SlideShare una empresa de Scribd logo
1 de 33
Guilty by Association?
HIPAA, HITECH, and the role
of Business Associates
!"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&(

!"#$%&'()*+,#-".)/#$0,&-1"
                                                    61#,(%)7+8-",'

                                      • 4*+,%+),%9):$+%&-1"%);-,):$+%&-1"%)1')
                                        0<,&


                                      • 61#,(%)%*-#+%),'+),;,-*,8*+)
2+'&-3+#)4,'&"+')4'1.',5              566,788)*+,-./0)1923*4,#)*+8:-.;<:=>?8


                                      • 4,%&)=+8-",'%),"#)'+01'#-".%
                                      566,788)*+,-./0)1923*4,#)*+8(<@.0/38




                                                                       !""#!"$%&''
                                                                  (((#)*+,-./0)123*4,#)*+
Welcome!

Updating Business Associate requirements

The roles of BAs, Subcontractors and Agents

Amending Business Associate Agreements

New Violation Categories and Penalties

Audits, Remediation and Good Faith E!orts
Changing BA Rules

Prior to HITECH, management of ePHI security
was loosely defined. The law required BAs to
“use appropriate safeguards.”

There was no standard relating to how data would
be protected, and no way to validate whether the
BA was actually following the standard.
Changing BA Rules

Encryption and virus protection as cases in point

Laptops do not necessarily have discs encrypted

Workstation users often disable virus protection

System patching has also emerged as an issue
Changing BA Rules

Best intentions created worst-case scenarios

Limited IT resources in many CEs

Too many IT issues to handle

BA changes inevitable given EMR adoption
Redefining
Business Associates
BAs are “persons who, on behalf of a covered
entity (but other than as members of the covered
entity’s workforce) perform or assist in performing
a function or activity that involves the use or
disclosure of individually identifiable health
information, or that otherwise is regulated by
HIPAA.”
Redefining
Business Associates
HITECH requires BAs to comply directly with
Security Rule provisions directing implementation
of administrative, physical and technical
safeguards for ePHI and development and
enforcement of related policies, procedures and
documentation safeguards including designation
of a security o"cial.
Redefining
Business Associates
HITECH also imposes on the BA an obligation to
comply directly with HIPAA BA safeguards,
including limiting use and disclosure of ePHI as
specified in the BAA or required by law, facilitating
access and accounting for disclosures, opening
books and records to DHHS, and returning or
destroying all ePHI, if feasible, upon termination of
the Business Associate Agreement.
Redefining
Business Associates

HITECH deems BA to violate HIPAA if the BA
“knows of a pattern of activity or practice” by the
CE that breaches their BAA and if BA fails to cure
the breach, terminate the BAA or report the non-
compliance to DHHS.
Subcontractors
and Agents

The BA must require subcontractors and agents to
provide reasonable written assurance that they will
comply with the same restrictions and conditions
that apply to the BA under the terms of the BAA
with respect to PHI.
Required Capabilities

Accounting of Disclosures and Audit Trail issues

Accounting provision only covers “disclosures”

CEs and BAs must account for narrow category

Includes disclosures to law enforcement
Required Capabilities

Protecting Data

BA restricts access to PHI via password, criteria

Servers in secured computer room; limited access

Data received and forwarded automatically

Archives and backups in fireproof safe
Required Capabilities

Proper Disposal of Data

At end of BAA, data deleted from BA systems

No printed reports or paper copies retained by BA

Printed reports are shredded upon completion
Required Capabilities
Privacy and Security Measures

Employees, contractors, subs, agents must sign

BA supports 128-bit encryption for all reports

Restricted access to PHI on need-to-know basis

Automatic expiration of passwords

Restricted access to computer room, servers
Required Capabilities
Privacy and Security Measures

Mandatory HIPAA training for all employees

Monitored security system

Automated data backups, stored in safe

Automated virus checks

Employee termination security procedures
Elements of BAAs

BA agrees not to use PHI outside requirements

BA agrees to use appropriate safeguards

BA mitigates disclosure that violates BAA

BA reports disclosures to CE

BA agrees to document disclosures
Elements of BAAs

BAA specifies purposes for use of PHI

Functions, activities or services on behalf of CE

May use PHI to provide data aggregation to CE

May use PHI to report violations of the law
Elements of BAAs


CE must notify BA of limitations in privacy practice

Notify BA of changes in PHI disclosure procedures

Notify BA of any restriction of PHI use, disclosure
Elements of BAAs

BAA must set forth term and termination provision

Upon termination, BA returns or destroys PHI

Provision applies to subcontractor or agent PHI

BA shall retain no copies of PHI

If returning unfeasible, BA must specify conditions
Amendments
and Provisions
There’s no clear consensus on the implications of
HITECH for BAAs. Since HITECH directly
regulates BAs and imposes new privacy and
security obligations, there may be little need to
update existing contracts. However, § 13401 and
13404 mandate that HITECH security and privacy
provisions be “incorporated into the BAA.” Your
need to amend may depend on existing language
and interpretation by the parties to the agreement.
Making the Transition


CEs directly responsible for “workforce” conduct

“Workforce” includes employees, volunteers

Also trainees and others working under CE control
Making the Transition

A broader definition: Temporary employees,
outsourced sta!, BA employees who are, by
contract, the responsibility of the CE are all part of
the CE “workforce.” CEs that fail to properly
respond to BA non-compliance may have violated
HIPAA.
Making the Transition

Enhanced enforcement provisions in HITECH may
prompt CEs to seek broader assurances from BAs
– some form of indemnification. BAs are likely to
seek protection for actions taken at the direction
of the CE, and to impose other limits on liability in
connection with the BAA.
New Violation
Categories

The person did not know (and by exercising
reasonable diligence, would not have known) that
action would lead to violation:

$100 per violation; total per CY $25,000
New Violation
Categories

Reasonable cause (not willful neglect):

$1000 per violation; total per CY $100,000
New Violation
Categories

Willful Neglect, corrected:

$10,000 per violation; total per CY $250,000
New Violation
Categories

Willful Neglect, uncorrected:

$50,000 per violation; total per CY $1,500,000
Audits, Remediation
and Good Faith Efforts
HIPAA audits are relatively new and still very rare.
They include a site visit and an audit report. Site
visits comprise interviews with stakeholders and
examination of physical features of Health
Information Systems. Site audits check physical
safeguards, daily operations, adherence to policies
and compliance with HIPAA requirements.
Audits, Remediation
and Good Faith Efforts
HIPAA remediation addresses “gaps” identified via
risk analysis. After “gap analysis” is complete,
begin prioritizing remediation targets. “Quick hits”
are key and can be anything your organization is
confident will require little resources to correct ...
and will often demonstrate “good faith” progress
toward compliance.
Audits, Remediation
and Good Faith Efforts

Remember ... problems will not all be of the same
priority. Some problems will involve relatively
flagrant or obvious violations of HIPAA privacy
mandates. These generally need to be addressed
as high priorities. Identify the resources needed to
work through these issues first.
Questions and Comments
HIPAA, HITECH, and the role
of Business Associates
!"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&(



                     !"#$%&'()*+,&#$%&-*./
          J/.06/.0
                                   ! >!4??)215@*-,"0+
                                   ! >!6/2>)?&&+%&,&-1"
                                   ! A+,"-".B$*)C%+)01'+)5+,%$'+)DE

                                          A3<<BC<+*B/0;BD"BC/1BEF/-4/6.*0
                                                     !""#!"$%&''BB
')5.<F<               %--4:63/6<
                                            566,788)*+,-./0)1923*4,#)*+8

                                                 G<(BHB&/:6BBI<@.0/3:
                                        566,788)*+,-./0)1923*4,#)*+8(<@.0/38




                                                                                 !""#!"$%&''
                                                                            (((#)*+,-./0)123*4,#)*+

Más contenido relacionado

Similar a HIPAA: Can you be guilty by association?

The Benefits of Becoming GSA Certified
The Benefits of Becoming GSA CertifiedThe Benefits of Becoming GSA Certified
The Benefits of Becoming GSA Certifiedbidsync
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceControlCase
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxrandymartin91030
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
The Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) ActThe Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) ActDana Boo
 
Icd10 organization strategy
Icd10 organization strategyIcd10 organization strategy
Icd10 organization strategyMichael Arrigo
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal ControlsBharath Rao
 
Incentives for Technology Investments
Incentives for Technology InvestmentsIncentives for Technology Investments
Incentives for Technology InvestmentsDecosimoCPAs
 
Enforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmonsEnforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmonsKenSimmons
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and proceduresCharles McNeil
 
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...IBM India Smarter Computing
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...Workiva
 
What You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07aWhat You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07aFreelancer Training
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTControlCase
 
Presentation Moss 2007 Usman
Presentation Moss 2007 UsmanPresentation Moss 2007 Usman
Presentation Moss 2007 UsmanUsman Zafar Malik
 
Methodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat AccountingMethodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat AccountingRayvat Accounting
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
 

Similar a HIPAA: Can you be guilty by association? (20)

The Benefits of Becoming GSA Certified
The Benefits of Becoming GSA CertifiedThe Benefits of Becoming GSA Certified
The Benefits of Becoming GSA Certified
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docx
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
The Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) ActThe Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) Act
 
Icd10 organization strategy
Icd10 organization strategyIcd10 organization strategy
Icd10 organization strategy
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
 
Incentives for Technology Investments
Incentives for Technology InvestmentsIncentives for Technology Investments
Incentives for Technology Investments
 
Enforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmonsEnforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmons
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures
 
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
 
What You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07aWhat You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07a
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
 
Presentation Moss 2007 Usman
Presentation Moss 2007 UsmanPresentation Moss 2007 Usman
Presentation Moss 2007 Usman
 
Methodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat AccountingMethodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat Accounting
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
 

Más de Compliancy Group

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...Compliancy Group
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016Compliancy Group
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud Compliancy Group
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Compliancy Group
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Compliancy Group
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...Compliancy Group
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsCompliancy Group
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practiceCompliancy Group
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...Compliancy Group
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA AuditCompliancy Group
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...Compliancy Group
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...Compliancy Group
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceCompliancy Group
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDCompliancy Group
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityCompliancy Group
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Compliancy Group
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingCompliancy Group
 

Más de Compliancy Group (20)

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 audits
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practice
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA Audit
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
 
Meaningful Use vs HIPAA
Meaningful Use vs HIPAAMeaningful Use vs HIPAA
Meaningful Use vs HIPAA
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA Compliance
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperability
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for Auditing
 

Último

Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Último (20)

Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

HIPAA: Can you be guilty by association?

  • 1. Guilty by Association? HIPAA, HITECH, and the role of Business Associates
  • 2. !"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&( !"#$%&'()*+,#-".)/#$0,&-1" 61#,(%)7+8-",' • 4*+,%+),%9):$+%&-1"%);-,):$+%&-1"%)1') 0<,& • 61#,(%)%*-#+%),'+),;,-*,8*+) 2+'&-3+#)4,'&"+')4'1.',5 566,788)*+,-./0)1923*4,#)*+8:-.;<:=>?8 • 4,%&)=+8-",'%),"#)'+01'#-".% 566,788)*+,-./0)1923*4,#)*+8(<@.0/38 !""#!"$%&'' (((#)*+,-./0)123*4,#)*+
  • 3. Welcome! Updating Business Associate requirements The roles of BAs, Subcontractors and Agents Amending Business Associate Agreements New Violation Categories and Penalties Audits, Remediation and Good Faith E!orts
  • 4. Changing BA Rules Prior to HITECH, management of ePHI security was loosely defined. The law required BAs to “use appropriate safeguards.” There was no standard relating to how data would be protected, and no way to validate whether the BA was actually following the standard.
  • 5. Changing BA Rules Encryption and virus protection as cases in point Laptops do not necessarily have discs encrypted Workstation users often disable virus protection System patching has also emerged as an issue
  • 6. Changing BA Rules Best intentions created worst-case scenarios Limited IT resources in many CEs Too many IT issues to handle BA changes inevitable given EMR adoption
  • 7. Redefining Business Associates BAs are “persons who, on behalf of a covered entity (but other than as members of the covered entity’s workforce) perform or assist in performing a function or activity that involves the use or disclosure of individually identifiable health information, or that otherwise is regulated by HIPAA.”
  • 8. Redefining Business Associates HITECH requires BAs to comply directly with Security Rule provisions directing implementation of administrative, physical and technical safeguards for ePHI and development and enforcement of related policies, procedures and documentation safeguards including designation of a security o"cial.
  • 9. Redefining Business Associates HITECH also imposes on the BA an obligation to comply directly with HIPAA BA safeguards, including limiting use and disclosure of ePHI as specified in the BAA or required by law, facilitating access and accounting for disclosures, opening books and records to DHHS, and returning or destroying all ePHI, if feasible, upon termination of the Business Associate Agreement.
  • 10. Redefining Business Associates HITECH deems BA to violate HIPAA if the BA “knows of a pattern of activity or practice” by the CE that breaches their BAA and if BA fails to cure the breach, terminate the BAA or report the non- compliance to DHHS.
  • 11. Subcontractors and Agents The BA must require subcontractors and agents to provide reasonable written assurance that they will comply with the same restrictions and conditions that apply to the BA under the terms of the BAA with respect to PHI.
  • 12. Required Capabilities Accounting of Disclosures and Audit Trail issues Accounting provision only covers “disclosures” CEs and BAs must account for narrow category Includes disclosures to law enforcement
  • 13. Required Capabilities Protecting Data BA restricts access to PHI via password, criteria Servers in secured computer room; limited access Data received and forwarded automatically Archives and backups in fireproof safe
  • 14. Required Capabilities Proper Disposal of Data At end of BAA, data deleted from BA systems No printed reports or paper copies retained by BA Printed reports are shredded upon completion
  • 15. Required Capabilities Privacy and Security Measures Employees, contractors, subs, agents must sign BA supports 128-bit encryption for all reports Restricted access to PHI on need-to-know basis Automatic expiration of passwords Restricted access to computer room, servers
  • 16. Required Capabilities Privacy and Security Measures Mandatory HIPAA training for all employees Monitored security system Automated data backups, stored in safe Automated virus checks Employee termination security procedures
  • 17. Elements of BAAs BA agrees not to use PHI outside requirements BA agrees to use appropriate safeguards BA mitigates disclosure that violates BAA BA reports disclosures to CE BA agrees to document disclosures
  • 18. Elements of BAAs BAA specifies purposes for use of PHI Functions, activities or services on behalf of CE May use PHI to provide data aggregation to CE May use PHI to report violations of the law
  • 19. Elements of BAAs CE must notify BA of limitations in privacy practice Notify BA of changes in PHI disclosure procedures Notify BA of any restriction of PHI use, disclosure
  • 20. Elements of BAAs BAA must set forth term and termination provision Upon termination, BA returns or destroys PHI Provision applies to subcontractor or agent PHI BA shall retain no copies of PHI If returning unfeasible, BA must specify conditions
  • 21. Amendments and Provisions There’s no clear consensus on the implications of HITECH for BAAs. Since HITECH directly regulates BAs and imposes new privacy and security obligations, there may be little need to update existing contracts. However, § 13401 and 13404 mandate that HITECH security and privacy provisions be “incorporated into the BAA.” Your need to amend may depend on existing language and interpretation by the parties to the agreement.
  • 22. Making the Transition CEs directly responsible for “workforce” conduct “Workforce” includes employees, volunteers Also trainees and others working under CE control
  • 23. Making the Transition A broader definition: Temporary employees, outsourced sta!, BA employees who are, by contract, the responsibility of the CE are all part of the CE “workforce.” CEs that fail to properly respond to BA non-compliance may have violated HIPAA.
  • 24. Making the Transition Enhanced enforcement provisions in HITECH may prompt CEs to seek broader assurances from BAs – some form of indemnification. BAs are likely to seek protection for actions taken at the direction of the CE, and to impose other limits on liability in connection with the BAA.
  • 25. New Violation Categories The person did not know (and by exercising reasonable diligence, would not have known) that action would lead to violation: $100 per violation; total per CY $25,000
  • 26. New Violation Categories Reasonable cause (not willful neglect): $1000 per violation; total per CY $100,000
  • 27. New Violation Categories Willful Neglect, corrected: $10,000 per violation; total per CY $250,000
  • 28. New Violation Categories Willful Neglect, uncorrected: $50,000 per violation; total per CY $1,500,000
  • 29. Audits, Remediation and Good Faith Efforts HIPAA audits are relatively new and still very rare. They include a site visit and an audit report. Site visits comprise interviews with stakeholders and examination of physical features of Health Information Systems. Site audits check physical safeguards, daily operations, adherence to policies and compliance with HIPAA requirements.
  • 30. Audits, Remediation and Good Faith Efforts HIPAA remediation addresses “gaps” identified via risk analysis. After “gap analysis” is complete, begin prioritizing remediation targets. “Quick hits” are key and can be anything your organization is confident will require little resources to correct ... and will often demonstrate “good faith” progress toward compliance.
  • 31. Audits, Remediation and Good Faith Efforts Remember ... problems will not all be of the same priority. Some problems will involve relatively flagrant or obvious violations of HIPAA privacy mandates. These generally need to be addressed as high priorities. Identify the resources needed to work through these issues first.
  • 32. Questions and Comments HIPAA, HITECH, and the role of Business Associates
  • 33. !"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&( !"#$%&'()*+,&#$%&-*./ J/.06/.0 ! >!4??)215@*-,"0+ ! >!6/2>)?&&+%&,&-1" ! A+,"-".B$*)C%+)01'+)5+,%$'+)DE A3<<BC<+*B/0;BD"BC/1BEF/-4/6.*0 !""#!"$%&''BB ')5.<F< %--4:63/6< 566,788)*+,-./0)1923*4,#)*+8 G<(BHB&/:6BBI<@.0/3: 566,788)*+,-./0)1923*4,#)*+8(<@.0/38 !""#!"$%&'' (((#)*+,-./0)123*4,#)*+