Question

In: Nursing

Describe how a health care organization can reduce risk for HIPAA compliance when transmitting patient information...

Describe how a health care organization can reduce risk for HIPAA compliance when transmitting patient information (via fax, e-mail, paper).

Solutions

Expert Solution

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) required the Secretary of the U.S. Branch of Health and Human Services (HHS) to create controls ensuring the protection and security of certain wellbeing information.1 To satisfy this prerequisite, HHS distributed what are ordinarily known as the HIPAA Privacy Rule and the HIPAA Security Rule. The Privacy Rule, or Standards for Privacy of Individually Identifiable Health Information, sets up national guidelines for the assurance of certain wellbeing data. The Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) build up a national arrangement of security measures for ensuring certain wellbeing data that is held or moved in electronic shape. The Security Rule operationalizes the insurances contained in the Privacy Rule by tending to the specialized and non-specialized shields that associations called "secured substances" must set up to secure people's "electronic ensured wellbeing data" (e-PHI). Inside HHS, the Office for Civil Rights (OCR) has duty regarding implementing the Privacy and Security Rules with willful consistence exercises and common cash punishments.

Before HIPAA, no by and large acknowledged arrangement of security norms or general necessities for ensuring wellbeing data existed in the human services industry. In the meantime, new innovations were advancing, and the medicinal services industry started to move far from paper forms and depend all the more vigorously on the utilization of electronic data frameworks to pay claims, answer qualification questions, give wellbeing data and lead a large group of other authoritative and clinically based capacities.

Today, suppliers are utilizing clinical applications, for example, mechanized doctor arrange section (CPOE) frameworks, electronic wellbeing records (EHR), and radiology, drug store, and research facility frameworks. Wellbeing designs are giving access to cases and care administration, and also part self-benefit applications. While this implies the restorative workforce can be more versatile and proficient (i.e., doctors can check quiet records and test comes about because of wherever they are), the ascent in the appropriation rate of these innovations expands the potential security dangers.

A noteworthy objective of the Security Rule is to ensure the protection of people's wellbeing data while enabling secured elements to embrace new advances to enhance the quality and effectiveness of patient care. Given that the medicinal services commercial center is assorted, the Security Rule is intended to be adaptable and versatile so a secured substance can actualize arrangements, methods, and innovations that are fitting for the element's specific size, authoritative structure, and dangers to shoppers' e-PHI.

This is a synopsis of key components of the Security Rule and not a total or thorough manual for consistence. Substances managed by the Privacy and Security Rules are committed to follow the majority of their pertinent necessities and ought not depend on this rundown as a wellspring of lawful data or exhortation. To make it less demanding to survey the total necessities of the Security Rule, arrangements of the Rule referenced in this rundown are refered to at last notes. Visit our Security Rule segment to see the whole Rule, and for extra accommodating data about how the Rule applies. In case of a contention between this rundown and the Rule, the Rule oversees.

Statutory and Regulatory Background

•           The Administrative Simplification arrangements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA, Title II) required the Secretary of HHS to distribute national models for the security of electronic ensured wellbeing data (e-PHI), electronic trade, and the protection and security of wellbeing data.

HIPAA approached the Secretary to issue security controls with respect to measures for ensuring the respectability, classification, and accessibility of e-PHI that is held or transmitted by secured elements. HHS built up a proposed run and discharged it for open remark on August 12, 1998. The Department got roughly 2,350 open remarks. The last direction, the Security Rule, was distributed February 20, 2003. The Rule determines a progression of managerial, specialized, and physical security strategies for secured substances to use to guarantee the classification, uprightness, and accessibility of e-PHI.

The content of the last direction can be found at 45 CFR Part 160 and Part 164, Subparts An and C.

Who is Covered by the Security Rule

•           The Security Rule applies to wellbeing designs, medicinal services clearinghouses, and to any human services supplier who transmits wellbeing data in electronic frame regarding an exchange for which the Secretary of HHS has embraced benchmarks under HIPAA (the "secured substances") and to their business partners

Business Associates

•           The HITECH Act of 2009 extended the obligations of business relates under the HIPAA Security Rule. HHS created directions to actualize and clear up these progressions.

What Information is Protected

•           Electronic Protected Health Information. The HIPAA Privacy Rule secures the security of separately identifiable wellbeing data, called ensured wellbeing data (PHI). The Security Rule ensures a subset of data secured by the Privacy Rule, which is all independently identifiable wellbeing data a secured substance makes, gets, keeps up or transmits in electronic frame. The Security Rule calls this data "electronic ensured wellbeing data" (e-PHI).3 The Security Rule does not have any significant bearing to PHI transmitted orally or in composing.

General Rules

•           The Security Rule requires secured substances to keep up sensible and suitable authoritative, specialized, and physical shields for ensuring e-PHI.

