26
Healthcare Insurance Portability and Accountability Act (HIPAA) By Hugh Kominars, VP - ControlCase

Health Insurance Portability and Accountability Act (HIPAA) Compliance

Embed Size (px)

DESCRIPTION

The majority of changes to HIPAA have been introduced and strengthened by the recent passage of the HITECH and Omni-bus rules. ControlCase HIPAA Compliance as a Service (CaaS) is an Integration of services, software and compliance management and reporting for HIPAA, PCI, ISO 27001/2, SSAE16 and SAP through our cloud-based GRC.

Citation preview

Page 1: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Healthcare Insurance Portability and Accountability Act (HIPAA)By Hugh Kominars, VP - ControlCase

Page 2: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Agenda

• Introduction• What is HIPAA today? • How does Omnibus and HITECH tie into and mean in

the context of HIPAA• High level requirements of the HIPAA Privacy,

Security and Breach Notification Rules for covered entities and business associates

• Lessons Learned - Demonstrating Compliance• Maintaining effective compliance with CaaS• Q&A

2/23

Page 3: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Introduction

• Global Reach

› Serving more than 400 clients in 40 countries and rapidly growing

• Certified Resources

› Shared Assessment/BITS FISAP Assessor

› PCI DSS Qualified Security Assessor (QSA)

› QSA for Point-to-Point Encryption (QSA P2PE)

› Certified ASV vendor

› Certified ISO 27001 Assessor

› EI3PA Assessor

› SSAE16, SOC1, SOC2, SOC3 Audits

› HITRUST and HIPAA

3/23

Page 4: Health Insurance Portability and Accountability Act (HIPAA) Compliance

What is HIPAA today?

Health Insurance Portability & Accountability Act of 1996 & HIPAA Omnibus Rule:• Establishes administrative, physical and technical

security and privacy standards• Applies to both healthcare providers and business

associates (3rd parties) • Attributes responsibility for monitoring HIPAA

compliance of business associates to healthcare providers

• Assessment of compliance of business associates due 09/23/13

4/23

Page 5: Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA, HITECH and the Omni-bus Rule

5 / 23

HITECH

• Specifically extends security, privacy and breach notification requirements to Business Associates (BA)

• Establishes mandatory penalties for ‘willful neglect’

• Imposes data breach notification requirements for unauthorized uses and disclosures of "unsecured PHI.“

• Institutes third party management and monitoring as ‘due diligences and ‘due care’ provisions

• Establishes the right for patients to obtain their PHI in an electronic format (i.e. ePHI)

Omni-bus Rule

• Finalization of interim rules outlined in the HITECH act

• Formalizes enforcement provisions for breaches

• Expands definition of BA to include subcontractors of BA (BA of BA)

• Clarifies that HHS will determine the actual maximum for penalties

• Covered Entities (CE) and BA are liable for the acts of BA and their subcontractors

• Requires a on-going monitoring process for the organization’s security programs and processes.

Page 6: Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Enforcement

• HHS’ Office of Civil Rights (OCR) is responsible for enforcing the Privacy and Security Rule › Performing investigations of complaints (95,588 reported since 2003; 22,497

investigated by OCR)› Random sampling of organizations, (115 performed in 2012)› Assessment of risk/exposure based on transaction volumes (CEs and BAs)

• OCR resolution options› Voluntary compliance,› Corrective action, and/or› Resolution agreement

• OCR referrals to Department of Justice (DOJ)› Cases involving knowingly disclosing or obtaining PHI› 526 cases have been referred to date

• HHS determines penalties (Federal)› Additional penalties levied by individual States Attorneys’ for affected residents › Funds approximately half of OCR audit operations cost from fines

6 /23

Page 7: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Fines/Penalties

HIPAA Violation Minimum Penalty Maximum Penalty

Individual did not know (and by exercising reasonable diligence would not have known) that he/she violated HIPAA

$100 per violation, with an annual maximum of $25,000 for repeat violations (Note: maximum that can be imposed by State Attorneys General regardless of the type of violation)

