drchrono`s Privacy and Security guide

advertisement
drcrhono’s Privacy and Security Guide 2
Introduction
In order to achieve Stage 1 of Meaningful Use, eligible professionals must
attest that they have met certain requirements related to the use of certified
Electronic Health Record Technology. One of these requirements is related
to privacy and security.
Please use this as a guide to complete your security risk analysis. drchrono
does not attempt to interpret federal or state requirements for your practice,
and each risk should be examined in the context of your organization before
attesting for Meaningful Use.
Core Requirement 15
Objective: Protect electronic health information related or maintained by
the certified EHR technology through the implementation of appropriate
technical capabilities
Measure: Conduct or review a security risk analysis per 45 CFR
164.308(a)(1) and implement security updates as necessary and correct
identified security deficiencies as part of its risk management process.
What do I have to do?
1. Risk Analysis. Conduct an accurate and thorough assessment of the potential
risks and vulnerabilities to the confidentiality, integrity, and availability of
electronic protected health information held by the covered entity.
2. Risk Management. Implement security measures sufficient to reduce risks and
vulnerabilities to a reasonable and appropriate level.
3. Sanction policy. Apply appropriate sanctions against workforce members who
fail to comply with the security policies and procedures of the covered entity
4. Information system activity review. Implement procedures to regularly
review records of information system activity, such as audit logs, access reports,
and security incident tracking reports.
drcrhono’s Privacy and Security Guide 3
How to
ONC has released several helpful documents to guide eligible professionals complete
the four requirements above. We have compiled some of this documentation in the
guide below. We suggest that you print this document out, complete each section,
and keep it on file in case of audit and for use in future security analysis.
Page 4… Assess Confidentiality Risks
Page 6… Assess Integrity Risks
Page 7… Assess Availability Risks
Page 8… Identify Administrative Safeguards
Page 10… Identify Physical Safeguards
Page 11… Identify Technical Safeguards
Page 13… Sanction Policy
Page 15… Audit Log
References
drchrono's MU Page
*HIPAA Security Reminder - Sanction Policy
HealthIT's Guide to Privacy and Security of Health Information
Small Practice Security Guide
drcrhono’s Privacy and Security Guide 4
Assessing Confidentiality Risks
Question
drchrono’s thoughts
What new electronic
health information (EHI)
has been introduced into
my practice because of
EHRs? Where will that
electronic health
information reside?
Who in my office will have
access to EHRs and the
EHI contained within
them?
Should all employees with
access to EHRs have the
same level of access?
We recommend that
you take advantage of
our partnership with
box to securely store all
electronic health
information.
Under Account >
Permissions, you can
set all access settings
for your users.
Each user within your
practice, as designated
by an administrator, can
have unique and
individual security
settings.
Will I permit my
We recommend that
employees to have EHI on you take advantage of
mobile computing/storage our partnership with
equipment? If so, do they box to securely store all
know how, and do they
electronic health
have the resources
information. If you need
necessary, to keep
to store scanned
electronic health
documents before
information secure on
uploading to box, these
these devices?
should be deleted after
the upload.
How will I know if EHI has On drchrono’s website,
been accidentally or
go to Clinical > Audit
maliciously disclosed to an Log to view all activity
unauthorized person?
and access in the
practice.
When I upgrade my
Since drchrono is webcomputer storage
based, no patient health
equipment, will EHI be
information should be
properly erased from the
stored locally.
old storage equipment
Comments
Initials
drcrhono’s Privacy and Security Guide 5
before I dispose of it?
Are my backup facilities
secured (computers, tapes,
offices, etc., used to
backup EHRs and other
health IT)?
Will I be sharing EHRs, or
EHI contained in EHRs,
with other health care
entities through an HIO? If
so, what security policies
do I need to be aware of?
If my EHR is capable of
providing my patients
with a way to access their
health record/information
via the Internet (e.g.,
through a portal), am I
familiar with the security
requirements that will
protect my patients EHI
before I implement that
feature?
Will I communicate with
my patients electronically
(e.g. through a portal or
email)? Are those
communications secured?
