HIPAA Compliance: Why IT Matters and How to Obtain It

What is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule established standards for protecting individuals’ electronic personal health information (PHI) (which includes any identifiable health information, such as health records and histories, medical bills, lab results, etc.) that are created, received, used, or maintained by a covered entity, which includes healthcare providers, health plans, and healthcare clearinghouses. 

Although the rule was passed into law in 1996, businesses today need to pay close attention.In 2017, the OCR announced an initiative to more widely investigate HIPAA breaches affecting 500 people or fewer. While small breaches can occur at organizations of any size, the announcement was a reminder to those at the small end of the scale, that when it comes to a HIPAA breach, size does not matter.

Related: Key Strategies For Meeting Data Compliance Regulations

Does your business need to be HIPAA compliant?

If your business currently handles PHI or wants to work with companies in the healthcare field, you will need to be HIPAA compliant and be able to show that your business has protections for PHI in place and can safely and securely handle the data that your clients have been trusted with. 

Covered entities are the main group subject to HIPAA requirements. Covered entities include a wide range of different healthcare organizations and individuals.

Healthcare Providers

The first group, healthcare providers, includes providers such as doctors, psychologists, nursing homes, and pharmacies. However, these groups are only covered if they transmit any information electronically in connection with a transaction that HHS has adopted a standard for.

Health Plans

The second group, health plans, covers health insurance companies, health maintenance organizations (HMOs), company health plans, and government programs that pay for healthcare, such as Medicare, Medicaid, and military/veteran programs.

Healthcare Clearinghouses

The third and final group, healthcare clearinghouses, includes organizations that process nonstandard health information received from other entities into a standard form (i.e., standard electronic format or data content), or vice versa.

Additionally, the law allows covered entities to disclose PHI to business associates as long as there is a contract in place that establishes what the business associate is going to do with the data and requires them to protect the privacy and security of the PHI they’re given access to. Business associates are also directly liable for compliance with some HIPAA provisions.

HIPAA auditing and enforcement

The Health and Human Services Office of Civil Rights (OCR) audits organizations to ensure they are following HIPAA. In 2016, the OCR began the second phase of its audit program and collected covered entities’ contact information. They also collected questionnaires about each covered entity’s size, type, and operations and used them to create pools of potential organizations to audit. Auditees are chosen at random by OCR.

What are the consequences of violating HIPAA? 

If the OCR finds discovers a HIPAA violation, they can issue both financial penalties and corrective action plans. Financial penalties for HIPAA violations are tiered — the penalty is based on the covered entity’s knowledge of the violation. Violations start at Tier 1, which indicates a violation that the covered entity was not aware of and couldn’t have been realistically avoided, all the way to Tier 4, which indicates a violation that the covered entity knew about but made no attempt to correct. The fines for each tier are adjusted annually to account for inflation. In 2019, the fines for each tier were:

  • Tier 1: Minimum fine of $117 per violation up to $58,490
  • Tier 2: Minimum fine of $1,170 per violation up to $58,490
  • Tier 3: Minimum fine of $11,698 per violation up to $58,490
  • Tier 4: Minimum fine of $58,490 per violation up to $1,754,698

The OCR takes intentional violations for HIPAA very seriously, as they demonstrated in 2019 when they fined the University of Rochester Medical Center $3M for HIPAA violations, including failing to encrypt mobile devices. A solid compliance program can protect you even in the event that you unintentionally violate HIPAA. A thorough and continually updated compliance program can mean the difference between a bump in the road and a potentially business-ending financial penalty.

What are the key requirements of HIPAA?

Covered entities must be in compliance with three core requirements. All controls and safeguards HIPAA-compliant organizations have in place ultimately serve to help them meet these three requirements.

The Privacy Rule: HIPAA ensures the privacy of PHI. HIPAA’s privacy rule establishes standards for protecting medical records and other PHI and sets limits and conditions on using and disclosing PHI without patient authorization. This rule also gives patients the right to a copy of their health records and ask providers to make corrections to their PHI.

