what the organization should do to appropriately protect information systems and electronic media containing PHI that are moved to various organizational locations. Describes what the organization should do to appropriately dispose of information systems and electronic media containing ephi when it is no longer needed. (Required Implementation Specification for Device and Media Controls Discusses what the organization should do to erase ephi from electronic media before re-using the media. (Required Implementation Specification for Device and Media Controls Discusses what the organization should do specifically addressing mobile device security in support of the Device and Media Controls Standard.) Defines what the organization should do to appropriately track and log all movement of information systems and electronic media containing ephi to various organizational locations. (Addressable Implementation Specification for Device and Media Controls Discusses what the organization should do to backup and securely store ephi on its information systems and electronic media. (Addressable Implementation Specification for Device and Media Controls III. HIPAA SECURITY POLICIES ON THE STANDARDS FOR TECHNICAL SAFEGUARDS (Standard.) Indicates what the organization should do to purchase and implement information systems that comply with its 45 Access Control information access management policies. 46 Unique User Identification Discusses what the organization should do to assign a unique identifier for each of its employees who access its ephi for the purpose of tracking and monitoring use of information systems. (Required Implementation Specification for Access Control Discusses what the organization should do to have a formal, documented emergency access procedure enabling authorized employees to obtain required ephi during the emergency. (Required Implementation Specification for Access Control 47 Emergency Access Procedure Page 5 of 10

48 Automatic Logoff 49 Encryption and Decryption 50 Audit Controls 51 Integrity 52 Mechanism to Authenticate Electronic Protected Health Information 53 Person or Entity Authentication 54 Transmission Security 55 Integrity Controls 56 Encryption Discusses what the organization should do to develop and implement procedures for terminating users' sessions after a certain period of inactivity on systems that contain or have the ability to access ephi. (Addressable Implementation Specification for Access Control Discusses what the organization should do to appropriately use encryption to protect the confidentiality, integrity, and availability of its ephi. (Addressable Implementation Specification for Access Control (Standard.) Discusses what the organization should do to record and examine significant activity on its information systems that contain or use ephi. (Standard.) Defines what the organization should do to appropriately protect the integrity of its ephi. Discusses what the organization should do to implement appropriate electronic mechanisms to confirm that its ephi has not been altered or destroyed in any unauthorized manner. (Addressable Implementation Specification for Integrity (Standard.) Defines what the organization should do to ensure that all persons or entities seeking access to its ephi are appropriately authenticated before access is granted. (Standard.) Describes what the organization should do to appropriately protect the confidentiality, integrity, and availability of the ephi it transmits over electronic communications networks. Indicates what the organization should do to maintain appropriate integrity controls that protect the confidentiality, integrity, and availability of the ephi it transmits over electronic communications networks. (Addressable Implementation Specification for Transmission Security Defines what the organization should do to appropriately use encryption to protect the confidentiality, integrity, and availability of ephi it transmits over electronic communications networks. (Addressable Implementation Specification for Transmission Security IV. ORGANIZATIONAL REQUIREMENTS 57 Policies and Procedures 58 Documentation (Standard.) Defines what the requirements are relative to establishing organizational policies and procedures. (Standard.) Discusses what the organization should do to appropriately maintain, distribute, and review the security policies and procedures it implements to comply with the HIPAA Security Rule Page 6 of 10

