230 likes | 375 Views
Privacy & Security Process and Tools Overview. Scott C Pettigrew Practice Consultant. The Approach. Prepare: Gather the knowledge, organizational information, and expertise to successfully perform a Privacy & Security audit. . Gather Knowledge. Research Am I a Covered Entity (CE)?
E N D
Privacy & Security Process and Tools Overview Scott C Pettigrew Practice Consultant
Prepare:Gather the knowledge, organizational information, and expertise to successfully perform a Privacy & Security audit.
Gather Knowledge • Research • Am I a Covered Entity (CE)? • How do the Privacy & Security rules affect your organization? • What are the possible implications if a breach occurs? • Perform Site Inventory • What technology is used in your practice? • Do these items transmit, process, or store EPHI? • Do you have a set of relevant policies and procedures? • Where are they located? • When were they last updated? • When did you last review them with your staff?
Assemble Your Team Internal Resources • Who are your designated Privacy/Security Officers? • Who in your organization has the most knowledge about technology and how it’s used? External Resources • IT Vendor • Parent or Affiliate Organization IT Security Staff • EHR Vendor • Regional Extension Center • Security Organizations
Tools: Preparation • REC-Provided Document:Privacy & Security Preparation: Necessary Resources
Tools: Preparation • ONC-Provided Document:HIT Security Risk Assessment Questionnaire:Inventory Assets (Preparation) http://www.healthit.gov/providers-professionals/core-measure-15
Soapbox: Encryption • Lost /stolen devices are a major cause of reported security breaches! • How would you prove what patient records were on a missing device? (Hint: If you don’t do daily backups, this is nearly impossible!)
Soapbox: Encryption • Encryption is not necessarily expensive! • Free Alternatives: • PC: Microsoft EFS, BitLocker, TrueCrypt • Apple OSX: FileVault, TrueCrypt
Tools: Preparation • REC-Provided Document:Computer & Mobile TechnologyEncryption Log
Identify:Assess each functional area and technology resource where EPHI is processed, stored, or transmitted to find areas of vulnerability.
Tools: Identification • Facility Walkthrough
Tools: Identification • Risk Assessment Questionnaire:Screening Questions (Step 1)
Prioritize:Examine each possible vulnerability, honestly rating the current systems’ effectiveness, likelihood of breaches, and the impact a breach would have.
Tools: Prioritization • Risk Assessment Questionnaire:People & Processes (Step 2a)
Tools: Prioritization • Risk Assessment Questionnaire:Technology (Step 2b)
Mitigate:For each identified area of vulnerability, maximize the effectiveness of existing controls, and minimize both the possibility of breach and the extent of damage should an unavoidable breach take place.
Tools: Mitigation • Risk Assessment Questionnaire:Findings – Remediation (Step 3)
Tools: Mitigation • REC-Provided Document:Identified Vulnerability Action Plan
Prepare:Continue to gather the knowledge, organizational information, and expertise to successfully review and update your Privacy & Security audit on a yearly basis.
Prepare Now In Case of Audit! • CMS recommends the following documentation be retained: Source:http://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/Downloads/EHR_SupportingDocumentation_Audits.pdf
Tools: Preparation • REC-Provided Document:Policy Review Log
Contact Us! • Visit us online at www.tristaterec.org • Email us at rec@healthbridge.org • Call us at 513-469-7222, ext. 3 • Follow us on Twitter: @HealthBridgeHIO • Like us on Facebook: www.facebook.com/pages/Cincinnati-OH/HealthBridge/128672340540952