SlideShare uma empresa Scribd logo
1 de 33
Guilty by Association?
HIPAA, HITECH, and the role
of Business Associates
!"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&(

!"#$%&'()*+,#-".)/#$0,&-1"
                                                    61#,(%)7+8-",'

                                      • 4*+,%+),%9):$+%&-1"%);-,):$+%&-1"%)1')
                                        0<,&


                                      • 61#,(%)%*-#+%),'+),;,-*,8*+)
2+'&-3+#)4,'&"+')4'1.',5              566,788)*+,-./0)1923*4,#)*+8:-.;<:=>?8


                                      • 4,%&)=+8-",'%),"#)'+01'#-".%
                                      566,788)*+,-./0)1923*4,#)*+8(<@.0/38




                                                                       !""#!"$%&''
                                                                  (((#)*+,-./0)123*4,#)*+
Welcome!

Updating Business Associate requirements

The roles of BAs, Subcontractors and Agents

Amending Business Associate Agreements

New Violation Categories and Penalties

Audits, Remediation and Good Faith E!orts
Changing BA Rules

Prior to HITECH, management of ePHI security
was loosely defined. The law required BAs to
“use appropriate safeguards.”

There was no standard relating to how data would
be protected, and no way to validate whether the
BA was actually following the standard.
Changing BA Rules

Encryption and virus protection as cases in point

Laptops do not necessarily have discs encrypted

Workstation users often disable virus protection

System patching has also emerged as an issue
Changing BA Rules

Best intentions created worst-case scenarios

Limited IT resources in many CEs

Too many IT issues to handle

BA changes inevitable given EMR adoption
Redefining
Business Associates
BAs are “persons who, on behalf of a covered
entity (but other than as members of the covered
entity’s workforce) perform or assist in performing
a function or activity that involves the use or
disclosure of individually identifiable health
information, or that otherwise is regulated by
HIPAA.”
Redefining
Business Associates
HITECH requires BAs to comply directly with
Security Rule provisions directing implementation
of administrative, physical and technical
safeguards for ePHI and development and
enforcement of related policies, procedures and
documentation safeguards including designation
of a security o"cial.
Redefining
Business Associates
HITECH also imposes on the BA an obligation to
comply directly with HIPAA BA safeguards,
including limiting use and disclosure of ePHI as
specified in the BAA or required by law, facilitating
access and accounting for disclosures, opening
books and records to DHHS, and returning or
destroying all ePHI, if feasible, upon termination of
the Business Associate Agreement.
Redefining
Business Associates

HITECH deems BA to violate HIPAA if the BA
“knows of a pattern of activity or practice” by the
CE that breaches their BAA and if BA fails to cure
the breach, terminate the BAA or report the non-
compliance to DHHS.
Subcontractors
and Agents

The BA must require subcontractors and agents to
provide reasonable written assurance that they will
comply with the same restrictions and conditions
that apply to the BA under the terms of the BAA
with respect to PHI.
Required Capabilities

Accounting of Disclosures and Audit Trail issues

Accounting provision only covers “disclosures”

CEs and BAs must account for narrow category

Includes disclosures to law enforcement
Required Capabilities

Protecting Data

BA restricts access to PHI via password, criteria

Servers in secured computer room; limited access

Data received and forwarded automatically

Archives and backups in fireproof safe
Required Capabilities

Proper Disposal of Data

At end of BAA, data deleted from BA systems

No printed reports or paper copies retained by BA

Printed reports are shredded upon completion
Required Capabilities
Privacy and Security Measures

Employees, contractors, subs, agents must sign

BA supports 128-bit encryption for all reports

Restricted access to PHI on need-to-know basis

Automatic expiration of passwords

Restricted access to computer room, servers
Required Capabilities
Privacy and Security Measures

Mandatory HIPAA training for all employees

Monitored security system

Automated data backups, stored in safe

Automated virus checks

Employee termination security procedures
Elements of BAAs

BA agrees not to use PHI outside requirements

BA agrees to use appropriate safeguards

BA mitigates disclosure that violates BAA

BA reports disclosures to CE

BA agrees to document disclosures
Elements of BAAs

BAA specifies purposes for use of PHI

Functions, activities or services on behalf of CE

May use PHI to provide data aggregation to CE

May use PHI to report violations of the law
Elements of BAAs


CE must notify BA of limitations in privacy practice

Notify BA of changes in PHI disclosure procedures

Notify BA of any restriction of PHI use, disclosure
Elements of BAAs

BAA must set forth term and termination provision

Upon termination, BA returns or destroys PHI

Provision applies to subcontractor or agent PHI

BA shall retain no copies of PHI

If returning unfeasible, BA must specify conditions
Amendments
and Provisions
There’s no clear consensus on the implications of
HITECH for BAAs. Since HITECH directly
regulates BAs and imposes new privacy and
security obligations, there may be little need to
update existing contracts. However, § 13401 and
13404 mandate that HITECH security and privacy
provisions be “incorporated into the BAA.” Your
need to amend may depend on existing language
and interpretation by the parties to the agreement.
Making the Transition


CEs directly responsible for “workforce” conduct

“Workforce” includes employees, volunteers

Also trainees and others working under CE control
Making the Transition

A broader definition: Temporary employees,
outsourced sta!, BA employees who are, by
contract, the responsibility of the CE are all part of
the CE “workforce.” CEs that fail to properly
respond to BA non-compliance may have violated
HIPAA.
Making the Transition

Enhanced enforcement provisions in HITECH may
prompt CEs to seek broader assurances from BAs
– some form of indemnification. BAs are likely to
seek protection for actions taken at the direction
of the CE, and to impose other limits on liability in
connection with the BAA.
New Violation
Categories

The person did not know (and by exercising
reasonable diligence, would not have known) that
action would lead to violation:

$100 per violation; total per CY $25,000
New Violation
Categories

Reasonable cause (not willful neglect):

$1000 per violation; total per CY $100,000
New Violation
Categories

Willful Neglect, corrected:

$10,000 per violation; total per CY $250,000
New Violation
Categories

Willful Neglect, uncorrected:

$50,000 per violation; total per CY $1,500,000
Audits, Remediation
and Good Faith Efforts
HIPAA audits are relatively new and still very rare.
They include a site visit and an audit report. Site
visits comprise interviews with stakeholders and
examination of physical features of Health
Information Systems. Site audits check physical
safeguards, daily operations, adherence to policies
and compliance with HIPAA requirements.
Audits, Remediation
and Good Faith Efforts
HIPAA remediation addresses “gaps” identified via
risk analysis. After “gap analysis” is complete,
begin prioritizing remediation targets. “Quick hits”
are key and can be anything your organization is
confident will require little resources to correct ...
and will often demonstrate “good faith” progress
toward compliance.
Audits, Remediation
and Good Faith Efforts

Remember ... problems will not all be of the same
priority. Some problems will involve relatively
flagrant or obvious violations of HIPAA privacy
mandates. These generally need to be addressed
as high priorities. Identify the resources needed to
work through these issues first.
Questions and Comments
HIPAA, HITECH, and the role
of Business Associates
!"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&(



                     !"#$%&'()*+,&#$%&-*./
          J/.06/.0
                                   ! >!4??)215@*-,"0+
                                   ! >!6/2>)?&&+%&,&-1"
                                   ! A+,"-".B$*)C%+)01'+)5+,%$'+)DE

                                          A3<<BC<+*B/0;BD"BC/1BEF/-4/6.*0
                                                     !""#!"$%&''BB
')5.<F<               %--4:63/6<
                                            566,788)*+,-./0)1923*4,#)*+8

                                                 G<(BHB&/:6BBI<@.0/3:
                                        566,788)*+,-./0)1923*4,#)*+8(<@.0/38




                                                                                 !""#!"$%&''
                                                                            (((#)*+,-./0)123*4,#)*+

Mais conteúdo relacionado

Semelhante a HIPAA: Can you be guilty by association?