In particular, secured substances must:

1.         Ensure the secrecy, respectability, and accessibility of all e-PHI they make, get, keep up or transmit;

2.         Identify and ensure against sensibly foreseen dangers to the security or trustworthiness of the data;

3.         Protect against sensibly expected, impermissible utilizations or revelations; and

4.         Ensure consistence by their workforce.

The Security Rule characterizes "classification" to imply that e-PHI isn't accessible or unveiled to unapproved people. The Security Rule's classification necessities bolster the Privacy Rule's disallowances against uncalled for utilizations and divulgences of PHI. The Security run likewise advances the two extra objectives of keeping up the honesty and accessibility of e-PHI. Under the Security Rule, "respectability" implies that e-PHI isn't adjusted or pulverized in an unapproved way. "Accessibility" implies that e-PHI is open and usable on request by an approved individual.

HHS perceives that secured elements run from the littlest supplier to the biggest, multi-state wellbeing design. In this way the Security Rule is adaptable and versatile to enable secured elements to break down their own particular needs and execute arrangements fitting for their particular surroundings. What is suitable for a specific secured substance will rely upon the idea of the secured element's business, and additionally the secured element's size and assets.

Thusly, when a secured element is choosing which safety efforts to utilize, the Rule does not direct those measures but rather requires the secured element to consider:

o          Its size, many-sided quality, and abilities,

o          Its specialized, equipment, and programming foundation,

o          The expenses of safety efforts, and

o          The probability and conceivable effect of potential dangers to e-PHI.

Secured elements must audit and adjust their safety efforts to keep ensuring e-PHI in an evolving situation.

Hazard Analysis and Management

•           The Administrative Safeguards arrangements in the Security Rule require secured elements to perform chance examination as a component of their security administration forms. The hazard investigation and administration arrangements of the Security Rule are tended to independently here on the grounds that, by figuring out which safety efforts are sensible and suitable for a specific secured substance, chance examination influences the usage of the greater part of the protections contained in the Security Rule.

•           A hazard examination process incorporates, yet isn't constrained to, the accompanying exercises:

o          Evaluate the probability and effect of potential dangers to e-PHI;

o          Implement proper safety efforts to address the dangers recognized in the hazard examination;

o          Document the picked safety efforts and, where required, the method of reasoning for embracing those measures; and

o          Maintain ceaseless, sensible, and proper security assurances.

Hazard examination ought to be a progressing procedure, in which a secured element frequently surveys its records to track access to e-PHI and identify security incidents,12 intermittently assesses the adequacy of safety efforts put in place,13 and routinely reexamines potential dangers to e-PHI.

Authoritative Safeguards

•           Security Management Process. As clarified in the past segment, a secured element must distinguish and dissect potential dangers to e-PHI, and it must actualize safety efforts that decrease dangers and vulnerabilities to a sensible and proper level.

•           Security Personnel. A secured element must assign a security official who is in charge of creating and executing its security approaches and systems.

•           Information Access Management. Steady with the Privacy Rule standard restricting uses and divulgences of PHI to the "base essential," the Security Rule requires a secured substance to actualize approaches and methods for approving access to e-PHI just when such access is suitable in view of the client or beneficiary's (part based access).

•           Workforce Training and Management. A secured element must accommodate proper approval and supervision of workforce individuals who work with e-PHI.17 A secured element must prepare all workforce individuals in regards to its security arrangements and procedures,18 and must have and apply suitable authorizations against workforce individuals who disregard its strategies and methods.

•           Evaluation. A secured substance must play out an occasional evaluation of how well its security approaches and strategies meet the prerequisites of the Security Rule.

Physical Safeguards

•           Facility Access and Control. A secured element must utmost physical access to its offices while guaranteeing that approved access is permitted.

•           Workstation and Device Security. A secured element must actualize strategies and systems to determine legitimate utilization of and access to workstations and electronic media.22 A secured element likewise should have set up approaches and methodology in regards to the exchange, expulsion, transfer, and re-utilization of electronic media, to guarantee proper insurance of electronic ensured wellbeing data (e-PHI).

Specialized Safeguards

•           Access Control. A secured substance must actualize specialized approaches and methodology that enable just approved people to get to electronic ensured wellbeing data (e-PHI).

•           Audit Controls. A secured substance must execute equipment, programming, and additionally procedural components to record and analyze get to and other action in data frameworks that contain or utilize e-PHI.

•           Integrity Controls. A secured substance must execute arrangements and systems to guarantee that e-PHI isn't shamefully changed or pulverized. Electronic measures must be set up to affirm that e-PHI has not been despicably modified or obliterated.

•           Transmission Security. A secured substance must actualize specialized safety efforts that make preparations for unapproved access to e-PHI that is being transmitted over an electronic system.

Required and Addressable Implementation Specifications

•           Covered substances are required to conform to each Security Rule "Standard." However, the Security Rule orders certain execution particulars inside those benchmarks as "addressable," while others are "required." The "required" usage determinations must be actualized. The "addressable" assignment does not imply that an execution detail is discretionary. In any case, it licenses secured elements to decide if the addressable execution detail is sensible and suitable for that secured substance. In the event that it isn't, the Security Rule enables the secured substance to embrace an elective measure that accomplishes the motivation behind the standard, if the elective measure is sensible and suitable.

