SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
Do	
  You	
  Know	
  How	
  To	
  
Handle	
  A	
  HIPAA	
  
Breach?	
  
Claudia	
  A.	
  Hinrichsen,	
  Esq.	
  
The	
  Greenberg,	
  Dresevic,	
  Hinrichsen,	
  Iwrey,	
  Kalmowitz,	
  Lebow	
  &	
  Pendleton	
  Law	
  Group	
  
(516)	
  492-­‐3390	
  
chinrichsen@thehlp.com	
  

	
  
Industry	
  leading	
  Education	
  
Certified	
  Partner	
  Program	
  
	
  

•  Please	
  ask	
  questions	
  
•  For	
  todays	
  Slides	
  
http://compliancy-­‐group.com/slides023/	
  
•  Todays	
  &	
  Past	
  webinars	
  go	
  to:	
  
http://compliancy-­‐group.com/webinar/	
  
Join	
  our	
  chat	
  on	
  Twitter	
  
	
  
	
  
	
  
	
  
#cgwebinar	
  
Agenda	
  
I.  DefiniSon	
  of	
  Breach	
  and	
  Risk	
  Assessment	
  
II.  NoSficaSon	
  obligaSons	
  in	
  event	
  of	
  HIPAA	
  
breach	
  
III.  GeYng	
  you	
  own	
  “house	
  in	
  order”	
  	
  
IV.  What	
  to	
  do	
  when	
  social	
  security	
  numbers	
  are	
  
disclosed	
  
V.  Credit	
  monitoring	
  for	
  impacted	
  paSents	
  
VI.  Insurance	
  for	
  HIPAA	
  breaches	
  
VII.  QuesSons?	
  
I	
  

HIPAA	
  Omnibus	
  Rule	
  
• New	
  HIPAA	
  regulaSons	
  became	
  effecSve	
  
on	
  September	
  23,	
  2013	
  
• Significant	
  modificaSons	
  made	
  to	
  HIPAA	
  
rules,	
  including	
  breach	
  noSficaSon,	
  among	
  
other	
  things	
  
• Harm	
  standard	
  removed	
  
• Four	
  factors	
  must	
  be	
  considered	
  in	
  risk	
  
assessment	
  
Determine	
  Whether	
  a	
  Breach	
  
Occurred	
  
•  Impermissible	
  use	
  or	
  disclosure	
  of	
  protected	
  
health	
  informaSon	
  (PHI)	
  is	
  presumed	
  to	
  be	
  a	
  
breach	
  unless	
  the	
  Covered	
  EnSty	
  is	
  able	
  to	
  
demonstrate	
  that	
  there	
  is	
  	
  “low	
  probability	
  that	
  
PHI	
  has	
  been	
  compromised.”	
  
•  Applies	
  to	
  “unsecured	
  PHI”	
  which	
  is	
  not	
  
rendered	
  unusable,	
  unreadable,	
  or	
  
indecipherable	
  

I	
  
Determine	
  Whether	
  a	
  Breach	
  
Occurred	
  
At	
  least	
  the	
  four	
  following	
  factors	
  must	
  be	
  assessed:	
  
1)  The	
  nature	
  and	
  extent	
  of	
  the	
  PHI	
  involved,	
  including	
  the	
  
types	
  of	
  idenSfiers	
  and	
  the	
  likelihood	
  of	
  re-­‐
idenSficaSon;	
  
2)  The	
  unauthorized	
  person	
  who	
  used	
  the	
  PHI	
  or	
  to	
  whom	
  
the	
  disclosure	
  was	
  made;	
  
3)  whether	
  the	
  PHI	
  was	
  actually	
  acquired	
  or	
  viewed;	
  and	
  
4)  The	
  extent	
  to	
  which	
  the	
  risk	
  to	
  the	
  PHI	
  has	
  been	
  
mi;gated.	
  

I	
  
I	
  

Results	
  of	
  Risk	
  Assessment	
  
• If	
  evaluaSon	
  of	
  the	
  factors	
  fails	
  to	
  
demonstrate	
  that	
  low	
  probability	
  that	
  
the	
  PHI	
  has	
  been	
  compromised,	
  
breach	
  no;fica;on	
  is	
  required.	
  
I	
  

Example	
  1	
  
•  If	
  informaSon	
  containing	
  dates	
  of	
  health	
  care	
  
service	
  and	
  diagnosis	
  of	
  certain	
  employees	
  was	
  
impermissibly	
  disclosed	
  to	
  their	
  employer,	
  the	
  
employer	
  may	
  be	
  able	
  to	
  determine	
  that	
  the	
  
informaSon	
  pertains	
  to	
  specific	
  employees	
  
based	
  on	
  the	
  informaSon	
  available	
  to	
  the	
  
employer,	
  such	
  as	
  dates	
  of	
  absence	
  from	
  work.	
  	
  	
  
•  In	
  this	
  case,	
  there	
  may	
  be	
  more	
  than	
  a	
  low	
  
probability	
  that	
  the	
  protected	
  health	
  
informaSon	
  has	
  been	
  compromised.	
  
I	
  

Example	
  2	
  
•  If	
  a	
  laptop	
  computer	
  was	
  stolen	
  and	
  later	
  
recovered	
  and	
  a	
  forensic	
  analysis	
  shows	
  that	
  the	
  
protected	
  health	
  informaSon	
  on	
  the	
  computer	
  
was	
  never	
  accessed,	
  viewed,	
  acquired,	
  
transferred,	
  or	
  otherwise	
  compromised,	
  the	
  
Covered	
  EnSty	
  could	
  determine	
  that	
  the	
  
informaSon	
  was	
  not	
  actually	
  an	
  unauthorized	
  
individual	
  even	
  though	
  the	
  opportunity	
  existed.	
  
I	
  

Example	
  3	
  
•  If	
  financial	
  informaSon,	
  such	
  as	
  credit	
  card	
  
numbers	
  or	
  social	
  security	
  numbers	
  was	
  
disclosed,	
  the	
  Covered	
  EnSty	
  may	
  determine	
  
that	
  a	
  breach	
  has	
  occurred	
  as	
  unauthorized	
  use	
  
or	
  disclosure	
  of	
  such	
  informaSon	
  could	
  increase	
  
the	
  risk	
  of	
  idenSty	
  thef	
  or	
  financial	
  fraud.	
  
NotiIication	
  Obligations	
  in	
  the	
  
Event	
  of	
  a	
  HIPAA	
  Breach	
  
• NoSficaSon	
  to	
  affected	
  individuals	
  
• NoSficaSon	
  to	
  the	
  media	
  
• NoSficaSon	
  to	
  the	
  Secretary	
  of	
  the	
  
Department	
  of	
  Health	
  and	
  Human	
  
Services	
  (the	
  Secretary)	
  
• Other	
  noSficaSons	
  	
  
	
  

II	
  
NotiIication	
  to	
  Affected	
  
Individuals	
  
•  All	
  noSces	
  to	
  affected	
  individuals	
  must	
  be	
  
wrihen	
  in	
  plain	
  language	
  and	
  include:	
  
•  A	
  brief	
  descripSon	
  of	
  what	
  happened,	
  
including	
  the	
  date	
  of	
  the	
  breach	
  and	
  the	
  date	
  
of	
  the	
  discovery	
  of	
  the	
  breach,	
  if	
  known;	
  
•  A	
  descripSon	
  of	
  the	
  types	
  of	
  PHI	
  (not	
  the	
  
specific	
  PHI)	
  that	
  were	
  involved	
  in	
  the	
  breach	
  
(such	
  as	
  whether	
  full	
  name,	
  social	
  security	
  
number,	
  date	
  of	
  birth,	
  home	
  address,	
  account	
  
number,	
  diagnosis,	
  disability	
  code	
  or	
  other	
  
types	
  of	
  informaSon	
  were	
  involved);	
  

II	
  
NotiIication	
  to	
  Affected	
  
Individuals	
  
•  Any	
  recommended	
  steps	
  individuals	
  should	
  
take	
  to	
  protect	
  themselves	
  from	
  potenSal	
  
harm	
  resulSng	
  from	
  the	
  breach;	
  
•  A	
  brief	
  descripSon	
  of	
  what	
  the	
  Covered	
  EnSty	
  
is	
  doing	
  to	
  invesSgate	
  the	
  breach,	
  to	
  miSgate	
  
harm	
  to	
  individuals	
  and	
  to	
  protect	
  against	
  any	
  
further	
  breaches;	
  and	
  	
  
•  Contact	
  informaSon	
  for	
  the	
  Privacy	
  Officer	
  of	
  
the	
  Covered	
  EnSty.	
  

II	
  
II	
  

Method	
  of	
  NotiIication	
  
•  The	
  covered	
  enSty	
  must	
  noSfy	
  affected	
  
individuals	
  by:	
  
1.  Wrihen	
  noSficaSon	
  by	
  first-­‐class	
  mail	
  to	
  the	
  
individual	
  at	
  the	
  last	
  known	
  address	
  of	
  the	
  
individual	
  
2.  If	
  the	
  individual	
  agrees	
  to	
  electronic	
  noSce	
  
and	
  such	
  agreement	
  has	
  not	
  been	
  
withdrawn,	
  by	
  electronic	
  mail	
  
II	
  

Method	
  of	
  NotiIication	
  
•  In	
  the	
  case	
  of	
  minors	
  or	
  individuals	
  who	
  lack	
  
legal	
  capacity	
  due	
  to	
  a	
  mental	
  or	
  physical	
  
condiSon,	
  the	
  parent	
  or	
  personal	
  
representaSve	
  should	
  be	
  noSfied.	
  
