16
HIPAA/HITECH Security and Privacy HIPAA/HITECH Security and Privacy A Practical Approach A Practical Approach Presented by: Presented by: Raj Chaudhary, PE, CGEIT Partner, Crowe Horwath LLP h th /hi Chris Reffkin, CISSP Manager, Crowe Horwath LLP www.crowehorwath.com/hipaa

HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

HIPAA/HITECH Security and PrivacyHIPAA/HITECH Security and PrivacyA Practical ApproachA Practical Approach

Presented by:Presented by:Raj Chaudhary, PE, CGEITPartner, Crowe Horwath LLP

h th /hi

Chris Reffkin, CISSPManager, Crowe Horwath LLP

www.crowehorwath.com/hipaa

Page 2: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Learning Objectives and Agenda Introduction Holistic View of HIPAA A Picture is Worth a Thousand Words A Picture is Worth a Thousand Words… Overall 5-Step Approach to HIPAA Compliance Top 5 HIPAA Security and Privacy Gapsy y Meaningful Use/CMS Incentives/EHR Certification Approach to EHR Certification and Compliance (Security) Top 5 Considerations for Self EHR Certification (Security) Q&A

© 2011 Crowe Horwath LLP 2Audit | Tax | Advisory | Risk | Performance

Page 3: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Holistic View of HIPAA There is more than just EHRs with PHI…

Email

Network DevicesWorkstations

EHRsFile Servers and Shares

Other Applications

(e.g. Radiology,

L b)

Faxes and Mail

Lab)

© 2011 Crowe Horwath LLP 3Audit | Tax | Advisory | Risk | Performance

Page 4: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

A Picture is Worth a Thousand Words…

Workstation in the On Unlocked andWorkstation in the On Call room had been left logged in for 40 minutes and was discovered

Unlocked and unattended file cabinets with PHI.

unattended.

L b l ft tt d d

© 2011 Crowe Horwath LLP 4Audit | Tax | Advisory | Risk | Performance

Labs left unattended and unlocked.

Page 5: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Overall 5-Step Approach to HIPAA Compliance

Security1. Policy Gap Analysis2 Application Inventory (50-70 Apps

Privacy1. Policy Gap Analysis2 Agree on privacy survey2. Application Inventory (50-70 Apps

w/PHI) and Risk Rating3. Gap Analysis

) T # (6 10) Hi h Ri k A li ti

2. Agree on privacy survey participants with CMO

3. Conduct privacy survey of selected departmentsa) Top x # (6-10) High-Risk-Applications

Application Control Gap Analysisb) Entity Level Controls Gap Analysis

4 Survey Based Gap Analysis of

selected departments4. Update Gap Analysis from Step 1

with Results of Survey4. Survey Based Gap Analysis of

Remaining Applications

5 Common Step for Security and Privacy5. Common Step for Security and Privacy• Walk Through Observations• Picture is worth a thousand words

© 2011 Crowe Horwath LLP 5Audit | Tax | Advisory | Risk | Performance

End Result: Risk Ranked Remediation Plan

Page 6: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Top 5 HIPAA Security and Privacy Gaps1. Safeguarding Data from Unauthorized Individuals/Physical Security

2. Vendor Management Function/Business Associate Processes

© 2011 Crowe Horwath LLP 6Audit | Tax | Advisory | Risk | Performance

Page 7: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Top 5 HIPAA Security and Privacy Gaps3. Entity Level IT Security Governance

4. Inadequate Application Logging and Monitoring

5. Weak Application Access Control Processes

© 2011 Crowe Horwath LLP 7Audit | Tax | Advisory | Risk | Performance

Page 8: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Meaningful Use/CMS Incentives/EHR Certificationg

© 2011 Crowe Horwath LLP 8Audit | Tax | Advisory | Risk | Performance

Page 9: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Meaningful Use -15 Core Objectives NUMBER DESCRIPTION METRIC OR % OF PATIENTS Core 1 Record Patient Demographics >50% Structured Data Core 2 Record Vital Signs/Chart Changes >50% Structured Data Core 3 Up-to-date List of Current Diagnosis >80% - at least one entry Core 4 Maintain Active Medication List >80% - at least one entry Core 5 Maintain Active Medication Allergy >80% - at least one entry Core 6 Record Smoking Status >13 Years Age >50% Structured Data Core 7 (Hosp ) On Request E Copy of Hospital Discharge >50% Patients Discharged Core 7 (Hosp.) On Request E-Copy of Hospital Discharge >50% Patients Discharged Core 7 (Phys.) Clinical Summary of Office Visit >50% Patients Within 3 Days Core 8 On Request Electronic Copy of Health Inf. >50% Requesting Within 3 Days Core 9 Generate/Transmit Permissible Prescriptions >40% E-Transmit Certified EHRp Core 10 CPOE for Medication Orders >30% At Least 1 Medication Core 11 Implement Drug-Drug/Allergy Interaction Functionality is Enabled Core 12 E-Exchange of Clinical Information 1 Test of E-Exchange of HER Core 13 Implement 1 Clinical Decision Support Rule 1 Rule Implemented Core 14 Implement Security/Privacy of Patient Data Review Security Risk Analysis

