The Health Insurance Portability And Accountability Act (HIPAA) compliance a legislation which provides security provisions and data privacy, in order to keep patients’ medical information safe.
The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health insurers and providers.

ITperfection, HIPAA Compliance, pictural, slide show, 01

 

 

Section 1: About HIPAA Compliance

Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance.
Other entities, such as subcontractors and any other related business associates must also be in compliance.

ITperfection, HIPAA Compliance, pictural, slide show, 02

 

Titles

HIPAA is divided into 5 titles, of which title II “Administrative Simplification Rules” is the one related to IT and information security. It title contains the following topics:

  • National Provider Identifier Standard
  • Transactions and Code Sets Standard
  • Privacy Rule
  • Security Rule
  • Enforcement Rule

 

National Provider Identifier Standard

Each healthcare entity, including individuals, employers, health plans and healthcare providers, must have a unique 10-digit national provider identifier number, or NPI.

ITperfection, HIPAA Compliance, pictural, slide show, 04

 

Transactions and Code Sets Standard

This standard orders organizations to follow a standard mechanisms for EDI when processing or submitting insurance claims.

ITperfection, HIPAA Compliance, pictural, slide show, 05

 

Privacy Rules

Privacy rule requires covered entities and business associates to protect the privacy of any kind of patient health information that can identify an individual, whether it is electronic or not, and gives standards related to Protected Health Information (PHI) uses and disclosures and whether they need patient consent/authorization or not.

ITperfection, HIPAA Compliance, pictural, slide show, 06

 

Administrative requirements

The privacy rule covers administrative requirements that are applicable to most of the covered entities.

ITperfection, HIPAA Compliance, pictural, slide show, 07

 

Security Rule

The security rule is specifically related to electronic protected health information (ePHI) and how covered entities should safeguard their CIA triad.

ITperfection, HIPAA Compliance, pictural, slide show, 08

 

Security Rule- Safeguards

The security rule requires covered entities to use three types of safeguards:

  • Administrative
  • Physical
  • Technical

ITperfection, HIPAA Compliance, pictural, slide show, 09

 

Enforcement Rule

Enforcement rule establishes the guidelines for investigating violations of HIPAA.

ITperfection, HIPAA Compliance, pictural, slide show, 10

 

IT Security

HIPAA privacy and HIPAA security rules are the most important to train for in IT security.

 

HIPAA Privacy Rule: Basic Training

  • What PHI is, how to identify it and who can access it
  • When, how and by whom it could be disclosed
  • What CIA is
  • Patients’ rights
  • Business associate obligations
  • Consequences of violation of the rule

ITperfection, HIPAA Compliance, pictural, slide show, 12

 

HIPAA Security Rule: Mandatory Training

  • Potential threats to information security related to the use of internal information systems (password shared to other people), social media, websites, emails, and devices
  • How to protect from those threats (encryption, e-signatures, etc.)
  • Actions to take when something goes wrong or is not normal
  • Any other information security policy, guideline or procedure
  • Security updates (i.e. new internal policy)
  • Audits Consequences of not following the security rule

ITperfection, HIPAA Compliance, pictural, slide show, 13

 

You can read more details in this post: HIPAA Compliance

 

 

Section 2: Administrative Safeguards

EPHI is to implement reasonable and appropriate administrative safeguards that establish the foundation for a covered entity’s security program. The objectives of this paper are to:

  • Reviewing each Administrative Safeguards standard and implementation specification listed in the Security Rule.
  • Discussing the purpose for each standard.
  • Providing sample questions that covered entities may want to consider when implementing the Administrative Safeguards.

The Security Rule defines administrative safeguards as, “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.”

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-01

 

Nine Standards

Administrative Safeguards includes nine standards

  1. Security Risk Management – STANDARD § 164.308(a) (1)
  2. Assigned Security Responsibility- STANDARD § 164.308(a) (2)
  3. Workforce Security- STANDARD § 164.308(a) (3)
  4. Information Access Management- STANDARD § 164.308(a) (4)
  5. Security Awareness and Training – STANDARD § 164.308(a) (5)
  6. Security Incident Procedures- STANDARD § 164.308(a) (6)
  7. Contingency Plan- STANDARD § 164.308(a) (7)
  8. Evaluation- STANDARD § 164.308(a) (8)
  9. Business Associate Contracts and Other Arrangements- STANDARD § 164.308(b) (1)

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-02

 

Security Risk Management – STANDARD § 164.308(a) (1)

The first standard under Administrative Safeguards section is the Security Management Process.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-03

 

Assigned Security Responsibility- STANDARD § 164.308(a) (2)