Hierarchical Requirements

•           Covered Entity Responsibilities. On the off chance that a secured element is aware of an action or routine with regards to the business relate that constitutes a material rupture or infringement of the business partner's commitment, the secured element must accept sensible strides to solution the break or end the infringement. Infringement incorporate the inability to actualize shields that sensibly and suitably ensure e-PHI.

•           Business Associate Contracts. HHS created controls identifying with business relate commitments and business relate contracts under the HITECH Act of 2009.

Strategies and Procedures and Documentation Requirements

•           A secured substance must receive sensible and proper approaches and methodology to agree to the arrangements of the Security Rule. A secured element must keep up, until six years after the later of the date of their creation or last powerful date, composed security strategies and techniques and composed records of required activities, exercises or evaluations.

•           Updates. A secured substance should occasionally audit and refresh its documentation in light of natural or hierarchical changes that influence the security of electronic ensured wellbeing data (e-PHI).

State Law

•           Preemption. All in all, State laws that are in opposition to the HIPAA controls are acquired by the government prerequisites, which implies that the elected necessities will apply.32 "Opposite" implies that it would be outlandish for a secured substance to conform to both the State and elected necessities, or that the arrangement of State law is a snag to achieving the full purposes and destinations of the Administrative Simplification arrangements of HIPAA

Authorization and Penalties for Noncompliance

•           Compliance. The Security Rule sets up an arrangement of national benchmarks for secrecy, respectability and accessibility of e-PHI. The Department of Health and Human Services (HHS), Office for Civil Rights (OCR) is in charge of overseeing and upholding these measures, working together with its implementation of the Privacy Rule, and may lead grumbling examinations and consistence audits.

•           Learn more about implementation and punishments in the Privacy Rule Summary - PDF - PDF and on OCR's Enforcement Rule page.

Consistence Dates

•           Compliance Schedule. Every single secured substance, aside from "little wellbeing designs," more likely than not been agreeable with the Security Rule by April 20, 2005. Little wellbeing designs had until April 20, 2006 to consent.


Related Solutions

Your organization deals with sensitive patient health insurance information that is covered by the HIPAA compliance...
Your organization deals with sensitive patient health insurance information that is covered by the HIPAA compliance policies. What security techniques should be implemented to help protect the privacy of your patient's health insurance data when communicating the data between healthcare facilities? Why?
Your organization deals with sensitive patient health insurance information that is covered by the HIPAA compliance...
Your organization deals with sensitive patient health insurance information that is covered by the HIPAA compliance policies. What security techniques should be implemented to help protect the privacy of your patient's health insurance data when communicating the data between healthcare facilities? Why? please summarize your answer
Health care organization compliance with HIPAA is critical.Small health care organizations often struggle with ensuring...
Health care organization compliance with HIPAA is critical. Small health care organizations often struggle with ensuring this, however. There are a number of risk assessment tools for health care organizations. These tools are both proprietary and open source. IT security professionals in these organizations need to be familiar with the range of tools available, their effectiveness, and their cost.Discussion QuestionRead the following case study: Case Study: Information Security Risk Assessment for a Small Healthcare Clinic using the Security Risk Assessment...
Describe how risk-management initiatives in a health-care organization can be fragmented. Describe the three likely outcomes...
Describe how risk-management initiatives in a health-care organization can be fragmented. Describe the three likely outcomes of fragmented risk-management initiatives.
Explain how HIPAA has changed how health care information is transmitted in EDI. Describe the relationship...
Explain how HIPAA has changed how health care information is transmitted in EDI. Describe the relationship between Electronic Health Records, reimbursement, HIPAA, and EDI transactions.
Explain how HIPAA has changed how health care information is transmitted in EDI. Describe the relationship...
Explain how HIPAA has changed how health care information is transmitted in EDI. Describe the relationship between Electronic Health Records, reimbursement, HIPAA, and EDI transactions.
Describe the critical role of health information exchange in patient care at an organization level (across...
Describe the critical role of health information exchange in patient care at an organization level (across all facilities), statewide level, and national level. How do the goals of each vary and how is quality of care enhanced?
Health Care efforts are intended to enhance the quality of care, increase compliance with regulations, reduce...
Health Care efforts are intended to enhance the quality of care, increase compliance with regulations, reduce liability, and maximize safety for patients, visitors, and staff. No single discipline has the capacity to address all of the requirements placed on health care organizations and health care professionals. We continue to encourage risk managers and other health care professionals to enhance their abilities in these skill areas for the benefit of patients, co-workers, organizations, and communities. Adopting changes to care standards and...
Choose a health care organization or provider with which you are familiar, and describe its patient information capture process.
  Choose a health care organization or provider with which you are familiar, and describe its patient information capture process. Does this process support operational effectiveness, satisfy compliance requirements, and promote quality patient care? Explain.
Describe how an ethically challenged CEO can affect the liability of a health care organization. Identify...
Describe how an ethically challenged CEO can affect the liability of a health care organization. Identify ethical responsibilities of a CEO in a health care setting, and state five most important responsibilities you believe will assist a CEO in maintaining a culture of ethical and legal behavior.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT