Security Risk Analysis

Similar documents
Chapter 9 Legal Aspects of Health Information Management

Emergency Medical Services Division Policies Procedures Protocols

VCU Health System PatientKeeper Connect. Request Instructions

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

A Deep Dive into the Privacy Landscape

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

Privacy and Security For Teammates

MOT CHARTER SCHOOL ASSIGNED SCHOOL COMPUTER USE AGREEMENT

CENTRAL TEXAS MEDICAL CENTER

Minimum Business Requirements To Administer the CAHPS Hospice Survey

Safeguarding Healthcare Information. By:

FCSRMC 2017 HIPAA PRESENTATION

HIPAA Privacy Training for Non-Clinical Workforce

Information Privacy and Security

System of Records Notice (SORN) Checklist

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Teleworking and access to ECHA IT systems

2514 Stenson Dr Cedar Park TX Fax

Compliance with Personal Health Information Protection Act

1/21/2011. Cindy C. Parman, CPC, CPC H Coding Strategies, Inc.

2018 Employee HIPAA Orientation (EHO) Handbook

OSHA & HIPAA Seminar. Northern Texas Facial & Oral Surgery

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

Minutes Board of Trustees

ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE. Thomson Reuters ONESOURCE Support

Record Keeping - Legal and Ethical Core CPD

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

Privacy and Management of Health Information

Section: Medical Staff Office Page: 1 of 2

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

East Carolina University 2010 Annual HIPAA Privacy Training

HIMSS Security Survey

Navigating HIPAA Regulations. Michelle C. Stickler, DEd Director, Research Subjects Protections

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

The future of patient care. 6 ways workflow automation will transform the healthcare experience

TELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL

I. POLICY: DEFINITIONS:

HIPAA Privacy & Security

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

Advanced HIPAA Communications and University Relations

Vacancy Announcement

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

Status Check On Health IT

Meaningful Use Hello Health v7 Guide for Eligible Professionals. Stage 2

Iatric Systems Supports the Achievement of Meaningful Use

OFFICE OF THE CITY AUDITOR Audit Report PERFORMANCE AUDIT: POLICE PROPERTY ROOM. Stockton City Council Mayor Ann Johnston

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015

1. What are the requirements for Stage 1 of the HITECH Act for CPOE to qualify for incentive payments?

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

Certification of Employee Time and Effort

PRIVACY IMPACT ASSESSMENT (PIA) For the

IT Managed Services Provider

Checklist for Minimum Security Procedures for Voting Systems 1S Section (4),F.S.

PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY

I. PURPOSE DEFINITIONS. Page 1 of 5

Compliance Risks with EHR implementation and how to minimize them

USER VALIDATION FORM (NIPRNET & SIPRNET)

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY

GDPR Records Management Policy

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

Patient Unified Lookup System for Emergencies (PULSE) System Requirements

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Care Management User Guide for Dashboards and Alerts. December 21, 2016

Meaningful Use Hello Health v7 Guide for Eligible Professionals. Stage 1

IVAN FRANKO HOME Пансіон Ім. Івана Франка

Office of the Chief Privacy Officer. Privacy & Security in an App Enabled World HIMSS, Tuesday March 1, 2016, Las Vegas, NV

Health Care Provider Guide Digital Health Drug Repository. Version: V 3.0

Navpreet Kaur IT /16/16. Electronic Health Records

Appendix. Final Version of the Electronic Health Record (EHR) Survey Questionnaire

EPCS FREQUENTLY ASKED QUESTIONS FOR ELECTRONIC PRESCRIBING OF CONTROLLED SUBSTANCES. Revised: March 2016

HIPAA Training

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Overview of Privacy Legislation in Ontario

Medication Inventory Management for Healthcare Practices

ONE ID Local Registration Authority Procedures Manual. Version: 3.3

The Privacy & Security of Protected Health Information

PRIVACY IMPACT ASSESSMENT (PIA) For the

FOUR TIPS: THE INVISIBLE IMPACT OF CREDENTIALING

Texas Medicaid. Provider Procedures Manual. Provider Handbooks. Telecommunication Services Handbook