The Security Rule: Businesses that are covered by HIPAA must establish security standards that protect electronic PHI (ePHI). These standards cover any ePHI that is created, received, used, or maintained by a covered entity and, in turn, their business associates. According to OCR, the security rule “requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronically protected health information.” This rule is broken down and discussed further in the next section.

Notification in Case of Breach of Unsecured Protected Health Information: While the safeguards required by the security rule are designed to help organizations avoid breaches, if a HIPAA-compliant organization does experience one, they are required to notify certain parties — including individuals, the media, and the Secretary of breaches of unsecured information — depending on the type and size of breach. 

OCR defines a breach as “an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information.” So breaches include not just those caused by hackers or malware, but also by employees inappropriately disclosing information or leaving it where unauthorized users can see.

How to satisfy the HIPAA security rule

A healthcare provider inputs patient data using technical safeguards on a secure computer

The HIPAA security rule has three parts: technical safeguards, physical safeguards, and administrative safeguards. These parts have their own set of specifications, all of which are either considered required or addressable.

Keep in mind that a specification being marked as addressable does not mean you can simply ignore it — it means there is some flexibility with safeguard implementation. If an addressable safeguard isn’t reasonable for an organization to implement, they can introduce an alternative or not implement it at all. However, you will need to document that decision and be prepared to justify it during an audit.

Technical safeguards: This category covers the technology used to protect and access ePHI. When it comes to implementing these safeguards, organizations can implement whatever mechanisms make the most sense for them, with the exception of encrypting ePHI (all ePHI, whether being stored or transmitted, must be encrypted to NIST standards once it leaves your internal servers).

These technical safeguards dictate that covered entities must:

  • Implement a means of access control
  • Introduce a mechanism to authenticate ePHI
  • Implement tools for encryption and decryption
  • Introduce activity logs and audit controls
  • Facilitate automatic log-off of PCs and devices

Physical safeguards: The HIPAA physical safeguards cover physical access to ePHI wherever it is stored, whether it’s in a data center, cloud-based storage, in a covered entity’s physical location, or anywhere else. They lay out the standards for physically safeguarding ePHI.

The physical safeguards include requirements for:

  • Facility access controls 
  • Workstation use and positioning policies
  • Mobile device policies and procedures
  • Hardware inventory

Administrative safeguards: These safeguards pertain to the policies and procedures that govern your organization’s conduct and integrate the privacy rule and the security rule into one set of policies and actions. HIPAA requires that a dedicated security officer and privacy officer be assigned to implement these safeguards.

The administrative safeguards include requirements for:

  • Conducting risk assessments
  • Introducing a risk management policy
  • Training employees on security
  • Developing a contingency plan
  • Testing of contingency plan
  • Restricting third-party access
  • Reporting security incidents

How does HIPAA fit into your overall compliance program?

Although HIPAA covers a very specific type of information, the controls and safeguards required to protect ePHI are similar to those in other cybersecurity compliance frameworks. If you already have a robust information security program, you may already be meeting certain HIPAA requirements. 

Inversely, if you are already HIPAA compliant and are looking to achieve compliance with other data protection standards such as SOC 2, ISO27K, or CCPA, your HIPAA-compliant policies and safeguards will likely give you a headstart. Access control, mobile device usage policies, risk management policies, and employee training are just a few examples of HIPAA compliance requirements that overlap with requirements in other data security frameworks.

Utilizing a dedicated compliance software such as Hyperproof allows you to map evidence to more than one control/requirement, re-use evidence from past audits and avoid duplicating efforts.

When should you consider HIPAA compliance?

If you want to do business with HIPAA covered entities, you need to become HIPAA compliant before accepting or working with any PHI from clients. If there is a data breach or one of your clients is audited and they identify you as a business associate, the OCR will expect you to be able to demonstrate HIPAA compliance. As we discussed earlier, willful noncompliance is punished, and if you accept PHI from a covered entity without HIPAA compliance, you could face steep penalties.