Implement Security UpdatesCorrect Security Deficiencies

© 2011 Crowe Horwath LLP 9Audit | Tax | Advisory | Risk | Performance

Correct Security Deficiencies Core 15 Report Clinical Quality Measures to CMS

Page 10: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Approach to EHR Certification and Compliance (Security) Vendor Supplied/Certified EHR Technology Upgrade to certified version Verification of Vendor Certification

In-House Developed EHR Technology CCHIT EHR Alternative Certification for Hospitals (EACH) Programp ( ) g Approved Test Procedures v1.1 (NIST) 45 Certification Criteria to be tested 8 of which are security-focused

© 2011 Crowe Horwath LLP 10Audit | Tax | Advisory | Risk | Performance

Page 11: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Approach to EHR Certification and Compliance (Security) Security Focused Certification Criteria Access Control Emergency Access Automatic Log-Off Audit Log Integrity Authentication General Encryption Encryption when Exchanging Electronic Health Information

Should look familiar in regards to your overall HIPAA Security and Privacy Compliance Program…p g

© 2011 Crowe Horwath LLP 11Audit | Tax | Advisory | Risk | Performance

Page 12: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Approach to EHR Certification and Compliance (Security) The requirements for EHR Certification correlate to Standards and

Implementation Specifications from the HIPAA Security Rule

Approved Test Certification Criteria / HIPAA HIPAA/HITECHApproved Test Procedures v 1.1

Certification Criteria / HIPAA (Standard or Imp. Spec.)

HIPAA/HITECHReference

§170.302 (o) Access Control §164.312(a)(1)

§170.302 (p) Emergency Access §164.312(a)(2)(iii)

§170.302 (q) Automatic Log-Off §164.312(a)(2)(iii)

§170.302 (r) Audit Log §164.312(b)

§170.302 (s) Integrity §164.312(c)(1)

§170.302 (t) Authentication §164.312(d)

§170.302 (u) General Encryption §164.312(a)(2)(iv)

§170 302 ( ) E ti h E h i §164 312( )(2)(ii)

© 2011 Crowe Horwath LLP 12Audit | Tax | Advisory | Risk | Performance

§170.302 (v) Encryption when Exchanging Electronic Health Information

§164.312(e)(2)(ii)

Page 13: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Top 5 Considerations for Self EHR Certification (Security) Independence and Developers Consider implications of in-house testing “…the Tester remains in full control of the testing process, directly observes the test

data being entered by the Vendor, and validates that the test data are entered correctly as specified in the test procedure. “

Audit Logs A developer/debug log is generally not the same as an audit log; specific

requirements for log details are provided by certification criteria Consider overall benefits to organization versus just meeting the requirements; a

tool or utility may be useful in general to manage logging and monitoring of events

Encryption Balanced knowledge of HIPAA/Meaningful Use as well as technology required to

fully understand in order to apply “common sense”

© 2011 Crowe Horwath LLP 13Audit | Tax | Advisory | Risk | Performance

Page 14: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Top 5 Considerations for Self EHR Certification (Security) Integration with Overall HIPAA Compliance Efforts Ensure all members of the HIPAA Compliance Committee and/or the HIPAA Security

and Privacy Officers are collaborating on certification efforts Verify direction of overall HIPAA compliance efforts align with certification efforts Want to avoid designing a control for certification that contradicts efforts or not does not follow

direction of overall HIPAA compliance program

Ongoing Maintenance Release version 2 of Approved Test Procedures anticipated April 2011

© 2011 Crowe Horwath LLP 14Audit | Tax | Advisory | Risk | Performance

Page 15: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

Q&A

© 2011 Crowe Horwath LLP 15Audit | Tax | Advisory | Risk | Performance

Page 16: HIPAA/HITECH Security and PrivacyHIPAA/HITECH …The Unique Alternative to the Big Four ® Holistic View of HIPAA There is more than just EHRs with PHI… Email Network Devices Workstations

The Unique Alternative to the Big Four®

For more information, contact or visit:Raj ChaudharyDirect: 312.899.7008Mobile: [email protected]

Chris ReffkinDi t 317 208 2547Direct: 317.208.2547Mobile: [email protected]

Or visit:www.crowehorwath.com/hipaa

Crowe Horwath LLP is an independent member of Crowe Horwath International, a Swiss verein. Each member firm of Crowe Horwath International is a separate and independent legal entity. Crowe Horwath LLP and its affiliates are not responsible or liable for any acts or omissions of Crowe Horwath International or any other member of Crowe Horwath International and specifically disclaim any and all responsibility or liability for acts or omissions of Crowe Horwath International or any other Crowe Horwath International member. Accountancy services in Kansas and North Carolina are rendered by Crowe Chizek LLP, which is not a member

f C H th I t ti l Thi t i l i f i f ti l l d h ld t b t d fi i l l l d i Pl k id

© 2011 Crowe Horwath LLP 16Audit | Tax | Advisory | Risk | Performance

of Crowe Horwath International. This material is for informational purposes only and should not be construed as financial or legal advice. Please seek guidance specific to your organization from qualified advisers in your jurisdiction. © 2011 Crowe Horwath LLP