SlideShare a Scribd company logo
1 of 22
www.complianzworld.com




New rules have finalized the Interim Final Rule
on HIPAA Breach Notification, but there has
been an important change in how to determine
whether or not a breach is reportable.
Old policies and processes must be replaced
with an updated process meeting the new rule’s
requirements no later than September 23, 2013.


HIPAA entities will need to follow the new rules
or risk substantial fines and penalties, including
multi-year corrective action plans.




HIPAA Breach Notification rules require
notification of individuals and HHS when
information security is breached, and the rules
for determining what to report have changed.
The HIPAA Breach Notification Rule required by
the HITECH Act within the American Recovery
and Reinvestment Act of 2009 requires all HIPAA
covered entities and business associates to
follow a number of steps to be in compliance.


If there is a breach of protected health
information that does not meet one of the
strictly defined exceptions or has greater than a
“low risk of compromise,” the breach must be
reported to the individual, and all such breaches
must be reported to the Secretary of the US
Department of Health and Human Services at
least annually.




There are additional steps to take if the breach
affects more than 500 individuals, including
media notices and immediate notification of
HHS.
For every potential breach of PHI, the entity will
have to determine if the information breached
meets an exception,


or perform a risk assessment considering what
the information was, who received it, whether it
was actually viewed, and whether or not it was
destroyed, and take action to notify the affected
individuals if there is greater than a “low
probability of compromise.”




Entities must adopt a breach notification policy
and procedures to ensure accurate reporting and
documentation of breaches, and must take steps
to protect information from breaches by using
encryption and proper disposal methods
meeting Federal standards.
Entities must follow the standards and
specifications of the HIPAA Security Rule to
protect information from breaches and




must negotiate new Business Associate
Agreements to include liability for breach
notification and requirements for timely
reporting to the entity.
On top of all this, the landscape of information
security threats and breaches is changing
dramatically, requiring new kinds of security
efforts and consistent application of old
safeguards to protect patient information.



What used to be "good enough" is no longer
sufficient to properly protect PHI.
The HIPAA Breach Notification Rule has been in
effect since September 23, 2009 and many
organizations are not prepared to respond to a
breach of PHI and report and document it
properly.




We will discuss the origins of the rule and how it
works, including interactions with other HIPAA
rules and penalties for violations.
HIPAA Covered Entities and Business Associates
need to know where and what information they
have, so they can know if there has been a
breach, and figure out how serious a breach may
be and whom to notify if there is a chance of
compromise.




Entities can avoid notification if information has
been encrypted according to Federal
standards. We’ll talk about what information
needs to be encrypted the most and how
entities are doing it.
We will cover the guidance from the US
Department of Health and Human Services that
shows how to encrypt so as to prevent the need
for notification in the event of lost data.




Online compliance Training & webinar on HIPAA
2 - What Needs to Change in Policies and
Procedures will discuss how to create the right
breach notification policy for your organization
and how to follow through when an incident
occurs.
In addition, a policy framework to help establish
good security practices is presented.




We will cover the essentials of information
security methods you can use to keep breaches
from happening, and be in compliance with the
HIPAA Security Rule as well. We'll also discuss
the new penalties for non-compliance, including
mandatory penalties for "wilful neglect" that
begin at $10,000.
We will help you understand what isn’t a breach
and under what circumstances you don’t have to
consider breach notification.


You’ll find out how to report the smaller
breaches (less than 500 individuals), as required,
within 60 days of the end of each year and you’ll
know why you want to avoid a breach involving
more than 500 individuals – media notices, Web
site notices, and immediate notification of HHS,
including posting on the HHS breach notification
“wall of shame” on the Web.
We will explain, based on historical analysis of
reported breaches, what measures must be
taken today to protect information from the
most common threats, as well as discuss
information security trends and explain what
kinds of efforts will need to be undertaken in the
future to protect the security of PHI.
 We will discuss the kinds of threats that exist for
PHI and how they're changing as the hackers
gain experience and abilities.

Breach Notification Laws
 State Breach Notification Laws
 Changes to HIPAA
 Federal Breach Notification Law and Regulation
 The Who, What, and How of Breach Notification
Preventing and Preparing for Breaches
 Using an Information Security Management
Process
 Using Risk Analysis and Risk Assessment
 Most Common Types of Breaches
 Information Security, Incident, and Breach
Notification Policies
 The Importance of Documentation
Enforcement and Audits
 New HIPAA Violation Categories and Penalties
 Preparing for HIPAA Audits
 Case Studies
Future Trends and New Threats to Prepare For
 History vs. the Future
 Why Attack Trends Are Changing
 Implications of New Directions in Attacks and
Targets













Compliance director
CEO
CFO
Privacy Officer
Security Officer
Information Systems Manager
HIPAA Officer
Chief Information Officer
Health Information Manager
Healthcare Counsel/lawyer
Office Manager
Contracts Manager
Thank you
Complianz World is a US based company, and a
leading GRC training provider has announced
to conduct
Webinar or Online Training on
HIPAA 2 - What Needs to Change in Policies and
Procedures

More Related Content

Viewers also liked

Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training Module
PHXONLINE
 
DocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360M
DocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360MDocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360M
DocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360M
DocSend
 

Viewers also liked (15)

Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentation
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training Module
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Corporate & Anti-fraud Culture
Corporate & Anti-fraud CultureCorporate & Anti-fraud Culture
Corporate & Anti-fraud Culture
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag Deodhar
 
DocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360M
DocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360MDocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360M
DocSend Fundraising Research: What we Learned from 200 Startups Who Raised $360M
 

Recently uploaded

PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
nhezmainit1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 

Webinar or Online Training on Hipaa 2 what needs to change in policies and procedures

  • 2.   New rules have finalized the Interim Final Rule on HIPAA Breach Notification, but there has been an important change in how to determine whether or not a breach is reportable. Old policies and processes must be replaced with an updated process meeting the new rule’s requirements no later than September 23, 2013.
  • 3.  HIPAA entities will need to follow the new rules or risk substantial fines and penalties, including multi-year corrective action plans.
  • 4.   HIPAA Breach Notification rules require notification of individuals and HHS when information security is breached, and the rules for determining what to report have changed. The HIPAA Breach Notification Rule required by the HITECH Act within the American Recovery and Reinvestment Act of 2009 requires all HIPAA covered entities and business associates to follow a number of steps to be in compliance.
  • 5.  If there is a breach of protected health information that does not meet one of the strictly defined exceptions or has greater than a “low risk of compromise,” the breach must be reported to the individual, and all such breaches must be reported to the Secretary of the US Department of Health and Human Services at least annually.
  • 6.   There are additional steps to take if the breach affects more than 500 individuals, including media notices and immediate notification of HHS. For every potential breach of PHI, the entity will have to determine if the information breached meets an exception,
  • 7.  or perform a risk assessment considering what the information was, who received it, whether it was actually viewed, and whether or not it was destroyed, and take action to notify the affected individuals if there is greater than a “low probability of compromise.”
  • 8.   Entities must adopt a breach notification policy and procedures to ensure accurate reporting and documentation of breaches, and must take steps to protect information from breaches by using encryption and proper disposal methods meeting Federal standards. Entities must follow the standards and specifications of the HIPAA Security Rule to protect information from breaches and
  • 9.   must negotiate new Business Associate Agreements to include liability for breach notification and requirements for timely reporting to the entity. On top of all this, the landscape of information security threats and breaches is changing dramatically, requiring new kinds of security efforts and consistent application of old safeguards to protect patient information.
  • 10.   What used to be "good enough" is no longer sufficient to properly protect PHI. The HIPAA Breach Notification Rule has been in effect since September 23, 2009 and many organizations are not prepared to respond to a breach of PHI and report and document it properly.
  • 11.   We will discuss the origins of the rule and how it works, including interactions with other HIPAA rules and penalties for violations. HIPAA Covered Entities and Business Associates need to know where and what information they have, so they can know if there has been a breach, and figure out how serious a breach may be and whom to notify if there is a chance of compromise.
  • 12.   Entities can avoid notification if information has been encrypted according to Federal standards. We’ll talk about what information needs to be encrypted the most and how entities are doing it. We will cover the guidance from the US Department of Health and Human Services that shows how to encrypt so as to prevent the need for notification in the event of lost data.
  • 13.   Online compliance Training & webinar on HIPAA 2 - What Needs to Change in Policies and Procedures will discuss how to create the right breach notification policy for your organization and how to follow through when an incident occurs. In addition, a policy framework to help establish good security practices is presented.
  • 14.   We will cover the essentials of information security methods you can use to keep breaches from happening, and be in compliance with the HIPAA Security Rule as well. We'll also discuss the new penalties for non-compliance, including mandatory penalties for "wilful neglect" that begin at $10,000. We will help you understand what isn’t a breach and under what circumstances you don’t have to consider breach notification.
  • 15.  You’ll find out how to report the smaller breaches (less than 500 individuals), as required, within 60 days of the end of each year and you’ll know why you want to avoid a breach involving more than 500 individuals – media notices, Web site notices, and immediate notification of HHS, including posting on the HHS breach notification “wall of shame” on the Web.
  • 16. We will explain, based on historical analysis of reported breaches, what measures must be taken today to protect information from the most common threats, as well as discuss information security trends and explain what kinds of efforts will need to be undertaken in the future to protect the security of PHI.  We will discuss the kinds of threats that exist for PHI and how they're changing as the hackers gain experience and abilities. 
  • 17. Breach Notification Laws  State Breach Notification Laws  Changes to HIPAA  Federal Breach Notification Law and Regulation  The Who, What, and How of Breach Notification
  • 18. Preventing and Preparing for Breaches  Using an Information Security Management Process  Using Risk Analysis and Risk Assessment  Most Common Types of Breaches  Information Security, Incident, and Breach Notification Policies  The Importance of Documentation
  • 19. Enforcement and Audits  New HIPAA Violation Categories and Penalties  Preparing for HIPAA Audits  Case Studies
  • 20. Future Trends and New Threats to Prepare For  History vs. the Future  Why Attack Trends Are Changing  Implications of New Directions in Attacks and Targets
  • 21.             Compliance director CEO CFO Privacy Officer Security Officer Information Systems Manager HIPAA Officer Chief Information Officer Health Information Manager Healthcare Counsel/lawyer Office Manager Contracts Manager
  • 22. Thank you Complianz World is a US based company, and a leading GRC training provider has announced to conduct Webinar or Online Training on HIPAA 2 - What Needs to Change in Policies and Procedures