•  If	
  the	
  covered	
  enSty	
  knows	
  that	
  an	
  individual	
  
is	
  deceased,	
  the	
  noSficaSon	
  should	
  be	
  sent	
  to	
  
the	
  individual's	
  next	
  of	
  kin	
  or	
  personal	
  
representaSve	
  if	
  the	
  address	
  is	
  known.	
  
II	
  

Method	
  of	
  NotiIication	
  
•  In	
  urgent	
  situaSons	
  where	
  there	
  is	
  a	
  possibility	
  
for	
  imminent	
  misuse	
  of	
  the	
  unsecured	
  PHI,	
  
addiSonal	
  noSce	
  by	
  telephone	
  or	
  other	
  means	
  
may	
  be	
  made.	
  However,	
  direct	
  wrihen	
  noSce	
  
must	
  sSll	
  be	
  provided.	
  
II	
  

NotiIication	
  to	
  the	
  Media	
  
•  If	
  the	
  breach	
  of	
  unsecured	
  PHI	
  involves	
  more	
  
than	
  500	
  residents	
  of	
  a	
  state	
  or	
  jurisdicSon,	
  
prominent	
  media	
  outlet	
  must	
  be	
  noSfied	
  (most	
  
likely	
  via	
  a	
  press	
  release)	
  without	
  unreasonable	
  
delay	
  and	
  no	
  later	
  than	
  60	
  days	
  afer	
  discovery.	
  
	
  
PLEASE	
  NOTE:	
  The	
  noSficaSon	
  to	
  the	
  media	
  is	
  not	
  
a	
  subsStute	
  for	
  the	
  noSficaSon	
  to	
  the	
  individual.	
  
II	
  

NotiIication	
  to	
  the	
  Secretary	
  
•  For	
  breach	
  of	
  unsecured	
  PHI	
  that	
  involves	
  more	
  
than	
  500	
  individuals,	
  the	
  Secretary	
  of	
  the	
  
Department	
  of	
  Health	
  and	
  Human	
  Services	
  
should	
  be	
  noSfied	
  via	
  ocrnoSficaSons.hhs.gov	
  
without	
  unreasonable	
  delay	
  and	
  no	
  later	
  than	
  60	
  
days	
  aBer	
  discovery.	
  
	
  
II	
  

NotiIication	
  to	
  the	
  Secretary	
  
•  If	
  the	
  breach	
  of	
  unsecured	
  PHI	
  involve	
  less	
  than	
  
500	
  individuals,	
  the	
  Covered	
  EnSty’s	
  Privacy	
  
Officer	
  should	
  maintain	
  an	
  internal	
  log	
  or	
  other	
  
documentaSon	
  of	
  the	
  breach.	
  This	
  informaSon	
  
should	
  then	
  be	
  submihed	
  annually	
  (before	
  
March	
  1st)	
  to	
  the	
  Secretary	
  of	
  HHS	
  for	
  the	
  
preceding	
  calendar	
  year	
  via	
  the	
  website.	
  	
  
•  The	
  health	
  care	
  provider	
  should	
  maintain	
  its	
  
internal	
  log	
  or	
  other	
  documentaSon	
  of	
  
breaches	
  for	
  six	
  years.	
  
II	
  
II	
  
II	
  
III	
  

Getting	
  Your	
  “House	
  in	
  Order”	
  
•  Review/update	
  the	
  pracSce’s	
  policies	
  and	
  
procedures	
  
•  Provide	
  training	
  to	
  all	
  employees	
  in:	
  
•  Updated	
  policies	
  
•  Prompt	
  reporSng	
  
•  EvaluaSon	
  and	
  documentaSon	
  of	
  breaches	
  
•  Create	
  an	
  ac;on	
  plan	
  to	
  respond	
  to	
  security	
  
incidents	
  and	
  breaches	
  
•  Conduct	
  regular	
  internal	
  audits	
  
•  Consider	
  geYng	
  insurance	
  for	
  HIPAA	
  breaches	
  
Most	
  Common	
  Forms	
  of	
  
Breach	
  
•  Impermissible	
  uses	
  and	
  disclosures	
  of	
  
protected	
  health	
  informaSon	
  
•  Lack	
  of	
  safeguards	
  of	
  protected	
  health	
  
informaSon	
  
•  Lack	
  of	
  pa5ent	
  access	
  to	
  their	
  protected	
  
health	
  informaSon	
  
•  Uses	
  or	
  disclosures	
  of	
  more	
  than	
  the	
  
Minimum	
  Necessary	
  protected	
  health	
  
informaSon	
  
•  Complaints	
  to	
  the	
  covered	
  enSty	
  
OfIice	
  of	
  Civil	
  Rights	
  (OCR)	
  
Audits	
  
•  OCR	
  has	
  completed	
  audits	
  for	
  115	
  enSSes	
  with	
  a	
  
total	
  of	
  979	
  audit	
  findings	
  and	
  observaSons:	
  
•  293	
  regarding	
  Privacy	
  
•  592	
  regarding	
  Security	
  
•  94	
  regarding	
  Breach	
  No;fica;on	
  
•  An	
  evaluaSon	
  is	
  currently	
  underway	
  to	
  make	
  
audits	
  a	
  permanent	
  part	
  of	
  enforcement	
  efforts.	
  
•  Security	
  Rule	
  assessment	
  will	
  be	
  highly	
  
scruSnized.	
  	
  	
  

III	
  
IV	
  

Social	
  Security	
  Numbers	
  
•  Most	
  states	
  have	
  addiSonal	
  laws	
  regulaSng	
  
noSficaSon	
  of	
  unauthorized	
  disclosure	
  of	
  social	
  
security	
  numbers.	
  
•  These	
  regulaSons	
  require	
  that	
  noSficaSon	
  be	
  
provided	
  in	
  the	
  most	
  expediSous	
  Sme	
  possible	
  
and	
  without	
  unreasonable	
  delay.	
  
•  The	
  person	
  that	
  owns	
  or	
  licenses	
  the	
  
computerized	
  data	
  must	
  provide	
  noSce	
  to	
  the	
  
individual.	
  
	
  
IV	
  

Social	
  Security	
  Number	
  Breach	
  
•  Typically	
  the	
  following	
  must	
  be	
  done	
  immediately	
  afer	
  
discovery	
  of	
  the	
  breach:	
  
•  Detailed	
  noSce	
  to	
  affected	
  residents	
  within	
  state	
  
•  NoSficaSon	
  to	
  other	
  governmental	
  agencies,	
  
including,	
  but	
  not	
  limited	
  to:	
  
•  State	
  Ahorney	
  General	
  
•  Department	
  of	
  State	
  
•  Consumer	
  ReporSng	
  Agencies	
  
	
  
PLEASE	
  NOTE:	
  The	
  Ahorney	
  General	
  may	
  bring	
  a	
  civil	
  acSon	
  
and	
  the	
  court	
  may	
  also	
  award	
  injuncSve	
  relief.	
  
V	
  

Credit-­‐Monitoring	
  
•  According	
  to	
  the	
  U.S.	
  Federal	
  Trade	
  Commission,	
  
it	
  takes	
  an	
  average	
  of	
  12	
  months	
  for	
  a	
  vicSm	
  of	
  
idenSty	
  thef	
  to	
  noSce	
  the	
  crime.	
  
•  Credit-­‐monitoring	
  services	
  will	
  regularly	
  alert	
  
the	
  individual	
  of	
  any	
  changes	
  to	
  their	
  credit,	
  
helping	
  stop	
  thef	
  before	
  it	
  gets	
  out	
  of	
  control.	
  
	
  
V	
  

Credit-­‐Monitoring	
  
•  Covered	
  enSSes	
  and	
  others	
  who	
  maintain	
  PHI	
  may	
  need	
  
to	
  offer	
  such	
  services	
  to	
  affected	
  individuals	
  to	
  miSgate	
  
risk.	
  
•  Companies	
  such	
  as	
  IdenSty	
  Guard,	
  Equifax,	
  and	
  
Experian	
  offer	
  credit-­‐monitoring,	
  providing	
  credit	
  
alerts	
  to	
  individuals	
  every	
  business	
  day.	
  
•  The	
  average	
  cost	
  of	
  credit	
  monitoring	
  per	
  person	
  is	
  
$15	
  a	
  month	
  with	
  credit	
  alerts	
  which	
  will	
  report	
  new	
  
accounts,	
  credit	
  inquiries,	
  address	
  changes,	
  changes	
  to	
  
current	
  accounts/account	
  informaSon,	
  etc.	
  
Business	
  Associate	
  
Agreements	
  
•  Covered	
  EnSSes	
  should	
  include	
  indemnificaSon	
  
language	
  in	
  their	
  Business	
  Associate	
  Agreement	
  
for	
  any	
  costs	
  related	
  to	
  a	
  breach	
  including	
  free	
  
credit-­‐monitoring	
  for	
  affected	
  individuals.	
  
•  A	
  Covered	
  EnSty	
  may	
  also	
  consider	
  requiring	
  
business	
  associates	
  to	
  have	
  data	
  breach	
  
insurance.	
  	
