Companies who routinely store sensitive health or other personally compromising data, and who do not employ adequate IT security measures to protect said data are putting themselves at risk of an HIPAA audit. What’s an HIPAA audit; you may ask? This is when the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR), citing the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy, Security and Breach Notification Rules, sends you a notice that states, in part, “your organization has been selected for a desk audit of your compliance with the HIPAA Rules.” What this entails is the OCR then requesting you, through a link to one of their own secured servers, to upload certain compliance documents that show your organization is taking the appropriate and lawful actions and measures necessary to protect the personal health information (PHI) and other secure, sensitive data of your clients, patrons or other type of customer whose health information privacy may be compromised.
How Do I Know If I Am in Compliance?
This is a question many organizations (or their CIOs and CISOs) are (or should be) asking, following the recent settlements reached with Oregon Health & Science University (OHSU) and the Catholic Health Care Services of Philadelphia regarding the theft and exploitation of sensitive data on their patrons — and thousands of patients in the OHSU case. This sensitive data included:
The total settlements or HIPAA fines were $2.7 million for Oregon Health & Science University and $650,000 for CHCS of Philadelphia.
2016 — a Banner Year for HIPAA Fines
The misappropriation of HIPAA-protected data has already garnered more than $9 million in fines by mid-2016. Two more healthcare organizations have recently panicked over their own IT data thefts — University of Mississippi Medical Center in Jackson, Miss., and Granger Medical Clinic, in West Valley City, Utah — involving, respectively, yet another stolen, unencrypted laptop and 2,600 paper medical records scheduled for shredding, but which went missing. These are two more healthcare entities that could face HIPAA audits or fines should the missing data be deemed egregious enough of a breach after investigation.
Business Associates and “Covered Entities”
CHCS of Philadelphia is deemed a “Business Associate” under HIPAA laws because they provide ongoing management and IT services to six skilled nursing facilities. Business Associates of “covered entities” such as- healthcare facilities and university hospitals can be held liable in the event of a breach or violation of mandated security measures under HIPAA rules. According to HHS.gov, “A ‘business associate’ is a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or provides services to, a covered entity.”
If you are a CIO or CISO of an SME or larger corporate entity, and your organization is in a potentially high-risk security situation that involves huge databases of personal health information, get secure with adequate IT security measures that will pass an HIPAA audit. 403Tech Inc is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at (403) 215-7506 or send us an email at [email protected] for more information.
Scott Gallupe of 403Tech Discusses Cybersecurity Threats in Business in Calgary Article
The COVID-19 pandemic sent businesses scrambling to pivot from an office-based environment to a remote workforce. A recent issue of Business in Calgary featured 403Tech President Scott Gallupe, who advised on how local businesses can protect their IT systems from cybersecurity threats. He explained that passwords and video collaboration tools are possible entryways for viruses and malware. The article, Alright, Stop, Collaborate and Listen, features several local IT leaders, describes the issues faced by business owners during the pandemic and provides guidance on ways to protect business data from ransomware and other types of cyberattacks.