Select Page
Uncategorized

HIPAA regulations are tricky, challenging, and full of pitfalls for the smallest of practices and business associates all the way to the largest enterprises. The introduction of the HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 further complicates matters.

Our approach pivots the traditional advice, making compliancy practical and easier to follow.

Pitfall: Creating non-HIPAA compliant Technical and Cybersecurity systems
Solutions:

  • Create a Cybersecurity program including policies, procedures and technical controls to address all specific HIPAA requirements.
  • Select a Cybersecurity framework to guide your policies and procedures, such as NIST CSF.
  • Select the right maturity level of your Cybersecurity program based on HIPAA requirements and your organization’s legal, compliance, contractual and business needs.
  • Perform risk assessment to understand your areas of risk and severity of each risk identified.
  • Perform a gap analysis and formulate a plan to remediate deficient areas.
  • Prioritize your remediation plan to address highest risk items first.
  • Gain management approval and funding to implement your Cybersecurity program and remediation plan.
  • A Cybersecurity program and remediation plan without moral and financial support from your executive team is destined to fail.
  • Start implementing your remediation plan in the agreed priority order.
  • Prioritize areas such as:
  • Physically secure access to systems containing electronic Protected Health Information (ePHI).
  • Implement Multi-Factor Authentication (MFA) controls even on devices not leaving your facility.
  • Perform review of access rights to systems containing ePHI, remove inactive accounts, adjust permissions for active accounts.
  • Encrypt all devices containing ePHI, prioritize mobile devices that leave your facility.
  • Do not allow any non-controlled devices access to any system containing ePHI, especially, personally owned devices.
  • Make sure all your software is current, patch/upgrade/retire as necessary.
  • Make sure your Endpoint Detection and Response software is active and current.
  • Monitor systems for unusual activity that may indicate an attempted or actual compromise

Pitfall: Failure to manage data according to HIPAA requirements
Solutions:

  • Perform a data classification exercise.
    1. Inventory all system containing ePHI and other protected information.
    2. Classify each data element or groups of data elements in all systems
    3. Classify each system based on the highest classification of data it contains
  • Implement access controls commensurate with classification of each system.
  • All access to systems containing ePHI must use a unique user identifier and if technically feasible be authenticated using multi-factor authentication
  • Review and adjust access levels periodically
  • Identify all vendors that manage or have access to your ePHI, including both SaaS providers and vendors supporting your systems on premises
    1. Electronic Health Record systems (HER)
    2. Productivity systems (Office 365)
    3. Storage (online and backup)
    4. Other vendors that have access to your ePHI
  • Create a comprehensive vendor management program including:
    1. Due diligence
    2. HIPAA requirements compliance
    3. Technical requirements compliance
  • Inventory all media containing ePHI, protect media in line with HIPAA requirements
    1. Encrypt all media containing ePHI
    2. Make sure all portable media has an identifiable owner
    3. Sanitize media before reuse, maintenance or disposal
    4. Dispose of media in line with HIPAA requirements

Pitfall: Users activities that are not HIPAA compliant
Solutions:

  • Create and enforce an acceptable use policy defining rules for use of company IT systems and access to ePHI.
  • Be very specific in what is allowed and what not – gray areas may lead to behavior that is not desired.
  • Define acceptable ways to communicate ePHI internally and externally.
  • Define procedures for reporting policy breaches.
  • Include sanctions in your policy.
  • Define sanctions for different levels of infractions and for repeat offenders
  • Ensure staff are trained and prepared to handle ePHI
  • Conduct periodic HIPAA and Cybersecurity Awareness training, including topics such as:
  • System usage and cybersecurity hygiene
  • Password management
  • Phishing and similar attacks
  • Social Breaches – talking about patients
  • Employee Curiosity
  • Messaging ePHI
  • Accessing and storing ePHI from unauthorized locations
  • Perform simulated phishing testing
  • Users who fail phishing tests should receive additional mandatory training
  • Periodically test your users on HIPAA and cybersecurity practices
  • Create a culture that encourages employee honesty and integrity

Pitfall: Not managing Business Associates Agreements (BAA)
Solutions:Carefully evaluate all potential business associates

  • Perform general due diligence
  • Ensure they have a HIPAA-aligned policy and culture
  • Ensure they use systems that are compatible with HIPAA
  • Ensure data retention matches requirements for service provided and ePHI no longer needed will be purged in line with HIPAA requirements
  • Maintain an active roster of all Business Associates.
  • Include elements specified at 45 CFR 164.504(e) in the contract or other written arrangement with Business Associates.
  • Require all Business Associates to use appropriate safeguards to prevent use or disclosure of ePHI other than as provided for by the contract.
  • Periodically review/audit your business associates
  • Review SOC2/ISO27001/other audit reports
  • Review security incidents
  • Confirm employees are trained and subject to acceptable use policy
  • Confirm business associate’s access to ePHI and use of ePHI is still necessary and that access is at the right level based on the service provided.
  • Periodically review Business Associate Agreements.
  • Look for expirations of clauses or entire agreement
  • Make sure the BAA correctly covers current needs and adjust as necessary

Pitfall: Trying to be HIPAA compliant alone
Solutions:

Click here to know why you need to be HIPAA Compliant.

Next Article