The purpose of this standard is to identify who will be operationally responsible for assuring that the covered entity complies with the Security Rule.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-04

 

Workforce Security- STANDARD § 164.308(a) (3)

For each workforce member, or job function, the covered entity must identify the EPHI that is needed, when it is needed, and make reasonable efforts to control access to the EPHI.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-05

 

Information Access Management- STANDARD § 164.308(a)(4)

By implementing this standard, the risk of inappropriate disclosure, alteration, or destruction of EPHI is minimized.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-06

 

Security Awareness and Training – STANDARD § 164.308(a) (5)

Many security risks and vulnerabilities within covered entities are internal. This is why the next standard, Security Awareness and Training, is so important.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-07

 

Security Incident Procedures- STANDARD § 164.308(a) (6)

The Security Rule defines a security incident as, “the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.”

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-08

 

Contingency Plan- STANDARD § 164.308(a) (7)

The purpose of contingency planning is to establish strategies for recovering access to EPHI should the organization experience an emergency or other occurrence, such as a power outage and/or disruption of critical business operations.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-09

 

Evaluation- STANDARD § 164.308(a) (8)

Covered entities must implement ongoing monitoring and evaluation plans. Covered entities must periodically evaluate their strategy and systems to ensure that the security requirements continue to meet their organizations’ operating environments.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-10

 

Business Associate Contracts and Other Arrangements- STANDARD § 164.308(b) (1)

This standard is comparable to the Business Associate Contract standard in the Privacy Rule, but is specific to business associates that create, receive, maintain or transmit EPHI.

ITperfection, HIPAA Compliance, pictural, slide show, Administrative Safeguards-11

 

Read more about administrative safeguards

 

 

Section 3: Physical Safeguards

A covered entity must consider all physical access to EPHI. This may extend outside of an actual office, and could include workforce members’ homes or other physical locations where they access EPHI.

ITperfection, HIPAA Compliance, pictural, slide show, Physical Safeguards-01

 

Physical Safeguards: Standards

These standards include:
1. Facility Access Controls – STANDARD § 164.310(a)(1)
2. Workstation Use – STANDARD § 164.310 ( b )
3. Workstation Security – STANDARD § 164.310(c)
4. Device and Media Controls – STANDARD § 164.310(d) (1)

ITperfection, HIPAA Compliance, pictural, slide show, Physical Safeguards-02

 

Facility Access Controls- STANDARD § 164.310(a)(1)

This standard requires covered entities to: “Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.”

ITperfection, HIPAA Compliance, pictural, slide show, Physical Safeguards-03

 

Workstation Security – STANDARD § 164.310(c)

It is a standard with no implementation specifications. Workstation Security standard addresses how workstations are to be physically protected from unauthorized users. This standard requires that covered entities: “Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.”

ITperfection, HIPAA Compliance, pictural, slide show, Physical Safeguards-04

 

Device and Media Controls – STANDARD § 164.310(d) (1)

The Device and Media Controls standard requires covered entities to: “Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain electronic protected health information, into and out of a facility, and the movement of these items within the facility.”

ITperfection, HIPAA Compliance, pictural, slide show, Physical Safeguards-05

 Read more about physical safeguards

 

 

Section 4: Technical Safeguards

The Security Rule defines technical safeguards in “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.”

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-01

 

Technical Safeguard: Standards

This Safeguard includes nine standards, all of which we will discuss. These standards include:
1. Access Control – STANDARD § 164.312(a ) (1)
2. Audit Controls – STANDARD § 164.312 (b)
3. Integrity- STANDARD § 164.312(c) (1)
4. Person or Entity Authentication – STANDARD § 164.312(d)
5. Transmission Security – STANDARD § 164.312(e) (1)

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-02

 

Access Control – STANDARD § 164.312(a ) (1)

Access controls provide users with rights and/or privileges to access and perform functions using information systems, applications, programs, or files.

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-03

 

Audit Controls – STANDARD § 164.312 (b)

A covered entity must consider its risk analysis and organizational factors, such as current technical infrastructure, hardware and software security capabilities, to determine reasonable and appropriate audit controls for information systems that contain or use EPHI.

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-04

 

Integrity – STANDARD § 164.312(c) (1)

The integrity of data can be compromised by both technical and non-technical sources. Workforce members or business associates may make accidental or intentional changes that improperly alter or destroy EPHI. Data can also be altered or destroyed without human intervention, such as by electronic media errors or failures.

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-05

 

Person or Entity Authentication – STANDARD § 164.312(d)

This standard has no implementation specifications. This standard requires a covered entity to: “Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.”

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-06

 

Transmission Security – STANDARD § 164.312(e) (1)

A covered entity must identify the available and appropriate means to protect EPHI as it is transmitted, select appropriate solutions, and document its decisions.

ITperfection, HIPAA Compliance, pictural, slide show, Technical Safeguards-07

 

Read more about technical safeguards

 

 

Section 5: Risk Analysis

Risks arise from legal liability or mission loss due to:

  1. Unauthorized (malicious or accidental) disclosure, modification, or destruction of information
  2. Unintentional errors and omissions
  3. IT disruptions due to natural or man-made disasters
  4. Failure to exercise due care and diligence in the implementation and operation of the IT system.”

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-01

 

Risk Analysis: Typical Steps

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-02

 

Identify the Scope of the Analysis

The risk analysis scope that the Security Rule requires is the potential risks and vulnerabilities to the confidentiality, availability and integrity of all EPHI that a covered entity creates, receives, maintains, or transmits. This includes EPHI in all forms of electronic media.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-03

 

Identify the Scope of the Analysis

Electronic media is defined:

  • Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk, optical disk, or digital memory card; or
  • Transmission media used to exchange information already in electronic storage media. This media include for example, the internet, extranet, leased lines, dial-up lines, private networks, and the physical movement of removable/transportable electronic storage media.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-04

 

Assess Current Security Measures

The goal of this step is to analyze current security measures implemented to minimize or eliminate risks to EPHI.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-05

 

Determine the Likelihood of Threat Occurrence

Likelihood of occurrence: Probability that a threat will trigger or exploit a specific vulnerability.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-06

 

Determine the Potential Impact of Threat Occurrence

If a threat triggers or exploits a specific vulnerability, there are many potential outcomes. For covered entities, the most common outcomes include, but are not limited to:
1. Unauthorized access to or disclosure of EPHI
2. Permanent loss or corruption of EPHI
3. Temporary loss or unavailability of EPHI
4. Loss of financial cash flow
5. Loss of physical assets

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-07

 

Determine the Level of Risk

The level of risk is determined by analyzing the values assigned to the likelihood of threat occurrence and resulting impact of threat occurrence. The risk level determination may be performed by assigning a risk level based on the average of the assigned likelihood and impact levels.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-08

 

Identify Security Measures and Finalize Documentation

When identifying security measures that can be used, it is important to consider factors such as: the effectiveness of the security measure; legislative or regulatory requirements that require certain security measures to be implemented; and requirements of the organization’s policies and procedures. Any potential security measures that can be used to reduce risks to EPHI should be included in documentation.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Analysis-09

 

Read more about risk analysis

 

 

Section 6: Risk Management

Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with the General Requirements of the Security Rule.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Management-01

 

Risk Management- Steps

ITperfection, HIPAA Compliance, pictural, slide show, Risk Management-02

 

Develop and Implement a Risk Management Plan

For the risk management plan to be successful, key members of the covered entity’s workforce, including senior management and other key decision makers, must be involved.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Management-03

 

Develop and Implement a Risk Management Plan

An important component of the risk management plan is the plan for implementation of the selected security measures.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Management-04

 

Evaluate and Maintain Security Measures

Risk management is not one-time activity. Risk management is ongoing, dynamic process that must be periodically reviewed and updated in response to changes in the environment.

ITperfection, HIPAA Compliance, pictural, slide show, Risk Management-05

 

Read more about risk management

 

 

Section 7: Security Standards Organizational, Policies and Procedures and Documentation Requirements

The objective of this post is reviewing each Organizational Requirements and Policies and Procedures and Documentation Requirements standard and implementation specification listed in the Security Rule. This topic includes four standards, all of which we will discuss. These standards include:

1. Business Associate Contracts or Other Arrangements – STANDARD§ 164.314(a) (1)

2. Requirements for Group Health Plans – STANDARD § 164.314(b) (1)

3. Policies and Procedures – STANDARD§ 164.316(a)

4. Documentation – STANDARD§ 164.316(b) (1)

ITperfection, HIPAA, Standards Organizational, Policies and Procedures and Documentation- 01

 

Business Associate Contracts or Other Arrangements Standard

For example, a health care clearinghouse may be a business associate and is also a covered entity under HIPAA. A software vendor may be a business associate as well; however, it is not, in that capacity, a covered entity. In both cases, the organizations could perform certain functions, activities or services on behalf of the covered entity and would therefore be business associates.

ITperfection, HIPAA, Standards Organizational, Policies and Procedures and Documentation- 02

 

Requirements for Group Health Plans Standard

The health plan has access to EPHI beyond summary information and enrollment information or to EPHI other than that which has been authorized under § 164.508, the plan documents must contain language similar to that already required by the Privacy Rule.

ITperfection, HIPAA, Standards Organizational, Policies and Procedures and Documentation- 03

 

Policies and Procedures Standard

Policies and Procedures standard is not to be construed to permit or excuse an action that violates any other standard, implementation specification, or other requirements of this subpart.

ITperfection, HIPAA, Standards Organizational, Policies and Procedures and Documentation- 04

 

Documentation Standard

The Time Limit implementation specification requires covered entities to: “Retain the documentation required of this section for 6 years from the date of its creation or the date when it last was in effect, whichever is later.”

Organizations often make documentation available in printed manuals and/or on Intranet websites. The Updates implementation specification requires covered entities to: “Review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of the electronic protected health information.”

ITperfection, HIPAA, Standards Organizational, Policies and Procedures and Documentation- 05

 

Read more about Security Standards: Organizational, Policies and Procedures and Documentation Requirements

 

 

Section 8: Implementation for the Small Providers

Small providers that are covered entities have unique business and technical environments that provide both opportunities and challenges related to compliance with the Security Rule.

ITperfection, Hipaa, implementation for the small providers-01

 

Many of the standards contain implementation specifications but where there is no implementation specification for a particular standard, compliance with the standard itself is required.

  • A required implementation specification is similar to a standard, in that a covered entity must comply with it. For example, all covered entities including small providers must conduct a “Risk Analysis”.
  • For addressable implementation specifications, covered entities must perform an assessment to determine whether the specification is a reasonable and appropriate safeguard in the covered entity’s environment. After performing the assessment, a covered entity decides if it will implement the addressable implementation specification;
  • Factors that determine what is “reasonable” and “appropriate” include cost, size, technical infrastructure and resources. While cost is one factor entities must consider in determining whether to implement a particular security measure, some appropriate measure must be implemented. An addressable implementation specification is not optional.
  • Administrative Safeguards: These provisions are defined in the Security Rule as the “administrative actions, policies, and procedures to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.”

ITperfection, Hipaa, implementation for the small providers-02

 

11 Standard

Standards Implementation for the Small Provider includes eleven standards.

ITperfection, Hipaa, implementation for the small providers-03

 

Security Management Process

  • Risk Analysis: A small provider must “Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.”
  •  Risk Management: A small provider must “Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with §164.306(a).”
  •  Sanction Policy: The small provider must “Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity.”

ITperfection, Hipaa, implementation for the small providers-04

 

Workface Security

A small provider must “Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information, and to prevent those workforce members who do not have access from obtaining access to electronic protected health information.”

ITperfection, Hipaa, implementation for the small providers-05

 

Security Awareness and Training

A small provider must “Implement a security awareness and training program for all members of its workforce (including management).”

ITperfection, Hipaa, implementation for the small providers-06

 

Contingency Plan

Data Backup Plan: The small provider must “Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information.”

ITperfection, Hipaa, implementation for the small providers-07

 

Business Associate Contracts and Other Arrangements

The small provider “A covered entity may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity’s behalf only if the covered entity obtains satisfactory assurances that the business associate will appropriately safeguard the information.”

ITperfection, Hipaa, implementation for the small providers-08

 

Facility Access Controls

The small provider must “Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.”

ITperfection, Hipaa, implementation for the small providers-09

 

Facility Access Controls: Facility Security Plan

A small provider “Implement policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft.”

ITperfection, Hipaa, implementation for the small providers-10

 

Facility Access Controls: Maintenance Records

A small provider must “Implement policies and procedures to document repairs and modifications to the physical components of a facility which are related to security.”

ITperfection, Hipaa, implementation for the small providers-11

 

Workstation Use

The small provider must “Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.”

ITperfection, Hipaa, implementation for the small providers-12

 

Device and Media Controls

A small provider must “Implement policies and procedures to address the final disposition of electronic protected health information, and/or the hardware or electronic media on which it is stored.”

ITperfection, Hipaa, implementation for the small providers-13

 

Device and Media Controls: Data Backup and Storage 

A small provider must “Create a retrievable, exact copy of electronic protected health information, when needed, before movement of equipment.”

ITperfection, Hipaa, implementation for the small providers-14

 

Access Control

The small provider must “Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4)) [(Information Access Management)].”

ITperfection, Hipaa, implementation for the small providers-15

 

Person or Entity Authentication

The small provider must “Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.”

ITperfection, Hipaa, implementation for the small providers-16

 

Transmission Security

The small provider must “Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.”

ITperfection, Hipaa, implementation for the small providers-16

Read more about implementation for the Small provider

 

———–

Source: HHS.gov