SlideShare a Scribd company logo
www.shipmangoodwin.com @SGHealthLaw
Non-Business Associate Vendors
• Generally, a vendor is not a business associate if it does not receive, use,
disclose or maintain PHI.
• Examples:
IT vendor will have access to hospital information systems to install,
update or maintain malware protection.
Cleaning service with access to staff offices, medical record rooms or
other areas in which PHI may exist.
A software company which licenses a locally hosted program which
utilizes or processes PHI.
A consultant who is granted limited access to quality, compliance or
other internal reports which include only aggregate information.
1
www.shipmangoodwin.com @SGHealthLaw
Non-Business Associate Vendors
2
• Despite not being subject to HIPAA, your organization’s relationship with
a non-business associate vendor may entail significant risk for your
organization. Consider:
Data Access: What type of data will the vendor have access to? Even if
not PHI subject to HIPAA, confidentiality concerns may nevertheless
exist under state law or concerns with proprietary information.
Access to Premises: Will the vendor have access to your premises or
information systems? If so, would that access enable the vendor to
access PHI?
Incidental Use or Disclosure: Will the vendor have incidental use or
disclosure of PHI?
• Key Point: Don’t ignore a vendor simply because it’s not a business
associate!
www.shipmangoodwin.com @SGHealthLaw
Example of Non-BA Incident
• Community health center engages a local IT security firm to install patches. Parties
agree that vendor is not a business associate. While in the center’s information
system, a newly hired vendor employee stumbles upon locally maintained patient
and employee records. Bored, he starts reviewing the records and finds a former
classmate of his. He copies the records to a USB drive and emails the records to the
former classmate. Several weeks later, the former classmate contacts the state AG
and says “look what the health center gave [the employee] access to.”
• Vendor employee failed to appreciate the seriousness of the access (no privacy
training provided), was under no obligation to report the access to employer, and
Vendor had no obligation to notify, indemnify, reimburse or cooperate with the
center.
• Resulted in HIPAA and state law violations and an extensive corrective action plan.
3
www.shipmangoodwin.com @SGHealthLaw
3 Part Strategy for Non-Business
Associates
Organizational
Policies
Due Diligence
Confidentiality
Agreement
4
www.shipmangoodwin.com @SGHealthLaw
Organizational Policies
• Don’t limit your privacy and security policies to only HIPAA compliance –
while important, HIPAA is not the only privacy and security concern a
covered entity or business associate should have.
Proprietary information and trade secrets.
State privacy laws.
• Ensure that policies apply to all vendors, and not merely those subject to
HIPAA.
• Revisit policies regarding access to premises and information systems.
• Determine when your organization requires a non-business associate to
enter into a confidentiality agreement.
5
www.shipmangoodwin.com @SGHealthLaw
Due Diligence
• Consider implementing a vendor screening tool as part of your contracting
process.
Obtain privacy and security information and assurances from a
potential vendor prior to entering into negotiations.
Receive comfort that a vendor who will have access to your premises
or information systems is cognizant of privacy concerns, takes privacy
seriously and has a privacy and security plan in place.
Use vendor screening tool as a way to periodically monitor vendor and
remind vendor of privacy and security expectations (i.e. annual or bi-
annual re-certification).
Make privacy and security a factor when choosing vendors.
6
www.shipmangoodwin.com @SGHealthLaw
Confidentiality Agreements
• In many instances, a covered entity or business associate may desire to
require the vendor to agree to a confidentiality agreement or contract
clause.
• The extent and scope of such requirements should be based upon the risk to
the organization.
• Key Terms:
Commitment to confidentiality
Compliance with laws and policies
Incident reporting
Reimbursement
7
www.shipmangoodwin.com @SGHealthLaw
Logistics
• Three main options for binding a vendor to confidentiality requirements:
Compliance addendum;
Traditional NDA or confidentiality agreement; and/or
Preparing standard, organization-approved language to insert into
services or other agreements.
• Many organizations have developed all three and use them in different
situations.
Consider a confidentiality tool to guide business owners regarding
when to use which form/language.
• Don’t limit yourself to privacy and security – for example, the compliance
addendum is a great opportunity to address other pertinent issues such as
exclusions or Medicare access to records.
8
www.shipmangoodwin.com @SGHealthLaw
Confidentiality
• HIPAA: Acknowledge that vendor is not a business associate and require
vendor to enter into BAA should scope of services change or HIPAA
changes such that the vendor would be considered a business associate.
• Data Use Requirements:
Prohibit requesting or accessing data outside the scope of the
engagement.
Maintain information obtained through “incidental” use or disclosure in
strict confidence.
Do not use or disclose PHI for any purpose except to the extent
incidental use or disclosure of PHI is necessary in performance of the
services.
Do not maintain, copy or misappropriate any PHI.
9
www.shipmangoodwin.com @SGHealthLaw
Compliance
• Require vendor to comply with all applicable law, including state data
privacy and security laws.
• Require vendor to comply with all organizational policies and procedures
regarding access to information systems or premises, including:
User authentication;
Sharing of passwords;
Visitor sign-in/out and badge requirements; and
Remaining accompanied by organization personnel while on-site.
10
www.shipmangoodwin.com @SGHealthLaw
Incident Reporting
• Require vendors to report data security incidents in a manner similar to the
breach reporting obligations required by HIPAA and state law.
A data security incident may be defined as any use or disclosure of
confidential information in violation of the confidentiality agreement.
• Key Requirements for Vendor:
report the incident;
safeguard the confidentiality of the information involved in the
incident;
take reasonable steps to destroy or return the information involved in
the incident; and
take reasonable steps to mitigate any harm from the incident.
11
www.shipmangoodwin.com @SGHealthLaw
Reimbursement and Liability
• Particularly if a large amount of data is involved, or the potential exists for
access to medical records or other sensitive information, consider:
Incident Reimbursement: Require vendor to reimburse organization for
any costs, fines, penalties or expenses incurred as a result of the
incident. Consider specifying which costs (if not all), cap on liability
(tied to insurance?), insurance mandate, and exceptions to
reimbursement (vendor not solely to blame?).
Indemnification: Vendor holds organization harmless and makes
organization whole in the event of a claim arising from the vendor’s
use or disclosure of data.
► More important in light of growing negligence claim activity.
12

More Related Content

What's hot

Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Compliancy Group
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
Aegify Inc.
 
California's New Privacy Policy Guidelines
California's New Privacy Policy GuidelinesCalifornia's New Privacy Policy Guidelines
California's New Privacy Policy Guidelines
Brian Heidelberger
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
OnRamp
 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rule
complianceonline123
 
Business Associate Risk Infographic
Business Associate Risk InfographicBusiness Associate Risk Infographic
Business Associate Risk Infographicgaryjohnson500
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
AvePoint
 
Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Samantha Haas
 
Human resources protecting confidentiality
Human resources protecting confidentialityHuman resources protecting confidentiality
Human resources protecting confidentiality
TaylorCannon8
 
HIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-WongHIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-Wong
Lorianne Sainsbury-Wong
 
How to Ensure your Healthcare Organisation is IG compliant
How to Ensure your Healthcare Organisation is IG compliantHow to Ensure your Healthcare Organisation is IG compliant
How to Ensure your Healthcare Organisation is IG compliant
Proofreading4all
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
Kimberly Simon MBA
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
Hanna Global
 
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
Rea & Associates
 
Healthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major PriorityHealthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major Priority
Medical Transcription Service Company
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
Jose Ivan Delgado, Ph.D.
 
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPABoards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Hernan Huwyler, MBA CPA
 
Understanding HIPAA / HITECH as a Mail Service Provider
Understanding HIPAA / HITECH as a Mail Service ProviderUnderstanding HIPAA / HITECH as a Mail Service Provider
Understanding HIPAA / HITECH as a Mail Service Provider
Karla Humphrey
 
What Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​sWhat Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​s
Iatric Systems
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
ControlCase
 

What's hot (20)

Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
California's New Privacy Policy Guidelines
California's New Privacy Policy GuidelinesCalifornia's New Privacy Policy Guidelines
California's New Privacy Policy Guidelines
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rule
 
Business Associate Risk Infographic
Business Associate Risk InfographicBusiness Associate Risk Infographic
Business Associate Risk Infographic
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Hipaa privacy and security 03192014
Hipaa privacy and security 03192014
 
Human resources protecting confidentiality
Human resources protecting confidentialityHuman resources protecting confidentiality
Human resources protecting confidentiality
 
HIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-WongHIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-Wong
 
How to Ensure your Healthcare Organisation is IG compliant
How to Ensure your Healthcare Organisation is IG compliantHow to Ensure your Healthcare Organisation is IG compliant
How to Ensure your Healthcare Organisation is IG compliant
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
 
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
 
Healthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major PriorityHealthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major Priority
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPABoards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
 
Understanding HIPAA / HITECH as a Mail Service Provider
Understanding HIPAA / HITECH as a Mail Service ProviderUnderstanding HIPAA / HITECH as a Mail Service Provider
Understanding HIPAA / HITECH as a Mail Service Provider
 
What Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​sWhat Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​s
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

Viewers also liked

Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
Paige Rasid
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
Paige Rasid
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Paige Rasid
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
Paige Rasid
 
Operationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final RuleOperationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final Rule
ID Experts
 
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsStudy Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Paige Rasid
 
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Paige Rasid
 
Tecna jobs and innovation ecosystems 6-1-2011
Tecna   jobs and innovation ecosystems 6-1-2011Tecna   jobs and innovation ecosystems 6-1-2011
Tecna jobs and innovation ecosystems 6-1-2011
Paige Rasid
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit Program
Paige Rasid
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 Program
Paige Rasid
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industry
Paige Rasid
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015
Paige Rasid
 
Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event Program
Paige Rasid
 
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterSAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
David Sweigert
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 

Viewers also liked (16)

Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Operationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final RuleOperationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final Rule
 
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsStudy Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
 
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
 
Tecna jobs and innovation ecosystems 6-1-2011
Tecna   jobs and innovation ecosystems 6-1-2011Tecna   jobs and innovation ecosystems 6-1-2011
Tecna jobs and innovation ecosystems 6-1-2011
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit Program
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 Program
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industry
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015
 
Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event Program
 
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterSAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 

Similar to Keeping Control: Data Security and Vendor Management

How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
Compliancy Group
 
What Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud StorageWhat Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud Storage
Texas Medical Liability Trust
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
JagdeepSingh394
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
Compliancy Group
 
HNI U: HIPAA Essentials
HNI U: HIPAA EssentialsHNI U: HIPAA Essentials
HNI U: HIPAA Essentials
HNI Risk Services
 
HIPAA and Patient Access of Information - New Rules and Guidelines
HIPAA and Patient Access of Information - New Rules and GuidelinesHIPAA and Patient Access of Information - New Rules and Guidelines
HIPAA and Patient Access of Information - New Rules and Guidelines
Conference Panel
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
RightScale
 
HIPAA Security 2019
HIPAA Security 2019HIPAA Security 2019
HIPAA Security 2019
Jose Ivan Delgado, Ph.D.
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
Compliancy Group
 
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docxCHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
christinemaritza
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
Jason Karn
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
Kimberly Simon MBA
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider ContractsWhitmeyerTuffin
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
Provider Resources Group
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
Endeavor Management
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009
rogersons
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightScale
 

Similar to Keeping Control: Data Security and Vendor Management (20)

How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
 
What Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud StorageWhat Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud Storage
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
 
HNI U: HIPAA Essentials
HNI U: HIPAA EssentialsHNI U: HIPAA Essentials
HNI U: HIPAA Essentials
 
HIPAA and Patient Access of Information - New Rules and Guidelines
HIPAA and Patient Access of Information - New Rules and GuidelinesHIPAA and Patient Access of Information - New Rules and Guidelines
HIPAA and Patient Access of Information - New Rules and Guidelines
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
 
HIPAA Security 2019
HIPAA Security 2019HIPAA Security 2019
HIPAA Security 2019
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
 
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docxCHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
CHAPTER3 Maintaining ComplianceMANY LAWS AND REGULATIONS.docx
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
 

More from Paige Rasid

2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards
Paige Rasid
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Paige Rasid
 
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesLife Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Paige Rasid
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 Program
Paige Rasid
 
Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30
Paige Rasid
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy Agenda
Paige Rasid
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
Paige Rasid
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014
Paige Rasid
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014
Paige Rasid
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech
Paige Rasid
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money tree
Paige Rasid
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014
Paige Rasid
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council
Paige Rasid
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13
Paige Rasid
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Paige Rasid
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
Paige Rasid
 
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 Grow with the Grove - A CVG Second Thursday Event, 7/11/13 Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Paige Rasid
 
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Paige Rasid
 
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Paige Rasid
 

More from Paige Rasid (19)

2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
 
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesLife Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar Series
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 Program
 
Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy Agenda
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money tree
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
 
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 Grow with the Grove - A CVG Second Thursday Event, 7/11/13 Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
 
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Keeping Control: Data Security and Vendor Management

  • 1. www.shipmangoodwin.com @SGHealthLaw Non-Business Associate Vendors • Generally, a vendor is not a business associate if it does not receive, use, disclose or maintain PHI. • Examples: IT vendor will have access to hospital information systems to install, update or maintain malware protection. Cleaning service with access to staff offices, medical record rooms or other areas in which PHI may exist. A software company which licenses a locally hosted program which utilizes or processes PHI. A consultant who is granted limited access to quality, compliance or other internal reports which include only aggregate information. 1
  • 2. www.shipmangoodwin.com @SGHealthLaw Non-Business Associate Vendors 2 • Despite not being subject to HIPAA, your organization’s relationship with a non-business associate vendor may entail significant risk for your organization. Consider: Data Access: What type of data will the vendor have access to? Even if not PHI subject to HIPAA, confidentiality concerns may nevertheless exist under state law or concerns with proprietary information. Access to Premises: Will the vendor have access to your premises or information systems? If so, would that access enable the vendor to access PHI? Incidental Use or Disclosure: Will the vendor have incidental use or disclosure of PHI? • Key Point: Don’t ignore a vendor simply because it’s not a business associate!
  • 3. www.shipmangoodwin.com @SGHealthLaw Example of Non-BA Incident • Community health center engages a local IT security firm to install patches. Parties agree that vendor is not a business associate. While in the center’s information system, a newly hired vendor employee stumbles upon locally maintained patient and employee records. Bored, he starts reviewing the records and finds a former classmate of his. He copies the records to a USB drive and emails the records to the former classmate. Several weeks later, the former classmate contacts the state AG and says “look what the health center gave [the employee] access to.” • Vendor employee failed to appreciate the seriousness of the access (no privacy training provided), was under no obligation to report the access to employer, and Vendor had no obligation to notify, indemnify, reimburse or cooperate with the center. • Resulted in HIPAA and state law violations and an extensive corrective action plan. 3
  • 4. www.shipmangoodwin.com @SGHealthLaw 3 Part Strategy for Non-Business Associates Organizational Policies Due Diligence Confidentiality Agreement 4
  • 5. www.shipmangoodwin.com @SGHealthLaw Organizational Policies • Don’t limit your privacy and security policies to only HIPAA compliance – while important, HIPAA is not the only privacy and security concern a covered entity or business associate should have. Proprietary information and trade secrets. State privacy laws. • Ensure that policies apply to all vendors, and not merely those subject to HIPAA. • Revisit policies regarding access to premises and information systems. • Determine when your organization requires a non-business associate to enter into a confidentiality agreement. 5
  • 6. www.shipmangoodwin.com @SGHealthLaw Due Diligence • Consider implementing a vendor screening tool as part of your contracting process. Obtain privacy and security information and assurances from a potential vendor prior to entering into negotiations. Receive comfort that a vendor who will have access to your premises or information systems is cognizant of privacy concerns, takes privacy seriously and has a privacy and security plan in place. Use vendor screening tool as a way to periodically monitor vendor and remind vendor of privacy and security expectations (i.e. annual or bi- annual re-certification). Make privacy and security a factor when choosing vendors. 6
  • 7. www.shipmangoodwin.com @SGHealthLaw Confidentiality Agreements • In many instances, a covered entity or business associate may desire to require the vendor to agree to a confidentiality agreement or contract clause. • The extent and scope of such requirements should be based upon the risk to the organization. • Key Terms: Commitment to confidentiality Compliance with laws and policies Incident reporting Reimbursement 7
  • 8. www.shipmangoodwin.com @SGHealthLaw Logistics • Three main options for binding a vendor to confidentiality requirements: Compliance addendum; Traditional NDA or confidentiality agreement; and/or Preparing standard, organization-approved language to insert into services or other agreements. • Many organizations have developed all three and use them in different situations. Consider a confidentiality tool to guide business owners regarding when to use which form/language. • Don’t limit yourself to privacy and security – for example, the compliance addendum is a great opportunity to address other pertinent issues such as exclusions or Medicare access to records. 8
  • 9. www.shipmangoodwin.com @SGHealthLaw Confidentiality • HIPAA: Acknowledge that vendor is not a business associate and require vendor to enter into BAA should scope of services change or HIPAA changes such that the vendor would be considered a business associate. • Data Use Requirements: Prohibit requesting or accessing data outside the scope of the engagement. Maintain information obtained through “incidental” use or disclosure in strict confidence. Do not use or disclose PHI for any purpose except to the extent incidental use or disclosure of PHI is necessary in performance of the services. Do not maintain, copy or misappropriate any PHI. 9
  • 10. www.shipmangoodwin.com @SGHealthLaw Compliance • Require vendor to comply with all applicable law, including state data privacy and security laws. • Require vendor to comply with all organizational policies and procedures regarding access to information systems or premises, including: User authentication; Sharing of passwords; Visitor sign-in/out and badge requirements; and Remaining accompanied by organization personnel while on-site. 10
  • 11. www.shipmangoodwin.com @SGHealthLaw Incident Reporting • Require vendors to report data security incidents in a manner similar to the breach reporting obligations required by HIPAA and state law. A data security incident may be defined as any use or disclosure of confidential information in violation of the confidentiality agreement. • Key Requirements for Vendor: report the incident; safeguard the confidentiality of the information involved in the incident; take reasonable steps to destroy or return the information involved in the incident; and take reasonable steps to mitigate any harm from the incident. 11
  • 12. www.shipmangoodwin.com @SGHealthLaw Reimbursement and Liability • Particularly if a large amount of data is involved, or the potential exists for access to medical records or other sensitive information, consider: Incident Reimbursement: Require vendor to reimburse organization for any costs, fines, penalties or expenses incurred as a result of the incident. Consider specifying which costs (if not all), cap on liability (tied to insurance?), insurance mandate, and exceptions to reimbursement (vendor not solely to blame?). Indemnification: Vendor holds organization harmless and makes organization whole in the event of a claim arising from the vendor’s use or disclosure of data. ► More important in light of growing negligence claim activity. 12