$50,000 per violation, with an annual maximum of $1.5 million

HIPAA violation due to reasonable cause and not due to willful neglect

$1,000 per violation, with an annual maximum of $100,000 for repeat violations

$50,000 per violation, with an annual maximum of $1.5 million

HIPAA violation due to willful neglect but violation is corrected within the required time period

$10,000 per violation, with an annual maximum of $250,000 for repeat violations

$50,000 per violation, with an annual maximum of $1.5 million

HIPAA violation is due to willful neglect and is not corrected

$50,000 per violation, with an annual maximum of $1.5 million

$50,000 per violation, with an annual maximum of $1.5 million

7 / 23

Source: http://www.ama-assn.org//ama/pub/physician-resources/solutions-managing-your-practice/coding-billing-insurance/hipaahealth-insurance-portability-accountability-act/hipaa-violations-enforcement.page

Page 8: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Enforcement Results

Organization Penalty (Federal) Nature of Violation

CIGNET $4,300,000 Online database application error.Alaska Department of Health and Human Services $1,700,000 Unencrypted USB hard drive stolen, poor policies and risk

analysis.

WellPoint $1,700,000Did not have technical safeguards in place to verify the person/entity seeking access to PHI in the database. Failed to conduct a tech eval in response to software upgrade.

Blue Cross Blue Shield of Tennessee $1,500,000 57 unencrypted hard drives stolen.

Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates $1,500,000 Unencrypted laptop stolen, poor risk analysis, policies.

Affinity Health Plan $1,215,780 Returned photocopiers without erasing the hard drives.

South Shore Hospital $750,000 Backup tapes went missing on the way to contractor.

Idaho State University $400,000 Breach of unsecured ePHI.

Shasta Regional Medical Center $275,000 Inadequate safeguarding of PHI from impermissible uses and disclosures.

Phoenix Cardiac Surgery $100,000 Internet calendar, poor policies, training.

The Hospice of Northern Idaho $50,000 Breach of unsecured ePHI. Unencrypted laptop stolen, no risk analysis.

8 / 23

Source: http://www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/index.html

Page 9: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Looking Forward….

• Leon Rodriguez (HHS OCR Director)› "I think all these (17) cases really powerfully articulate those expectations and

the fact that we will be holding people accountable," › “…those numbers are expected to go up, especially when the official audit

program goes live this year. ”› When asked regarding root cause or biggest misstep, Rodriguez pointed to risk

analysis inadequacies, for business associates and covered entities alike. It’s the "failure to perform a comprehensive, thorough risk analysis and then to apply the results of that analysis,"

• Onshore/Offshore BAs and their BAs› Enforcement actions on BAs with onshore business units is clear cut› For BAs with only offshore business units; enforcement actions levied through

CEs.

9 / 23

Page 10: Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Requirements – Privacy Rule

Privacy Rule Main Points:• Requires appropriate safeguards to protect the privacy of personal health

information• Sets limits and conditions on the uses and disclosures that may be made of

such information without patient authorization • Gives patients rights over their health information, including rights to

examine and obtain a copy of their health records, and to request corrections

• Requires compliance with the Security RuleFor BAs• Requires breach notification to the Covered Entity• Requires either the individual or the Covered Entity access to PHI• Requires reporting the disclosure of PHI to the Secretary of HHS• Provide an accounting of disclosures.

Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

10/23

Page 11: Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Requirements – Security Rule

Administrative Safeguards:Security Management Process (Risk Analysis (required), Risk Management (required), Sanction Policy (required), Information Systems Activity Reviews (required), Assigned Security Responsibility - Officers (required), Workforce Security - Employee Oversight (addressable), Information Access Management - Multiple Organizations (required) and ePHI Access (addressable); Security Awareness and Training - Security Reminders (addressable), Protection Against Malware (addressable), Login Monitoring (addressable); Password Management (addressable), Security Incident Procedures - Response and Reporting (required), Contingency Plans (required); Evaluations (required); Business Associate Agreements (required)

Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

Technical Safeguards:Access Control - Unique User Identification (required), Emergency Access Procedure (required), Automatic Logoff (addressable), Encryption and Decryption (addressable); Audit Controls (required); Integrity - Mechanism to Authenticate ePHI (addressable); Authentication (required); Transmission Security - Integrity Controls (addressable), Encryption (addressable)

Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf

Physical Safeguards:Facility Access Controls - Contingency Operations (addressable), Facility Security Plan (addressable), Access Control and Validation Procedures (addressable), Maintenance Records (addressable), Workstation Security (required), Device and Media Controls - Disposal (required), Media Re-Use (required), Data Backup and Storage (addressable)

Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf

11/23

Page 12: Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Requirements – Breach Notification

Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

12/23

Definition of BreachA breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information.

Unsecure PHITransition and Storage: NIST Special Publication 800-111, NIST Special Publications 800-52, 800-77 or Federal Information Processing Standards (FIPS) 140-2 validatedDestruction: Specifies physical and electronic PHI, for electronic, NIST Special Publication 800-88

Breach Notification Methods: By email or first class mail, to the media, posting the notice on the home page of its web site for at least 90 days, If BA, to the CE, within 60 days of determination

Notification Thresholds> 500 records: notify HHS, to individuals and media, within 60 days< 500 records: notify HHS, annually consolidated listing

Burden of ProofCEs/BAs required to prove that they have notified the affected parties within the time periods specified or face penalties

Page 13: Health Insurance Portability and Accountability Act (HIPAA) Compliance

HIPAA Requirements – BAs and subcontractors

• Comply directly with the HIPAA Regulation• Business associates must identify, assess and monitor their

supporting business associates (BAs of BAs) and provide regular updates to the respective CE

• BAs must establish and define (contractually) security requirements, right to audit, incident reporting clauses with their service providers

• BAs must implement an effective monitoring/assessment process based on the nature of the data exchanged with service providers

• Be able to show due diligence/due care with respect to monitoring their supplier’s security compliance

13/23

Page 14: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Lessons Learned - Demonstrating Compliance -

14 / 23

• Risk Assessments› Not performed/not updated or

documented› Limited scope: facilities, processing

environment, personnel, software, › Not aligned with controls or

monitoring

• Inventories (Asset Management)› Out of date/not documented

hardware, software, interfaces, dataflow diagrams/process descriptions, removable media, teleworkers (remote), BAs and subcontractors

• No BA/Vendor Management program

• Policies, procedures and standards (Governance)

• Hardening and patch management› None or not implemented› Not monitored/No follow-up› End-of-life

• Vulnerability Management› Inconsistent/incomplete internal

vulnerability and penetration testing for networks and applications

› Remediation gaps› No Internet content restrictions

Page 15: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Lessons Learned (continued)

15 / 23

• System Logging and Monitoring› Not implemented/inconsistent› Not retained or analyzed› Lack of oversight and approval

• None or inconsistent encryption of data in transmission or storage

• Media management and tracking gaps

• Untested incident and breach response processes for PHI related disclosures

• User Provisioning› Excessive privileges/accesses› No formal documentation of

rationale› Lack of oversight and approval

• Training and awareness› Not HIPAA oriented› No refresh› Lack of evidence of attendance

• Inadequate business continuity and disaster recover

• Failure to monitor external maintenance personnel

Page 16: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Root Causes

16/23

• Operational Conflicts of Interest› Maintaining versus securing› Capacity and focus› Lack of resources for monitoring and maintaining compliance after achieving initial

compliance

• No assignment of accountability• Personnel turnover• Lack of expertise and objectivity• Process disconnects between HR, change management, IT and

Systems acquisition• Lack of resources for monitoring and maintaining compliance

after achieving initial compliance

Page 17: Health Insurance Portability and Accountability Act (HIPAA) Compliance

The Path Forward and Beyond

17/23

• Risk Assessments – complete, detailed, controls aligned to mitigate risk, and a program to monitor the effectiveness of those controls

• Inventories (Asset Management) – documented, covering all hardware, software, interfaces (internally and externally), process documentation (DFD) with narratives, removable media (with method of encryption), teleworkers and BAs and subcontractors (including what PHI is shared and how is it protected)

• BA Management Program – identifies in-scope and out-of-scope organizations, the data that is shared, an assessment of risk, the method to monitor and track HIPAA compliance, results of monitoring.

