1 / 33

The Quality Payment Program: Security Risk Assessment

The Quality Payment Program: Security Risk Assessment. Kim Salamone, PhD Vice President, Health Information Technology Chad Jans, MBA Health Informatics Specialist Health Services Advisory Group (HSAG). Disclosure.

colclough
Download Presentation

The Quality Payment Program: Security Risk Assessment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Quality Payment Program: Security Risk Assessment Kim Salamone, PhD Vice President, Health Information Technology Chad Jans, MBA Health Informatics Specialist Health Services Advisory Group (HSAG)

  2. Disclosure • I have nothing to report, nor are there any real or perceived conflicts of interest, implied or expressed, in the following presentation. Kim Salamone, PhD

  3. Agenda • Introduce HSAG • Wrap-up QPP—Year 1 (2017) • Security Risk Assessment • No-cost assistance • Questions

  4. Acronyms • Alternative Payment Model (APM) • Electronic Health Record (EHR) • Electronic Protected Health Information (ePHI) • Enterprise Identity Management (EIDM) • Health Care Quality Information Systems (HCQIS) Access Roles and Profile (HARP) • Health Insurance Portability and Accountability Act (HIPAA) • Merit-based Incentive Payment System (MIPS) • Meaningful Use (MU) • Office of the National Coordinator (ONC) • Quality Innovation Network-Quality Improvement Organization (QIN-QIO) • Quality Payment Program (QPP) • Security Risk Assessment (SRA) • Small, Underserved, and Rural Support (SURS) Program • Tax Identification Number (TIN)

  5. HSAG: Your Partner in Healthcare Quality • HSAG is the Medicare QIN-QIO for Arizona, California, Florida, Ohio, and the U.S. Virgin Islands. • QPP support for ≥16 eligible clinicians through the QIN-QIO • HSAG is the QPP technical assistance contractor for Hawaii, California, Arizona, Florida, New Mexico, and the U.S. Virgin Islands. • ≤15 eligible clinicians through the QPP SURS program

  6. QPP Year 1 (2017)Wrap-Up

  7. Audience Participation • Questions? • Are you submitting data for 2018? • How many of you are prepared to submit your 2019 MIPS? • Did you do a SRA?

  8. Fact Check • QPP Year 1 (2017) is in the books and we are now in the submitting data for Year 2 (2018)! • CMS Administrator Seema Verma announced via blog: • 91 percent of MIPS-eligible clinicians participated in Year 1. • 94 percent of eligible rural practices submitted MIPS data. • 98 percent of eligible ACOs participated. • MIPS Year 1 Final Reports were released on June 29, 2018. • Do you know how you performed?

  9. Lessons Learned from MIPS Year 1 (2017) Did not have all staff on board with the requirements Did not take the time to educate themselves Did not monitor progress or switched measures too late Did not confirm submitted data or relied on others Did not have EIDM account set-up or let password expire Did not submit early or waited at the last minute Did not submit data under all TINs when “Included” Did not submit enough data or reach data completeness Did not ___? Fill in the blank. Did not prepare for vendor issues or delays (no back-up plan)

  10. Security Risk Assessment

  11. ONC’s Top 10 Myths of SRA • The SRA is optional for small providers. • Simply installing a certified EHR fulfills the PI requirement. • My EHR vendor took care of everything I need to do about privacy and security. • I have to outsource the SRA. • A checklist will suffice for the risk analysis requirement. Source: HealthIT.gov website. Accessed on January 22, 2019. Available at https://www.healthit.gov/topic/privacy-security/top-10-myths-security-risk-analysis

  12. ONC’s Top 10 Myths of SRA (cont.) • There is a specific risk assessment method that I must follow. • My SRA only needs to look at my EHR. • I only need to do a risk assessment once. • Before I attest, I must fully mitigate all risks. • Each year, I will have to completely redo my SRA. Source: HealthIT.gov website. Accessed on January 22, 2019. Available at https://www.healthit.gov/topic/privacy-security/top-10-myths-security-risk-analysis

  13. What Is Required Under the HIPAA Security Rule? • The HIPAA Security Rule requires healthcare providers, health plans, and business associates to conduct risk assessment and implement technical, physical, and administrative safeguards to protect ePHI. • Administrative (e.g., security management process) • Physical (e.g., security badges) • Technical (e.g., encryption on the network) Source: HealthIT.gov website. Accessed on January 22, 2019. Available at https://www.healthit.gov/sites/default/files/page/2018-10/SRA_Tool_User_Guide_101518.pdf

  14. SRA Tool 3.0 (SRA 3.0) • The ONC for Health IT worked together with the Office for Civil Rights, which enforces the HIPAA Security Rule, to develop this tool to assist providers and business associates with meeting their responsibility to protect ePHI. • The tool is designed to assist an organization with its review and documentation of its risk assessment. • A thoroughly completed SRA 3.0 will make you aware of areas where attention is needed to bring your organization into compliance with the HIPAA Security Rule. Source: HealthIT.gov website. Accessed on January 22, 2019. Available at https://www.healthit.gov/sites/default/files/page/2018-10/SRA_Tool_User_Guide_101518.pdf

  15. SRA 3.0 (cont.) • The SRA 3.0 Tool is a Windows-based single downloadable module that runs on your computer. • The legacy iOS SRA Tool 2.0 application for iPad can be downloaded from the Apple App Store. • The SRA 3.0 Tool uses a wizard based workflow and section summary reporting that provides feedback and progress indicators as the risk assessment is worked through. • The SRA 3.0 Tool supports multiple user accounts and a collaborative file sharing feature. Source: HealthIT.gov website. Accessed on January 22, 2019. Available at https://www.healthit.gov/sites/default/files/page/2018-10/SRA_Tool_User_Guide_101518.pdf

  16. Additional Resources for SRA on HealthIT.gov • A paper-based version of the Legacy SRA Tool Version 2.0 can be downloaded, and printed, along with the companion SRA Tool 2.0 User Guide. • SRA Videos. • A Model Privacy Notice (MPN) • Privacy and Security Resources and Tools for providers and consumers. • https://www.healthit.gov/topic/privacy-security-and-hipaa Source: HealthIT.gov website. Accessed on January 22, 2019. Available at https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment

  17. Let’s Get Started

  18. Downloading the Tool • Download the tool from the HealthIT.gov website. • https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment • Once downloaded, run the downloaded executable file to begin installation. • When installation is complete, double click on the SRA-Tool icon to begin. • Hardware Requirements: • Windows 7/8/10 • 2 GHz Pentium processor • 2 GB RAM

  19. Starting an Assessment • SRA 3.0 Tool must be downloaded and installed on a compatible system. • The first steps to starting a new assessment are entering a user name of your choosing, creating a file name for your SRA, and selecting a location to save your SRA file. • Select “START NEW SRA”. • Enter a user name. Click “Continue.” • Select “Pick a spot to save your SRA file.” This launches a system-file browser. • In order to begin a new assessment and save progress, a location and file name for the .SRA file must be selected. • Choose a location and file name for the assessment, click “Save” when finished. Click “Continue” to move forward.

  20. Starting a New Assessment Source: SRA Tool V.3.0 User Guide, pg. 5

  21. Go to Tool: Fill Out Practice Information

  22. Look at Reports

  23. Risk report screenshot Source: SRA Tool V.3.0 User Guide, pg. 18

  24. SRA Maintenance • Log into your QPP account using your HARP credential every 60 days to keep it active. • Update your SRA yearly and keep documentation. • Develop necessary policies and procedures. • Update assets each time a new piece of equipment is purchased that will contain ePHI or disposed of that contains ePHI. • Review and update business associate agreements yearly. • Ensure mobile devices used in the practice are secured.

  25. Securing Mobile Devices • Use a password or other user authentication. • Install and enable encryption. • Install and activate remote wiping and/or remote disabling. • Disable and do not install or use file sharing applications. • Install and enable a firewall. • Install and enable security software. • Keep security software up to date. • Research mobile apps before downloading. • Use adequate security to send or receive health information over public Wi-Fi networks. • Delete all stored health information before discarding or reusing the mobile device. https://www.healthit.gov/topic/privacy-security-and-hipaa/how-can-you-protect-and-secure-health-information-when-using-mobile-device

  26. Paper Tool

  27. Administrative Safeguards • A1 - §164.308(a)(1)(i) Standard Does your practice develop, document, and implement policies and procedures for assessing and managing risk to its ePHI? • When you are finished with each question:

  28. Physical Safeguards • PH1 - §164.310(a)(1) Standard Do you have an inventory of the physical systems, devices, and media in your office space that are used to store or contain ePHI? • When you are finished with each question:

  29. Technical Safeguards • T1 - §164.312(a)(1) Standard Does your practice have policies and procedures requiring safeguards to limit access to ePHI to those persons and software programs appropriate for their role? • When you are finished with each question:

  30. How Do I Get Help?

  31. Call to Action–Request No-Cost Assistance • Request the appropriate technical assistance now! • QPP support for practices with 15 or less clinicians under TIN, visit https://goo.gl/MTGhua • QPP support for practices with 16 or more clinicians under TIN, visit https://www.hsag.com/QPPEnroll www.hsag.com/QPP

  32. Questions

  33. Thank you! Kim Salamone, PhD HSAG Vice President, Health Information Technology 602.801.6960| Ksalamone@hsag.com

More Related