Auditing for HIPAA Flashcards
What is a HIPAA Security Risk Assessment?
Prior to implementing safeguards, organizations need to know what kind of PHI they can access, where they have gaps and security risks, and what can threaten the integrity and security of PHI. HIPAA stipulates that covered entities and their business associates complete a thorough risk assessment to identify and document vulnerabilities within their business.
Performing a security risk analysis is the first step to identify vulnerabilities that could result in a breach of PHI.
HIPAA doesn’t give instructions on how a risk analysis should be conducted, because the rule recognizes that not only are the needs and vulnerabilities of covered entities and business associates often very different from one another, the rule is aware that different sized organizations will have access to different levels of resources. However, you do need proof that your organization has conducted a risk assessment.
Determine the Scope of Your Risk Analysis
A security Risk Assessment is a thorough and accurate audit of your businesses’ administrative, physical, and technical safeguards to identify vulnerabilities and risks to the integrity and sanctity of ePHI.
A risk analysis of your Administrative Safeguards
takes a long hard look at the process that your business has in place to maintain the integrity of PHI. As part of the process, ask yourself these questions:
What kind of security procedures does your business have in place?
Are your employees aware of and trained in HIPAA Security regulations?
The Physical Safeguards portion of the assessment
will review the physical property of your organization to determine its vulnerabilities. Ask yourself:
Are your healthcare records locked up?
Do you have alarm and access control systems in place?
When reviewing Technical Safeguards, evaluate
the technology that your organization is using to keep the electronic access, storage, or transmission of PHI secure. Evaluate:
What kind of encryptions are you using?
Are systems protected against unauthorized access?
Your risk analysis should not just recognize current risks, but also identify
any potential risks that your organization could face that would threaten the integrity and confidentiality of PHI that an organization may have access to. In addition to electronic media stored on your computer and servers, this could also include CDs, jump drives, and your network.
A HIPAA risk assessment is an essential element of
HIPAA compliance that can help identify areas of vulnerability and weakness to prevent data breaches.
What is a “reasonably anticipated threat”?
Reasonably anticipated threats are any threats to HIPAA compliance that are foreseeable. These not only include threats from external bad actors, but also threats originating from human error or a lack of knowledge due to a lack of training. This is why a “big picture” view of organizational workflows is essential to identify reasonably anticipated threats.
Who is responsible for conducting a HIPAA security risk assessment?
HIPAA security risk assessments are either conducted by a HIPAA Compliance Officer; or, if the responsibility for HIPAA compliance is shared between a HIPAA Privacy Officer and a HIPAA Security Officer, the risk assessment and analysis should be conducted by the HIPAA Security Officer with assistance from his or her colleague depending on the nature of risks identified.
What are the Penalties for Breaching HIPAA?
The penalties for breaching HIPAA vary according to the nature of the violation, the level of culpability, and the amount of assistance given to HHS during investigations into the breach. The penalties were originally implemented in the HITECH Act 2009 and increase each year to account for inflation.
What Steps Should You Take for HIPAA Compliance?
The steps you should take for HIPAA compliance depend on the nature of your business and your access to Protected Health Information. The HHS publishes several tools to help Covered Entities determine what steps to take for HIPAA compliance; but, if you are still unsure about the requirements, you should seek professional compliance advice.
What is the HIPAA Security Rule?
The HIPAA Security Rule was enacted in 2004 to establish national standards for the protection of Protected Health Information when it is created, received, used, or maintained electronically by a Covered Entity. The Rule was introduced due to more Covered Entities adopting technology and replacing paper processes.
What is the HIPAA Privacy Rule?
The HIPAA Privacy Rule – or “Standards for Privacy of Individually Identifiable Health Information” – was introduced to standardize a patchwork of state laws relating to how healthcare providers and insurers can use, share, and disclose Protected Health Information. It is important to note that where state laws provide stronger privacy protection, these laws continue to apply.
What is the HIPAA Breach Notification Rule?
The HIPAA Breach Notification Rule requires Covered Entities and Business Associations to notify the Secretary of Health and Human Services of any impermissible use or disclosure of unsecured Protected Health Information. Different procedures apply depending on the nature of the breach and the number of records disclose without permission.