SlideShare una empresa de Scribd logo
1 de 34
 
                                 	
  
                                	
  	
  
        Meaningful	
  Use	
  and	
  Core	
  Requirement	
  15	
  
                                                 	
  
How	
  	
  can	
  I	
  possibly	
  
 comply	
  with	
  this	
  
part	
  of	
  Meaningful	
  
Use	
  with	
  the	
  lack	
  of	
  
 time	
  and	
  staff....	
  




                                       www.compliancygroup.com	
     1	
  
Meaningful	
  Use	
  and	
  Core	
  Requirement	
  15	
  

  Meaningful Use – Protection of Protected Health Information

  So you acquired an (EHR) platform and you want to attest and receive
  a Government Payment
                          great news, but ……
  There are 15 Core Requirements that you need to comply with. One has
  nothing to do with your EHR system, is the protection of protected health
  information you are storing.

  CMS is requiring that you perform and comply with the Security Standards
  of HIPAA, specifically 164.308. HIPAA is over 10 years old and some have
  still not complied with the regulations for Privacy or Security, at last check
  CMS estimates upwards of 80 percent.

                                www.compliancygroup.com	
                  2	
  
Meaningful	
  Use	
  and	
  Core	
  Requirement	
  15	
  

When saying yes to the attestation part for number 15 you must have performed
and tracked the following:
• Security Management Process
The first standard under Administrative Safeguards section is the Security Management Process. This standard
requires covered entities to:

“Implement Policies and Procedures to prevent, detect, contain and correct security violations.”	
  

The purpose of this standard is to establish the administrative processes and procedures that a covered entity will
use to implement the security program in its environment. There are four implementation specifications in the
Security Management Process standard.

1. Risk Analysis (Required)
2. Risk Management (Required)
3. Sanction Policy (Required)
4. Information System Activity Review (Required)


                                               www.compliancygroup.com	
                                   3	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

1. RISK ANALYSIS - § 164.308(a)(1)(ii)(A)

The Risk Analysis implementation specification requires covered entities to:

“Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the
  confidentiality, integrity, and availability of electronic protected health information held by
  the covered entity.”	
  

In general, a risk analysis can be viewed as:

The process of identifying potential security risks, and determining the probability of occurrence
  and magnitude of risks.




                                         www.compliancygroup.com	
                          4	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
2. RISK MANAGEMENT - § 164.308(a)(1)(ii)(B)

Risk Management is a required implementation specification. It requires an
  organization to make decisions about how to address security risks and
  vulnerabilities. The Risk Management implementation specification states that
  covered entities must:

“Implement security measures sufficient to reduce risks and vulnerabilities to a
  reasonable and appropriate level”	
  

Risk management is the process used to identify and implement security measures to
  reduce risk to a reasonable and appropriate level within the covered entity based on
  the covered entity’s circumstances.



                                     www.compliancygroup.com	
                     5	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

3.  SANCTION POLICY - § 164.308(a)(1)(ii)(C)

Another implementation specification in the Security Management Process is
the Sanction Policy. It requires covered entities to:

“Apply appropriate sanctions against workforce members who fail to comply
with the security Policies and Procedures of the covered entity.”	
  

Appropriate sanctions must be in place so that workforce members understand
the consequences of failing to comply with security policies and procedures, to
deter noncompliance.


                                 www.compliancygroup.com	
                6	
  
Manually	
  	
  you	
  will	
  need	
  
          	
  (and	
  this	
  is	
  just	
  the	
  short	
  list):	
  

4. INFORMATION SYSTEM ACTIVITY REVIEW - § 164.308(a)(1)(ii)(D)

The Security Management Process standard also includes the Information System Activity Review
implementation specification. This required implementation specification states that covered
entities must:

“Implement Policies and Procedures to regularly review records of information system activity,
such as audit logs, access reports, and security incident tracking reports.”	
  

The information system activity review enables covered entities to determine if any EPHI is used
or disclosed in an inappropriate manner. Information system activity review procedures may be
different for each covered entity. The procedure should be customized to meet the covered entity’s
risk management strategy and take into account the capabilities of all information systems with
EPHI.



                                         www.compliancygroup.com	
                          7	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
Excel Spreadsheets to track:

•  Policies	
  and	
  Procedures	
  	
  
          •  Along	
  with	
  all	
  of	
  your	
  updates	
  to	
  the	
  each	
  one.	
  
•  	
  Training	
  for	
  each	
  employee	
  	
  
          •  When	
  their	
  refresher	
  has	
  occurred.	
  
•  Security	
  Audits	
  	
  
          •  State	
  the	
  regulation	
  
          •  The	
  	
  gap	
  steps	
  you	
  took	
  to	
  remediate	
  them.	
  
•  Your	
  incidents	
  
          •  How	
  you	
  investigated	
  	
  
          •  How	
  you	
  resolved	
  them.	
  
•  Each	
  vendor	
  you	
  share	
  PHI	
  with	
  
          •  How	
  you	
  determined	
  them	
  to	
  be	
  compliant	
  

                                                    www.compliancygroup.com	
                 8	
  
The	
  Guard	
  –	
  Compliance	
  made	
  easy	
  




                    www.compliancygroup.com	
     9	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
Assigned Security Responsibility

The second standard in the Administrative Safeguards section is Assigned Security
Responsibility. There are no separate implementation specifications for this standard. The
standard requires that covered entities:
“Identify the security official who is responsible for the development and implementation of
the Policies and Procedures required for the entity.”	
  
The purpose of this standard is to identify who will be operationally responsible for assuring that
the covered entity complies with the Security Rule. Covered entities should be aware of the
following when assigning security responsibility:
The Security Official and Privacy Official can be the same person, but are not required to be.
While one individual must be designated as having overall responsibility, other individuals in the
covered entity may be assigned specific security responsibilities (e.g., facility security or
network security).


                                           www.compliancygroup.com	
                           10	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
Workforce Security

The third standard is Workforce Security, which states that covered entities must:
“Implement Policies and Procedures to ensure that all members of its workforce have appropriate
access to electronic protected health information”	
  
Within a covered entity’s environment, workforce members that need access to EPHI to carry out
their duties must be identified. For each workforce member, or job function, the covered entity must
identify the EPHI that is needed, when it is needed, and make reasonable efforts to control access to
the EPHI. This will also include identification of the computer systems and applications that provide
access to the EPHI. Covered entities must provide only the minimum necessary access to EPHI that
is required for a workforce member to do his or her job.

Within Workforce Security there are three implementation specifications.
A. Authorization and/or Supervision
B. Workforce Clearance Procedure
C. Termination Procedures
                                           www.compliancygroup.com	
                         11	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

AUTHORIZATION AND/OR SUPERVISION – § 164.308(a)(3)(ii)(A)
Where the Authorization and/or Supervision implementation specification is a reasonable and appropriate safeguard
for a covered entity, the covered entity must:
“Implement Policies and Procedures for the authorization and/or supervision of workforce members who work
with electronic protected health information or in locations where it might be accessed.”	
  
Authorization is the process of determining whether a particular user (or a computer system) has the right to carry
out a certain activity, such as reading a file or running a program. Implementation of this implementation
specification will vary among covered entities, depending upon the size and complexity of the workforce, and the
information systems that contain EPHI. For example, in a very small provider office, all staff members may need to
access all EPHI in their information system, since they may perform multiple functions. In this case, the covered
entity might document the reasons for implementing policies and procedures allowing this kind of global access. If
the documented rationale is reasonable and appropriate, this may be an acceptable approach.

To determine the most reasonable and appropriate authorization and/or supervision procedures, covered entities
may want to ask some basic questions about existing policies and procedures. Covered entities should review the
authorization and supervision policies already present in the organization’s current operating environment.
Depending on the existing policies, covered entities may need to reinforce them, make modifications for EPHI, and/
or develop corresponding documentation.

                                                 www.compliancygroup.com	
                                 12	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

WORKFORCE CLEARANCE PROCEDURES - § 164.308(a)(3)(ii)(B)

Covered entities need to address whether all members of the workforce with authorized
access to EPHI receive appropriate clearances. Where the Workforce Clearance
Procedure implementation specification is a reasonable and appropriate safeguard for a
covered entity, the covered entity must:
“Implement Policy and Procedures to determine that the access of a workforce
member to electronic protected health information is appropriate.”	
  
In other words, the clearance process must establish the procedures to verify that a
workforce member does in fact have the appropriate access for their job function. A
covered entity may choose to perform this type of screening procedure separate from or
as a part of the authorization and/or supervision procedure.


                                    www.compliancygroup.com	
                   13	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

TERMINATION PROCEDURES - § 164.308(a)(3)(ii)(C)

Where the Termination Procedures implementation specification is a reasonable and
appropriate safeguard for a covered entity, the covered entity must:

“Implement Policy and Procedures for terminating access to electronic protected
health information when the employment of a workforce member ends or as
required by determinations made.”	
  

Termination procedures must be implemented to remove access privileges when an
employee, contractor, or other individual previously entitled to access information no
longer has these privileges. Whether the employee leaves the organization
voluntarily or involuntarily, procedures to terminate access must be in place.


                                      www.compliancygroup.com	
                    14	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
Information Access Management
The fourth standard in the Administrative Safeguards section is Information Access Management. Covered
entities are required to:
“Implement Policies and Procedures for authorizing access to electronic protected health information that
are consistent with the applicable requirements”	
  
Restricting access to only those persons and entities with a need for access is a basic tenet of security. By
implementing this standard, the risk of inappropriate disclosure, alteration, or destruction of EPHI is
minimized. Covered entities must determine those persons and/or entities that need access to EPHI within their
environment.
Compliance with this standard should support a covered entity’s compliance with the HIPAA Privacy Rule
minimum necessary requirements, which requires covered entities to evaluate their practices and enhance
safeguards as needed to limit unnecessary or inappropriate access to and disclosure of protected health
information.
The Information Access Management standard has three implementation specifications.
A. Isolating Health Care Clearinghouse Functions
B. Access Authorization
C. Access Establishment and Modification

                                                 www.compliancygroup.com	
                                15	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

ISOLATING HEALTH CARE CLEARINGHOUSE FUNCTIONS -	
  164.308(a)(4)(ii)(A)
(May not be applicable)


The Isolating Health Care Clearinghouse Functions implementation specification states:
“If a health care clearinghouse is part of a larger organization, the clearinghouse must
implement policies and procedures that protect the electronic protected health information
of the clearinghouse from unauthorized access by the larger organization.”	
  
This implementation specification only applies in the situation where a health care
clearinghouse is part of a larger organization. In these situations, the health care
clearinghouse is responsible for protecting the EPHI that it is processing.




                                         www.compliancygroup.com	
                     16	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

ACCESS AUTHORIZATION - § 164.308(a)(4)(ii)(B)
Authorization is defined as the act of determining whether a particular user (or computer system)
has the right, based on job function or responsibilities, to carry out a certain activity, such as
reading a file or running a program. Where this implementation standard is a reasonable and
appropriate safeguard for a covered entity, the covered entity must:

“Implement Policies and Procedures for granting access to electronic protected health
information, for example, through access to a workstation, transaction, program, process, or
other mechanism.”

Once the covered entity has determined that the person or system is authorized, there are
numerous ways to grant access to EPHI. In general, a covered entity’s policies and procedures
must identify who has authority to grant access privileges. It must also state the process for
granting access. To create and document policies and procedures to grant access, covered entities
should address the following questions.


                                           www.compliancygroup.com	
                           17	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

ACCESS ESTABLISHMENT AND MODIFICATION - § 164.308(a)(4)(ii)(C)
Where the Access Establishment and Modification implementation specification is a
reasonable and appropriate safeguard for a covered entity, the covered entity must:
“Implement Policies and Procedures that, based upon the entity’s access authorization
policies, establish, document, review, and modify a user’s right of access to a
workstation, transaction, program, or process.”	
  
This means that a covered entity must implement and manage the creation and
modification of access privileges to workstations, transactions, programs or processes.
Covered entities must evaluate existing procedures, update them (if needed), and
document procedures as necessary.




                                      www.compliancygroup.com	
                    18	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
• Security Awareness and Training
Regardless of the Administrative Safeguards a covered entity implements, those safeguards will not protect the
EPHI if the workforce is unaware of its role in adhering to and enforcing them. Many security risks and
vulnerabilities within covered entities are internal. This is why the next standard, Security Awareness and
Training, is so important.
Specifically, the Security Awareness and Training standard states that covered entities must:
“Implement a security awareness and training program for all members of its workforce including
management).”	
  
Security training for all new and existing members of the covered entity’s workforce is required by the
compliance date of the Security Rule. In addition, periodic retraining should be given whenever environmental or
operational changes affect the security of EPHI. Changes may include: new or updated policies and procedures;
new or upgraded software or hardware; new security technology; or even changes in the Security Rule.
The Security Awareness and Training standard has four implementation specifications.
A. Security Reminders
B. Protection from Malicious Software
C. Log-in Monitoring
D. Password Management
                                                  www.compliancygroup.com	
                               19	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

• SECURITY REMINDERS - § 164.308(a)(5)(ii)(A)
Where this implementation specification is a reasonable and appropriate safeguard for a
covered entity, the covered entity must implement:
“Periodic security updates.”	
  
There are many types of security reminders that covered entities may choose to
implement. Examples might include notices in printed or electronic form, agenda items
and specific discussion topics at monthly meetings, focused reminders posted in affected
areas, as well as formal retraining on security policies and procedures. Covered entities
should look at how they currently remind the workforce of current policies and
procedures, and then decide whether these practices are reasonable and appropriate or if
other forms of security reminders are needed.



                                     www.compliancygroup.com	
                     20	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

PROTECTION FROM MALICIOUS SOFTWARE - § 164.308(a)(5)(ii)(B)
One important security measure that employees may need to be reminded of is security software that
is used to protect against malicious software. Where this implementation specification is a
reasonable and appropriate safeguard for a covered entity, the covered entity must implement:
“Policy	
  and	
  Procedures for guarding against, detecting, and reporting malicious software”	
  
Malicious software can be thought of as any program that harms information systems, such as
viruses, Trojan horses or worms. As a result of an unauthorized infiltration, EPHI and other data can
be damaged or destroyed, or at a minimum, require expensive and time-consuming repairs.
Malicious software is frequently brought into an organization through email attachments, and
programs that are downloaded from the Internet. Under the Security Awareness and Training
standard, the workforce must also be trained regarding its role in protecting against malicious
software, and system protection capabilities. It is important to note that training must be an ongoing
process for all organizations.



                                              www.compliancygroup.com	
                               21	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

LOG-IN MONITORING - § 164.308(a)(5)(ii)(C)
Security awareness and training should also address how users log onto systems and how they are supposed to
manage their passwords. Where the Log-in Monitoring implementation specification is a reasonable and
appropriate safeguard for a covered entity, the covered entity must implement:
“Policy	
  and	
  Procedures for monitoring log-in attempts and reporting discrepancies.”	
  
An inappropriate or attempted log-in is when someone enters multiple combinations of usernames and/or
passwords to attempt to access an information system. Once capabilities are established the workforce must be
made aware of how to use and monitor them.

• PASSWORD MANAGEMENT - § 164.308(a)(5)(ii)(D)
The last specification in this standard is Password Management. Where this implementation specification is a
reasonable and appropriate safeguard for a covered entity, the covered entity must implement:
“Policy	
  and	
  Procedures for creating, changing, and safeguarding passwords”
In addition to providing a password for access, entities must ensure that workforce members are trained on how to
safeguard the information. Covered entities must train all users and establish guidelines for creating passwords and
changing them during periodic change cycles.

                                                     www.compliancygroup.com	
                              22	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
Security Incident Procedures
The next standard is Security Incident Procedures, which states that covered entities must:

“Implement Policies and Procedures to address security incidents.”	
  

The purpose of this standard is to require covered entities to address security incidents
within their environment. Addressing security incidents is an integral part of the overall
security program. Implementing the Security Rule standards will reduce the type and
amount of security incidents a covered entity encounters, but security incidents will occur.
Even covered entities with detailed security policies and procedures and advanced
technology will have security incidents. The Security Rule defines a security incident as:

“The attempted or successful unauthorized access, use, disclosure, modification, or
destruction of information or interference with system operations in an information
system”	
  

                                      www.compliancygroup.com	
                     23	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

Security incident procedures must address how to identify security incidents and provide that the incident be
reported to the appropriate person or persons. Whether a specific action would be considered a security incident,
the specific process of documenting incidents, what information should be contained in the documentation, and
what the appropriate response should be will be dependent upon an entity’s environment and the information
involved. An entity should be able to rely upon the information gathered in complying with the other Security
Rule standards, for example, its risk assessment and risk management procedures and the privacy standards, to
determine what constitutes a security incident in the context of its business operations.

RESPONSE AND REPORTING - § 164.308(a)(6)(ii)
The Response and Reporting implementation specification states that covered entities must:
“Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful
effects of security incidents that are known to the covered entity; and document security incidents and their
outcomes.”	
  




                                               www.compliancygroup.com	
                                 24	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

RESPONSE AND REPORTING - § 164.308(a)(6)(ii) Continued
Security incident procedures must describe how workforce members are to respond to an incident. This may
include: preserving evidence; mitigating, to the extent possible, the situation that caused the incident;
documenting the incident and the outcome; and evaluating security incidents as part of ongoing risk
management. Covered entities must be aware of any number of possible incidents that they may have to deal
with. For example:

• Stolen or otherwise inappropriately obtained passwords that are used to access EPHI
• Corrupted backup tapes that do not allow restoration of EPHI
• Virus attacks that interfere with the operations of information systems with EPHI
• Physical break-ins leading to the theft of media with EPHI
• Failure to terminate the account of a former employee that is then used by an unauthorized user to access
information systems with EPHI
• Providing media with EPHI, such as a PC hard drive or laptop, to another user who is not authorized to access
the EPHI prior to removing the EPHI stored on the media.




                                               www.compliancygroup.com	
                                 25	
  
Meaningful	
  use	
  core	
  measure	
  15	
  
Contingency Plan
The purpose of contingency planning is to establish strategies for recovering access to EPHI should the
organization experience an emergency or other occurrence, such as a power outage and/or disruption of critical
business operations. The goal is to ensure that organizations have their EPHI available when it is needed. The
Contingency Plan standard requires that covered entities:

“Establish and implement as needed, Policies and Procedures for responding to an emergency or other
occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that
contain electronic protected health information”

The Contingency Plan standard includes five implementation specifications.

A. Data Backup Plan
B. Disaster Recovery Plan
C. Emergency Mode Operation Plan
D. Testing and Revision Procedures
E. Applications and Data Criticality Analysis




                                                www.compliancygroup.com	
                               26	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

DATA BACKUP PLAN - § 164.308(a)(7)(ii)(A)
The Data Backup Plan implementation specification requires covered entities to:
“Establish and implement Policy and Procedures to create and maintain retrievable exact copies of
electronic protected health information.”	
  
Most covered entities may have backup procedures as part of current business practices. Data Backup plans are
an important safeguard for all covered entities, and a required implementation specification.


DISASTER RECOVERY PLAN - § 164.308(a)(7)(ii)(B)
The Disaster Recovery Plan implementation specification requires covered entities to:
“Establish (and implement as needed) procedures to restore any loss of data”	
  
Some covered entities may already have a general disaster plan that meets this requirement; however, each
entity must review the current plan to ensure that it allows them to recover EPHI.




                                                www.compliancygroup.com	
                               27	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

EMERGENCY MODE OPERATION PLAN - § 164.308(a)(7)(ii)(C)
The Emergency Mode Operation Plan implementation specification requires covered entities
to:
“Establish and implement as needed, policy and procedures to enable continuation of
critical business processes for protection of the security of electronic protected health
information while operating in emergency mode”	
  
When a covered entity is operating in emergency mode due to a technical failure or power
outage, security processes to protect EPHI must be maintained.




                                          www.compliancygroup.com	
                         28	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

TESTING AND REVISION PROCEDURES - § 164.308(a)(7)(ii)(D)
Where the Testing and Revision Procedures implementation specification is a reasonable and
appropriate safeguard for the covered entity, the covered entity must:
“Implement Policy and Procedures for periodic testing and revision of contingency plans.”	
  
This standard applies to all implementation specifications under the Contingency Plan standard,
including the Data Backup Plan, Disaster Recovery Plan, and Emergency Mode Operations Plan.
Disaster recovery and emergency mode operations plans might be tested by using a scenario-
based walkthrough (to avoid daily operations impacts) or by performing complete live tests. The
comprehensiveness and sophistication of the testing and revision procedures depends on the
complexity of the covered entity’s organization and other factors such as size and costs. It is
expected that the frequency and comprehensiveness of the procedures will vary among covered
entities.



                                         www.compliancygroup.com	
                         29	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

APPLICATION AND DATA CRITICALITY ANALYSIS – § 164.308(a)(7)(ii)(E)
The last implementation specification in the Contingency Plan standard is Application and
Data Criticality Analysis. Where this implementation specification is a reasonable and
appropriate safeguard for the covered entity, the covered entity must:
“Assess the relative criticality of specific applications and data in support of other
contingency plan components.”	
  
This implementation specification requires covered entities to identify their software
applications that store, maintain or transmit EPHI and determine how important each is to
patient care or business needs, in order to prioritize for data backup, disaster recovery and/or
emergency operations plans. A prioritized list of specific applications and data will help
determine which applications or information systems get restored first and/or which must be
available at all times.




                                           www.compliancygroup.com	
                           30	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

Evaluation
It is important for a covered entity to know if the security plans and procedures it implements continue to
adequately protect its EPHI. To accomplish this, covered entities must implement ongoing monitoring and
evaluation plans. Covered entities must periodically evaluate their strategy and systems to ensure that the
security requirements continue to meet their organizations’ operating environments.

The purpose of the evaluation is to establish a process for covered entities to review and maintain reasonable
and appropriate security measures to comply with the Security Rule. Initially the evaluation must be based
on the security standards implemented to comply with the Security Rule.

Subsequent periodic evaluations must be performed in response to environmental or operational changes
that affect the security of EPHI. The on-going evaluation should also be performed on a scheduled basis,
such as annually or every two years. The evaluation must include reviews of the technical and non-technical
aspects of the security program.




                                                www.compliancygroup.com	
                                 31	
  
Meaningful	
  use	
  core	
  measure	
  15	
  

Conclusion:
Knowing that you must comply with these standards to say yes to the attestation for criteria 15 of
Meaningful Use, you have to say to yourself that is a lot of time and effort. How am I going to
track all that, where am I going to get all these policies, who has the time to do this. Compliancy
Group LLC and The Guard can help. Once you have studied this document and realize what is
needed, when you attend The Guard’s demo you will realize it can all be done from one repository
cost effectively with reduced effort.

For more information and to sign up for a demo of The Guard, go to www.compliancygroup.com.




                                          www.compliancygroup.com	
                          32	
  
Compliance	
  is	
  important	
  but	
  often	
  expensive…Until	
  Now	
  


The	
  Guard	
  Compliance	
  Tracking	
  Software	
  




                                 Full	
  access	
  annual	
  site	
  license:	
  $1200	
  
                                   To	
  find	
  out	
  more	
  or	
  start	
  a	
  FREE	
  30	
  Day	
  evaluation	
  
                                  visit	
  http://info.compliancygroup.com/webinardemo	
  
                                                 (931)	
  4	
  HIPAA	
  1	
  or	
  (931)	
  444-­‐7221	
  


                                                         www.compliancygroup.com	
                                       33	
  
Meaningful	
  use	
  core	
  measure	
  15	
  



Questions:

Thank you all for attending and have a great day……




                    www.compliancygroup.com	
        34	
  

Más contenido relacionado

La actualidad más candente

Hipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized ReportHipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized Reporttbeckwith
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisCharles McNeil
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in IndiaiFour Consultancy
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceLumension
 
ISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaiFour Consultancy
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityHelpSystems
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Marc-Andre Heroux
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 

La actualidad más candente (20)

Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Hipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized ReportHipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized Report
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in India
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Information security
Information securityInformation security
Information security
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
 
ISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in india
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i Security
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
Implementing security
Implementing securityImplementing security
Implementing security
 

Destacado

Group 5 sop version2
Group 5 sop version2Group 5 sop version2
Group 5 sop version2VanZandt52
 
Functional Chart Presentation
Functional Chart PresentationFunctional Chart Presentation
Functional Chart Presentationprobation
 
Guidance for Preparing Standard Operating Procedures (SOPs)
Guidance for Preparing Standard Operating Procedures (SOPs) Guidance for Preparing Standard Operating Procedures (SOPs)
Guidance for Preparing Standard Operating Procedures (SOPs) Cláudio Ferreira
 
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNALSTANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNALKARYA DHARMA JAYA
 
Standard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) OperationsStandard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) OperationsRonald Bartels
 
Store Operating Procedure for Store Manager
Store Operating Procedure for Store ManagerStore Operating Procedure for Store Manager
Store Operating Procedure for Store ManagerKundan Ganvir
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedureUMP
 
payroll process
payroll processpayroll process
payroll processonearbaein
 

Destacado (10)

Group 5 sop version2
Group 5 sop version2Group 5 sop version2
Group 5 sop version2
 
Functional Chart Presentation
Functional Chart PresentationFunctional Chart Presentation
Functional Chart Presentation
 
Cleaning standard-operating-procedures
Cleaning standard-operating-proceduresCleaning standard-operating-procedures
Cleaning standard-operating-procedures
 
Guidance for Preparing Standard Operating Procedures (SOPs)
Guidance for Preparing Standard Operating Procedures (SOPs) Guidance for Preparing Standard Operating Procedures (SOPs)
Guidance for Preparing Standard Operating Procedures (SOPs)
 
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNALSTANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
 
Standard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) OperationsStandard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) Operations
 
Store Operating Procedure for Store Manager
Store Operating Procedure for Store ManagerStore Operating Procedure for Store Manager
Store Operating Procedure for Store Manager
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedure
 
Sop
SopSop
Sop
 
payroll process
payroll processpayroll process
payroll process
 

Similar a Meaningful Use Core Measure 15 Webinar

Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxkenjordan97598
 
Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxbagotjesusa
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdfAliAhmed675993
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STakishaPeck109
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1sharing notes123
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseKaspersky
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfInfosectrain3
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 

Similar a Meaningful Use Core Measure 15 Webinar (20)

Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docx
 
Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docx
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdf
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended Use
 
Test2
Test2Test2
Test2
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Internal control system
Internal control systemInternal control system
Internal control system
 

Más de Compliancy Group

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...Compliancy Group
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016Compliancy Group
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud Compliancy Group
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Compliancy Group
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Compliancy Group
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...Compliancy Group
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsCompliancy Group
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practiceCompliancy Group
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...Compliancy Group
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA AuditCompliancy Group
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...Compliancy Group
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...Compliancy Group
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceCompliancy Group
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDCompliancy Group
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityCompliancy Group
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Compliancy Group
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingCompliancy Group
 

Más de Compliancy Group (20)

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 audits
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practice
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA Audit
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
 
Meaningful Use vs HIPAA
Meaningful Use vs HIPAAMeaningful Use vs HIPAA
Meaningful Use vs HIPAA
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA Compliance
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperability
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for Auditing
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Meaningful Use Core Measure 15 Webinar

  • 1.         Meaningful  Use  and  Core  Requirement  15     How    can  I  possibly   comply  with  this   part  of  Meaningful   Use  with  the  lack  of   time  and  staff....   www.compliancygroup.com   1  
  • 2. Meaningful  Use  and  Core  Requirement  15   Meaningful Use – Protection of Protected Health Information So you acquired an (EHR) platform and you want to attest and receive a Government Payment great news, but …… There are 15 Core Requirements that you need to comply with. One has nothing to do with your EHR system, is the protection of protected health information you are storing. CMS is requiring that you perform and comply with the Security Standards of HIPAA, specifically 164.308. HIPAA is over 10 years old and some have still not complied with the regulations for Privacy or Security, at last check CMS estimates upwards of 80 percent. www.compliancygroup.com   2  
  • 3. Meaningful  Use  and  Core  Requirement  15   When saying yes to the attestation part for number 15 you must have performed and tracked the following: • Security Management Process The first standard under Administrative Safeguards section is the Security Management Process. This standard requires covered entities to: “Implement Policies and Procedures to prevent, detect, contain and correct security violations.”   The purpose of this standard is to establish the administrative processes and procedures that a covered entity will use to implement the security program in its environment. There are four implementation specifications in the Security Management Process standard. 1. Risk Analysis (Required) 2. Risk Management (Required) 3. Sanction Policy (Required) 4. Information System Activity Review (Required) www.compliancygroup.com   3  
  • 4. Meaningful  use  core  measure  15   1. RISK ANALYSIS - § 164.308(a)(1)(ii)(A) The Risk Analysis implementation specification requires covered entities to: “Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.”   In general, a risk analysis can be viewed as: The process of identifying potential security risks, and determining the probability of occurrence and magnitude of risks. www.compliancygroup.com   4  
  • 5. Meaningful  use  core  measure  15   2. RISK MANAGEMENT - § 164.308(a)(1)(ii)(B) Risk Management is a required implementation specification. It requires an organization to make decisions about how to address security risks and vulnerabilities. The Risk Management implementation specification states that covered entities must: “Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level”   Risk management is the process used to identify and implement security measures to reduce risk to a reasonable and appropriate level within the covered entity based on the covered entity’s circumstances. www.compliancygroup.com   5  
  • 6. Meaningful  use  core  measure  15   3.  SANCTION POLICY - § 164.308(a)(1)(ii)(C) Another implementation specification in the Security Management Process is the Sanction Policy. It requires covered entities to: “Apply appropriate sanctions against workforce members who fail to comply with the security Policies and Procedures of the covered entity.”   Appropriate sanctions must be in place so that workforce members understand the consequences of failing to comply with security policies and procedures, to deter noncompliance. www.compliancygroup.com   6  
  • 7. Manually    you  will  need    (and  this  is  just  the  short  list):   4. INFORMATION SYSTEM ACTIVITY REVIEW - § 164.308(a)(1)(ii)(D) The Security Management Process standard also includes the Information System Activity Review implementation specification. This required implementation specification states that covered entities must: “Implement Policies and Procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.”   The information system activity review enables covered entities to determine if any EPHI is used or disclosed in an inappropriate manner. Information system activity review procedures may be different for each covered entity. The procedure should be customized to meet the covered entity’s risk management strategy and take into account the capabilities of all information systems with EPHI. www.compliancygroup.com   7  
  • 8. Meaningful  use  core  measure  15   Excel Spreadsheets to track: •  Policies  and  Procedures     •  Along  with  all  of  your  updates  to  the  each  one.   •   Training  for  each  employee     •  When  their  refresher  has  occurred.   •  Security  Audits     •  State  the  regulation   •  The    gap  steps  you  took  to  remediate  them.   •  Your  incidents   •  How  you  investigated     •  How  you  resolved  them.   •  Each  vendor  you  share  PHI  with   •  How  you  determined  them  to  be  compliant   www.compliancygroup.com   8  
  • 9. The  Guard  –  Compliance  made  easy   www.compliancygroup.com   9  
  • 10. Meaningful  use  core  measure  15   Assigned Security Responsibility The second standard in the Administrative Safeguards section is Assigned Security Responsibility. There are no separate implementation specifications for this standard. The standard requires that covered entities: “Identify the security official who is responsible for the development and implementation of the Policies and Procedures required for the entity.”   The purpose of this standard is to identify who will be operationally responsible for assuring that the covered entity complies with the Security Rule. Covered entities should be aware of the following when assigning security responsibility: The Security Official and Privacy Official can be the same person, but are not required to be. While one individual must be designated as having overall responsibility, other individuals in the covered entity may be assigned specific security responsibilities (e.g., facility security or network security). www.compliancygroup.com   10  
  • 11. Meaningful  use  core  measure  15   Workforce Security The third standard is Workforce Security, which states that covered entities must: “Implement Policies and Procedures to ensure that all members of its workforce have appropriate access to electronic protected health information”   Within a covered entity’s environment, workforce members that need access to EPHI to carry out their duties must be identified. For each workforce member, or job function, the covered entity must identify the EPHI that is needed, when it is needed, and make reasonable efforts to control access to the EPHI. This will also include identification of the computer systems and applications that provide access to the EPHI. Covered entities must provide only the minimum necessary access to EPHI that is required for a workforce member to do his or her job. Within Workforce Security there are three implementation specifications. A. Authorization and/or Supervision B. Workforce Clearance Procedure C. Termination Procedures www.compliancygroup.com   11  
  • 12. Meaningful  use  core  measure  15   AUTHORIZATION AND/OR SUPERVISION – § 164.308(a)(3)(ii)(A) Where the Authorization and/or Supervision implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must: “Implement Policies and Procedures for the authorization and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessed.”   Authorization is the process of determining whether a particular user (or a computer system) has the right to carry out a certain activity, such as reading a file or running a program. Implementation of this implementation specification will vary among covered entities, depending upon the size and complexity of the workforce, and the information systems that contain EPHI. For example, in a very small provider office, all staff members may need to access all EPHI in their information system, since they may perform multiple functions. In this case, the covered entity might document the reasons for implementing policies and procedures allowing this kind of global access. If the documented rationale is reasonable and appropriate, this may be an acceptable approach. To determine the most reasonable and appropriate authorization and/or supervision procedures, covered entities may want to ask some basic questions about existing policies and procedures. Covered entities should review the authorization and supervision policies already present in the organization’s current operating environment. Depending on the existing policies, covered entities may need to reinforce them, make modifications for EPHI, and/ or develop corresponding documentation. www.compliancygroup.com   12  
  • 13. Meaningful  use  core  measure  15   WORKFORCE CLEARANCE PROCEDURES - § 164.308(a)(3)(ii)(B) Covered entities need to address whether all members of the workforce with authorized access to EPHI receive appropriate clearances. Where the Workforce Clearance Procedure implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must: “Implement Policy and Procedures to determine that the access of a workforce member to electronic protected health information is appropriate.”   In other words, the clearance process must establish the procedures to verify that a workforce member does in fact have the appropriate access for their job function. A covered entity may choose to perform this type of screening procedure separate from or as a part of the authorization and/or supervision procedure. www.compliancygroup.com   13  
  • 14. Meaningful  use  core  measure  15   TERMINATION PROCEDURES - § 164.308(a)(3)(ii)(C) Where the Termination Procedures implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must: “Implement Policy and Procedures for terminating access to electronic protected health information when the employment of a workforce member ends or as required by determinations made.”   Termination procedures must be implemented to remove access privileges when an employee, contractor, or other individual previously entitled to access information no longer has these privileges. Whether the employee leaves the organization voluntarily or involuntarily, procedures to terminate access must be in place. www.compliancygroup.com   14  
  • 15. Meaningful  use  core  measure  15   Information Access Management The fourth standard in the Administrative Safeguards section is Information Access Management. Covered entities are required to: “Implement Policies and Procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements”   Restricting access to only those persons and entities with a need for access is a basic tenet of security. By implementing this standard, the risk of inappropriate disclosure, alteration, or destruction of EPHI is minimized. Covered entities must determine those persons and/or entities that need access to EPHI within their environment. Compliance with this standard should support a covered entity’s compliance with the HIPAA Privacy Rule minimum necessary requirements, which requires covered entities to evaluate their practices and enhance safeguards as needed to limit unnecessary or inappropriate access to and disclosure of protected health information. The Information Access Management standard has three implementation specifications. A. Isolating Health Care Clearinghouse Functions B. Access Authorization C. Access Establishment and Modification www.compliancygroup.com   15  
  • 16. Meaningful  use  core  measure  15   ISOLATING HEALTH CARE CLEARINGHOUSE FUNCTIONS -  164.308(a)(4)(ii)(A) (May not be applicable) The Isolating Health Care Clearinghouse Functions implementation specification states: “If a health care clearinghouse is part of a larger organization, the clearinghouse must implement policies and procedures that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization.”   This implementation specification only applies in the situation where a health care clearinghouse is part of a larger organization. In these situations, the health care clearinghouse is responsible for protecting the EPHI that it is processing. www.compliancygroup.com   16  
  • 17. Meaningful  use  core  measure  15   ACCESS AUTHORIZATION - § 164.308(a)(4)(ii)(B) Authorization is defined as the act of determining whether a particular user (or computer system) has the right, based on job function or responsibilities, to carry out a certain activity, such as reading a file or running a program. Where this implementation standard is a reasonable and appropriate safeguard for a covered entity, the covered entity must: “Implement Policies and Procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism.” Once the covered entity has determined that the person or system is authorized, there are numerous ways to grant access to EPHI. In general, a covered entity’s policies and procedures must identify who has authority to grant access privileges. It must also state the process for granting access. To create and document policies and procedures to grant access, covered entities should address the following questions. www.compliancygroup.com   17  
  • 18. Meaningful  use  core  measure  15   ACCESS ESTABLISHMENT AND MODIFICATION - § 164.308(a)(4)(ii)(C) Where the Access Establishment and Modification implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must: “Implement Policies and Procedures that, based upon the entity’s access authorization policies, establish, document, review, and modify a user’s right of access to a workstation, transaction, program, or process.”   This means that a covered entity must implement and manage the creation and modification of access privileges to workstations, transactions, programs or processes. Covered entities must evaluate existing procedures, update them (if needed), and document procedures as necessary. www.compliancygroup.com   18  
  • 19. Meaningful  use  core  measure  15   • Security Awareness and Training Regardless of the Administrative Safeguards a covered entity implements, those safeguards will not protect the EPHI if the workforce is unaware of its role in adhering to and enforcing them. Many security risks and vulnerabilities within covered entities are internal. This is why the next standard, Security Awareness and Training, is so important. Specifically, the Security Awareness and Training standard states that covered entities must: “Implement a security awareness and training program for all members of its workforce including management).”   Security training for all new and existing members of the covered entity’s workforce is required by the compliance date of the Security Rule. In addition, periodic retraining should be given whenever environmental or operational changes affect the security of EPHI. Changes may include: new or updated policies and procedures; new or upgraded software or hardware; new security technology; or even changes in the Security Rule. The Security Awareness and Training standard has four implementation specifications. A. Security Reminders B. Protection from Malicious Software C. Log-in Monitoring D. Password Management www.compliancygroup.com   19  
  • 20. Meaningful  use  core  measure  15   • SECURITY REMINDERS - § 164.308(a)(5)(ii)(A) Where this implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must implement: “Periodic security updates.”   There are many types of security reminders that covered entities may choose to implement. Examples might include notices in printed or electronic form, agenda items and specific discussion topics at monthly meetings, focused reminders posted in affected areas, as well as formal retraining on security policies and procedures. Covered entities should look at how they currently remind the workforce of current policies and procedures, and then decide whether these practices are reasonable and appropriate or if other forms of security reminders are needed. www.compliancygroup.com   20  
  • 21. Meaningful  use  core  measure  15   PROTECTION FROM MALICIOUS SOFTWARE - § 164.308(a)(5)(ii)(B) One important security measure that employees may need to be reminded of is security software that is used to protect against malicious software. Where this implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must implement: “Policy  and  Procedures for guarding against, detecting, and reporting malicious software”   Malicious software can be thought of as any program that harms information systems, such as viruses, Trojan horses or worms. As a result of an unauthorized infiltration, EPHI and other data can be damaged or destroyed, or at a minimum, require expensive and time-consuming repairs. Malicious software is frequently brought into an organization through email attachments, and programs that are downloaded from the Internet. Under the Security Awareness and Training standard, the workforce must also be trained regarding its role in protecting against malicious software, and system protection capabilities. It is important to note that training must be an ongoing process for all organizations. www.compliancygroup.com   21  
  • 22. Meaningful  use  core  measure  15   LOG-IN MONITORING - § 164.308(a)(5)(ii)(C) Security awareness and training should also address how users log onto systems and how they are supposed to manage their passwords. Where the Log-in Monitoring implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must implement: “Policy  and  Procedures for monitoring log-in attempts and reporting discrepancies.”   An inappropriate or attempted log-in is when someone enters multiple combinations of usernames and/or passwords to attempt to access an information system. Once capabilities are established the workforce must be made aware of how to use and monitor them. • PASSWORD MANAGEMENT - § 164.308(a)(5)(ii)(D) The last specification in this standard is Password Management. Where this implementation specification is a reasonable and appropriate safeguard for a covered entity, the covered entity must implement: “Policy  and  Procedures for creating, changing, and safeguarding passwords” In addition to providing a password for access, entities must ensure that workforce members are trained on how to safeguard the information. Covered entities must train all users and establish guidelines for creating passwords and changing them during periodic change cycles. www.compliancygroup.com   22  
  • 23. Meaningful  use  core  measure  15   Security Incident Procedures The next standard is Security Incident Procedures, which states that covered entities must: “Implement Policies and Procedures to address security incidents.”   The purpose of this standard is to require covered entities to address security incidents within their environment. Addressing security incidents is an integral part of the overall security program. Implementing the Security Rule standards will reduce the type and amount of security incidents a covered entity encounters, but security incidents will occur. Even covered entities with detailed security policies and procedures and advanced technology will have security incidents. The Security Rule defines a security incident as: “The attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system”   www.compliancygroup.com   23  
  • 24. Meaningful  use  core  measure  15   Security incident procedures must address how to identify security incidents and provide that the incident be reported to the appropriate person or persons. Whether a specific action would be considered a security incident, the specific process of documenting incidents, what information should be contained in the documentation, and what the appropriate response should be will be dependent upon an entity’s environment and the information involved. An entity should be able to rely upon the information gathered in complying with the other Security Rule standards, for example, its risk assessment and risk management procedures and the privacy standards, to determine what constitutes a security incident in the context of its business operations. RESPONSE AND REPORTING - § 164.308(a)(6)(ii) The Response and Reporting implementation specification states that covered entities must: “Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes.”   www.compliancygroup.com   24  
  • 25. Meaningful  use  core  measure  15   RESPONSE AND REPORTING - § 164.308(a)(6)(ii) Continued Security incident procedures must describe how workforce members are to respond to an incident. This may include: preserving evidence; mitigating, to the extent possible, the situation that caused the incident; documenting the incident and the outcome; and evaluating security incidents as part of ongoing risk management. Covered entities must be aware of any number of possible incidents that they may have to deal with. For example: • Stolen or otherwise inappropriately obtained passwords that are used to access EPHI • Corrupted backup tapes that do not allow restoration of EPHI • Virus attacks that interfere with the operations of information systems with EPHI • Physical break-ins leading to the theft of media with EPHI • Failure to terminate the account of a former employee that is then used by an unauthorized user to access information systems with EPHI • Providing media with EPHI, such as a PC hard drive or laptop, to another user who is not authorized to access the EPHI prior to removing the EPHI stored on the media. www.compliancygroup.com   25  
  • 26. Meaningful  use  core  measure  15   Contingency Plan The purpose of contingency planning is to establish strategies for recovering access to EPHI should the organization experience an emergency or other occurrence, such as a power outage and/or disruption of critical business operations. The goal is to ensure that organizations have their EPHI available when it is needed. The Contingency Plan standard requires that covered entities: “Establish and implement as needed, Policies and Procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information” The Contingency Plan standard includes five implementation specifications. A. Data Backup Plan B. Disaster Recovery Plan C. Emergency Mode Operation Plan D. Testing and Revision Procedures E. Applications and Data Criticality Analysis www.compliancygroup.com   26  
  • 27. Meaningful  use  core  measure  15   DATA BACKUP PLAN - § 164.308(a)(7)(ii)(A) The Data Backup Plan implementation specification requires covered entities to: “Establish and implement Policy and Procedures to create and maintain retrievable exact copies of electronic protected health information.”   Most covered entities may have backup procedures as part of current business practices. Data Backup plans are an important safeguard for all covered entities, and a required implementation specification. DISASTER RECOVERY PLAN - § 164.308(a)(7)(ii)(B) The Disaster Recovery Plan implementation specification requires covered entities to: “Establish (and implement as needed) procedures to restore any loss of data”   Some covered entities may already have a general disaster plan that meets this requirement; however, each entity must review the current plan to ensure that it allows them to recover EPHI. www.compliancygroup.com   27  
  • 28. Meaningful  use  core  measure  15   EMERGENCY MODE OPERATION PLAN - § 164.308(a)(7)(ii)(C) The Emergency Mode Operation Plan implementation specification requires covered entities to: “Establish and implement as needed, policy and procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode”   When a covered entity is operating in emergency mode due to a technical failure or power outage, security processes to protect EPHI must be maintained. www.compliancygroup.com   28  
  • 29. Meaningful  use  core  measure  15   TESTING AND REVISION PROCEDURES - § 164.308(a)(7)(ii)(D) Where the Testing and Revision Procedures implementation specification is a reasonable and appropriate safeguard for the covered entity, the covered entity must: “Implement Policy and Procedures for periodic testing and revision of contingency plans.”   This standard applies to all implementation specifications under the Contingency Plan standard, including the Data Backup Plan, Disaster Recovery Plan, and Emergency Mode Operations Plan. Disaster recovery and emergency mode operations plans might be tested by using a scenario- based walkthrough (to avoid daily operations impacts) or by performing complete live tests. The comprehensiveness and sophistication of the testing and revision procedures depends on the complexity of the covered entity’s organization and other factors such as size and costs. It is expected that the frequency and comprehensiveness of the procedures will vary among covered entities. www.compliancygroup.com   29  
  • 30. Meaningful  use  core  measure  15   APPLICATION AND DATA CRITICALITY ANALYSIS – § 164.308(a)(7)(ii)(E) The last implementation specification in the Contingency Plan standard is Application and Data Criticality Analysis. Where this implementation specification is a reasonable and appropriate safeguard for the covered entity, the covered entity must: “Assess the relative criticality of specific applications and data in support of other contingency plan components.”   This implementation specification requires covered entities to identify their software applications that store, maintain or transmit EPHI and determine how important each is to patient care or business needs, in order to prioritize for data backup, disaster recovery and/or emergency operations plans. A prioritized list of specific applications and data will help determine which applications or information systems get restored first and/or which must be available at all times. www.compliancygroup.com   30  
  • 31. Meaningful  use  core  measure  15   Evaluation It is important for a covered entity to know if the security plans and procedures it implements continue to adequately protect its EPHI. To accomplish this, covered entities must implement ongoing monitoring and evaluation plans. Covered entities must periodically evaluate their strategy and systems to ensure that the security requirements continue to meet their organizations’ operating environments. The purpose of the evaluation is to establish a process for covered entities to review and maintain reasonable and appropriate security measures to comply with the Security Rule. Initially the evaluation must be based on the security standards implemented to comply with the Security Rule. Subsequent periodic evaluations must be performed in response to environmental or operational changes that affect the security of EPHI. The on-going evaluation should also be performed on a scheduled basis, such as annually or every two years. The evaluation must include reviews of the technical and non-technical aspects of the security program. www.compliancygroup.com   31  
  • 32. Meaningful  use  core  measure  15   Conclusion: Knowing that you must comply with these standards to say yes to the attestation for criteria 15 of Meaningful Use, you have to say to yourself that is a lot of time and effort. How am I going to track all that, where am I going to get all these policies, who has the time to do this. Compliancy Group LLC and The Guard can help. Once you have studied this document and realize what is needed, when you attend The Guard’s demo you will realize it can all be done from one repository cost effectively with reduced effort. For more information and to sign up for a demo of The Guard, go to www.compliancygroup.com. www.compliancygroup.com   32  
  • 33. Compliance  is  important  but  often  expensive…Until  Now   The  Guard  Compliance  Tracking  Software   Full  access  annual  site  license:  $1200   To  find  out  more  or  start  a  FREE  30  Day  evaluation   visit  http://info.compliancygroup.com/webinardemo   (931)  4  HIPAA  1  or  (931)  444-­‐7221   www.compliancygroup.com   33  
  • 34. Meaningful  use  core  measure  15   Questions: Thank you all for attending and have a great day…… www.compliancygroup.com   34