HIPAA awareness training and fear mongering Steve Allen

  • Slides: 76
Download presentation
HIPAA awareness training and fear mongering Steve Allen Adams, MCS, COC, CPMA, CPC-I, PCS,

HIPAA awareness training and fear mongering Steve Allen Adams, MCS, COC, CPMA, CPC-I, PCS, FCS, COA Steve. adams@ingaugehsi. com 770 -709 -3598 Becauseyourpatientscomefirst.

www. thecodingeducator. com

www. thecodingeducator. com

$363

$363

Topics 1. The Findings and Penalties from Recent HIPAA Reviews 2. The Past, Present

Topics 1. The Findings and Penalties from Recent HIPAA Reviews 2. The Past, Present and Future of HIPAA 3. The HIPAA Privacy Rules and what they mean to you 4. Implementing the HIPAA Security Rule Standards 5. Getting up to date with HIPAA HITech Rules and Standards 6. How to get started on being HIPAA Compliant

 1. Findings from Recent Government Reviews

1. Findings from Recent Government Reviews

4 Tiers of Penalties Tier A is for violations in which the offender didn’t

4 Tiers of Penalties Tier A is for violations in which the offender didn’t realize he or she violated the Act and would have handled the matter differently. – $100 fine for each violation, and – $25, 000, maximum total imposed for the calendar year. Tier B is for violations due to reasonable cause, but not “willful neglect. ” – $1, 000 fine for each violation, and – $100, 000, maximum total imposed for the calendar year. Tier C is for violations due to willful neglect that the organization ultimately corrected. – $10, 000 fine for each violation, and – $250, 000, maximum total imposed for the calendar year. Tier D is for violations of willful neglect that the organization did not correct. – $50, 000 fine for each violation, and – $1, 500, 000, maximum total imposed for the calendar year.

Small Practice HIPAA Violations: 65% Security Rule 26% Privacy Rule 9% Breech Rule (HITech)

Small Practice HIPAA Violations: 65% Security Rule 26% Privacy Rule 9% Breech Rule (HITech)

2. Past, Present and Future of HIPAA

2. Past, Present and Future of HIPAA

HIPAA History & Update • The Health Insurance Portability and Accountability Act (HIPAA), also

HIPAA History & Update • The Health Insurance Portability and Accountability Act (HIPAA), also referred to as the Kennedy - Kassebaum, bill was passed by Congress in 1996 to provide consumers with: 1. greater access to health care insurance; 2. protect the privacy of health care data; and 3. promote more standardization and efficiency in the health care industry.

HIPAA is currently broken up into five (5) titles

HIPAA is currently broken up into five (5) titles

HIPAA Titles • Title I – Health Care Access, Portability, and Renewability • Title

HIPAA Titles • Title I – Health Care Access, Portability, and Renewability • Title II – Preventing Healthcare Fraud and Abuse, Administrative Simplification, Medical Liability Reform. • Title III – Tax Related Health Provisions • Title IV – Application and Enforcement of Group Health Plan Requirements • Title V – Revenue Offsets

Administrative Simplification Provisions that required HHS to adopt national standards for: 1. electronic health

Administrative Simplification Provisions that required HHS to adopt national standards for: 1. electronic health care transactions and code sets, 2. unique health identifiers (NPI), and 3. security. Congress recognized that advances in electronic technology could erode the privacy of health information. Consequently, they incorporated into HIPAA provisions that mandated the adoption of Federal privacy and security protections for individually identifiable health information. Next came the HITECH law in the ARRA.

“Privacy”, “Security” and “HITECH” aren’t in the name “HIPAA, ” but they present some

“Privacy”, “Security” and “HITECH” aren’t in the name “HIPAA, ” but they present some of our biggest challenges today in Healthcare

What’s The Difference? • In general, the Privacy Rule covers protected health information (PHI)

What’s The Difference? • In general, the Privacy Rule covers protected health information (PHI) in all forms. The Privacy Rule sets the standards spelling out how you should control PHI. • The Security Rule only covers PHI in electronic form. The Security Rule defines the standards that you must implement to provide basic safeguards to protect EPHI. • The HITECH Act makes significant changes to all provisions of HIPAA (Breech rule) of which the Privacy Rule and Security Rule are a part.