If I offer my patients a
method of communicating
with me electronically
how will I know that I am
communicating with the
right patient?
Again, there should be
no local backups
necessary using a webbased EHR like
drchrono.
Any data shared with
other health care
entities in an HIO
should be secured, and
any policies regarding
security should be
agreed upon before
sharing.
drchrono’s patient
portal, OnPatient, is
secured through the
same requirements as
drchrono’s EHR to
ensure the standards of
EHI security are met
Patient communications
made through
OnPatient are secured
to standard, though
communications made
by e-mail are not
secured to the same
standards.
Patient enrollment and
login to OnPatient
requires unique
identification and
authorization.
drcrhono’s Privacy and Security Guide 6
Assessing Integrity Risks
Question
drchrono’s thoughts
Who in my office will be
permitted to create or
modify an EHR, or EHI
contained in the EHR?
Under Account >
Permissions, you can
set all access settings
for your users.
How will I know if an EHR,
or the EHI in that EHR, has
been altered or deleted?
On drchrono’s website,
go to Clinical > Audit
Log to view all activity
and access in the
practice.
On drchrono’s website,
go to Clinical > Audit
Log to view all activity
and access in the
practice.
Patient information
entered through
OnPatient is stored
separately from
clinician-entered
information, and only
appropriate clinical
users have the ability
to enter that patient
information in the EHR.
If I participate in an HIO,
how will I know if the
health information I
exchange is altered in an
unauthorized manner?
If my EHR system is
capable of providing my
patients with a way to
access their health
record/information via the
Internet (e.g. through a
portal) and I implement
that feature, will my
patients be permitted to
modify any of the health
information within that
record? If so, what
information?
Comments
Initials
drcrhono’s Privacy and Security Guide 7
Assessing Availability Risks
Question
drchrono’s thoughts
How will I ensure that EHI,
regardless of where it
resides, is readily available
to me and my employees
for authorized purposes,
including after normal
office hours?
Do I have a backup
strategy for my EHRs in the
event of an emergency, or
to ensure I have access to
patient information if the
power goes out of my
computer crashes?
Since drchrono is webbased, it can be
accessed from the
computer or iPad
wherever there is an
internet connection!
If I participate in an HIO,
does it have performance
standards regarding
network availability?
If my EHR system is
capable of providing my
patients with a way to
access their health
record/information via the
internet (e.g. through a
portal) and I implement
that feature, will I allow
24/7 access?
In case of computer
crash, you can always
use a different
computer! In case of
server downtime,
check
status.drchrono.com
for real-time updates.
Since drchrono is webbased, it can be
accessed from the
computer or iPad
wherever there is an
internet connection!
Network availability
could affect
performance but
should never affect
security.
OnPatient is available
to patients 24/7!
Comments
Initials
drcrhono’s Privacy and Security Guide 8
Identifying Administrative Safeguards
Question
drchrono’s thoughts
Have I updated my internal
information security
processes to include the
use of EHRs, connectivity
to HIOs, offering portal
access to patients, and the
handling and management
of EHI in general?
Have I trained my
employees on the use of
EHRs? Other electronic
health information related
technologies that I plan to
implement? Do they
understand the importance
of keeping EHI protected?
Have I identified how I will
periodically assess my use
of health IT to ensure my
safeguards are effective?
By completing periodic
review of the above
analysis and reacting
appropriately, you are
updating your security
processes.
As employees enter and
leave my practice, have I
defined processes to
ensure electronic health
information access
controls are updated
accordingly?
Have I developed a
security incident response
plan so that my employees
know how to respond to a
potential security incident
involving EHI (e.g.
unauthorized access to an
EHR, corrupted EHI)?
Each user is able to join
in drchrono’s training
during implementation.
You should also review
your sanction policy
with each employee.
You can print this
document out
periodically and use it
as a tool to maintain
security.
By managing staff and
permissions in
drchrono, you can
make sure all
information access
controls are updated
appropriately.
In case of a breach of
security, designated
administrators can
update password
information, review
audit logs, and
communicate with any
patients whose records
may have been
breached.