  

V	
  
VI	
  

Cyber/Breach	
  Insurance	
  
•  A	
  recent	
  study	
  by	
  the	
  Ponemon	
  InsStute	
  
reported	
  that	
  76%	
  of	
  parScipaSng	
  organizaSons	
  
in	
  the	
  study	
  who	
  had	
  experienced	
  a	
  security	
  
exploit	
  ranked	
  cyber	
  security	
  risks	
  as	
  high	
  or	
  
higher	
  than	
  other	
  insurable	
  risks,	
  such	
  as	
  natural	
  
disasters,	
  business	
  interrupSons,	
  and	
  fire.	
  
•  Many	
  general	
  liability	
  insurance	
  polices	
  are	
  
excluding	
  data	
  breaches	
  ad	
  security	
  
compromises.	
  
VI	
  

Cyber/Breach	
  Insurance	
  
•  Data	
  breach	
  insurance	
  may	
  be	
  necessary	
  to	
  
cover	
  the	
  costs	
  of	
  responding	
  to	
  a	
  breach	
  and	
  
may	
  include:	
  
•  Defense	
  costs	
  and	
  indemnity	
  for	
  a	
  statutory	
  
violaSon,	
  regulatory	
  invesSgaSon,	
  negligence	
  
or	
  breach	
  of	
  contract	
  
•  Credit	
  or	
  idenSty	
  costs	
  as	
  part	
  of	
  a	
  covered	
  
liability	
  judgment,	
  award	
  or	
  sehlement	
  
•  Forensic	
  costs	
  incurred	
  in	
  the	
  defense	
  of	
  
covered	
  claim	
  
VII	
  

Conclusion	
  
•  “Thus	
  far	
  in	
  2013,	
  48	
  percent	
  of	
  reported	
  data	
  breaches	
  in	
  the	
  
United	
  States	
  have	
  been	
  in	
  the	
  medical/healthcare	
  industry.	
  
In	
  2012,	
  there	
  were	
  154	
  breaches	
  in	
  the	
  medical	
  and	
  
healthcare	
  sector,	
  accounSng	
  for	
  34.5	
  percent	
  of	
  all	
  breaches	
  
in	
  2012,	
  and	
  2,237,873	
  total	
  records	
  lost.”	
  
•  ITRC	
  Breach	
  Report,	
  IdenSty	
  Thef	
  Resource	
  Center,	
  May	
  2013	
  

•  A	
  plan	
  of	
  acSon	
  is	
  crucial	
  in	
  order	
  to	
  
appropriately	
  handle	
  a	
  breach.	
  
•  Proper	
  and	
  Smely	
  noSficaSon	
  is	
  necessary	
  
	
  
	
  

	
  
  HIPAA	
  Compliance	
  
  HITECH	
  Attestation	
  
  Risk	
  Assessment	
  

  Omnibus	
  Rule	
  Ready	
  
  Meaningful	
  Use	
  core	
  measure	
  15	
  
  Policy	
  &	
  Procedure	
  Templates	
  	
  

Free	
  Demo	
  and	
  60	
  Day	
  Evaluation	
  
www.compliancy-­‐group.com	
  
	
  

HIPAA	
  Hotline	
  	
  	
  
855.85HIPAA	
  
855.854.4722	
  	
  
VII	
  

Questions?	
  

Más contenido relacionado

La actualidad más candente

HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECHrcabarloc
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceControlCase
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law TestSachiko Hurst
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentialityjessie66
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAAMargery Lynn
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for StartupsObaa, Inc.
 

La actualidad más candente (20)

HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
Hipaa
HipaaHipaa
Hipaa
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAA
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 

Similar a Do You Know How to Handle a HIPAA Breach?

HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update Resilient Systems
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa trainingGina Ruggiero
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Return to office post covid 19
Return to office post covid 19Return to office post covid 19
Return to office post covid 19Denise Bailey
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 
Securing health information
Securing health informationSecuring health information
Securing health informationDarla Moore
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsOnline Tech
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleJames Pekarek
 

Similar a Do You Know How to Handle a HIPAA Breach? (20)

HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
HIPAA 2015 webinar
HIPAA 2015 webinarHIPAA 2015 webinar
HIPAA 2015 webinar
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
HIPAA - Updated.ppt
HIPAA - Updated.pptHIPAA - Updated.ppt
HIPAA - Updated.ppt
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Hipaa
HipaaHipaa
Hipaa
 
Return to office post covid 19
Return to office post covid 19Return to office post covid 19
Return to office post covid 19
 
Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy Rule
 

Más de Compliancy Group

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...Compliancy Group
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016Compliancy Group
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud Compliancy Group
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Compliancy Group
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Compliancy Group
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...Compliancy Group
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsCompliancy Group
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practiceCompliancy Group
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...Compliancy Group
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA AuditCompliancy Group
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...Compliancy Group
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...Compliancy Group
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceCompliancy Group
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDCompliancy Group
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityCompliancy Group
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Compliancy Group
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingCompliancy Group
 

Más de Compliancy Group (20)

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 audits
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practice
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA Audit
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
 
Meaningful Use vs HIPAA
Meaningful Use vs HIPAAMeaningful Use vs HIPAA
Meaningful Use vs HIPAA
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA Compliance
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperability
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for Auditing
 

Último

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 

Último (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 

Do You Know How to Handle a HIPAA Breach?

