+ All Categories
Home > Documents > Eliza de Guzman HTM 520 Health Information Exchange.

Eliza de Guzman HTM 520 Health Information Exchange.

Date post: 03-Jan-2016
Category:
Upload: gary-stanley
View: 212 times
Download: 0 times
Share this document with a friend
Popular Tags:
16
Eliza de Guzman HTM 520 Health Information Exchange
Transcript
Page 1: Eliza de Guzman HTM 520 Health Information Exchange.

Eliza de GuzmanHTM 520 Health Information Exchange

Page 2: Eliza de Guzman HTM 520 Health Information Exchange.

INTRODUCTION

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) required the Secretary of the U.S. Department of Health and Human Services (HHS) to develop a regulations that will protect the privacy and security of certain health information. HHS published the most commonly known as the HIPAA Privacy Rule and HIPAA Security Rule to fulfill the required regulations.

• The Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) established a national set of security standards to protect certain health information that is held or transferred in electronic form.

• The Security Rule can be measured by protecting that contains in the Privacy Rule by

addressing the technical and non-technical safeguards that organizations called “cover-entities” that will put in place to secure individuals “electronic protected health information” (e-PHI).

Page 3: Eliza de Guzman HTM 520 Health Information Exchange.
Page 4: Eliza de Guzman HTM 520 Health Information Exchange.

WHO IS COVERED BY THE SECURITY RULE?

• Health care provider

• Health plans

• Health care clearinghouses

• Medicare Prescription Drug Card Sponsors

Page 5: Eliza de Guzman HTM 520 Health Information Exchange.

WHAT INFORMATION IS PROTECTED?

• Electronic Protected Health Information. 

Page 6: Eliza de Guzman HTM 520 Health Information Exchange.

GENERAL RULES – COVERED ENTITIES

1. Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit;

2. Identify and protect against reasonably anticipated threats to the security or integrity of the information;

3. Protect against reasonably anticipated, impermissible uses or disclosures; and

4. Ensure compliance by their workforce.

Page 7: Eliza de Guzman HTM 520 Health Information Exchange.

Cont.

Covered Entity – security measures to use:

• Its size, complexity, and capabilities,

• Its technical, hardware, and software infrastructure,

• The costs of security measures, and  

• The likelihood and possible impact of potential risks to e-PHI.

Page 8: Eliza de Guzman HTM 520 Health Information Exchange.

RISK ANALYSIS AND MANAGEMENT

• Evaluate the likelihood and impact of potential risks to e-PHI;

• Implement appropriate security measures to address the risks identified in the risk analysis;

• Document the chosen security measures and, where required, the rationale for adopting those measures;

• Maintain continuous, reasonable, and appropriate security protections.

Page 9: Eliza de Guzman HTM 520 Health Information Exchange.

SECURITY RULE COMPLIANCE CONSIDERATIONS

HIPAA compliance audits should be based on three things:

An Identification of the organization governance model.

A traditional screening

An Identification of the master rules

Compliance Date : April 20, 2005 – April 20, 2006

Page 10: Eliza de Guzman HTM 520 Health Information Exchange.

 HIPAA Security Rule audit process

Page 11: Eliza de Guzman HTM 520 Health Information Exchange.

SECURITY SAFEGUARDS• Administrative Safeguards

o Security Management Processo Assigned Security Responsibilityo Workforce Securityo Security Awareness and Trainingo Information Access Managemento Security Incident Procedureso Contingency Plano Evaluationo Business Associate Contracts and Other Arrangements

Page 12: Eliza de Guzman HTM 520 Health Information Exchange.

Cont.• Physical Safeguards :

o Facility Access Control

o Workstation and Device Security

• Technical Safeguards

o Access Controlo Audit Controlo Integrity Controlo Person or Entity Authenticationo Transmission Security

Page 13: Eliza de Guzman HTM 520 Health Information Exchange.

ORGANIZATIONAL REQUIREMENTS

• Covered Entity Responsibilities

• Business Associate Contracts

Page 14: Eliza de Guzman HTM 520 Health Information Exchange.

CHALLENGES

• Rapid increase of mobile devices

• User Training

Page 15: Eliza de Guzman HTM 520 Health Information Exchange.

SUMMARY OF THE HIPAA SECURITY RULE

This is a summary of key elements of the Security Rule including who is covered, what information is protected, and what safeguards must be in place to ensure appropriate protection of electronic protected health information.  

Page 16: Eliza de Guzman HTM 520 Health Information Exchange.

HIPAA SECURITY GAME

 http://www.healthit.gov/sites/default/files/cybersecure/cybersecure.html


Recommended