54
BILL LANE AND MARGARET LALLY STARTEL’S CONTRIBUTIONS TO YOUR HIPAA COMPLIANCE

Startel’s Contributions to your hipaa compliance

  • Upload
    arissa

  • View
    50

  • Download
    1

Embed Size (px)

DESCRIPTION

Startel’s Contributions to your hipaa compliance. Bill lane and Margaret Lally. Agenda. Overview of HIPAA Startel’s HIPAA/HITECH Assessment Report Findings & Recommendations HIPAA /HITECH Compliance Program Assessment Report - PowerPoint PPT Presentation

Citation preview

Page 1: Startel’s  Contributions to your  hipaa  compliance

B I L L L A N E A N D M A R G A R E T L A L LY

STARTEL’S CONTRIBUTIONS TO YOUR HIPAA COMPLIANCE

Page 2: Startel’s  Contributions to your  hipaa  compliance

AGENDA

Overview of HIPAA Startel’s HIPAA/HITECH Assessment Report Findings & Recommendations

HIPAA/HITECH Compliance Program Assessment Report HIPAA Security Rule - Technical Safeguards Application

Assessment Report for ePHI Compliance HIPAA Security Best Practices Summary

Page 3: Startel’s  Contributions to your  hipaa  compliance

OVERVIEW OF HIPAA

Page 4: Startel’s  Contributions to your  hipaa  compliance

HIPAA – WHAT IS IT?

The Health Insurance Portability & Accountability Act of 1996 (HIPAA) required the Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information

Page 5: Startel’s  Contributions to your  hipaa  compliance

HIPAA – WHAT IS IT? CONTINUED

HHS published what are commonly known as the HIPAA Privacy Rule & HIPAA Security Rule Help to protect the privacy of a individual’s health

information Allow covered entities to adopt new technologies to improve

the quality and efficiency of patient care

Page 6: Startel’s  Contributions to your  hipaa  compliance

HIPAA SECURITY RULE

The Security Standards for the Protection of Electronic Protected Health Information, or the Security Rule, is a national set of security standards for protecting certain health information that is held or transferred in electronic form (ePHI) Addresses the administrative, physical & technical

safeguards that covered entities must put in place to secure ePHI Technical safeguards include access control, audit controls,

integrity controls and transmission security Each of these technical safeguards can be addressed with software

solutions, like encryption technology

Page 7: Startel’s  Contributions to your  hipaa  compliance

COVERED ENTITY VS. BUSINESS ASSOCIATE

Page 8: Startel’s  Contributions to your  hipaa  compliance

COVERED ENTITY VS. BUSINESS ASSOCIATE Business Associate (BA): A person or organization

that performs a function on behalf of a CE.

Examples include: Software Vendors (such as STARTEL) Third-party Billing Companies Claims Processors Collections Agencies Outsourced Contact Centers/Telephone answering

services

Page 9: Startel’s  Contributions to your  hipaa  compliance

BUSINESS ASSOCIATE REQUIREMENTS Ensure the confidentiality, integrity and availability of all

ePHI that is created, received, maintained or transmitted

Protect against any reasonably anticipated threats or hazards to the security or integrity of such information

Protect against reasonably anticipated uses or disclosures of such information that are not permitted by the HIPAA Privacy Rule

Ensure compliance by workforce

Page 10: Startel’s  Contributions to your  hipaa  compliance

STARTEL’S HIPAA/HITECH ASSESSMENT

Page 11: Startel’s  Contributions to your  hipaa  compliance

OVERVIEW

Auditing Firm: Hired Coalfire Systems Annual, 3-year engagement

Objective: To perform an assessment of the controls in place to satisfy requirements of the HIPAA Security Rule, HITECH & Omnibus Rule

Assessment Period: September – December Locations Assessed: Startel HQ & Colo (Latisys)

Page 12: Startel’s  Contributions to your  hipaa  compliance

PROJECT ACTIVITIES

1. Performed an environment characterization to understand the uses/flows of ePHI throughout Startel2. Reviewed policies/procedures to identify compliance gaps3. Reviewed the controls in place to satisfy the IT security-related requirements of HIPAA, HITECH and Omnibus Rule4. Performed control analysis and testing for the purpose of understanding the level of operating effectiveness5. Provided detailed assessment results outlining Startel’s HIPAA compliance posture, as well as recommendations

Page 13: Startel’s  Contributions to your  hipaa  compliance

STARTEL’S ACTIVITIES

Performed a risk analysis Implemented information system policies & procedures Named a security official Defined workforce clearance/termination procedures Implemented user access rights Performed (annual) training and periodic security updates Protection from malicious software

Page 14: Startel’s  Contributions to your  hipaa  compliance

STARTEL’S ACTIVITIES CONTINUED

Log-in monitoring and audit controls Password management Data back-up plan Tested Startel applications in Coalfire Lab Acquired secure shredding bins Created breach notification procedures Modified ATSI Sample BA agreements for users to sign

Page 15: Startel’s  Contributions to your  hipaa  compliance

REPORT FINDINGSHIPAA/HITECH COMPLIANCE PROGRAM ASSESSMENT REPORT

Page 16: Startel’s  Contributions to your  hipaa  compliance

REPORT KEY

Full compliance for a given requirement is based on two objectives: Assess whether or not the Startel has defined

policies/procedures to meet the requirement Determine if appropriate controls have been implemented

If requirements are not fully met, the compliance status is identified as “Partially Compliant”

Standards and implementation specifications that don’t apply to Startel are identified as “Not Applicable” (N/A)

Page 17: Startel’s  Contributions to your  hipaa  compliance

STARTEL’S HIPAA COMPLIANCE SCORECARD

Page 18: Startel’s  Contributions to your  hipaa  compliance

STARTEL’S HIPAA COMPLIANCE POSTURE

Page 19: Startel’s  Contributions to your  hipaa  compliance

ADMINISTRATIVE SAFEGUARDS

Page 20: Startel’s  Contributions to your  hipaa  compliance

ADMINISTRATIVE SAFEGUARDS CONT.

Page 21: Startel’s  Contributions to your  hipaa  compliance

PHYSICAL SAFEGUARDS

Page 22: Startel’s  Contributions to your  hipaa  compliance

TECHNICAL SAFEGUARDS

Page 23: Startel’s  Contributions to your  hipaa  compliance

ORGANIZATIONAL SAFEGUARDS

Page 24: Startel’s  Contributions to your  hipaa  compliance

POLICES, PROCEDURES & DOCUMENTATION REQUIREMENTS

Page 25: Startel’s  Contributions to your  hipaa  compliance

HITECH ACT & OMNIBUS RULE – IT SECURITY PROVISIONS

Page 26: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

WORKFORCE SECURITY: Workforce Clearance Procedure (A)

Create procedures for obtaining appropriate sign-offs to grant or terminate access to ePHI

Modify Company policies to require that background checks be performed on all potential employees prior to hire

Page 27: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

INFORMATION ACCESS MANAGEMENT: Access Establishment and Modification (A)

Ensure that documented review is performed monthly of user access and privileges

Page 28: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

SECURITY INCIDENT PROCEDURES: Testing and Revision Procedure (A)

Review and test BCDR Plan on an annual basis Document results and implement improvements

Page 29: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

ACCESS CONTROL: Encryption & Decryption (A)

Ensure that ePHI is encrypted at rest. This includes managed clients’ CMC databases but also Startel Appointment Scheduler and Startel Secure Messaging databases.

Page 30: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

AUDIT CONTROLS: Change Management (R)

Ensure that all changes to hardware and software in ePHI environment require formal Change Management policy and strategy for production systems

Page 31: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

POLICIES, PROCEDURES AND DOCUMENTATION: Updates (R)

Review Company’s IT policies and procedures annually Document changes to environment and any potential risks

Page 32: Startel’s  Contributions to your  hipaa  compliance

REPORT FINDINGSHIPAA SECURITY RULE – TECHNICAL SAFEGUARDS APPLICATION ASSESSMENT REPORT FOR EPHI COMPLIANCE

Page 33: Startel’s  Contributions to your  hipaa  compliance

OVERVIEW

Objectives: To determine if the HIPAA Security Rule for ePHI applies to

Startel’s Application Suite To determine if Startel’s Application Suite is compliant with

HIPAA’s Technical Safeguards via Lab Testing Assessment Period: December 10-14, 2013 Testing Access: Remote

Page 34: Startel’s  Contributions to your  hipaa  compliance

PROJECT SCOPE

Page 35: Startel’s  Contributions to your  hipaa  compliance

PROJECT SCOPE CONTINUED

Page 36: Startel’s  Contributions to your  hipaa  compliance

PROJECT ACTIVITIES

1. Testing of Startel’s Application Suite in Coalfire’s lab environment including:

a. Lab set-up and application implementation following vendor guidanceb. Technical testing of the application in the lab environmentc. Review of all relevant documentationd. Interview of vendor personnel

2. Completion of the HIPAA Security Rule – Technical Safeguards Assessment Report

Page 37: Startel’s  Contributions to your  hipaa  compliance

SUMMARY RESULTS

On January 3, 2014, Coalfire complete the full assessment testing process and found the Startel Application Suite to be fully compliant with all applicable requirements of HIPAA’s Technical Safeguards (Part 164.312)

Page 38: Startel’s  Contributions to your  hipaa  compliance

KEY FEATURES OF STARTEL’S HIPAA-COMPLIANT APPLICATION SUITE Unique User Identification (R) Emergency Access Procedures (R) Automatic Log Off (A) Encryption and Decryption (A) Audit Controls (R) Mechanism to Authenticate ePHI (A) Person or Entity Authentication (R) Integrity Controls (A) Encryption of Transmitted ePHI (A)

Page 39: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Unique User Identification (R) Develop & maintain access control documentation of the

applications access controls in relation to establishing unique user IDs

Emergency Access Procedure (R) Application users should develop & maintain a BCDR

plan; include how to restore application and access to ePHI data

Page 40: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Automatic Log Off (A) Develop & maintain access control documentation in

relation to how the application enforces automatic log off of sessions Changing log-off for period of inactivity from 30 mins to 15 mins

Page 41: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Encryption/Decryption (A) Develop & maintain encryption documentation which

describes how the application implements requirements for encrypting/decrypting ePHI at rest

Encrypt ePHI stored by the application (data at rest) using strong encryption algorithms and key lengths

Page 42: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Audit Controls (R) Develop and maintain audit control documentation which

describes how the application implements requirements for audit and logging of access to ePHI

Maintain a log of all activity in application

Page 43: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Mechanism to Authenticate ePHI (A) Develop & maintain documentation which describes how

the application implements requirements to protect ePHI from improper alteration of destruction

Employ encryption technology/integrity-checking controls to detect a change to ePHI made outside the application

Page 44: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Person or Entity Authentication (R) Develop & maintain encryption documentation which

describes how the application implements requirements for verifying access to ePHI is limited to the one claiming access

Authenticate each user or entity for each device they are permitted to use to access ePHI

Page 45: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Integrity Controls (A) Develop & maintain encryption documentation which

describes how the application implements ePHI requirements for integrity of transmission of ePHI

Employ electronic mechanisms to ensure that ePHI transmitted across networks is not improperly modified without detection until disposed of

Page 46: Startel’s  Contributions to your  hipaa  compliance

RECOMMENDATIONS

Encryption of Transmitted ePHI (A) Develop & maintain documentation which describes how

the application implements ePHI requirements for encryption of transmitted ePHI

Encrypt ePHI using strong algorithms & key lengths (SSL/TLS)

Certificates should be signed by a Certificate Authority, not self-signed

Page 47: Startel’s  Contributions to your  hipaa  compliance

HIPAA SECURITY BEST PRACTICES

Page 48: Startel’s  Contributions to your  hipaa  compliance

SAFEGUARD YOUR ORGANIZATION

Perform a risk assessment of your environment Implement/update IT policies to include HIPAA Name a security official Ensure user IDs are unique; review user access

rights Monitor log-ins Create/update workforce clearance and

termination procedures to ensure it addresses HIPAA

Page 49: Startel’s  Contributions to your  hipaa  compliance

SAFEGUARD YOUR ORGANIZATION CONT. Perform annual training and periodic security

updates Install protection from malicious software Update passwords following HIPAA

recommendations Implement/update/test BCDR plan Issue/Sign BA agreements with CE/BA/sub-

contractors Create breach notification procedures

Page 50: Startel’s  Contributions to your  hipaa  compliance

WHAT YOU CAN DO TO PROTECT PHI/EPHI Lock computer workstation when not at desk Lock up portable devices and documents that may

contain sensitive information at the end of each work day

Don’t forward work emails with sensitive info to personal email accounts

Don’t upload sensitive info to unauthorized websites

Page 51: Startel’s  Contributions to your  hipaa  compliance

WHAT YOU CAN DO TO PROTECT PHI/EPHI CONTINUED When traveling, keep equipment in your

possession Don’t leave documents that contain PHI on

printers or fax machines, or on your desk when you are not there

Dispose of papers containing PHI via secure shredding bin

When exiting a screen, close out of all systems

Page 52: Startel’s  Contributions to your  hipaa  compliance

SUMMARY

Page 53: Startel’s  Contributions to your  hipaa  compliance

IN CONCLUSION

Startel & Startel Application Suite have been deemed HIPAA-compliant by Coalfire Systems!

Reports available for users on Startel Partner Portal Reproduction or distribution of the Reports with any non-

user (end user included) requires approval from Coalfire and Startel

For questions regarding Startel’s HIPAA-compliance, contact [email protected]

Page 54: Startel’s  Contributions to your  hipaa  compliance

THANK YOU!

Questions & Answersall questions are good questions