410 likes | 425 Views
Understand the importance of HIPAA compliance for counties and the significance of conducting risk assessments. Learn how to identify vulnerabilities, assess risks, and mitigate them effectively. Explore the key elements of a risk assessment process and its ongoing nature in maintaining security of protected health information (PHI). Discover the regulatory requirements, ethical considerations, and best practices for ensuring compliance. Enhance your knowledge to prevent security violations and protect PHI in all forms.
E N D
Iowa State Association of Counties Risk Assessment-what, why and how October 21, 2016
Midwest Compliance Associates • Full service health care compliance consulting firm • HIPAA compliance and training • Gary Jones, JD, CHC, CHPC
Does HIPAA even apply to counties? • Protected Health Information (PHI) is individually identifiable health information that is: Created or received by a health care provider, health plan, employer, or health care clearinghouse that • Relates to the past, present, or future physical or mental health or condition of an individual; • Relates to the provision of health care to an individual • The past, present or future payment for the provision of health care to an individual.
All PHI created, received, stored or transmitted by an organization is subject to the Security Rule • There is no, “we don’t do enough to be covered by HIPAA” exception
Essential to look at phi in all forms: e-mail, hard drives, laptops, work stations, servers, backup tapes, smart cards, mobile devices, copiers, etc. • Complete protection is not possible, looking for reasonable
What is required since we have PHI? • Implement policies and procedures to prevent, detect, contain and correct security violations • Risk Assessment is just one part of the puzzle
Generally Accepted Compliance Principles Expectations Regulations, Ethical Behavior, Policies Prevention Education Ethical Culture Code of Conduct Controls Look for Problems Auditing Monitoring Reporting Issues Risk Assessment Evaluate Investigation Measure Effectiveness Fix and Follow Up Corrective Action Enforce and Discipline Report Report to Board Issues/Compliance Activities Disclosure Program
North Memorial Health Care of Minnesota Business Associate lost a laptop from a locked car Laptop was not encrypted No Business Associate Contract in Place No Risk Assessment had been conducted $1.55 million settlement
Risk Assessment • Risk Assessment is the first step in building a Security Management Plan • What is Risk Assessment? • Risk Identification Process • Risk Assessment Process • Rick Vulnerability/Impact • Risk Mitigation
We all conduct risk assessments each and every day • Joe wakes up to his alarm clock • “should I get up and go to work or should I sleep in?” • He asks himself: What is on my schedule? What really has to be done today? What would happen if I slept in today?
Once Joe considers the impact of sleeping in he consider how vulnerable he is to the impact How often has he slept in? Would anyone notice if he was late to work? Can he hit snooze and still get everything done without being noticed?
Risk Assessments can take many forms • From the simple evaluation Joe did to a complicated underwriting evaluation • Formal – once a year • Informal – occur much more frequently • Simply a way to identify and evaluate exposures/vulnerabilities and establish a plan to mitigate that risk
Definitions • Risks – events or conditions that may occur and, if they do, would have a harmful impact on the organization • Inherent risk • Residual risk
A risk assessment is a snapshot of the organization from a compliance perspective • OIG (Office of Inspector General) suggests the snapshot becomes the baseline against which progress is judged
A bit of history… • Federal Sentencing Guidelines (1998) set forth the 7 elements of an effective compliance program • Sarbanes-Oxley (2002) introduced the “internal control report” that includes performance of a fraud risk assessment
FSG revised in 2004. “organizations should evaluate the nature and seriousness of potential criminal conduct, the likelihood that conduct may occur because of the nature of the organization’s business and the prior history of the organization”
HIPAA • 45 CFR 164.308(a)(1)(ii)(A) • Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity and availability of e-PHI held by the organization –Required Specification • Find the soft spots!
According to HHS, risk assessment is foundational; the first step in identifying and implementing safeguards that comply with the Security rule • RA is not a one time event, rather something that happens on a regular on-going basis • One size does not fit all
To be a valid process, the Privacy Officer must engage leadership in: Identification of compliance risks Establishing “risk appetite” Buy-in and approval of risk mitigation process, and Ongoing monitoring of the risk mitigation plan
Risk Identification Process • First step in RA is to identify what the risks are that impact the organization • Potential risks can come from many different directions: regulations and laws, litigation, former employees, etc. • Important to consider as many sources of risk as possible
Risk Identification Process • Not a solo act. Requires input from all aspects of the organization • More input will result in more risks being identified • Important to consider which process will be most effective based on the organization
3 Primary Approaches • Using written, open-ended questions in a survey of key personnel • Personal interview or small group meetings • Pre-defined list of potential risks
Open ended survey questions • Somewhat generic in nature • Rely on the expertise of the person being surveyed • Allows the Privacy Officer to “know what they don’t know” • Very important to also include potential risk areas raised by trade and governmental publications, prior audit results, litigation, etc.
Examples • In your opinion, what are the top 10 compliance risks for this organization? • Are there any aspects of your job with which you are uncomfortable from a legal or regulatory standpoint? • What should be the number one focus for compliance?
May result in a large volume of potential risks being identified • Difficult to prioritize and develop a plan for mitigation of each risk • High “wild goose chase” potential
Personal Interviews • Utilize same type of open ended questions • Allows interviewer to probe deeper and gain more understanding of the risks • Explore possible avenues for mitigation
Time consuming • Resource intensive • Increased expense • Tend to use a smaller sample size
Pre-defined list of risks • Much more structured approach • Sent to key stakeholders and internal process experts • Asked to identify potential for risk realization
List sources • Office of Inspector General (OIG) • Office for Civil Rights (OCR) • NIST • HIPAA-COW • DOJ
Additional sources • Prior history of non-compliance • Audit reports – internal and external • Risk management cases • Quality assurance reviews • Compliance hotline reports • Employee exit interviews
Risk Assessment Process • Next step is to assess and score the identified risks • Integrity of the process depends on well defined scoring criteria • Without well defined criteria, it is impossible to effectively evaluate and prioritize
Risk Assessment Process • Each identified risk is assigned a score (numerical, HML, etc.) • Looking at the likelihood of that particular risk actually occurring • Consider current security measures in place when looking at likelihood
Vulnerability • With the security measures in place, how likely is it: • Someone can compromise the confidentiality of ePHI? • Someone might inappropriately alter or delete ePHI which impacts integrity • ephi might not be available when you need it
Determining vulnerability can be a moving target • Inherent risk • Residual risk • Technical – holes in the system • Non-technical – policies, procedures, standards
Impact • Basically, how much will it hurt? • Scored on same type of scale (numerical or HML) • Each rating should have a specific criteria to ensure consistency • Impact to: finances, reputation, legal or regulatory obligation
Risk identification, assessment for vulnerability and impact information can be used to prioritize • Heat Map
Based on the heat map, organization can allocate, or re-allocate, resources • Prioritize mitigation efforts • Be careful of risk shifting
Risk Mitigation • Policies and procedures • Training • Physical interventions • Electronic/hardware interventions
Summary • No prescribed method for risk assessment • One size does not fit all • Risk assessment is a required specification under HIPAA • Whether you use an outside consultant or conduct the assessment in house keeping a record of what is done is essential
Questions? Gary N. Jones J.D. CHC, CHPC Gary.jones@mwcompliance.com Midwest Compliance Associates, LLC 721 W. 1st Street Cedar Falls, Iowa 50613