HIPAA Training by Smith Anderson and Element Health Consortium

Page 1


HIPAA Compliance for Business Associates

by:

Overview

• HIPAA Overview

• Business Associates and Covered Entities

• The Privacy Rule

• The Security Rule

Key HIPAA Terms

• Health Insurance Portability and Accountability Act of 1996 (HIPAA)

• Health Information Technology for Economic and Clinic Health (HITECH) Act

• Covered Entities (CEs)

• Business Associates (BAs)

• Protected health information (PHI)

○ ePHI in electronic form

• Department of Health and Human Services (HHS) Office of Civil Rights (OCR)

What is HIPAA?

• Health Insurance Portability and Accountability Act of 1996 (HIPAA)

• Privacy Rule

• Security Rule

• Health Information Technology for Economic and Clinical Health (HITECH) Act (2009)

• Breach Notification Rule

• Omnibus Rule

Covered Entities

• Health care providers who conduct HIPAA standard electronic transactions

• Health plans

• Health care clearinghouses

Business Associates

• Perform functions or activities that involve accessing, creating, receiving, maintaining, or transmitting PHI on a CE's behalf.

• Include a BA's subcontractors that create, receive, maintain, or transmit PHI on the BA's behalf.

• HITECH

Implications to BAs

Business Associate Agreements (BAAs)

A CE may disclose PHI to a BA if the BA contractually agrees in a BAA to:

• Use PHI only for specified purposes.

○ Safeguard PHI from misuse.

○ Address data breaches and security incidents.

○ Help CEs comply with applicable privacy and data protection laws.

○ Hold their subcontractors to the same standards.

○ Not use or further disclose PHI other than as permitted by the BA or required by law

Protected Health Information (PHI)

Individually identifiable information that relates to:

• An individual's past, present, or future physical or mental health or condition.

• The provision of health care to an individual.

• The past, present, or future payment for an individual's health care.

Examples: Name, contact information, birth date, Social Security number, payment details, service dates, prescriptions, diagnoses, or provider notes.

HIPAA Privacy Rule

• Policies and Procedures

• Train workforce members

• Designate Privacy Officer

• Mitigate harmful effects from violations

Minimum Necessary Standard

• Applies when CEs and BAs use, disclose, or request PHI.

• Limits PHI uses and disclosures to the minimum necessary to accomplish the intended purpose.

• Has exceptions, including disclosures for:

• Treatment purposes.

• Legal requirements.

• Individuals or their representatives.

• Authorizations.

• HHS investigation, review, or enforcement.

HIPAA Security Rule

• Establishes a minimum set of standards to protect the confidentiality, integrity, and availability of ePHI that a CE or BA creates, receives, maintains, or transmits.

• Specifies various safeguards.

• Applies equally to CEs and BAs.

Examples of Security Incidents

• Stolen passwords, access credentials, or devices.

• Physical break-ins.

• Viruses, malware, ransomware, hacking, or network intrusions.

• Social engineering and phishing.

• Unauthorized internal or external access to ePHI.

• Improper media disposal.

Security Rule Compliance

• Internal risk analysis includes reasonable and appropriate policies and procedures based on company size, technological capability, and contractual obligations (i.e., BAAs)

• Maintain written records of required activities

• Review and update periodically

Safeguards

• The Security Rule includes administrative, physical, and technical safeguards and organizational requirements.

• Safeguards are divided into standards.

• Some standards include required or addressable implementation specifications.

Safeguards (continued)

• Administrative Safeguards- applicable to daily operations, workforce members’ access

• Physical Safeguards- facility access controls, workstation use and security

• Technical Safeguards- access control, authentication controls, transmission security

Risk Analysis

Goals of risk analysis:

• Identify potential security risks.

• Determine a risk's probability and magnitude.

• Take appropriate actions to remediate or mitigate risks.

Goals of security incident response:

• Identify and respond to suspected or known security incidents.

Security Reporting

• If you become aware of a security incident, please report it to Element’s HIPAA Security Officer

Breach Notification

• CEs must provide notice of a breach to individuals, HHS, and, for large breaches, to the media.

• BAs must provide breach notice to their CEs.

• Notice required without unreasonable delay, and not later than 60 days after discovery.

• Notice on an annual basis to HHS for smaller breaches affecting fewer than 500 individuals.

• Where are Element’s HIPAA policies and procedures?

• A CIN participating provider needs to send us PHI outside of a protected platform. What is our process?

• I see a potential risk to PHI in Element’s custody or control. What should I do?

• I received PHI through my personal email account. What should I do?

Questions?

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.