  • 1. Do  You  Know  How  To   Handle  A  HIPAA   Breach?   Claudia  A.  Hinrichsen,  Esq.   The  Greenberg,  Dresevic,  Hinrichsen,  Iwrey,  Kalmowitz,  Lebow  &  Pendleton  Law  Group   (516)  492-­‐3390   chinrichsen@thehlp.com    
  • 2. Industry  leading  Education   Certified  Partner  Program     •  Please  ask  questions   •  For  todays  Slides   http://compliancy-­‐group.com/slides023/   •  Todays  &  Past  webinars  go  to:   http://compliancy-­‐group.com/webinar/   Join  our  chat  on  Twitter           #cgwebinar  
  • 3. Agenda   I.  DefiniSon  of  Breach  and  Risk  Assessment   II.  NoSficaSon  obligaSons  in  event  of  HIPAA   breach   III.  GeYng  you  own  “house  in  order”     IV.  What  to  do  when  social  security  numbers  are   disclosed   V.  Credit  monitoring  for  impacted  paSents   VI.  Insurance  for  HIPAA  breaches   VII.  QuesSons?  
  • 4. I   HIPAA  Omnibus  Rule   • New  HIPAA  regulaSons  became  effecSve   on  September  23,  2013   • Significant  modificaSons  made  to  HIPAA   rules,  including  breach  noSficaSon,  among   other  things   • Harm  standard  removed   • Four  factors  must  be  considered  in  risk   assessment  
  • 5. Determine  Whether  a  Breach   Occurred   •  Impermissible  use  or  disclosure  of  protected   health  informaSon  (PHI)  is  presumed  to  be  a   breach  unless  the  Covered  EnSty  is  able  to   demonstrate  that  there  is    “low  probability  that   PHI  has  been  compromised.”   •  Applies  to  “unsecured  PHI”  which  is  not   rendered  unusable,  unreadable,  or   indecipherable   I  
  • 6. Determine  Whether  a  Breach   Occurred   At  least  the  four  following  factors  must  be  assessed:   1)  The  nature  and  extent  of  the  PHI  involved,  including  the   types  of  idenSfiers  and  the  likelihood  of  re-­‐ idenSficaSon;   2)  The  unauthorized  person  who  used  the  PHI  or  to  whom   the  disclosure  was  made;   3)  whether  the  PHI  was  actually  acquired  or  viewed;  and   4)  The  extent  to  which  the  risk  to  the  PHI  has  been   mi;gated.   I  
  • 7. I   Results  of  Risk  Assessment   • If  evaluaSon  of  the  factors  fails  to   demonstrate  that  low  probability  that   the  PHI  has  been  compromised,   breach  no;fica;on  is  required.  
  • 8. I   Example  1   •  If  informaSon  containing  dates  of  health  care   service  and  diagnosis  of  certain  employees  was   impermissibly  disclosed  to  their  employer,  the   employer  may  be  able  to  determine  that  the   informaSon  pertains  to  specific  employees   based  on  the  informaSon  available  to  the   employer,  such  as  dates  of  absence  from  work.       •  In  this  case,  there  may  be  more  than  a  low   probability  that  the  protected  health   informaSon  has  been  compromised.  
  • 9. I   Example  2   •  If  a  laptop  computer  was  stolen  and  later   recovered  and  a  forensic  analysis  shows  that  the   protected  health  informaSon  on  the  computer   was  never  accessed,  viewed,  acquired,   transferred,  or  otherwise  compromised,  the   Covered  EnSty  could  determine  that  the   informaSon  was  not  actually  an  unauthorized   individual  even  though  the  opportunity  existed.  
  • 10. I   Example  3   •  If  financial  informaSon,  such  as  credit  card   numbers  or  social  security  numbers  was   disclosed,  the  Covered  EnSty  may  determine   that  a  breach  has  occurred  as  unauthorized  use   or  disclosure  of  such  informaSon  could  increase   the  risk  of  idenSty  thef  or  financial  fraud.  
  • 11. NotiIication  Obligations  in  the   Event  of  a  HIPAA  Breach   • NoSficaSon  to  affected  individuals   • NoSficaSon  to  the  media   • NoSficaSon  to  the  Secretary  of  the   Department  of  Health  and  Human   Services  (the  Secretary)   • Other  noSficaSons       II  
  • 12. NotiIication  to  Affected   Individuals   •  All  noSces  to  affected  individuals  must  be   wrihen  in  plain  language  and  include:   •  A  brief  descripSon  of  what  happened,   including  the  date  of  the  breach  and  the  date   of  the  discovery  of  the  breach,  if  known;   •  A  descripSon  of  the  types  of  PHI  (not  the   specific  PHI)  that  were  involved  in  the  breach   (such  as  whether  full  name,  social  security   number,  date  of  birth,  home  address,  account   number,  diagnosis,  disability  code  or  other   types  of  informaSon  were  involved);   II  