ICD-10 Frequently Asked Questions - SurgiSource

GRAND JURY CASTS VOTE OF CONFIDENCE IN OC ELECTION PROCESS

City of Coquitlam. Request for Expressions of Interest RFEI No Workforce Scheduling Software

Reporting a Privacy Breach to the Commissioner

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA)

POTENTIAL LIABILITY: PATIENT HEALTH INFORMATION PORTALS

Enterprise On-Demand Attachment Last Revised 8/6/ Enterprise On-Demand

STAFFING AGENCY ADMINISTRATIVE POLICIES AND PROCEDURES

Disclosure Statement & Policies

Special Presentation: HIPAA Survival. Dr. Ty Talcott, CHPSE C: / PH: /

Guide to Enterprise Telework and Remote Access Security (Draft)

Health Information Privacy Policies and Procedures

Protecting PHI for Clinical Staff and Students

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

Transcription:

Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis. The following table lists risk analysis questions, information, and suggestions provided by ChiroTouch. Complete this questionnaire each year, and save it in your records. CMS can audit your compliance up to six years after a reporting period. Risk Analysis Risk Analysis Question ChiroTouch Information Comments What new electronic health information has been introduced Electronic health information in the EHR system is into my practice because of EHRs? Where will that electronic protected following ONC-ATCB security guidelines. health information reside? Who in my office (employees, other providers, etc.) will have access to EHRs, and the electronic health information contained within them? Should all employees with access to EHRs have the same level of access? Will I permit my employees to have electronic health information on mobile computing/storage equipment? If so, do they know how, and do they have the resources necessary, to keep electronic health information secure on these devices? How will I know if electronic health information has been accidentally or maliciously disclosed to an unauthorized person? When I upgrade my computer storage equipment (e.g., hard drives), will electronic health information be properly erased from the old storage equipment before I dispose of it? Are my backup facilities secured (computers, tapes, offices, etc., used to backup EHRs and other health IT)? Will I be sharing EHRs, or electronic health information contained in EHRs with other health care entities through a HIO (Health Information Exchange)? If so, what security policies do I need to be aware of? If my EHR system is capable of providing my patients with a (e.g., through a portal), am I familiar with the security requirements that will protect my patients electronic health information before I implement that feature? Designated administrators will set permissions within the software to manage access to electronic health Each employee should have a unique access level decided upon by the administrator. The ChiroTouch audit log can be routinely reviewed to view actions performed within the software. CTSecure can be implemented to securely backup health information off-site. If you do not already have this service, contact your Account Manager for more ChiroTouch ONC-ATCB certification ensures that the software meets all security, integrity, and data exchange guidelines.

Will I communicate with my patients electronically (e.g., through a portal or email)? Are those communications secured? If I offer my patients a method of communicating with me electronically, how will I know that I am communicating with the right patient? Patient communication through the Patient Portal is secured via private patient password. Patient authentication is verified upon entry into the patient portal. Questions to Ask Yourself When Assessing Integrity Risks Who in my office will be permitted to create or modify an Access may be provided to those the administrator EHR, or electronic health information contained in the EHR? deems should have access. How will I know if an EHR, or the electronic health information All activity in a chart is recorded in the audit log for in the EHR, has been altered or deleted? review. If I participate in a HIO (Health Information Exchange), how will I know if the health information I exchange is altered in an unauthorized manner? If my EHR system is capable of providing my patients with a The patient portal allows patients read-only rights. and I implement that feature, will my patients be permitted to modify any of the health information within their record? If so, what information? Questions to Ask Yourself When Assessing Availability Risks How will I ensure that electronic health information, regardless of where it resides, is readily available to me and my employees for authorized purposes, including after normal office hours? Do I have a backup strategy for my EHRs in the event of an emergency, or to ensure I have access to patient information if the power goes out or my computer crashes? If I participate in a HIO, does it have performance standards regarding network availability? If my EHR system is capable of providing my patients with a (e.g., through a portal) and I implement that feature, will I allow 24/7 access? CTSecure can be implemented to securely backup health information off-site. If you do not already have this service, contact your Account Manager for more Signature of Administrator Date

