|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
See CISA, MS -ISAC, NGA & NASCIO RECOMMEND IMMEDIATE ACTION TO SAFEGUARD AGAINST RANSOMWARE ATTACKS. Really, circa mid-2019 (i.e. the date that the above “advice” was promulgated) is this the best that Team USA can do? NO! But you can rest assured for the foreseeable future this is the best that Team USA will do, premised on national security concerns. Team USA is not about to go any further than the “proverbial toe in the water”—doing nothing more than reinforcing the anemic response that it has shown pursuant to cybersecurity threats over the last four decades. It’s not about to expose its sources and methods by coming to the rescue of the healthcare industry. If patients must die, then so be it. After all we are at war. People die during wars. It’s the inescapable nature of the beast. This is on us. Team USA will do little more than what its already done by offering platitudes yet not venturing into the no man’s land of reallocating public/private Risks pursuant to cybersecurity threats. Big Brother is not coming to the rescue anytime soon.
Posted at 02:00 PM in Current Affairs, Health IT, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR), Internet Resources, Webinars | Permalink | Comments (0)
FREE FEBRUARY WEBINAR
|
A Short History of Cyber War and Why it Matters |
Posted at 11:03 AM in Current Affairs, Health IT, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR), Internet Resources, Webinars | Permalink | Comments (0)
JANUARY WEBINAR |
2019 NEW OR ENHANCED PRODUCTS! |
What We do - A portfolio of 3Lions Publishing products.
Training - List of all training modules: Comprehensive, Concept Shorts and Micro Shorts.
Checklists and Frameworks - All about our Checklists and Frameworks for Risk Remediation.
Expresso® the Risk Assessment Express - Your guide to Expresso, our "SaaS" based Risk Assessment Software with an encrypted Compliance Repository, HIPAA Survival Guide product access, the new Breach Wizard and reduce time doing assessments with multiple Risk updates.
Model Documents - Policies, Forms, Letters, Contracts, etc. that can be modified for your use.
IN THE DIGITAL ECONOMY
ONLY THE PARANOID SURVIVE
(a.k.a. Backups R' Us)
|
Posted at 11:19 AM in Current Affairs, Healthcare, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR), Webinars | Permalink | Comments (0)
Introduction
We have often preached our mantra that compliance can only be achieved at the granularity level of a requirement ("Requirement"). Further, the only way to show compliance is by providing visible, demonstrable, evidence ("VDE") that the Requirement's result was delivered. A Requirement presupposes the existence of a discrete deliverable. VDE is an abstraction that indicates how this result is accomplished; however, it only works at 10K feet. To make it actionable within your organization you need a process that works at ground level. What you need is a well-defined process that achieves the result. What you need is a workflow.
Since this workflow topic is "heavy," as you read through this month's article, please note that you may contact us with questions you may have. Email us at: [email protected]
The following are examples of Privacy Rule ("PR") workflows and their attendant results.
To demonstrate the need for a workflow, we borrow from the book: Workflow Modeling, Tools for Process Improvement and Application Development; Second Edition by Alec Sharp. Key definitions From Alec's work are shown below to enable the development of coherent compliance workflows and avoid the recursive semantics that has led many workflow projects into the abyss-turning what Edward Yourdon (father of Data Flow Diagrams) once correctly called "death march projects." Once you have experienced a demolished workflow design process and managed to survive, you never want to experience one again. Unfortunately, because we are veterans of the technology industry, we have managed to survive more than one-a fate that we would not wish on our worst enemies.
Definition of a Process (aka "Workflow")
It should go without saying that a Process involves some sort of work. Duh. Well not so much because what often appears obvious in the business modeling space isn't.
A Process is a defined method to achieve some result, and that result is far more important to the definition of a business process than the work that goes into it.
Named in Verb-Noun Form
The first step in deciding whether or not you have a process is to name it and apply two exceedingly simple and useful guidelines:
Delivers a Specific, Essential Result
And now it really gets interesting. The result of the Process, in "noun-verbed" form, must meet three criteria.
The Result is discrete and identifiable
The Result is countable
The Result is essential
Producing VDE Requires a Workflow
It is axiomatic that producing VDE requires a Workflow. The "triggering event" in compliance is a Requirement; the result is the fulfillment of that Requirement. Do all regulatory Requirements fit this model? Who knows? We believe that the majority do. Here our objective is not to reach Workflow Panacea, that is way beyond our pay grade. Our objective is to illustrate how widely the Workflow Modeling framework can be applied to compliance, and in this instance to HIPAA. To be a competent Compliance Officer going forward it is essential that you master this discipline. Workflow modeling should be one of many tools inside your toolkit. If you want a seat at the C-Suite table that means getting busy. Iterate. Iterate. Iterate. Literacy. Literacy. Literacy.