Privacy Rule

Privacy Rule

Privacy Rule HHS published a final Privacy Rule in December 2000, which was later

Privacy Rule HHS published a final Privacy Rule in December 2000, which was later modified in 2002. This Rule set national standards for the protection of individually identifiable health information by three types of covered entities: 1. health plans, 2. health care clearinghouses, and 3. health care providers who conduct the standard health care transactions electronically. Compliance with the Privacy Rule was required as of April 14, 2003.

Security Rule Standards

Security Rule Standards

Security Rule Standards HHS published a final Security Rule in 2003. This Rule sets

Security Rule Standards HHS published a final Security Rule in 2003. This Rule sets national standards for protecting the 1. confidentiality, 2. integrity, and 3. availability of electronic protected health information. Compliance with the Security Rule was required as of April 20, 2005.

HITECH Act

HITECH Act

HITECH Act The HITECH Act was enacted under Title XIII of the American Recovery

HITECH Act The HITECH Act was enacted under Title XIII of the American Recovery and Reinvestment Act of 2009. It changes/updates both the privacy and security law as well as allowing for increased penalties for violations of both laws.

 3. Privacy Rule is the one you are more familiar with for PHI

3. Privacy Rule is the one you are more familiar with for PHI (manual)

HIPAA Privacy Rule • The Privacy Rule covers all Protected Health Information(PHI) • This

HIPAA Privacy Rule • The Privacy Rule covers all Protected Health Information(PHI) • This is information that can identify the patient to the health record • De-identified Information does not have to be protected by HIPAA • Privacy Rule is concerned with guarding the confidentiality of PHI in ALL formats; paper, oral or electronic.

Types of PHI • • Names • Address/Zip Codes • All Dates Telephone &

Types of PHI • • Names • Address/Zip Codes • All Dates Telephone & Fax Numbers • • E-mail Addresses Social Security Numbers • Medical Record Numbers • Health Plan Numbers License Numbers Vehicle Identification Numbers Account Numbers Biometric Identifiers Full Face Photos Any Other Unique Identifying Number, Characteristic or Code

HIPAA Privacy Rule • The HIPAA Privacy Rule regulates the use and disclosure of

HIPAA Privacy Rule • The HIPAA Privacy Rule regulates the use and disclosure of Protected Health Information (PHI) held by "covered entities" (generally, health care clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain transactions.

Types of PHI Disclosures 1. No Authorization Required to: – To disclose PHI to

Types of PHI Disclosures 1. No Authorization Required to: – To disclose PHI to the patient – To use or disclose PHI for treatment, payment or healthcare operations – Certain disclosures required by law (for example, public health reporting of diseases, abuse/neglect cases, etc. ) 2. No Authorization Required - Must Offer Opportunity to Object: – Patient must be offered an opportunity to object before discussing PHI with a patient’s family or friends – Limited PHI (e. g. , patient’s hospital room/location number) is included in the “Hospital Directory” but patients must be offered “Opt Out” opportunity – Certain disclosures to clergy members 3. Authorization Is Required: – For Research (unless IRB approves a waiver of authorization) – To conduct certain fundraising activities – For marketing activities

HIPAA Privacy Rule • Any other disclosures of PHI (Protected Health Information) require the

HIPAA Privacy Rule • Any other disclosures of PHI (Protected Health Information) require the covered entity to obtain written authorization from the individual for the disclosure. • However, when a covered entity discloses any PHI, it must make a reasonable effort to disclose only the minimum necessary information required to achieve its purpose.

HIPAA Privacy Rule • What is the “minimum necessary” standard? The Privacy Rule generally

HIPAA Privacy Rule • What is the “minimum necessary” standard? The Privacy Rule generally requires covered entities to take reasonable steps to limit the use or disclosure of, and requests for, protected health information to the minimum necessary to accomplish the intended purpose

http: //www. hhs. gov/ocr/privacy/hipaa/understanding/summary/index. html 4. Security Rule is the most confusing and least

http: //www. hhs. gov/ocr/privacy/hipaa/understanding/summary/index. html 4. Security Rule is the most confusing and least clearly explained (manual)

Core Objective 15 Protect electronic health information created or maintained by the certified EHR

Core Objective 15 Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities. - 170. 302 (o)-(w) Conduct or review a security risk analysis per 45 CFR 164. 308 (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process

Security Rule • While the Privacy Rule pertains to all Protected Health Information (PHI)

Security Rule • While the Privacy Rule pertains to all Protected Health Information (PHI) including paper and electronic, the Security Rule deals specifically with Electronic Protected Health Information (EPHI).

