160 likes | 297 Vues
EHR & Meaningful Use for HIM Professionals R esource P atient M anagement S ystem. Protect Electronic Health Information. Presenters: Patricia Gowan RHIA , CPC - USET REC HIM Consultant Lisa Broome RPMS ISSO. Training Objectives. Understand the MU objectives and the measures
E N D
EHR & Meaningful Use for HIM Professionals Resource Patient Management System Protect Electronic Health Information
Presenters: Patricia Gowan RHIA, CPC - USET REC HIM Consultant Lisa Broome RPMS ISSO Privacy and Security
Training Objectives • Understand the MU objectives and the measures • Review the role of HIM in conducting the security risk analysis • Examine role-based access as it applies to the EHR, HIPAA Privacy & Security Rule & FISMA (Federal Information Security Management Act) Privacy and Security
Protect Health InformationObjective & Measure • Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities • Conduct or review a security risk analysis per 45 CFR 164.308 (a)(1) of the certified EHR technology, and implement security updates and correct identified security deficiencies as part of its risk management process. Privacy and Security
MU Measure • Type of Measure: Attestation Privacy and Security
What HIM Needs to Know • Protect electronic health information • Role in the Security Risk Analysis (physical, logical and environmental evaluations) • Role in determining role-based access as it applies to the HIPAA Privacy & Security Rule and FISMA Privacy and Security
MU Software Requirements for the Certified EHR • Approved Encryption Software • Symantec EndPoint Encryption v8.0 • Credant2Go Shield v7.1 • 7-Zip v9.2 • WinHasher v1.6 • IPSec for RPMS Windows Sites • VanDyke for RPMS AIX Sites • Two-factor authentication for EHR access Privacy and Security
Risk Analysis for MU & Continuous Monitoring • Designed to assess the security • Raise management’s awareness of major risks • Propose recommendations for mitigation • Ensure IHS meets federal requirements for MU Privacy and Security
Risk Analysis for MU & Continuous Monitoring • Physical controls • Protecting information, e.g., PC behind closed doors, secure computer room • Environmental controls • Changes in the environment, e.g., snow storms, tornados, etc., • Logical controls • Use of software, collected data and hardware, e.g., Symantec Protection Suite, Access Control Lists (ACLs), etc., Privacy and Security
Elements of Risk Assessment • Secure Fusion • Asset Inventory • Identification • System • Threat • Vulnerability • Control analysis • Risk mitigation • Signature of facility CEO/Area ISSO Privacy and Security
Risk Mitigation • Prioritize, evaluate and implement appropriate risk – reducing controls recommended from the RA process • Risk analysis (Appendix G: Risk Mitigation worksheet) • Risk Analysis (Appendix H: Secure Fusion Mitigation Plan) Privacy and Security
Storage of Completed RAs • RAs will be stored on SharePoint • HQ ISSOs • Perform periodic audits • Certify annually Privacy and Security
HIPAA Privacy & Security RuleUpcoming Changes Photocopier/Fax/MFD • Have hard drives installed • Must be disposed of properly Business Associates: now responsible for their breaches Privacy and Security
HIPAA Privacy & Security Ruleupcoming changes continued Patient request for medical information • Information must be provided to the patient within 30 days • If patient requests for electronic format such as CD/DVD/flash/e-mail • must be encrypted • patient may request unencrypted format and we must accommodate Privacy and Security
Policy and Procedure Review: Protecting Health Information Clinical Lab Test Results
Questions & Discussion Privacy and Security