• Policies, procedures and standards (Governance) – complete to include Sanction/Corrective Action policies and evidence that it is implemented

• Hardening and patch management – covers all assets that process PHI; tied to asset management and verified by internal/external vulnerability scans

• Vulnerability Management – covers all assets that process PHI, includes

remediation and retesting to verify remediation effectiveness. • System Logging and Monitoring – covers all systems, databases and applications

that process, transmit and store PHI

Page 18: Health Insurance Portability and Accountability Act (HIPAA) Compliance

The Path Forward and Beyond

18/23

• Data Encryption – in transit and at rest, tied to DFD and process narratives

• Media Management and Tracking – covers removable encrypted media, tied to DFD and process narratives

• Incident and Breach Response Processes – defined and tested to address breach and disclosure of PHI, understanding of who is impacted, and who needs to be notified

• User Provisioning – to specific system/applications, two manager review (business and IT Security)

• Training and awareness – covers new hire with annual retraining, maintaining a roster of completion and non-compliance.

• Business Continuity and Disaster Recover – must show that PHI would be available after a disaster

• Personnel Monitoring – cover employees, contractors and third parties that have access to PHI (physical and electronic)

Page 19: Health Insurance Portability and Accountability Act (HIPAA) Compliance

• Compliance as a Service (CaaS)› Integration of services, software and compliance management and

reporting for HIPAA, PCI, ISO 27001/2, SSAE16 and SAP through our cloud-based GRC

› Allows clients to easily assess, monitor and maintain compliance not only with HIPAA, but across multiple standards

› Services Include• Gap and Risk assessments (initial and on-going)• Automated data discovery for the 18 PHI identifiers• Policy and procedures• Training and awareness; records• External and internal vulnerability assessments for networks and applications• External and internal penetration tests for networks and applications• BA/Supplier identification, management and assessments• Logging and Monitoring

How ControlCase Supports CEs and BAs

19/23

Page 20: Health Insurance Portability and Accountability Act (HIPAA) Compliance

How ControlCase Supports CEs and BAs

19/23

Page 21: Health Insurance Portability and Accountability Act (HIPAA) Compliance

How ControlCase Supports CEs and BAs

19/23

Page 22: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Mapping CaaS to HIPAA

20/23

Page 23: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Mapping CaaS to HIPAA

20/23

Page 24: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Fines and Penaltieshttp://www.ama-assn.org//ama/pub/physician-resources/solutions-managing-your-practice/coding-billing-insurance/hipaahealth-insurance-portability-accountability-act/hipaa-violations-enforcement.page

Enforcement Resultshttp://www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/index.html

HIPAA Privacy http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

HIPAA SecurityAdministrative Safeguards: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/adminsafeguards.pdfTechnical Safeguards: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdfPhysical Safeguards: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf

HIPAA Breach Notificationhttp://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

Factors that OCR considers when investigating a complainthttp://www.hhs.gov/ocr/privacy/hipaa/enforcement/process/whatocrconsiders.html

Breach Notification Information http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/index.html

Factors considered when levying civil penalties (fines)http://www.hipaasurvivalguide.com/hipaa-regulations/160-408.php

24 / 23

External Resources

Page 25: Health Insurance Portability and Accountability Act (HIPAA) Compliance

Q & A

22/23

Page 26: Health Insurance Portability and Accountability Act (HIPAA) Compliance

To Learn More …

• Visit www.controlcase.com

• Call +1 703 483 6383 (North America)

• Call +57 1 678 3716 (South America)

• Call +44 1276 686 048 (Europe)

• Call +971 4440 5958 (Middle East & Africa)

• Call +91 982 029 3399 (Asia Pacific)

• Hugh Kominars (VP) [email protected]

23/23