Comments
Initials
drcrhono’s Privacy and Security Guide 9
Have I developed
processes that outline how
EHI will be backed-up or
stored outside of my
practice when it is no
longer needed (e.g. when a
patient moves and no
longer receives care at the
practice)?
Have I developed
contingency plans so that
my employees know what
to do if access to EHRs and
other EHI is not available
for an extended period of
time?
Have I developed
processes for securely
exchanging electronic
health information with
other health care entities?
Have I developed
processes that my patients
can use to securely connect
to a portal? Have I
developed processes for
proofing the identity of my
patients before granting
them access to the portal?
Do I have a process to
periodically test my health
IT backup capabilities, so
that I am prepared to
execute them?
If equipment is stolen or
lost, have I defined
processes to respond to the
theft or loss?
Again, since drchrono
is web-based, there
should be no local
storage necessary. You
are able to mark
patients as inactive to
designate when
patients no longer
receive care.
Since drchrono is webbased, it can be
accessed from the
computer or iPad
wherever there is an
internet connection!
Please review our
terms of service online
if you have any
questions.
Patients must present a
unique identifier
captured in drchrono
and go through a twostep authorization
process including
patient and provider to
enable access to
OnPatient.
Again, since drchrono
is web-based, there
should be no local
storage necessary.
No PHI should ever be
stored on local
equipment, but it’s
always smart to change
your password in case
of theft!
drcrhono’s Privacy and Security Guide 1
0
Identifying Physical Safeguards
Question
Do I have basic office
security in place, such as
locked doors and windows,
and an alarm system? Are
they being used properly
during working and nonworking hours?
Are my desktop computing
systems in areas that can
be secured during nonworking hours?
Are my desktop computers
out of reach of patients and
other personnel not
employed by my practice
during normal working
hours?
Is mobile equipment (e.g.
laptops), used within and
outside my office, secured
to prevent theft or loss?
Do I have a documented
inventory of approved and
known health IT
computing equipment
within my practice? Will I
know if one of my
employees is using a
computer or media device
not approved for my
practice?
Do my employees
implement basic computer
security principles, such as
logging out of a computer
before leaving it
drchrono’s thoughts
We hope so!
With drchrono’s autologoff features, this
should not be an issue.
Make sure to verify the
physical location of any
new equipment you
may purchase as part
of your
implementation.
Again, drchrono’s
website and iPad
platforms have autologoff functionality, so
PHI is secure.
Any activity is recorded
in the Audit Log, but
since drchrono is webbased, your users can
access it from
anywhere, regardless
of physical computing
equipment locations.
With drchrono’s autologoff features, this
should not be an issue.
Comments
Initials
drcrhono’s Privacy and Security Guide 1
1
unattended?
drcrhono’s Privacy and Security Guide 1
2
Identifying Technical Safeguards
Question
drchrono’s thoughts
Have I configured my
computing environment
where electronic health
information resides using
best-practice security
settings (enabling a
firewall, virus detection,
and encryption where
appropriate)? Am I
maintaining that
environment to stay up to
date with the latest
computer security
updates?
Are there other types of
software on my EHI
computing equipment that
are not needed to sustain
my health IT environment
(e.g. a music file sharing
program), which could put
my health IT environment
at risk?
Is my EHR certified to
address industry
recognized/best-practice
security requirements?
Are my health IT
applications installed
properly, and are the
vendor recommended
security controls enabled
(e.g. computer inactivity
timeouts)?
Is my health IT computing
environment up to date
with the most recent
security updates and
Since drchrono is webbased, no patient
health information
should be stored
locally, and security is
maintained on the
server.
The PHI will all reside
on the server, so other
applications should not
be a threat to your
secure online drchrono
connection.
drchrono is ONC-ACTB
Certified as a complete
EHR product!
Ensure your logout
settings are configured
for your iPad.
You should always
update your equipment
with up to date security
patches, but all PHI is
Comments
Initials
drcrhono’s Privacy and Security Guide 1
3
patches?
Have I configured my EHR
application to require my
employees to be
authenticated (e.g.
username/password)
before gaining access to
EHR? And have I set their
access privileges to
electronic health
information correctly?