The Benefits of Becoming GSA Certified
The Benefits of Becoming GSA CertifiedThe Benefits of Becoming GSA Certified
The Benefits of Becoming GSA Certifiedbidsync
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceControlCase
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxrandymartin91030
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
The Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) ActThe Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) ActDana Boo
 
Icd10 organization strategy
Icd10 organization strategyIcd10 organization strategy
Icd10 organization strategyMichael Arrigo
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal ControlsBharath Rao
 
Incentives for Technology Investments
Incentives for Technology InvestmentsIncentives for Technology Investments
Incentives for Technology InvestmentsDecosimoCPAs
 
Enforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmonsEnforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmonsKenSimmons
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and proceduresCharles McNeil
 
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...IBM India Smarter Computing
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...Workiva
 
What You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07aWhat You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07aFreelancer Training
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTControlCase
 
Presentation Moss 2007 Usman
Presentation Moss 2007 UsmanPresentation Moss 2007 Usman
Presentation Moss 2007 UsmanUsman Zafar Malik
 
Methodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat AccountingMethodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat AccountingRayvat Accounting
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
 

Semelhante a HIPAA: Can you be guilty by association? (20)

The Benefits of Becoming GSA Certified
The Benefits of Becoming GSA CertifiedThe Benefits of Becoming GSA Certified
The Benefits of Becoming GSA Certified
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) ComplianceHealth Insurance Portability and Accountability Act (HIPAA) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docx
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
The Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) ActThe Sarbanes Oxley ( Sox ) Act
The Sarbanes Oxley ( Sox ) Act
 
Icd10 organization strategy
Icd10 organization strategyIcd10 organization strategy
Icd10 organization strategy
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
 
Incentives for Technology Investments
Incentives for Technology InvestmentsIncentives for Technology Investments
Incentives for Technology Investments
 
Enforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmonsEnforcing compliancewithpbm kensimmons
Enforcing compliancewithpbm kensimmons
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures
 
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
CAN SOMEONE PLEASE EXPLAIN CARBON ACCOUNTING AND DEFINE WHAT A CARBON LEDGER ...
 
What You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07aWhat You Didnt Know You Dont Know About Compliance Mar 29 07a
What You Didnt Know You Dont Know About Compliance Mar 29 07a
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
 
Presentation Moss 2007 Usman
Presentation Moss 2007 UsmanPresentation Moss 2007 Usman
Presentation Moss 2007 Usman
 
Methodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat AccountingMethodology For Australian Business To Rayvat Accounting
Methodology For Australian Business To Rayvat Accounting
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
 

Mais de Compliancy Group

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...Compliancy Group
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016Compliancy Group
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud Compliancy Group
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Compliancy Group
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Compliancy Group
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...Compliancy Group
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsCompliancy Group
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practiceCompliancy Group
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...Compliancy Group
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA AuditCompliancy Group
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...Compliancy Group
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...Compliancy Group
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceCompliancy Group
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDCompliancy Group
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityCompliancy Group
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Compliancy Group
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingCompliancy Group
 

Mais de Compliancy Group (20)

HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
 
Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...Business Associates: How to differentiate your organization using HIPAA compl...
Business Associates: How to differentiate your organization using HIPAA compl...
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
HIPAA Compliance and Non-Business Associate Vendors - Strategies and Best Pra...
 
How to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 auditsHow to prepare for OCR's upcoming phase 2 audits
How to prepare for OCR's upcoming phase 2 audits
 
Preparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practicePreparing for the unexpected in your medical practice
Preparing for the unexpected in your medical practice
 
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
HIPAA Compliance and Electronic Protected Health Information: Ignorance is no...
 
How to Survive a HIPAA Audit
How to Survive a HIPAA AuditHow to Survive a HIPAA Audit
How to Survive a HIPAA Audit
 
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...How to Effectively Negotiate a Business Associate Agreement:  What’s Importan...
How to Effectively Negotiate a Business Associate Agreement: What’s Importan...
 