59 Isolating Healthcare Clearinghouse Function Purpose is to implement policies and procedures that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization (Required Implementation Specification for Information Access Management 60 Group Health Plan Requirements (Standard.) The purpose is to ensure that reasonable and appropriate safeguards are maintained on electronic protected health information created, received, maintained, or transmitted to or by the plan sponsor on behalf of the group health plan. V. SUPPLEMENTAL POLICIES FOR REQUIRED POLICIES 61 Wireless Security Policy 62 Email Security Policy 63 Analog Line Policy 64 Dial-in Access Policy 65 Automatically Forwarded Email Policy 66 Remote Access Policy 67 Ethics Policy 68 VPN Security Policy 69 Extranet Policy 70 Internet DMZ Equipment Policy 71 Network Security Policy The purpose is to implement security measures sufficient to reduce risks and vulnerabilities of the wireless infrastructure. The purpose is to establish management direction, procedures, and requirements to ensure safe and successful delivery of e- mail. The purpose is to explains Company's analog and ISDN line acceptable use and approval policies and procedures. The purpose is to implement security measures sufficient to reduce risks and vulnerabilities of dial-in connections to the enterprise infrastructure The purpose is to prevent the unauthorized or inadvertent disclosure of sensitive company information. The purpose is to implement security measures sufficient to reduce risks and vulnerabilities of remote access connections to the enterprise infrastructure. The purpose is to establish a culture of openness, trust and integrity in business practices. The purpose is to implement security measures sufficient to reduce the risks and vulnerabilities of the VPN infrastructure The purpose is to describes the policy under which third party organizations connect to Company's networks for the purpose of transacting business related to Company The purpose is to define standards to be met by all equipment owned and/or operated by Company located outside Company's corporate Internet firewalls. The purpose is to establish requirements for information processed by computer networks. Page 7 of 10

HIPAA Privacy Policies, Forms & Procedures Total Cost: $300 Following are the 57 HIPAA Privacy forms, policies and procedures included in the HIPAA Privacy Policy & procedures template suite. These templates are updated for the HITECH act of 2009 and Omnibus rule of 2013. The policies can be used by any covered entity & business associate. All policies are available in MS Word format and can be easily customized as per your requirements. Each template is presented in a standard format reflecting critical organizational functions to consider in HIPAA remediation. These HIPAA Privacy Policies cover areas like: 1) General policies regarding use and disclosure of PHI 2) Minimum necessary rule for use and disclosure of PHI 3) Patient rights regarding their own PHI 4) Uses and disclosures not requiring patient authorization 5) Special cases for restriction of uses and disclosures of PHI 6) Organizational issues and safeguards The templates suite includes following HIPAA Privacy forms, policies and procedures. Accept Access Request Accounting for Disclosures Acknowledgement of Receipt Amendment to Record Form Authorization for Release of Protected Health Information Authorization To Use Disclose Protected Health Information Business Associate Agreement Business Associate Contracts and Other Arrangements Page 8 of 10

Complaint Process Data Use Agreement Template De-identified Information and Limited Data Sets Denial Access Request Denial Request to Amend Form Disclosure Accounting Log for Medical Information Disclosure of PHI with and without authorization Template Disclosures Record Form Document Retention Requirements EHR accounting of disclosures Employee Confidentiality Agreement Execution of Business Associate Agreements with Contracts Health Plan Notice of Privacy Practices HIPAA Accept Amend Request Form Identifying PHI and Designated Record Sets Minimum Necessary Multi-Organization Arrangements Notice of Privacy Practices Patient Right to Access PHI PHI Release by Whistleblowers Privacy Officer Receipt of Payment when Disclosing PHI Release for Abuse Neglect or Domestic Violence Release for Confidential Communications Release for Fundraising Purposes Release for Health Oversight Release for Judicial or Administrative Proceedings Release for Law Enforcement Release for Marketing Purposes Release for Public Health Release for Research Purposes Release for Specific Government Functions Release for Workers Compensation Release of Information for Deceased Patients or Plan Members Release of Information for Legal Representatives Release of Information to a Minor Release of Information to a Minor s Parents Release of Information to Friends and Family Members Release of Psychotherapy Notes Release to Avert Serious Threat to Safety Page 9 of 10

Request Confidential Communications Template Request Restriction Request to Amend Patient or Plan Member Record Requests for Restriction policy Required PHI Disclosures Right to Object to Release for Certain Purposes Safeguarding PHI Training Requirements Workforce Sanctions Page 10 of 10