If you want to eventually do business with covered entities, you should be pursuing compliance now; don’t wait until you’re courting a client to think about it. In all likelihood, if you’re not compliant, one of your competitors is.

HIPAA vs. HITRUST: What’s the Difference?

Unlike some data security frameworks, there is no HIPAA certification that is obtained after an OCR audit: you are simply either found to be in or out of compliance. However, the Health Information Trust Alliance (HITRUST), a group of healthcare industry leaders, has developed a certification system that helps organizations become compliant with HIPAA and other regulations called the Common Security Framework (CSF). The CSF is a standardized, voluntary compliance framework that, when organizations become compliant, ensures their compliance with HIPAA and other frameworks, such as PCI and NIST. 

CSF certification offers organizations the chance to show that they take data security compliance seriously and an easy way to prove to clients that they are HIPAA compliant. However, obtaining the HITRUST CSF certification is time-consuming and expensive, so unless it is required by their potential clients, many organizations opt-out of obtaining the certification.

Tips for Getting Started with HIPAA

If your business is just starting out on its compliance journey, or if HIPAA compliance is new to your organization, you should have a plan in place for determining what security measures need to be put in place, how your organization is going to put those measures and controls in place, and what controls you plan to test and monitor activities you’ll need to do on a regular basis. Don’t wait for an issue to crop up — be proactive about completing the activities that will keep your data secure.

Develop an incident response plan: If your organization does experience a data breach, you are required to notify certain parties — including individuals, the media, and the Secretary of breaches of unsecured information — depending on the type and size of breach. 

Related: How to Create a Cybersecurity Incident Response Plan 

Record audit trails: As you complete internal and external audits, keep records of those activities: what documentation is being pulled, what processes you’re evaluating, and what the findings of each audit are. An audit is a point-in-time snapshot of your compliance process, and keeping track of your discoveries can tell you what you need to work on and what processes are working as intended.

Have dedicated staff and resources: To be as successful as possible, you need to have staff and resources that are dedicated to compliance. It can be tempting for startups, small businesses, or companies that don’t see the value in proactive compliance programs to tack compliance responsibilities onto an current employee’s responsibilities, but a successful compliance program requires dedicated and knowledgeable employees and resources to back them up.

Get leadership’s buy-in: Just like any program or corporate value, compliance needs to come from the top down to be successful. Having leadership’s buy-in is invaluable and will make a world of difference. Having their buy-in will mean your compliance program is more likely to have the dedicated staff and resources we discussed above and to be a priority everyone in the company, not just the compliance staff.

Maintaining compliance with HIPAA

As with any other compliance framework, HIPAA compliance isn’t something you can achieve once and move on from. Cybersecurity threats are constantly evolving, so if you don’t make compliance a continual priority, your compliance program will quickly fall behind and fail to protect your business. Once you achieve compliance, you need a plan for maintenance.

A member of the security team uses his phone for quick, secure incident response

Using Hyperproof to become (and stay) HIPAA compliant

Any business handling PHI, whether they’re a health insurance company, a data storage company, an insurance broker, or a part of any of the other many industries that touch PHI, needs to understand HIPAA and have the required processes and protections in place to ensure they are safely and securely handling that data.

If you need to ensure that your organization is compliant with HIPAA, Hyperproof’s compliance operations software can make your compliance journey simpler and faster. Hyperproof allows you to easily see the requirements for HIPAA (as well as those for other common cybersecurity standards such as, SOC 2 and ISO 27001), create or update internal controls, store, tag, and organize compliance evidence, and automate many repetitive administrative tasks associated with the audit process. If you’re interested in learning more about ways to manage your HIPAA compliance process efficiently, we’d love to talk

Related: Understanding and Executing Compliance Audits

The post HIPAA Compliance: Why IT Matters and How to Obtain It appeared first on Hyperproof.

*** This is a Security Bloggers Network syndicated blog from Hyperproof authored by Jingcong Zhao. Read the original post at: