SlideShare a Scribd company logo
1 of 15
18 March 2014
HIPAA Compliance 101: Part 1
A Brief History of Healthcare Regulation
Kurt Hagerman
Chief Information Security Officer
Today’s Speaker
Kurt Hagerman
Chief Information
Security Officer
Kurt Hagerman oversees all compliance
related and security initiatives. He is
responsible for leading FireHost in attaining
ISO, PCI, HIPAA and other certifications,
which allows FireHost customers to more
easily achieve their own compliance
requirements. He regularly speaks and
writes on information security topics in the
payments and healthcare spaces as well as
on cloud security.
HIPAA Compliance 101
Agenda
• The History of HIPAA
• Other Agency Oversight
• What Does It Mean to Be HIPAA Compliant?
• Security Rule
• Privacy Rule
• Breach Notification Rule
• HIPAA’s Impact on
Your Organization
• Getting Started
• Questions & Answers
HIPAA Compliance 101
The History of HIPAA
• HIPAA
• Created 1996
• Manifesto: no enforcement provisions
• HITECH
• Created 2009 as part of the Recovery
and Reinvestment Act
• Gave Office of Civil Rights (OCR)
ability to enforce, levy fines
• Omnibus Rule
• Created 2013
• Expanded and clarified
Business Associate (BA) role
• Addressed some of HITECH
audit findings
HIPAA Compliance 101
Other Agency Oversight
FDA
• Pharmaceuticals
• Medical devices, expanded
to include software
FTC
• Advertising Rules
• What you can and can’t say
• Communication do’s and don’ts
HIPAA Compliance 101
HIPAA Compliance: what it means
• No official HIPAA certification
• OCR has published audit protocols
• Organizations must understand:
• Security Rule
• Privacy Rule
• Breach Notification Rule
• Health Information Trust
Alliance (HITRUST)
• CSF Certification Program
HIPAA Compliance 101
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
Security Rule
Protects individuals’ electronic protected health information
(ePHI):
• Confidentiality
• Integrity
• Availability
• Protection against reasonably
anticipated threats
Requires appropriate safeguards:
• Administrative
• Physical
• Technical
HIPAA Compliance 101
Privacy Rule
Deals with the collection and use of
medical records and ePHI:
• Health plans, health care
clearinghouses, and health
care providers
• Defines rules for the collection
& use of patient data
• Sets limits and conditions on
data uses without patient
authorization
• Gives patients rights over
their information
HIPAA Compliance 101
Breach Notification Rule
If a breach occurs:
• Organizations and business
associates must notify:
• Impacted individual
• Media (in some cases)
• HHS Secretary
• Similar provisions enforced
by the FTC
HIPAA Compliance 101
Your entire organization is impacted
• HR, billing, finance, IT and IT security, customer service
• Records retention and policies
• Internal processes & procedures
• Don’t forget 3rd parties – called Business Associates (BA)
HIPAA & Its Impact on Your Organization
HIPAA Compliance 101
Overall security and compliance programs
• Compliance does not equal security
• Build a security program based on best practices and
assessment of risk in your organization
• Compliance should be considered a reporting function of your
security program
HIPAA Compliance 101
Bigger Picture
SECURITY
COMPLIANCE
• Find a consulting firm who can help you
understand how HIPAA impacts your business
• Learn about the requirements
• HSS: www.hhs.gov/
• OCR audit protocol:
www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol.
html
• External Resources
• www.hitrustalliance.net
• www.hipaacentral.com
Getting Started
HIPAA Compliance 101
April 1, 2014
HIPAA Compliance 101: Part 2
• Risk Assessment
• Building Your Security Programs to address HIPAA
• Business Associates and Covered entities
What’s next
HIPAA Compliance 101
&Answers
Questions
HIPAA Compliance 101
Thank You
Email
Phone
Kurt Hagerman
Chief Information Security Officer
kurt.hagerman@firehost.com
877 262 3473 x8073
HIPAA Compliance 101

More Related Content

What's hot

Week 1 privacy and security training
Week 1 privacy and security trainingWeek 1 privacy and security training
Week 1 privacy and security trainingSonja Davis
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Protecting patient privacy
Protecting patient privacyProtecting patient privacy
Protecting patient privacydlemin919
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurancemindleaftechnologies
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightScale
 
Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Samantha Haas
 
5 Documents to Prepare for a HIPAA Audit
5 Documents to Prepare for a HIPAA Audit5 Documents to Prepare for a HIPAA Audit
5 Documents to Prepare for a HIPAA AuditSecurityMetrics
 
HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Traininghimalya sharma
 
HIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_DraftHIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_DraftKevin Jenkins
 
HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Traininghimalya sharma
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 
Simple Steps to HIPAA Compliance
Simple Steps to HIPAA ComplianceSimple Steps to HIPAA Compliance
Simple Steps to HIPAA ComplianceAtMyDeskTraining
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceHostway|HOSTING
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations OnRamp
 
HIPAA: security risk analysis
HIPAA: security risk analysisHIPAA: security risk analysis
HIPAA: security risk analysisJoAnna Cheshire
 

What's hot (20)

Week 1 privacy and security training
Week 1 privacy and security trainingWeek 1 privacy and security training
Week 1 privacy and security training
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Protecting patient privacy
Protecting patient privacyProtecting patient privacy
Protecting patient privacy
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
 
Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Hipaa privacy and security 03192014
Hipaa privacy and security 03192014
 
5 Documents to Prepare for a HIPAA Audit
5 Documents to Prepare for a HIPAA Audit5 Documents to Prepare for a HIPAA Audit
5 Documents to Prepare for a HIPAA Audit
 
HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Training
 
HIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_DraftHIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_Draft
 
HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Training
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
Simple Steps to HIPAA Compliance
Simple Steps to HIPAA ComplianceSimple Steps to HIPAA Compliance
Simple Steps to HIPAA Compliance
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA Compliance
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
HIPAA: security risk analysis
HIPAA: security risk analysisHIPAA: security risk analysis
HIPAA: security risk analysis
 

Viewers also liked

how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECHrcabarloc
 
Assessment Of Mental Health
Assessment Of Mental HealthAssessment Of Mental Health
Assessment Of Mental HealthJade Sun
 
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers ApplicationsFirehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers ApplicationsArmor
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...Armor
 
Remembering Edgar Frank “Ted” Codd - Founder of Relational Databases
Remembering Edgar Frank “Ted” Codd - Founder of Relational DatabasesRemembering Edgar Frank “Ted” Codd - Founder of Relational Databases
Remembering Edgar Frank “Ted” Codd - Founder of Relational DatabasesBala Nagendra Betha
 
Cuestionario de tecnología e informática
Cuestionario de tecnología e informáticaCuestionario de tecnología e informática
Cuestionario de tecnología e informáticajuanitosexi
 
http://www.slideshare.net/upload
http://www.slideshare.net/uploadhttp://www.slideshare.net/upload
http://www.slideshare.net/uploadnatalia_rincon
 
Refracción de la luz
Refracción de la luzRefracción de la luz
Refracción de la luzkarenelis
 
1. towards open pedagogical practices
1. towards open pedagogical practices1. towards open pedagogical practices
1. towards open pedagogical practicesAngelica Risquez
 
League of legends.ppt.pptx.pptx (1) (1)
League of legends.ppt.pptx.pptx (1) (1)League of legends.ppt.pptx.pptx (1) (1)
League of legends.ppt.pptx.pptx (1) (1)DegoBot
 

Viewers also liked (20)

Will power
Will powerWill power
Will power
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
 
Assessment Of Mental Health
Assessment Of Mental HealthAssessment Of Mental Health
Assessment Of Mental Health
 
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers ApplicationsFirehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
 
Software
SoftwareSoftware
Software
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
 
Remembering Edgar Frank “Ted” Codd - Founder of Relational Databases
Remembering Edgar Frank “Ted” Codd - Founder of Relational DatabasesRemembering Edgar Frank “Ted” Codd - Founder of Relational Databases
Remembering Edgar Frank “Ted” Codd - Founder of Relational Databases
 
Cuestionario de tecnología e informática
Cuestionario de tecnología e informáticaCuestionario de tecnología e informática
Cuestionario de tecnología e informática
 
BienvenidosAlBlog
BienvenidosAlBlogBienvenidosAlBlog
BienvenidosAlBlog
 
http://www.slideshare.net/upload
http://www.slideshare.net/uploadhttp://www.slideshare.net/upload
http://www.slideshare.net/upload
 
Refracción de la luz
Refracción de la luzRefracción de la luz
Refracción de la luz
 
Maquina atomata123
Maquina atomata123Maquina atomata123
Maquina atomata123
 
Amor y amistad G.V
Amor y amistad G.VAmor y amistad G.V
Amor y amistad G.V
 
DIAPOSITIVAS
DIAPOSITIVASDIAPOSITIVAS
DIAPOSITIVAS
 
ResultStatement
ResultStatementResultStatement
ResultStatement
 
1. towards open pedagogical practices
1. towards open pedagogical practices1. towards open pedagogical practices
1. towards open pedagogical practices
 
League of legends.ppt.pptx.pptx (1) (1)
League of legends.ppt.pptx.pptx (1) (1)League of legends.ppt.pptx.pptx (1) (1)
League of legends.ppt.pptx.pptx (1) (1)
 
Razas de perros
Razas de perrosRazas de perros
Razas de perros
 
Lol
LolLol
Lol
 

Similar to Firehost Webinar: Hipaa Compliance 101 Part 1

Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational ImpactFirehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational ImpactArmor
 
Hipaa random audit
Hipaa random auditHipaa random audit
Hipaa random auditsupportc2go
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...Skoda Minotti
 
Hipaa audits and enforcement
Hipaa audits and enforcementHipaa audits and enforcement
Hipaa audits and enforcementsupportc2go
 
The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...CureMD
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit ImplementationValency Networks
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantCarbonite
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfSeasiaInfotech2
 
Importance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptxImportance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptxIT in DFW
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxMocDoc
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfOmniMD Healthcare
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAAManas Deep
 
Is your billing partner hipaa compliant
Is your billing partner hipaa compliantIs your billing partner hipaa compliant
Is your billing partner hipaa compliantjennyvergeese
 
The New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and ResponsibilituesThe New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and Responsibilituescomplianceexpert
 
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxBarbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxwilcockiris
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion Dan Wellisch
 

Similar to Firehost Webinar: Hipaa Compliance 101 Part 1 (20)

Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational ImpactFirehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
 
Hipaa random audit
Hipaa random auditHipaa random audit
Hipaa random audit
 
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
HIPAA Compliance: What Medical Practices and Their Business Associates Need t...
 
Hipaa audits and enforcement
Hipaa audits and enforcementHipaa audits and enforcement
Hipaa audits and enforcement
 
The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...The real reason why physicians must comply with HIPAA. What the government do...
The real reason why physicians must comply with HIPAA. What the government do...
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-Compliant
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdf
 
Importance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptxImportance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptx
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 
Is your billing partner hipaa compliant
Is your billing partner hipaa compliantIs your billing partner hipaa compliant
Is your billing partner hipaa compliant
 
The New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and ResponsibilituesThe New HIPAA: Rules and Responsibilitues
The New HIPAA: Rules and Responsibilitues
 
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxBarbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
 

More from Armor

The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Armor
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Armor
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the CloudArmor
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 
Keys To Better Data Security In the Cloud
Keys To Better Data Security In the CloudKeys To Better Data Security In the Cloud
Keys To Better Data Security In the CloudArmor
 
With FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & SecurityWith FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & SecurityArmor
 
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedFireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedArmor
 
FireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the CloudFireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the CloudArmor
 
Making Sense of Security and Compliance
Making Sense of Security and ComplianceMaking Sense of Security and Compliance
Making Sense of Security and ComplianceArmor
 
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentFirehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentArmor
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Armor
 
Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0Armor
 
Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant Armor
 
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityFireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityArmor
 
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster PreventionFireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster PreventionArmor
 
Cloud Computing Best Practices
Cloud Computing Best PracticesCloud Computing Best Practices
Cloud Computing Best PracticesArmor
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataArmor
 

More from Armor (19)

The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the Cloud
 
Ransomware
Ransomware Ransomware
Ransomware
 
Keys To Better Data Security In the Cloud
Keys To Better Data Security In the CloudKeys To Better Data Security In the Cloud
Keys To Better Data Security In the Cloud
 
With FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & SecurityWith FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & Security
 
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedFireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository Deconstructed
 
FireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the CloudFireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the Cloud
 
Making Sense of Security and Compliance
Making Sense of Security and ComplianceMaking Sense of Security and Compliance
Making Sense of Security and Compliance
 
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentFirehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data Envirnment
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is?
 
Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0
 
Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant
 
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityFireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent Security
 
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster PreventionFireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
 
Cloud Computing Best Practices
Cloud Computing Best PracticesCloud Computing Best Practices
Cloud Computing Best Practices
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Firehost Webinar: Hipaa Compliance 101 Part 1

  • 1. 18 March 2014 HIPAA Compliance 101: Part 1 A Brief History of Healthcare Regulation Kurt Hagerman Chief Information Security Officer
  • 2. Today’s Speaker Kurt Hagerman Chief Information Security Officer Kurt Hagerman oversees all compliance related and security initiatives. He is responsible for leading FireHost in attaining ISO, PCI, HIPAA and other certifications, which allows FireHost customers to more easily achieve their own compliance requirements. He regularly speaks and writes on information security topics in the payments and healthcare spaces as well as on cloud security. HIPAA Compliance 101
  • 3. Agenda • The History of HIPAA • Other Agency Oversight • What Does It Mean to Be HIPAA Compliant? • Security Rule • Privacy Rule • Breach Notification Rule • HIPAA’s Impact on Your Organization • Getting Started • Questions & Answers HIPAA Compliance 101
  • 4. The History of HIPAA • HIPAA • Created 1996 • Manifesto: no enforcement provisions • HITECH • Created 2009 as part of the Recovery and Reinvestment Act • Gave Office of Civil Rights (OCR) ability to enforce, levy fines • Omnibus Rule • Created 2013 • Expanded and clarified Business Associate (BA) role • Addressed some of HITECH audit findings HIPAA Compliance 101
  • 5. Other Agency Oversight FDA • Pharmaceuticals • Medical devices, expanded to include software FTC • Advertising Rules • What you can and can’t say • Communication do’s and don’ts HIPAA Compliance 101
  • 6. HIPAA Compliance: what it means • No official HIPAA certification • OCR has published audit protocols • Organizations must understand: • Security Rule • Privacy Rule • Breach Notification Rule • Health Information Trust Alliance (HITRUST) • CSF Certification Program HIPAA Compliance 101 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
  • 7. Security Rule Protects individuals’ electronic protected health information (ePHI): • Confidentiality • Integrity • Availability • Protection against reasonably anticipated threats Requires appropriate safeguards: • Administrative • Physical • Technical HIPAA Compliance 101
  • 8. Privacy Rule Deals with the collection and use of medical records and ePHI: • Health plans, health care clearinghouses, and health care providers • Defines rules for the collection & use of patient data • Sets limits and conditions on data uses without patient authorization • Gives patients rights over their information HIPAA Compliance 101
  • 9. Breach Notification Rule If a breach occurs: • Organizations and business associates must notify: • Impacted individual • Media (in some cases) • HHS Secretary • Similar provisions enforced by the FTC HIPAA Compliance 101
  • 10. Your entire organization is impacted • HR, billing, finance, IT and IT security, customer service • Records retention and policies • Internal processes & procedures • Don’t forget 3rd parties – called Business Associates (BA) HIPAA & Its Impact on Your Organization HIPAA Compliance 101
  • 11. Overall security and compliance programs • Compliance does not equal security • Build a security program based on best practices and assessment of risk in your organization • Compliance should be considered a reporting function of your security program HIPAA Compliance 101 Bigger Picture SECURITY COMPLIANCE
  • 12. • Find a consulting firm who can help you understand how HIPAA impacts your business • Learn about the requirements • HSS: www.hhs.gov/ • OCR audit protocol: www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol. html • External Resources • www.hitrustalliance.net • www.hipaacentral.com Getting Started HIPAA Compliance 101
  • 13. April 1, 2014 HIPAA Compliance 101: Part 2 • Risk Assessment • Building Your Security Programs to address HIPAA • Business Associates and Covered entities What’s next HIPAA Compliance 101
  • 15. Thank You Email Phone Kurt Hagerman Chief Information Security Officer kurt.hagerman@firehost.com 877 262 3473 x8073 HIPAA Compliance 101

Editor's Notes

  1. Chris: Hello and welcome to the first webinar in our series on HIPAA compliance. Today we’ll be talking about the history of healthcare regulation and what it means to be HIPAA compliant. We’ll leave some time at the end to take your questions, and you can also submit questions during the webinar through the chat feature. To mute your phone, <instructions>.
  2. Chris: I’m Will Morgan and I’ll be moderating our discussion. I’d like to introduce our speaker today, Kurt Hagerman, FireHost’s Chief Information Security Officer, who will lead today’s session on HIPAA compliance.
  3. Chris: Now let’s take a look at our agenda today. We’ll be talking about what it means to be compliant, the three main rules you’ll need to understand and HIPAA’s impact on your organization. Finally, we’ll have some time at the end to take your questions live.      
  4. Chris: Kurt, can you give us an overview of the history of HIPAA? Kurt:   Thanks, Will, and absolutely. The history of HIPAA will help everyone understand where we are today and how we got there.   HIPAA was created in August 1996 to protect the privacy of health and medical information. At first there was a lot of interest in it – but while there was a lot of wisdom there, there were no enforcement provisions and no agency oversight. HIPAA was more of a manifesto than anything. So it went ignored after an initial flurry of dialogue.   And that brings us to HITECH, which was created in 2009, as part of the Recovery and Reinvestment Act. It put an agency – the Office of Civil Rights - in charge of enforcing HIPAA and gave them the ability to levy fines. The OCR also began conducting audits.   Those audits turned up several findings, which led to the Omnibus Rule last year. It was enacted January 2013 and took effect September 2013. The Omnibus Rule tidied things up, and expanded and clarified some things, based on HITECH audit findings. It focused quite a bit on the role of business associates (BA.)    
  5. Chris: Kurt – you talked about OCR on the previous slide, but it looks like other agencies are involved. Can you talk to us about that? Kurt: It’s important to understand that while OCR controls HIPAA, other agencies have oversight too when it comes to healthcare data.   The FDA, for instance, obviously has some oversight over pharmaceuticals. But what many people don’t realize is that FDA also has oversight over medical devices – and that now has been expanded to include software. So when we’re talking about healthcare IT, we need to consider the FDA rules.   The FTC also gets involved because of advertising. They have rules on what you can and can’t say in marketing and communications and do’s and don’ts. For instance, they try to combat deceptive advertising and false claims.      
  6. Chris: That’s interesting and a good foundation. Let’s shift here and talk a little about what it actually means to be HIPAA compliant. Kurt: Right – this is what I call the nuts and bolts section.   First thing to know, there’s no official certification for HIPAA compliance. If you’ve worked with other compliance certifications, that might surprise you. But according to Leon Rodriguez of OCR, there won’t be an official certification. However, there are audit protocols from OCR. Let’s talk now about the three rules your organization must understand: the Security Rule, Privacy Rule and Breach Notification Rule.   The Security Rule sets national standards for the security of electronic protected health information The Breach Notification Rule requires covered entities and business associates to provide notification after a breach. The Patient Safety Rule protects any identifiable information being used to analyze patient safety events and improve patient safety.    It’s also important to understand HITRUST, particularly the CSF Certification Program.  
  7. Will: Excellent. Can we look a little deeper at those three rules you mentioned? What do we need to know about the Security Rule? Kurt: if you want to be compliant with HIPAA, you’ll need to follow the Security Rule. This was created to protect private healthcare data, such as medical records, test results, personal information – any kind of individual health data.   The rule states that you must protect the confidentiality of a person’s data, as well as its integrity and security. Obviously this is partly about protecting patient privacy, but also ensuring that the data stays accurate and free from breaches and reasonably anticipated threats.   It’s also important to note that this goes beyond just adopting technical security controls – you need to look at your administrative processes and physical devices as well to ensure the complete security. This could include something like a rule that paper medical files would need to be physically secure, and administrative processes that controlled access to sensitive data.  
  8. Chris: Great. What about the Privacy Rule? It must deal heavily with electronic protected health information, right? Kurt: Absolutely and it’s also an important rule. This rule protects medical records and other personal health information in a few ways – specifically it deals with the collection and use of those records and ePHI.   One is in regard to health plans, health care clearinghouses, and health care providers who transmit data electronically.   It also sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization.   Finally, the Privacy Rule gives patients rights over their health information, such as the rights to examine and obtain a copy of their health records, and to request corrections. I’m sure all of you are familiar with the forms you sign whenever you go to a doctor appointment – that’s because of the Privacy Rule.    
  9. Chris: And finally the Breach Notification Rule. That sounds pretty self explanatory. Kurt –The Breach Notification Rule is just what it sounds like. If your organization suffers a breach – or your business associate, your third-party provider, does – you must notify all impacted parties, the Secretary and sometimes the media.   There are very specific procedures to follow – for instance, you must notify through first-class mail or electronic mail, and you must include a working toll-free number to learn more about the breach for at least 90 days. You must also act “without unreasonable delay” and no later than 60 days following the discovery of a breach.   Even if your BA is the source of the breach, you are still ultimately responsible for ensuring notification. But you can delegate the notification to your BA, if that makes the most sense   If a breach affects more than 500 residents of a state or jurisdiction, you’re required to provide notice to prominent media outlets serving that area. Usually people do this with a press release. Again, this needs to happen without unreasonable delay and in no case later than 60 days following the discovery of a breach.   Your organization must also notify the Health and Human Services Secretary of any breaches. If it’s a breach affecting 500 or more people, you’ll need to notify within the same 60 day timeframe; but if it’s a smaller breach, an annual report is fine. You’ll submit your report electronically at the HHS site.   Please be aware this isn’t just HIPAA - the Federal Trade Commission (FTC) has similar policies, so you’ll need to take both HIPAA and the FTC into account if you have a breach.    
  10. Chris: That’s great info, Kurt. What I’m wondering and I’ll bet our attendees are, too, is how HIPAA impacts an organization and which parts of a healthcare organization are affected by all these rules? Kurt:   Most people wonder that and the answer is that all parts of your business are impacted by these rules.   Consider the Privacy rule, for instance. That impacts: HR, billing, finance, IT and IT security, customer service records rentention and policies Internal processes and procedures, like communication And don’t forget 3rd parties – called Business Associates. We’ll go over those in more detail in our next webinar.   In short, this is not just a legal issue or security issue – HIPAA compliance permeates your entire organization.
  11. Chris – Now, Kurt, I know you have some thoughts about how security and compliance programs work together. Can you talk to us about those?
  12. Will: So, there’s a lot of impact and a lot for healthcare IT organizations to do to get started. Where should they start? Kurt: If you’re new to HIPAA compliance, or if you’re in the midst of it and trying to get a grip on it, there are a few steps you can take.   First, find an experienced consulting firm who understands HIPAA and can work with you to determine what the impact will be on your organization.   Next, read up on online resources and learn about the requirements. Specifically I recommend: The HSS main website at hhs.gov The OCR audit protocols Then for external resources, we have : Hitrustalliance.net Hipaacentral.com – which has videos, webinars and other resources to walk you through all of the HIPAA elements.
  13. Kurt: Next month, we’ll have another webinar on HIPAA – this time we’ll go into more detail and talk about risk assessment and how to build your security programs to address HIPAA. We’ll also talk about your Business Associates and how to manage HIPAA compliance.   Chris, back to you.   .
  14. Will: Now that we’ve taken a look at the basics of HIPAA compliance, let’s hear your questions. If you have any questions of the Rules we’ve discussed, or how HIPAA could impact your organization, let us know and we’ll talk about the right actions to take. Just use the chat feature to submit your questions.
  15. Will: Thank you for joining us today. We hope our webinar on HIPAA was helpful and that we answered all of your questions. Within a day or so, you’ll receive a recording of this webinar in an email. To learn more, please visit us at firehost.com – and don’t forget to attend our next webinar on HIPAA Compliance Part 2, which will take place in April. We look forward to seeing you again.