Risk Management Risk Management Question ChiroTouch Information Comments Questions to Ask Yourself When Identifying Technical Safeguards Have I updated my internal information security processes to include the use of EHRs, connectivity to HIOs, offering portal access to patients, and the handling and management of electronic health information in general? Have I trained my employees on the use of EHRs? Other electronic health information related technologies that I plan to implement? Do they understand the importance of keeping electronic health information protected? Have I identified how I will periodically assess my use of health IT to ensure my safeguards are effective? As employees enter and leave my practice, have I defined processes to ensure electronic health information access controls are updated accordingly? Have I developed a security incident response plan so that my employees know how to respond to a potential security incident involving electronic health information (e.g., unauthorized access to an EHR, corrupted electronic health information)? Have I developed processes that outline how electronic health information will be backed-up or stored outside of my practice when it is no longer needed (e.g., when a patient moves and no longer receives care at the practice)? Have I developed contingency plans so that my employees know what to do if access to EHRs and other electronic health information is not available for an extended period of time? Find additional training on MyChiroTouch, including videos and documentation. Implement a protocol for routine assessment and sign/date those assessments. The audit log helps manage EHR system use. Review these logs and follow HIPAA guidance if patient records are breached. This is your responsibility. You need to have a plan in place for backing up your data. You need to develop your own contingency plan in preparation for the possibility that your software or hardware is nonfunctional for an extended period of time. Have I developed processes for securely exchanging electronic health information with other health care entities? Have I developed processes that my patients can use to Access to the patient portal is patient-designated securely connect to a portal? Have I developed processes for password-protected. proofing the identity of my patients before granting them access to the portal? Do I have a process to periodically test my health IT backup capabilities, so that I am prepared to execute them? If equipment is stolen or lost, have I defined processes to respond to the theft or loss?

Do I have basic office security in place, such as locked doors and windows, and an alarm system? Are they being used properly during working and non-working hours? Questions to Ask Yourself When Identifying Physical Safeguards Are my desktop computing systems in areas that can be secured during non-working hours? Are my desktop computers out of the reach of patients and other personnel not employed by my practice during normal working hours? Is mobile equipment (e.g., laptops), used within and outside my office, secured to prevent theft or loss? Verify the location of your computers are consistent with HIPAA compliance. Verify the location of your computers are consistent with HIPAA compliance. Do I have a documented inventory of approved and known health IT computing equipment within my practice? Will I know if one of my employees is using a computer or media device not approved for my practice? Keep an inventory list of your practice's electronic equipment. Do my employees implement basic computer security Automatic log-off may be set in the system via the principles, such as logging out of a computer before leaving it CTLauncher options screen. unattended? Questions to Ask Yourself When Identifying Technical Safeguards Have I configured my computing environment where electronic health information resides using best-practice security settings (e.g., enabling a firewall, virus detection, and encryption where appropriate)? Am I maintaining that environment to stay up to date with the latest computer security updates? Are there other types of software on my electronic health information computing equipment that are not needed to sustain my health IT environment (e.g., a music file sharing program), which could put my health IT environment at risk? Is my EHR certified to address industry recognized/bestpractice security requirements? Are my health IT applications installed properly, and are the vendor recommended security controls enabled (e.g., computer inactivity timeouts)? Is my health IT computing environment up to date with the most recent security updates and patches? Have I configured my EHR application to require my employees to be authenticated (e.g., username/password) before gaining access to the EHR? And have I set their access privileges to electronic health information correctly? ChiroTouch is ONC-ATCB certified to address these requirements.

If I have or plan to establish a patient portal, do I have the proper security controls in place to authenticate the patient (e.g., username/password) before granting access to the portal and the patient s electronic health information? Does the portal s security reflect industry best-practices? If I have or plan to set up a wireless network, do I have the proper security controls defined and enabled (e.g., known access points, data encryption)? Have I enabled the appropriate audit controls within my health IT environment to be alerted of a potential security incident, or to examine security incidents that have occurred? Patient access is granted via an e-mail verification and patient password. Signature of Administrator Date