If I have or plan to
establish a patient portal,
do I have the proper
security controls in place
to authenticate the patient
(e.g. username/password)
before gaining access to
the portal and the patient’s
EHI? Does the portal’s
security reflect industry
best-practices?
If I have or plan to set up a
wireless network, do I have
the proper security
controls defined and
enabled (e.g. known access
points, data encryption)?
Have I enabled the
appropriate audit controls
within my health IT
environment to be alerted
of a potential security
incident, or to examine
security incidents that
have occurred?
protected online.
Using drchrono’s
authorization and
permission features,
you can ensure that all
privileges to PHI are
controlled
appropriately.
Patients must present a
unique identifier
captured in drchrono
and go through a twostep authorization
process including
patient and provider to
enable access to
OnPatient.
Since you can access
drchrono’s secure
website through any
wireless network, no
special security
controls need to be
accounted for.
Using the Audit Log
within drchrono and
the Audit Log Review
Form below should
suffice.
drcrhono’s Privacy and Security Guide 1
4
Sanction Policy
You are required to implement and enforce a policy to apply sanctions
against members of the workforce who violate the respective
regulations.
We suggest you use the sample sanction policy content below as a
reference to create your policy and ensure that all employees are
knowledgeable of the policy.
Privacy Final Rule Requirement
1. Sanctions. A covered entity must have and apply appropriate sanctions
against members of its workforce who fail to comply with the privacy
policies and procedures of the covered entity…
2. Implementation Specification. A covered entity must document the
sanctions that are applied, if any
Security Final Rule Requirement
1. Security management process. Implement policies and procedures to
prevent, detect, contain, and correct security violations.
2. Sanction Policy. Apply appropriate sanctions against workforce members
who fail to comply with the security policies and procedures of the covered
entity.
drcrhono’s Privacy and Security Guide 1
5
Sample Sanction Policy*
DEFINITION OF OFFENSE:
Class I offenses:
(1) Accessing information that you do not need to know to do your job;
(2) Sharing your computer access codes (user name & password);
(3) Leaving your computer unattended while you are logged into a PHI program;
(4) Sharing PHI with another employee without authorization;
(5) Copying PHI without authorization;
(6) Changing PHI without authorization;
(7) Discussing confidential information in a public area or in an area where the public could overhear
the conversation;
(8) Discussing confidential information with an unauthorized person; or
(9) Failure to cooperate with privacy officer.
Class II offenses:
(1) Second offense of any class I offense (does not have to be the same offense);
(2) Unauthorized use or disclosure of PHI;
(3) Using another person’s computer access codes (user name & password); or
(4) Failure to comply with a resolution team resolution or recommendation.
Class III offenses:
(1) Third offense of any class I offense (does not have to be the same offense);
(2) Second offense of any class II offense (does not have to be the same offense);
(3) Obtaining PHI under false pretenses; or
(4) Using and/or disclosing PHI for commercial advantage, personal gain or malicious harm.
SANCTIONS:
Class I offenses shall include, but are not limited to:
(a) Verbal reprimand;
(b) Written reprimand in employee’s personnel file;
(c) Retraining on HIPAA Awareness;
(d) Retraining on Company's Privacy and Security Policy and how it impacts the said employee and
said employee’s department; or
(e) Retraining on the proper use of internal forms and HIPAA required forms.
Class II offenses shall include, but are not limited to:
(a) Written reprimand in employee’s personnel file;
(b) Retraining on HIPAA Awareness;
(c) Retraining on County’s Privacy Policy and how it impacts the said employee and said employee’s
department;
(d) Retraining on the proper use of internal forms and HIPAA required forms; or
(e) Suspension of employee (In reference to suspension period: minimum of one (1) day/ maximum of
three (3) days).
Class III offenses shall include, but are not limited to:
(a) Termination of employment;
drcrhono’s Privacy and Security Guide 1
6
(b) Civil penalties as provided under HIPAA or other applicable Federal/State/Local law; or
(c) Criminal penalties as provided under HIPAA or other applicable Federal/State/Local law.
Audit Log Review
Reviewer
Findings
Escalation?
Date
drcrhono’s Privacy and Security Guide 1
7
Download