  • 13. NotiIication  to  Affected   Individuals   •  Any  recommended  steps  individuals  should   take  to  protect  themselves  from  potenSal   harm  resulSng  from  the  breach;   •  A  brief  descripSon  of  what  the  Covered  EnSty   is  doing  to  invesSgate  the  breach,  to  miSgate   harm  to  individuals  and  to  protect  against  any   further  breaches;  and     •  Contact  informaSon  for  the  Privacy  Officer  of   the  Covered  EnSty.   II  
  • 14. II   Method  of  NotiIication   •  The  covered  enSty  must  noSfy  affected   individuals  by:   1.  Wrihen  noSficaSon  by  first-­‐class  mail  to  the   individual  at  the  last  known  address  of  the   individual   2.  If  the  individual  agrees  to  electronic  noSce   and  such  agreement  has  not  been   withdrawn,  by  electronic  mail  
  • 15. II   Method  of  NotiIication   •  In  the  case  of  minors  or  individuals  who  lack   legal  capacity  due  to  a  mental  or  physical   condiSon,  the  parent  or  personal   representaSve  should  be  noSfied.   •  If  the  covered  enSty  knows  that  an  individual   is  deceased,  the  noSficaSon  should  be  sent  to   the  individual's  next  of  kin  or  personal   representaSve  if  the  address  is  known.  
  • 16. II   Method  of  NotiIication   •  In  urgent  situaSons  where  there  is  a  possibility   for  imminent  misuse  of  the  unsecured  PHI,   addiSonal  noSce  by  telephone  or  other  means   may  be  made.  However,  direct  wrihen  noSce   must  sSll  be  provided.  
  • 17. II   NotiIication  to  the  Media   •  If  the  breach  of  unsecured  PHI  involves  more   than  500  residents  of  a  state  or  jurisdicSon,   prominent  media  outlet  must  be  noSfied  (most   likely  via  a  press  release)  without  unreasonable   delay  and  no  later  than  60  days  afer  discovery.     PLEASE  NOTE:  The  noSficaSon  to  the  media  is  not   a  subsStute  for  the  noSficaSon  to  the  individual.  
  • 18. II   NotiIication  to  the  Secretary   •  For  breach  of  unsecured  PHI  that  involves  more   than  500  individuals,  the  Secretary  of  the   Department  of  Health  and  Human  Services   should  be  noSfied  via  ocrnoSficaSons.hhs.gov   without  unreasonable  delay  and  no  later  than  60   days  aBer  discovery.    
  • 19. II   NotiIication  to  the  Secretary   •  If  the  breach  of  unsecured  PHI  involve  less  than   500  individuals,  the  Covered  EnSty’s  Privacy   Officer  should  maintain  an  internal  log  or  other   documentaSon  of  the  breach.  This  informaSon   should  then  be  submihed  annually  (before   March  1st)  to  the  Secretary  of  HHS  for  the   preceding  calendar  year  via  the  website.     •  The  health  care  provider  should  maintain  its   internal  log  or  other  documentaSon  of   breaches  for  six  years.  
  • 20. II  
  • 21. II  
  • 22. II  
  • 23. III   Getting  Your  “House  in  Order”   •  Review/update  the  pracSce’s  policies  and   procedures   •  Provide  training  to  all  employees  in:   •  Updated  policies   •  Prompt  reporSng   •  EvaluaSon  and  documentaSon  of  breaches   •  Create  an  ac;on  plan  to  respond  to  security   incidents  and  breaches   •  Conduct  regular  internal  audits   •  Consider  geYng  insurance  for  HIPAA  breaches  
  • 24. Most  Common  Forms  of   Breach   •  Impermissible  uses  and  disclosures  of   protected  health  informaSon   •  Lack  of  safeguards  of  protected  health   informaSon   •  Lack  of  pa5ent  access  to  their  protected   health  informaSon   •  Uses  or  disclosures  of  more  than  the   Minimum  Necessary  protected  health   informaSon   •  Complaints  to  the  covered  enSty  
  • 25. OfIice  of  Civil  Rights  (OCR)   Audits   •  OCR  has  completed  audits  for  115  enSSes  with  a   total  of  979  audit  findings  and  observaSons:   •  293  regarding  Privacy   •  592  regarding  Security   •  94  regarding  Breach  No;fica;on   •  An  evaluaSon  is  currently  underway  to  make   audits  a  permanent  part  of  enforcement  efforts.   •  Security  Rule  assessment  will  be  highly   scruSnized.       III  
  • 26. IV   Social  Security  Numbers   •  Most  states  have  addiSonal  laws  regulaSng   noSficaSon  of  unauthorized  disclosure  of  social   security  numbers.   •  These  regulaSons  require  that  noSficaSon  be   provided  in  the  most  expediSous  Sme  possible   and  without  unreasonable  delay.   •  The  person  that  owns  or  licenses  the   computerized  data  must  provide  noSce  to  the   individual.    
  • 27. IV   Social  Security  Number  Breach   •  Typically  the  following  must  be  done  immediately  afer   discovery  of  the  breach:   •  Detailed  noSce  to  affected  residents  within  state   •  NoSficaSon  to  other  governmental  agencies,   including,  but  not  limited  to:   •  State  Ahorney  General   •  Department  of  State   •  Consumer  ReporSng  Agencies     PLEASE  NOTE:  The  Ahorney  General  may  bring  a  civil  acSon   and  the  court  may  also  award  injuncSve  relief.  
  • 28. V   Credit-­‐Monitoring   •  According  to  the  U.S.  Federal  Trade  Commission,   it  takes  an  average  of  12  months  for  a  vicSm  of   idenSty  thef  to  noSce  the  crime.   •  Credit-­‐monitoring  services  will  regularly  alert   the  individual  of  any  changes  to  their  credit,   helping  stop  thef  before  it  gets  out  of  control.    
  • 29. V   Credit-­‐Monitoring   •  Covered  enSSes  and  others  who  maintain  PHI  may  need   to  offer  such  services  to  affected  individuals  to  miSgate   risk.   •  Companies  such  as  IdenSty  Guard,  Equifax,  and   Experian  offer  credit-­‐monitoring,  providing  credit   alerts  to  individuals  every  business  day.   •  The  average  cost  of  credit  monitoring  per  person  is   $15  a  month  with  credit  alerts  which  will  report  new   accounts,  credit  inquiries,  address  changes,  changes  to   current  accounts/account  informaSon,  etc.  
  • 30. Business  Associate   Agreements   •  Covered  EnSSes  should  include  indemnificaSon   language  in  their  Business  Associate  Agreement   for  any  costs  related  to  a  breach  including  free   credit-­‐monitoring  for  affected  individuals.   •  A  Covered  EnSty  may  also  consider  requiring   business  associates  to  have  data  breach   insurance.     V  
  • 31. VI   Cyber/Breach  Insurance   •  A  recent  study  by  the  Ponemon  InsStute   reported  that  76%  of  parScipaSng  organizaSons   in  the  study  who  had  experienced  a  security   exploit  ranked  cyber  security  risks  as  high  or   higher  than  other  insurable  risks,  such  as  natural   disasters,  business  interrupSons,  and  fire.   •  Many  general  liability  insurance  polices  are   excluding  data  breaches  ad  security   compromises.  
  • 32. VI   Cyber/Breach  Insurance   •  Data  breach  insurance  may  be  necessary  to   cover  the  costs  of  responding  to  a  breach  and   may  include:   •  Defense  costs  and  indemnity  for  a  statutory   violaSon,  regulatory  invesSgaSon,  negligence   or  breach  of  contract   •  Credit  or  idenSty  costs  as  part  of  a  covered   liability  judgment,  award  or  sehlement   •  Forensic  costs  incurred  in  the  defense  of   covered  claim  
  • 33. VII   Conclusion   •  “Thus  far  in  2013,  48  percent  of  reported  data  breaches  in  the   United  States  have  been  in  the  medical/healthcare  industry.   In  2012,  there  were  154  breaches  in  the  medical  and   healthcare  sector,  accounSng  for  34.5  percent  of  all  breaches   in  2012,  and  2,237,873  total  records  lost.”   •  ITRC  Breach  Report,  IdenSty  Thef  Resource  Center,  May  2013   •  A  plan  of  acSon  is  crucial  in  order  to   appropriately  handle  a  breach.   •  Proper  and  Smely  noSficaSon  is  necessary        
  • 34.   HIPAA  Compliance     HITECH  Attestation     Risk  Assessment     Omnibus  Rule  Ready     Meaningful  Use  core  measure  15     Policy  &  Procedure  Templates     Free  Demo  and  60  Day  Evaluation   www.compliancy-­‐group.com     HIPAA  Hotline       855.85HIPAA   855.854.4722