hipaa security spot audits begin chicken littles and
play

HIPAA SECURITY SPOT AUDITS BEGIN: CHICKEN LITTLES AND ANNUAL - PDF document

2/21/2012 HIPAA SECURITY SPOT AUDITS BEGIN: CHICKEN LITTLES AND ANNUAL LITTLES AND ANNUAL TRADITIONS KENNETH N. RASHBAUM, ESQ. RASHBAUM ASSOCIATES, LLC www.rashbaumassociates.com BREACHES MUNDANE AND COMPLEX Increasing Incidents Of


  1. 2/21/2012 HIPAA SECURITY SPOT AUDITS BEGIN: CHICKEN LITTLES AND ANNUAL LITTLES AND ANNUAL TRADITIONS KENNETH N. RASHBAUM, ESQ. RASHBAUM ASSOCIATES, LLC www.rashbaumassociates.com BREACHES MUNDANE AND COMPLEX  Increasing Incidents Of Protected Health Information Loss Through Negligence Loss Through Negligence  Lost, Unencrypted Portable Media (laptops, USB’s, Portable Hard Drives, Smartphones, etc.)  Virus Infection Shuts Down Hospital in Georgia  “Worm” Introduced Through USB  Blocked Access to EMR  Potential For Disclosures Of PHI Via Virus (HIPAA Violation) 1

  2. 2/21/2012 CYBER-ATTACKS: SECURITY AFFECTS PATIENT SAFETY  Chicago Hospital Shut Down In 2006 As Attack Crippled Vital Systems Crippled Vital Systems  Hospital Security Guard Obtains Password For HVAC system, Tampers, Raising And Lowering Temperatures To Dangerous Levels  Potential Exists For Attacks On Vital Systems, Such As ICU, Monitors, Etc. ICU Monitors Etc HIPAA SECURITY COMPLIANCE  Physical, Technical And Administrative Safeguards Required Required  Documentation and Documented Training  Current HIPAA Security Risk Analysis (as per Guidance from U.S. Dept. of Health and Human Services, “DHHS”)  NB: Some State Privacy and Security Laws Are Stricter Than HIPAA (i.e., MA, NC, NY, CA) 2

  3. 2/21/2012 Challenges to Compliance  Diverse set of content contributors  Content changes all day, every day C t t h ll d d  Documents uploaded / edited  Chart entries  Email communications  Social collaboration through blogs , wikis  External and internal website content  80 percent of enterprise content is unstructured and growing at 36 percent a year. - Doculabs SECURITY ENFORCEMENT INCREASING  DHHS Office For Civil Rights Spot Audit Program  Through 2012  Through 2012  Targets Covered Entities AND Business Associates  Audits Outsourced to KPMG  System Audited, But Also Policies and Procedures  Random Interviews Will Be Conducted  Breach Response Protocols Will Be A Target Of Audit 3

  4. 2/21/2012 SURVIVING THE SPOT AUDIT  Prepare BEFORE The Audit Notice Arrives  Retain Outside Entities To Prepare Hospital Or Company For Audit (Review of Protocols, Etc.)  Conduct Mock Audit ( Report Through Counsel For Attorney-Client Privilege Where Applicable)  Remediate Vulnerabilities And Compliance Gaps p p SECURITY TAKES A TEAM  Information Security Is An Interdisciplinary Initiative  Culture of Privacy and Compliance Requires A Culture of Security  Assemble the Information Security Team  IT  Health Information Management and Clinicians  Legal: In-House And Outside Counsel  Outside Security Consultants/Vendors 4

  5. 2/21/2012 SECURITY TEAM ASSESSMENTS  Data Map: Where Is Your PHI?  Many Locations Including Portable Media  Systems “Off the Grid”  Tools and Applications  Access Controls  Encryption  De-Identification Where Practicable  Penetration Analyses  Are Policies and Procedures Comprehensive and Current?  Business Associate Compliance CONCLUSION  PROACTIVITY SAVES TIME AND MONEY  Assemble Security Assessment Team Now  Assemble Security Assessment Team Now  Security Analysis Is A Requirement For Accessing HITECH Incentive Funds (“Meaningful Use”)  Remediate Vulnerabilities Before Breaches Occur And Before Audit Notice Is Received  Reminder Training And Notices Enable A Culture Of Security And, With It, Privacy 5

  6. 2/21/2012 QUESTIONS?  KENNETH N. RASHBAUM, ESQ.  Rashbaum Associates LLC  Rashbaum Associates, LLC  212-421-2823  krashbaum@rashbaumassociates.com  www.rashbaumassociates.com  Twitter: @RashbaumAssoc 6

Recommend


More recommend