Meaningful Use vs HIPAA
Meaningful Use vs HIPAAMeaningful Use vs HIPAA
Meaningful Use vs HIPAA
 
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...How to Increase Your Profits Using Patient Payments on File, Recurring and On...
How to Increase Your Profits Using Patient Payments on File, Recurring and On...
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA Compliance
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINEDHIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
HIPAA MYTHS: HOW MUCH DO YOU KNOW? COMMON MYTHS DEBUNKED & EXPLAINED
 
What you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperabilityWhat you need to know about Meaningful Use 2 & interoperability
What you need to know about Meaningful Use 2 & interoperability
 
Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10Just the Facts- Meaningful Use Stage 2 & ICD 10
Just the Facts- Meaningful Use Stage 2 & ICD 10
 
Is Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for AuditingIs Your EHR Safe? New Technologies for Auditing
Is Your EHR Safe? New Technologies for Auditing
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

HIPAA: Can you be guilty by association?

  • 1. Guilty by Association? HIPAA, HITECH, and the role of Business Associates
  • 2. !"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&( !"#$%&'()*+,#-".)/#$0,&-1" 61#,(%)7+8-",' • 4*+,%+),%9):$+%&-1"%);-,):$+%&-1"%)1') 0<,& • 61#,(%)%*-#+%),'+),;,-*,8*+) 2+'&-3+#)4,'&"+')4'1.',5 566,788)*+,-./0)1923*4,#)*+8:-.;<:=>?8 • 4,%&)=+8-",'%),"#)'+01'#-".% 566,788)*+,-./0)1923*4,#)*+8(<@.0/38 !""#!"$%&'' (((#)*+,-./0)123*4,#)*+
  • 3. Welcome! Updating Business Associate requirements The roles of BAs, Subcontractors and Agents Amending Business Associate Agreements New Violation Categories and Penalties Audits, Remediation and Good Faith E!orts
  • 4. Changing BA Rules Prior to HITECH, management of ePHI security was loosely defined. The law required BAs to “use appropriate safeguards.” There was no standard relating to how data would be protected, and no way to validate whether the BA was actually following the standard.
  • 5. Changing BA Rules Encryption and virus protection as cases in point Laptops do not necessarily have discs encrypted Workstation users often disable virus protection System patching has also emerged as an issue
  • 6. Changing BA Rules Best intentions created worst-case scenarios Limited IT resources in many CEs Too many IT issues to handle BA changes inevitable given EMR adoption
  • 7. Redefining Business Associates BAs are “persons who, on behalf of a covered entity (but other than as members of the covered entity’s workforce) perform or assist in performing a function or activity that involves the use or disclosure of individually identifiable health information, or that otherwise is regulated by HIPAA.”
  • 8. Redefining Business Associates HITECH requires BAs to comply directly with Security Rule provisions directing implementation of administrative, physical and technical safeguards for ePHI and development and enforcement of related policies, procedures and documentation safeguards including designation of a security o"cial.
  • 9. Redefining Business Associates HITECH also imposes on the BA an obligation to comply directly with HIPAA BA safeguards, including limiting use and disclosure of ePHI as specified in the BAA or required by law, facilitating access and accounting for disclosures, opening books and records to DHHS, and returning or destroying all ePHI, if feasible, upon termination of the Business Associate Agreement.
  • 10. Redefining Business Associates HITECH deems BA to violate HIPAA if the BA “knows of a pattern of activity or practice” by the CE that breaches their BAA and if BA fails to cure the breach, terminate the BAA or report the non- compliance to DHHS.
  • 11. Subcontractors and Agents The BA must require subcontractors and agents to provide reasonable written assurance that they will comply with the same restrictions and conditions that apply to the BA under the terms of the BAA with respect to PHI.
  • 12. Required Capabilities Accounting of Disclosures and Audit Trail issues Accounting provision only covers “disclosures” CEs and BAs must account for narrow category Includes disclosures to law enforcement
  • 13. Required Capabilities Protecting Data BA restricts access to PHI via password, criteria Servers in secured computer room; limited access Data received and forwarded automatically Archives and backups in fireproof safe
  • 14. Required Capabilities Proper Disposal of Data At end of BAA, data deleted from BA systems No printed reports or paper copies retained by BA Printed reports are shredded upon completion
  • 15. Required Capabilities Privacy and Security Measures Employees, contractors, subs, agents must sign BA supports 128-bit encryption for all reports Restricted access to PHI on need-to-know basis Automatic expiration of passwords Restricted access to computer room, servers
  • 16. Required Capabilities Privacy and Security Measures Mandatory HIPAA training for all employees Monitored security system Automated data backups, stored in safe Automated virus checks Employee termination security procedures
  • 17. Elements of BAAs BA agrees not to use PHI outside requirements BA agrees to use appropriate safeguards BA mitigates disclosure that violates BAA BA reports disclosures to CE BA agrees to document disclosures
  • 18. Elements of BAAs BAA specifies purposes for use of PHI Functions, activities or services on behalf of CE May use PHI to provide data aggregation to CE May use PHI to report violations of the law
  • 19. Elements of BAAs CE must notify BA of limitations in privacy practice Notify BA of changes in PHI disclosure procedures Notify BA of any restriction of PHI use, disclosure
  • 20. Elements of BAAs BAA must set forth term and termination provision Upon termination, BA returns or destroys PHI Provision applies to subcontractor or agent PHI BA shall retain no copies of PHI If returning unfeasible, BA must specify conditions
  • 21. Amendments and Provisions There’s no clear consensus on the implications of HITECH for BAAs. Since HITECH directly regulates BAs and imposes new privacy and security obligations, there may be little need to update existing contracts. However, § 13401 and 13404 mandate that HITECH security and privacy provisions be “incorporated into the BAA.” Your need to amend may depend on existing language and interpretation by the parties to the agreement.
  • 22. Making the Transition CEs directly responsible for “workforce” conduct “Workforce” includes employees, volunteers Also trainees and others working under CE control
  • 23. Making the Transition A broader definition: Temporary employees, outsourced sta!, BA employees who are, by contract, the responsibility of the CE are all part of the CE “workforce.” CEs that fail to properly respond to BA non-compliance may have violated HIPAA.
  • 24. Making the Transition Enhanced enforcement provisions in HITECH may prompt CEs to seek broader assurances from BAs – some form of indemnification. BAs are likely to seek protection for actions taken at the direction of the CE, and to impose other limits on liability in connection with the BAA.
  • 25. New Violation Categories The person did not know (and by exercising reasonable diligence, would not have known) that action would lead to violation: $100 per violation; total per CY $25,000
  • 26. New Violation Categories Reasonable cause (not willful neglect): $1000 per violation; total per CY $100,000
  • 27. New Violation Categories Willful Neglect, corrected: $10,000 per violation; total per CY $250,000
  • 28. New Violation Categories Willful Neglect, uncorrected: $50,000 per violation; total per CY $1,500,000
  • 29. Audits, Remediation and Good Faith Efforts HIPAA audits are relatively new and still very rare. They include a site visit and an audit report. Site visits comprise interviews with stakeholders and examination of physical features of Health Information Systems. Site audits check physical safeguards, daily operations, adherence to policies and compliance with HIPAA requirements.
  • 30. Audits, Remediation and Good Faith Efforts HIPAA remediation addresses “gaps” identified via risk analysis. After “gap analysis” is complete, begin prioritizing remediation targets. “Quick hits” are key and can be anything your organization is confident will require little resources to correct ... and will often demonstrate “good faith” progress toward compliance.
  • 31. Audits, Remediation and Good Faith Efforts Remember ... problems will not all be of the same priority. Some problems will involve relatively flagrant or obvious violations of HIPAA privacy mandates. These generally need to be addressed as high priorities. Identify the resources needed to work through these issues first.
  • 32. Questions and Comments HIPAA, HITECH, and the role of Business Associates
  • 33. !"#$%&'()*+,&#$%&-*.+/+!)0&*1*+2+"%%3456'5*2+#'&(5'&( !"#$%&'()*+,&#$%&-*./ J/.06/.0 ! >!4??)215@*-,"0+ ! >!6/2>)?&&+%&,&-1" ! A+,"-".B$*)C%+)01'+)5+,%$'+)DE A3<<BC<+*B/0;BD"BC/1BEF/-4/6.*0 !""#!"$%&''BB ')5.<F< %--4:63/6< 566,788)*+,-./0)1923*4,#)*+8 G<(BHB&/:6BBI<@.0/3: 566,788)*+,-./0)1923*4,#)*+8(<@.0/38 !""#!"$%&'' (((#)*+,-./0)123*4,#)*+