HIPAA Security Rule • Ensures that the business processes and technology used is not

HIPAA Security Rule • Ensures that the business processes and technology used is not vulnerable to threats. • 18 standards and 44 implementation specifications broken down into: 1. Administrative Safeguards (9) 2. Physical Safeguards (4) 3. Technical Safeguards (5)

HIPAA Security Rule • Each Implementation Specification is either: Required or Addressable • Even

HIPAA Security Rule • Each Implementation Specification is either: Required or Addressable • Even if only Addressable the practice must write in a policy why the Implementation Specification is not needed. • All Required specifications must be implemented and included in a written policy and procedure.

Administrative Safeguards (9) policies and procedures designed to clearly show the entity will comply

Administrative Safeguards (9) policies and procedures designed to clearly show the entity will comply with the act www. hhs. gov/ocr/privacy/hipaa/administrative/securityrule/adminsafeguards. pdf

Administrative Standards 1. Security Management Process q q Risk Analysis - Required Risk Management

Administrative Standards 1. Security Management Process q q Risk Analysis - Required Risk Management - Required Sanction Policy - Required Information System Activity Review - Required 2. Assigned Security Responsibility q Identify the practices HIPAA Security Official – Required Identify the security official who is responsible for the development and implementation of the policies and procedures for the entity

Example Risk Assessment Standard – Implementation Specification Question Required or Addressable Policy in Place?

Example Risk Assessment Standard – Implementation Specification Question Required or Addressable Policy in Place? Risk 1(low) to 5(high) Assigned Security Responsibility – Security Officer Have you appointed a Security Officer for the practice? Required N 4 Existing Control As of now there is no officially appointed Security Officer Mitigation: Our practice will designate the practice manager (Jane Doe) as the Security Official. The Security Official will be in charge of ensuring our electronic protected health information (e. PHI) is protected

Now The Policy Administrative Safeguards Standard: Implementation Specification: Assigned Security Responsibility Security Officer(Required) Requirement:

Now The Policy Administrative Safeguards Standard: Implementation Specification: Assigned Security Responsibility Security Officer(Required) Requirement: Identify the security officer who is responsible for developing and implementing the policies and procedures required by the HIPAA Security Rule for the protection of electronic protected health information. Policy: Our practice has designated a security officer who will be in charge of ensuring our electronic protected health information (e. PHI) is protected. Procedure: Our practice has designated the following individual as our HIPAA Security Officer: Jane Doe 1123 Nowhere Dr Beer Creek, WY 11111 (344) 333 -3333 The security officer may delegate tasks and responsibilities but is ultimately responsible for protecting the confidentiality of protected health information. Key responsibilities include: • Developing and implementing policies, procedures, and guidelines to direct and carry out the objectives of our security program, including policies and procedures that govern: • maintaining up to date inventory of software and hardware • ensuring the privacy and security of electronic health information, computer networks, servers, and wireless network • developing and implementing disaster recovery program • providing physical security • providing ongoing and initial HIPAA Security training • investigating, responding to, and remedying breaches and security incidents • supervising vendor personnel or business associates who perform technical maintenance and ensuring they have proper training regarding these policies and procedures as well as signing our Business Associate Agreement where applicable.

Administrative Standards 3. Workforce Security q Authorization/Supervision – Addressable q Workforce Clearance Procedures –

Administrative Standards 3. Workforce Security q Authorization/Supervision – Addressable q Workforce Clearance Procedures – Addressable q Termination Procedures - Addressable Implement procedures for terminating access to electronic protected health information when the employment of a workforce member ends… 4. Information Access Management q Isolating Healthcare clearinghouse functions – Required Third party must take responsibility as of HITECH act q Access Authorization - Required q Access Establishment and Modification - Addressable

Administrative Standards 5. Security Awareness and Training q q Security Reminders – Addressable Protection

Administrative Standards 5. Security Awareness and Training q q Security Reminders – Addressable Protection from Malicious software – Addressable Log-in monitoring – Addressable Password Management – Addressable Procedures for creating, changing, and safeguarding passwords 6. Security Incident Procedures q Response and Reporting – Required Your practice is required to respond and mitigate any harmful effects of security incidents All incidents must be logged and kept in a report

Administrative Standards 7. Contingency Plan q q q Data Backup Plan – Required Disaster

Administrative Standards 7. Contingency Plan q q q Data Backup Plan – Required Disaster Recovery Plan – Required Emergency Mode Operation Plan – Required Testing and Revision – Addressable Applications and Data Criticality Analysis – Addressable Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information. ” 8. Evaluation – q Periodic evaluation of practice levels of risk – Required At least annually

Administrative Standards 9. Business Associates Contract q Require all business associates to sign BAC

Administrative Standards 9. Business Associates Contract q Require all business associates to sign BAC - Required Have all business associates been identified? Business associates may include clearinghouses, medical billing services, vendors of hardware and software, external consultants, lawyers, transcription contractors, or others who have access to EPHI.

Physical Safeguards (4) controlling physical access to protect against inappropriate access to protected data

Physical Safeguards (4) controlling physical access to protect against inappropriate access to protected data www. hhs. gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards. pdf

Physical Safeguards 10. Facility Access Controls q Contingency Operations – Addressable Physical access to

Physical Safeguards 10. Facility Access Controls q Contingency Operations – Addressable Physical access to facility (part of Disaster Recovery) q Facility Security Plan – Addressable Physical facility safeguards (i. e. alarm system, sign in sheets, etc) q Access Control and Validation – Addressable Controls that validate a persons physical access q Maintenance Records – Addressable 11. Workstation Use – Required Proper usage of workstations documented 12. Workstation Security – Required Physical safeguards to restrict access to workstations from unauthorized users.

Physical Safeguards 13. Device and Media Controls q. Disposal – Required Media must be

Physical Safeguards 13. Device and Media Controls q. Disposal – Required Media must be purged or destroyed congruent with NIST Guidelines for Media Sanitation. – don’t just throw away a hard drive… q. Media Re-Use – Required Media must be wiped clean before being re-used. - PC’s containing e. PHI cannot be re-used unless e. PHI has been removed. q. Accountability – Addressable q. Data Backup and Storage - Addressable

Example Risk Assessment Standard – Implementation Specification Device and Media Control - Disposal Question

Example Risk Assessment Standard – Implementation Specification Device and Media Control - Disposal Question Required or Addressable Policy in Place? Risk 1(low) to 5(high) Existing Control Mitigation Are policies and procedures developed and implemente d that address disposal of EPHI, and/or equipment Required N 4 As of now, no policy exists for this requirement We will now develop an implement a policy that clearly shows that all equipment to be disposed of will have hard drives, etc. erased completely.

Now The Policy Physical Safeguards Standard: Implementation Specification: Devise and Media Disposal Security Officer(Required)

Now The Policy Physical Safeguards Standard: Implementation Specification: Devise and Media Disposal Security Officer(Required) Requirement: Development of a policy that ensures all media containing e. PHI is wiped clean prior to the equipment being disposed of or sold. Policy: Disposal of all medial containing e. PHI prior to disposal or sale Procedure: Once a piece of equipment is deemed obsolete or an upgrade is needed – our external IT department will ensure that all e. PHI is completely removed from the equipment and copies of information (if needed) is encrypted and placed in storage. The identification of the equipment will be logged into our policy manual as clean prior to destruction or sale – this includes all electronic equipment in the office that might contain e. PHI.

Technical Safeguards (5) controlling access to computer systems and enabling covered entities to protect

Technical Safeguards (5) controlling access to computer systems and enabling covered entities to protect communications containing PHI transmitted electronically over open networks from being intercepted by anyone other than the intended recipient. www. hhs. gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards. pdf

Technical Safeguards 14. Access Control q. Unique User Identification – Required q. Emergency Access

Technical Safeguards 14. Access Control q. Unique User Identification – Required q. Emergency Access Procedure - Required q. Automatic Log Off – Addressable q. Encryption and Decryption – Addressable e. PHI at rest or in a database must be encrypted 15. Audit Controls – Required Requires that mechanisms are in place that record and examine activity in information systems that contain e. PHI.

Technical Safeguards 16. Integrity Controls q Mechanism to Authenticate e. PHI – Addressable Ensure

Technical Safeguards 16. Integrity Controls q Mechanism to Authenticate e. PHI – Addressable Ensure all e. PHI that is transmitted is not improperly modified without detection. (most competent EMR systems have audit trails that track which user did what) 17. Person/Entity Authentication – Required Procedures that verify a person or entity seeking access to e. PHI is who they claim to be. Requires password management and audit trails that enable practice to authenticate who is accessing , altering or transmitting e. PHI.

Example Risk Assessment Standard – Implementation Specification Technical Safeguards – Automatic Logoff Question Required

Example Risk Assessment Standard – Implementation Specification Technical Safeguards – Automatic Logoff Question Required or Addressable Does your Addressable current system have automatic logoff capability to ensure unauthorize d users do not have access Policy in Place? Risk 1(low) to 5(high) Existing Control N 3 None at this time Mitigation We will develop this policy

Now The Policy Technical Safeguards Standard: Implementation Specification: Automatic Logoff Addressable Requirement: Development of

Now The Policy Technical Safeguards Standard: Implementation Specification: Automatic Logoff Addressable Requirement: Development of a policy that ensures all workstations have automatic logoff Policy: Automatic Logoff at Workstation Procedure: At every workstation within the organization, automatic logoff will occur after a period of 10 minutes of none terminal work. The employee will be required to log back into the system following an automatic logoff period and not simply bypass the login prompt.

Technical Safeguards 18. Transmission Security q. Integrity Controls – Addressable Implement mechanisms to ensure

Technical Safeguards 18. Transmission Security q. Integrity Controls – Addressable Implement mechanisms to ensure that data being transmitted is not improperly modified without detection q. Encryption – Addressable Implement a mechanism to encrypt e. PHI that is in transit over your local network whenever deemed appropriate

Policies and Procedures Standard A covered entity must implement “reasonable and appropriate” policies and

Policies and Procedures Standard A covered entity must implement “reasonable and appropriate” policies and procedures to comply with the standards and implementation specifications.

5. HITECH Act Under HIPAA and ARRA

5. HITECH Act Under HIPAA and ARRA

HITECH Act The 2009 American Recovery and Reinvestment Act (ARRA) includes a section called

HITECH Act The 2009 American Recovery and Reinvestment Act (ARRA) includes a section called the Health Information Technology for Economic and Clinical Health (HITECH) Act. It essentially makes 15 changes that have placed a huge burden on small and large physician practices:

HITECH Act Objectives Enforcement is strengthened significantly 1. Penalties are increased in the new

HITECH Act Objectives Enforcement is strengthened significantly 1. Penalties are increased in the new Civil Monetary Penalty (CMP) System 2. Enforcement is more proactive, more punitive and by more parties 3. Additional audit authority is now provided to HHS audit CEs and BAs Business Associates and others are fully and completely “in scope” 4. BAs are now statutorily obligated to comply with the relevant regulations. 5. Adds temporary breach notification requirements to vendors of personal health records Security Provisions are strengthened and clarified 6. Data protected is expanded beyond EPHI to include other personal information 7. More specific guidance on technical safeguards is provided by HHS annually 8. New data breach notification requirement

HITECH Act Objectives Privacy Provisions are strengthened and clarified 9. Individual right to request

HITECH Act Objectives Privacy Provisions are strengthened and clarified 9. Individual right to request restrictions on use and disclosure of PHI is now mandatory 10. The definition of “minimum necessary” PHI to use/disclose is clarified 11. Disclosure accounting is strengthened - eliminates any exceptions from the disclosure accounting rules 12. Tightens restrictions on use of protected health information for marketing purposes 13. Requires clear and conspicuous opt-out opportunity for fund-raising communications 14. Consumers now have the right to receive an electronic copy of their PHI 15. Prohibits a CE or BA from receiving payment in exchange for any PHI

Business Associate Agreements Have to change these to now reflect the BA is responsible

Business Associate Agreements Have to change these to now reflect the BA is responsible for losses of information or a breech and not you.

Business Associate Agreements

Business Associate Agreements

Breach Notifications

Breach Notifications

Breach Notifications • A data breach affecting more than 500 people must be reported

Breach Notifications • A data breach affecting more than 500 people must be reported immediately to the HHS, major media outlets and individuals affected by the breach. Also, the HHS secretary is required to post on an HHS website the list of covered entities that have reported breaches. • A data breach affecting fewer than 500 people must be reported to the HHS secretary on an annual basis and to the individuals affected by the breach. www. hhs. gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool. html

Breach Notifications https: //ocrportal. hhs. gov/ocr/breach_report. jsf

Breach Notifications https: //ocrportal. hhs. gov/ocr/breach_report. jsf

Encryption Requirements • The HITECH Act also requires the issuance of technical guidance on

Encryption Requirements • The HITECH Act also requires the issuance of technical guidance on the technologies and methodologies “that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals. ”

EHR Access • In the case where a provider has implemented an EHR system,

EHR Access • In the case where a provider has implemented an EHR system, the Act provides individuals with a right to obtain their PHI in an electronic format (i. e. e. PHI). An individual can also designate that a third party be the recipient of the e. PHI. The Act provides that only a fee equal to the labor cost can be charged for an electronic request.

