health information security & compliance

21
HEALTH INFORMATION SECURITY & COMPLIANCE Charles Nwasor, Xcellent Technologies

Upload: vinson

Post on 21-Feb-2016

38 views

Category:

Documents


0 download

DESCRIPTION

Health information security & compliance. Charles Nwasor, Xcellent Technologies. Agenda. 1. HIPAA. 2. The New Healthcare Paradigm. 3. Internal Compliance. 4. Conclusion. 1. HIPAA. HIPAA – Overview . - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Health information security & compliance

HEALTH INFORMATION SECURITY & COMPLIANCE

Charles Nwasor,Xcellent Technologies

Page 2: Health information security & compliance

Agenda

2

HIPAA1

Internal Compliance3

2 The New Healthcare Paradigm

Conclusion4

Page 3: Health information security & compliance

3

HIPAA1

Page 4: Health information security & compliance

4

HIPAA – Overview Sets standards to assure the Confidentiality,

Integrity, and Availability of PHIHealth Insurance Portability & Accountability Act

(HIPAA)Privacy – individuals’ rights of privacy and standardsSecurity – security of ePHIBreach Notification – reporting breach information

Limits the use and disclosure of confidential information:Protected Health Information (PHI)Electronic Protected Health Information (ePHI)

Page 5: Health information security & compliance

HIPAA – PHI

5

PHI and Personally Identifiable InformationAny information (verbal, electronic, or written) that relatesto a person’s physical or mental health or payment information

Name Postal Address All elements of Date Telephone Number Fax Number Email Address URL IP Address Social Security Number Account Numbers

License Number Medical Record

Number Health Plan Number Device Identifier Vehicle Identifier Biometric Identifier Full-face Photos Any other unique

identifying number Genetic information

Page 6: Health information security & compliance

HIPAA – CIA Triad

6

Confidentiality – keeping information from unauthorized access Integrity – safeguarding against unauthorized modification Availability – assuring the constant availability of information

Page 7: Health information security & compliance

HIPAA – Privacy Rule

7

Establishes rights of privacy and standards for disclosure

Permitted Disclosures Personal Representatives Treatment, Payment and Healthcare Operations Written Authorization/Verbal Consent De-identified Data

Required Disclosures Public Health Activities Law Enforcement

Verification Requirements Notice of Privacy Practices

Page 8: Health information security & compliance

HIPAA – Security Rule

8

Requires control measures to safeguard the confidentiality, integrity and availability of electronic Protected Health Information (ePHI)

Organizational Requirements – Business Associate Agreements (BAAs)

Security Standards Administrative Physical Technical

Security Management Process Information Access Management Security Awareness and Training

Page 9: Health information security & compliance

HIPAA – Breach Notification Rule

9

Requires notifications to authorities and/or patients when unsecured PHI has been breached

Defines Breach as the inappropriate use or disclosure that compromises the security and privacy of PHI

Exceptions Unintentional Acquisition by a workforce member Inadvertent Disclosure between workforce members Recipient can not reasonably retain the information

Unsecured PHI – is PHI that has not been rendered unreadable or indecipherable to unauthorized persons

Page 10: Health information security & compliance

10

2 The New Healthcare Paradigm

Page 11: Health information security & compliance

The New Healthcare Paradigm

11

Page 12: Health information security & compliance

12

Internal Compliance3

Page 13: Health information security & compliance

Internal Compliance Framework

13

Assess Risk •Security Risk Assessment

Plan Corrective Action •Prioritize Controls

Create & Implement Control Measures •Remediate

Page 14: Health information security & compliance

Internal Compliance Framework

14

Information Security Policy & Technical ControlsAcceptable UseAccess controls & Physical SecuritySecure Software & Malicious CodeSecurity Incident ManagementSanctionsBreach NotificationWorkforce SecuritySecurity Awareness and Training

Proper Conduct and Authorized Disclosures

Page 15: Health information security & compliance

Internal Compliance Framework

15

Page 16: Health information security & compliance

Impacts of Non-Compliance

16

Regulatory FinesLawsuits and LiabilityLoss of BusinessProfessional Sanctions

Page 17: Health information security & compliance

Current Examples

17

Hospice of North Idaho - $50,000Massachusetts Eye and Ear Associates Inc. - $1.5 MillionRiver Falls Medical Clinic – 2,400 Patient Records stolenShands Jacksonville Clinic – 261 Patient Records

photographedGoldthwait Associates, a Billing Service Provider -

$140,000Phoenix Cardiac Surgery, P.C. - $100,000

Page 18: Health information security & compliance

18

Conclusion4

Page 19: Health information security & compliance

19

Assuring the Privacy and Security of Patients’ Information is a vital component of providing healthcare.

Page 20: Health information security & compliance

Questions

20

Page 21: Health information security & compliance

21

Xcellent Technologies43155 Main Street Suite 2210-DNovi, MI 48375

(248) 956.0538 [email protected]

http://www.xcellenttechnologies.com