3 minute read

HIPAA Compliance Follow-Up: Keep Your Practice on the Right Side of Compliance

Is your practice compliant? Check out the following guidelines and tips for keeping your organization on track and out of legal hot water.

There are Six Annual Assessments of HIPAA Compliance – Keep records and document deficiencies of the following: 1.

Advertisement

Security Risk Assessment

2.

3.

4.

5. Privacy Assessment HITECH Subtitle D Audit

Security Standards Audit Asset and Device Audit

Create Remediation Plans to Address Deficiencies

Fully document plans in writing Update and review plans annually Tip: Retain records for six years

Annual HIPAA Training is Required by All Staff

• Keep documentation of completed training

Tip: Designate a staff member to act as HIPAA Compliance officer

Security Awareness Training for All Staff

Keep documentation of completed training Tip: Provide periodic reminders to reinforce security awareness training

Develop a Contingency Plan for Emergencies

Have policies and procedures in place for emergency response Create back-ups of all ePHI to ensure exact copies can be recovered

Develop procedures to ensure critical business processes continue during emergencies Tip: Regularly update and test contingency plan

Perform Risk Analysis, Assess Whether ePHI Encryption is Appropriate

If it is not appropriate, create and implement alternative Implement controls to guard against unauthorized access of ePHI

Tip: Document decision-making process covering the use of encryption

Implement Identity Management and Access Controls

Assign unique usernames to all individuals with access to ePHI

Implement policies to determine an employee’s need for access Develop policies for terminating access to ePHI

Create a system that logs out user after inactivity Tip: Only allow for employees that require access for work duties

Create and Monitor ePHI Access Logs

Create auditable ePHI access logs for all login attempts Routinely monitor unauthorized access attempts Use controls to ensure ePHI cannot be altered or destroyed by users Tip: Limit uses and disclosures to the minimum necessary information

Develop Policies to Securely Dispose of Protected Health Information

Implement procedure of rendering ePHI unreadable and incapable of being reconstructed Develop policy to permanently erase ePHI on electronic devices

Tip: Be sure to store any devices containing ePHI until they can be disposed of properly

Implement Policies for Providing Patients with Access to Health Information

Be able to provide copies of health information on request Provide copies of PHI in the format requested Create reasonable fees, if any, that are cost-based

Tip: Provide all health information in a timely manner and within 30 days

Obtain and Store HIPAA Authorizations for Uses and Disclosures of PHI Not Otherwise Permitted by the HIPAA Privacy Rule

Clearly explain specific uses and disclosures of PHI written in plain language State the classes of people to whom PHI will be disclosed

Include individual’s signature and date of signature Tip: Be sure to include an expiry date or event for authorization

Create a Notice of Privacy Practices (NPP)

Provide periodic reminders to reinforce security awareness training Provide notice of privacy to all patients Be sure every patient has signed that they’ve received the privacy notice

Develop procedures for dealing with complaints about failure to comply with NPP

Tip: Publish and display privacy practices in a prominent location and on your website

Create Procedures Relevant to Annual HIPAA Privacy, Security and Breach Notification Rules

Have all staff members read and legally attest to HIPAA policies and procedures Maintain documentation of their legal attestation Tip: Keep documentation of annual reviews of policies and procedures

Identify All Vendors and Business Associates

Maintain Business Associate Agreements (BAAs) with all associates

Assess associates’ HIPAA compliance Create confidentiality agreements with non-business associate vendors

Tip: Track and review all BAAs annually

Create Defined Process for Security Incidents and Data Breaches

• Make sure you have the ability to track and manage any incidents • Be able to provide the required reporting of all breaches and incidents

• Tip: An anonymous method of reporting breaches or violations can increase awareness

This article is from: