As we predicted, the government stopped short of a mandate. There is no movement afoot to change or add to the HIPAA security rule requirements. But in Stage 2 they emphasized that an EP or hospital should consider encrypting electronic protected health information as part of their security risk analysis, and where it is not “reasonable and appropriate,” adopt an equivalent alternative measure of securing data.
Automating Google Workspace (GWS) & more with Apps Script
Stage 2 Meaningful Use - Addressing Encryption and Security
1. Stage 2 Meaningful Use - Addressing
Encryption/Security
Last week, Health and Human Services Secretary Kathleen Sebelius reported that the number of hospitals using
electronic health records (EHR) has more than doubled in the last two years from 16 to 35 percent. She also said that 85
percent of all hospitals now report that by 2015 they intend to participate in The Centers for Medicare and Medicaid
Services’ (CMS) EHR incentive program.
Also last week, CMS released the proposed Stage 2 Meaningful Use requirements for public comment. The draft rule gives
eligible hospitals and providers a good indication of where to focus their efforts as they continue their implementation and
adoption of electronic health records throughout their organizations. Stage 1 was mostly about transferring data to EHRs
and being able to share information, including electronic copies and visit summaries for patients. Stage 2 moves the
goalposts further down field, requiring that patients have online access to their health information and facilitation of
electronic health information exchange between providers.
The Stage 2 core requirement for IT security uses nearly identical language from Stage 1 regarding updating or conducting
a HIPAA security risk analysis. Both Stage 1 and Stage 2 rely on the HIPAA security rule provisions under federal code
45 CFR. HIPAA deems encryption an “addressable” specification, meaning a covered entity decides if it is a “reasonable
and appropriate” technical security step to implement. The security rule enables an entity to adopt an alternative
protective measure that achieves the same purpose.
But the difference between Stage 1 and Stage 2 on this issue is subtle but significant. Stage 1 only mentioned the security
risk analysis provision. However, by specifically calling out out the issue of encryption at rest in Stage 2 , CMS has
heightened the importance of analyzing the pros and cons of using the technology. The complete language of the core
objective for both hospitals and eligible providers requires that they:
“Conduct or review a security risk analysis in according with the requirements under 45 CFR 164.308(a)(1), including
addressing the encryption/security of data at rest in accordance with requirements under 45 CFR 164.312(a)(2)(iv) and
45 CFR 164.306(d)(3), and implement security updates as necessary and correct identified security deficiencies as part
of the provider’s risk management process.”
WEB PHONE EMAIL
WWW.REDSPIN.COM 800-721-9177 INFO@REDSPIN.COM
2. As Redspin reported in our February 1st Breach Report 2011 - Protected Health Information:
"Of the 385 incidents affecting 500 or more individuals, 55% involved unencrypted devices or media. The Federal
government is unlikely to mandate that all portable devices that store ePHI be encrypted, but it’s an obvious and
sensible policy for a healthcare organization to adopt. Taking it further, why not require that all mobile devices in the
healthcare workplace be encrypted, even if ePHI is not allowed on them."
As we predicted, the government stopped short of a mandate. There is no movement afoot to change or add to the HIPAA
security rule requirements. But in Stage 2 they emphasized that an EP or hospital should consider encrypting electronic
protected health information as part of their security risk analysis, and where it is not "reasonable and appropriate,"
adopt an equivalent alternative measure of securing data.
Sometimes, you have to read between the lines... or in this case, read between the forward slash. We'll be talking about the
phrase "addressing theencryption/security of data at rest" for the next few years.
WEB PHONE EMAIL
WWW.REDSPIN.COM 800-721-9177 INFO@REDSPIN.COM