Accounting of Disclosures • New rules for the accounting of disclosures of a patient's

Accounting of Disclosures • New rules for the accounting of disclosures of a patient's health information. It extends the current accounting for disclosure requirements to information that is used to carry out treatment, payment and health care operations when an organization is using an EHR. This new requirement also limits the timeframe for the accounting to three years instead of six as it currently stands.

If Nothing Else – Focus on These Common Errors

If Nothing Else – Focus on These Common Errors

No Such Thing as 100% Security Covered Entities are just expected to follow the

No Such Thing as 100% Security Covered Entities are just expected to follow the Security Rule standards; implement the proper policies, procedures, and technologies; and reasonably show the organization is making an effort to protect against common threats and vulnerabilities.

Common Employee/Management Related Issues q Sharing usernames and passwords Clear violation q Not logging

Common Employee/Management Related Issues q Sharing usernames and passwords Clear violation q Not logging out before leaving a workstation q Passwords that are too easy q Discussing clinical conditions within earshot of others q Not having patients sign the NOPP q Downloading garbage from the internet or talking about PHI on Facebook/Twitter

Common Employee/Management Related Issues q q q Not updating policies and procedures Lack of

Common Employee/Management Related Issues q q q Not updating policies and procedures Lack of Business Associates Agreements No Business Continuity Plan (Disaster Recovery) Disgruntled employees Not reporting violations ALL VIOLATIONS SHOULD BE REPORTED IMMEDIATELY TO YOUR SUPERVISOR, HIGHER LEVEL MANAGER, OR COMPLIANCE OFFICER

Common Technical Related Issues Faxing Methods q Use a cover letter q Send only

Common Technical Related Issues Faxing Methods q Use a cover letter q Send only necessary PHI, no more q Use saved speed dial numbers for entities you dial most often, this helps prevent error q Never leave PHI sitting on fax machine or copier q Make sure machine DOES NOT save copies of received faxes q Do not fax if there are other “more secure” methods of delivering PHI

Common Technical Related Issues q Inadequate firewalls Cheap “home use” firewalls q Improperly configured

Common Technical Related Issues q Inadequate firewalls Cheap “home use” firewalls q Improperly configured firewalls Simply having a firewall doesn’t guarantee it is configured correctly q Lack of intrusion prevention q Untested backups q No anti-virus software (or expired) q Weak wireless encryption q Taking portable media off-site with no encryption

Common Technical Related Issues q Unencrypted Email Never send e. PHI over a non-encrypted

Common Technical Related Issues q Unencrypted Email Never send e. PHI over a non-encrypted internet account (i. e. Yahoo, Gmail) It is OK to send non-e. PHI over unsecure methods as long as e. PHI is de-identified. (Example: appointment reminder)

6. How To Get Started On Your Own

6. How To Get Started On Your Own

Getting this Done 1. Do it by yourself: http: //www. hhs. gov/ocr/privacy/hipaa/adminis trative/securityruleguidance. html

Getting this Done 1. Do it by yourself: http: //www. hhs. gov/ocr/privacy/hipaa/adminis trative/securityruleguidance. html 2. Buy a Guide http: //www. optumcoding. com/Product/19850/ 3. Hire an IT/HIPAA Consultant Brian Tuttle – contact CPA for more information

Topics 1. The Findings and Penalties from Recent HIPAA Reviews 2. The Past, Present

Topics 1. The Findings and Penalties from Recent HIPAA Reviews 2. The Past, Present and Future of HIPAA 3. The HIPAA Privacy Rules and what they mean to you 4. Implementing the HIPAA Security Rule Standards 5. Getting up to date with HIPAA HITech Rules and Standards 6. How to get started on being HIPAA Compliant

Questions

Questions

Contact Information Office: 770 -709 -3598 E-Fax: 770 -709 -3698 E-mail: steve. adams@ingaugehsi. com

Contact Information Office: 770 -709 -3598 E-Fax: 770 -709 -3698 E-mail: steve. adams@ingaugehsi. com Facebook: facebook. com/kingofcoders Web: thecodingeducator. com