Other Workflow Considerations
A Process is initiated to deliver its Result by a triggering event ("TE"). Generally, but not always, the Process is triggered by the "customer" that will benefit from the Result. The customer may be internal or external. In the examples herein, it is the patient or legal representative ("Individual") that triggers these processes. Between the TE and the Result is a collection of tasks, actions, steps (referred to as "Activities") that must be accomplished to deliver the Result. There may also be sub-processes, each meeting the Process definition, that may be interposed between a Process and its Result. For the Processes we present here as examples we will constrain the analysis to a collection of Activities.
However, within your organization, there may be sub-processes interposed. That is something we leave as an exercise for our readers. Be forewarned, there are some non-trivial technical challenges when you start interposing sub-processes. Each sub-process consists of another collection of Activities.
The Activities within a Process must be interrelated, they are not just some arbitrary collection of work. They must be related either through a necessary sequence or a dependency. A dependency is implicated when Activity "C" cannot occur until Activity "B" is completed. This distinction may be semantic "hair-splitting" because a sequence appears to implicate dependency, although one could quickly think of use cases where this is not true (i.e. where the sequence does not occur in any particular order).
Activities are also interrelated because they all deal with the same "Token." We think of a Token as a single unit of work. For example, in the "Authorize PHI" example the Token is the work required to complete the Authorization, provide the necessary access, or notification of denied access. If we included training staff to deliver Authorizations in that Process than that would introduce a different Token-which under this model would mean that said training constitutes a separate Process.
The example provided below is intended to be just that. We do not pretend that this example Process will meet every CE's need, or that of any specific CE. We intend, by way of example, to demonstrate how you should be thinking about Workflow Modeling within your organization. We also hope to extend our lexicon to show that producing VDE for a Requirement requires a Process and what that Process might look like when diagrammed.
Authorize PHI
This Requirement is driven by the following PR section: §164.508 Uses and disclosures for which an authorization is required. In general, the Requirement is stated as follows:
(1) Authorization required: General rule
Except as otherwise permitted or required by this sub-chapter, a covered entity may not use or disclose protected health information without an authorization that is valid under this section. When a covered entity obtains or receives a valid authorization for its use or disclosure of protected health information, such use or disclosure must be consistent with such authorization.
Let's provide a specific example. An aging mother (C) requests medical record access from her Physician (CE) for her daughter (Entity A). The TE for an authorization is the Individual ("I" or "C") (e.g. the Mother) who has requested access for her daughter.
In this simple example the Individual is both the Customer ("C") that triggers the Process ("P") and is the ultimate beneficiary of the Result ("R") (however here there are two beneficiaries: (1) the Mother (C); and (2) the Daughter (Entity A) that actually get authorized access to the PHI).
Right away there should be some flags that are set off based on the simplicity of this Process. But first let's determine if all the attributes of a Process are met:
(1) Here the R is discrete and identifiable: Access to the PHI has been provided and the Individual has been notified (two results here).
(2) The number of times an Authorization is provided is clearly countable over time.
(3) The R is essential in that it fulfills a regulatory requirement.
So, it appears that on its face we have a valid process. The issue is not based on the validity of the Process but rather on its simplicity. To see why this is true let's explore other aspects of §164.508. The Rule states as follows:
1) Valid authorizations.
(i) A valid authorization is a document that meets the requirements in paragraphs (a)(3)(ii), (a)(4)(ii), (c)(1), and (c)(2) of this section, as applicable.
(ii) A valid authorization may contain elements or information in addition to the elements required by this section, provided that such additional elements or information are not inconsistent with the elements required by this section.
(2) Defective authorizations. An authorization is not valid, if the document submitted has any of the following defects:
(i) The expiration date has passed, or the expiration event is known by the covered entity to have occurred;
(ii) The authorization has not been filled out completely, with respect to an element described by paragraph (c) of this section, if applicable;
(iii) The authorization is known by the covered entity to have been revoked;
(iv) The authorization violates paragraph (b)(3) or (4) of this section, if applicable;
(v) Any material information in the authorization is known by the covered entity to be false.
It should be clear from above that the Authorization requires validation and that the next steps cannot proceed until validation is complete. Further, it should be clear that "Validate Request," written in verb-noun form, is likely a sub-process with its own set of Activities. The same is true of "Provide Access" and "Notify Customer."
What are the takeaways thus far? First, it should be clear that Process modeling is iterative. You are simply not going to get it right during your first attempt. Second, in order to model effectively you are going to need some expert knowledge of the subject matter domain. Third, there are other questions and/or flags that should be on your radar by now. For example, what happens if "Validate Request" fails? And a sub-process to "Store Validation?" If we do not perform the latter how will we find the Authorizations that this Individual has triggered when the same (or other) person/entity wants access again?
Here is an example of a Swim Lane Diagram for this Example (Workflow Process). A quick explanation of its components is helpful.
Are we done? No. There are other steps in the Process modeling framework that remain (e.g. creating a more detailed "swim lane diagram"). However, the intent here was to introduce Process modeling and how it might work pursuant to the Privacy Rule. We suspect that most healthcare organizations have not modeled the Processes required to comply with the HIPAA Rules (i.e. Privacy, Security, and Breach Notification). Process modeling is the mechanism by which an organization gets "down and dirty" with the Activities necessary to produce VDE for a single Requirement.
Stay tuned for future webinars where we will provide additional information about how your organization can use swim lane diagrams (workflows) to improve HIPAA Compliance.
Signup for our FREE Newsletter here.
Posted at 02:55 PM in Current Affairs, Health IT, Information Technology for Healthcare (EHR/EMR), Knowledge Management | Permalink | Comments (0)
ANNOUNCEMENT
|
Just what clients need and want!
|
How Other People Comply with the Security Rule!
|
Information System Review Challenges
|
Posted at 03:39 PM in HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR), Internet Resources, Webinars | Permalink | Comments (0)
Does your staff have sufficient HIPAA training?
|
Certification Training Modules | |
3. Audit
7. Documentation*
8. HITECH Act
|
9. Omnibus Rule
10. Privacy Rule
11. Security Rule
12. Risk Assessment
13. Risk Management
|
HOW TO COMPLY WITH HIPAA
|
At 3Lions Publishing, Inc. our mission is to provide clients with:
HIPAA Help
|
Protect Your Practice and Your Business
|
![]() |
Click Here for HIPAA Survival Guide® Subscription Plan Testimonials
Take advantage of our Heartbeat™ and Pulse™ offerings with The HIPAA Survival Guide® Subscription Plan With Expresso®
|
Posted at 07:33 PM in Health Reform, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR), Web/Tech, Weblogs | Permalink | Comments (0)
If you anticipate or are currently transacting commerce with EU consumers, you will need the ability to perform a Personal Data Risk Assessment with Expresso.
HIPAA Survival Guide Subscription customers may purchase GDPR with Expresso as an ADD-ON for a one-time cost of $495.95 with no increase to your renewal fees.
Click here for more information and to purchase GDPR with Expresso ADD-ON.
Non-subscription clients may purchase Expresso with GDPR Subscription that includes GDPR Products for $1,295.95.
Click here for more information and to purchase Expresso with GDPR Subscription.
If you have any questions, please contact us at [email protected] or call (800) 516-7903
Expresso® was designed to manage more than one compliance regime. We are now delivering on that promise. Our competitors' products were narrowly focused on HIPAA and they have no easy path to migrate their offerings to other regimes. This includes smaller competitors and those that come with a more hefty price tag. None are delivering the kind of innovation that Expresso® represents.
We have rationalized the GDPR risk assessment in a more streamlined manner because GDPR is even less prescriptive than HIPAA. Our decade of experience provides you with a foundational list of 10 Essential Controls that any compliance regime requires. We introduced the Compliance Stack™ as a way to explain this groundbreaking innovation to the marketplace.
An introduction to the GDPR's 10 Essential Controls that are included in Expresso follows:
1. Risk Management: This Control encompasses the entirety of an entities Risk Management program ("Program"), including Risk Assessments and implementing additional Security Controls ("Controls") that reduce Risks to levels that are "reasonable and appropriate."
2. Incident Management: There can be no effective Risk Management Program, including but not limited to Breach Notification, of security incidents are not tracked.
3. Inventory (Security Objects): Controls are applied to Security Objects (e.g. most think in terms of an asset inventory but the term encompasses much more than that).
4. Administrative: Compliance is a multi-disciplinary subject matter domain that requires a skillset far greater than technical acumen.
5. Authentication: The ubiquitous nature of smart phones has led to widespread use of two-factor authentication by most large organizations including banks, brokerages, and of course all the major technology firms.
6. Breach Notification: Breach notification, under every compliance regime where it is applicable, has become the 800-Pound-Gorilla that drives enforcement. Such is the case for HIPAA and we expect this same Gorilla to dominate GDPR enforcement. Large Breaches attract the attention of regulators.
7. Disaster Recovery: Disaster Recovery is yet another meta-control because it encompasses much more that data backups. Of course, backing up your protected data, and all your data for that matter, is mission critical.
8. Audits: Measurement against a baseline of a compliance regime's requirements is the only level of granularity that matters during an audit.
9. Technical Controls: This is another meta-control that of necessity must be treated as such because it is where the most innovation is currently occurring in cybersecurity defenses (i.e. for the moment we are discounting the importance of process innovations because they are so little understood). What we enumerate here as sub-controls are the basics, the most important of which is encryption.
10. Physical Controls: Physical Controls are such a no-brainer that they often go overlooked because of our obsession with technology.
GDPR PRODUCTS AND SUBSCRIPTION
GDPR Products are available on the HIPAA Survival Guide Store. They include:
GDPR products can be purchased as a subscription or individually (including the Combo Package).
We recommend that you have at least four basic policies in place: (1) a Notice of Privacy Practices (outward facing); (2) a Privacy Policy; (3) a Security Policy; and (4) a Breach Notification Policy (collectively "Policies").
NOTICE OF PRIVACY PRACTICES ("NOPP")
Your GDPR NOPP is similar to covered entities NOPP under HIPAA, except you need to provide access to it in places where Data Subjects would expect to see it.
Your Privacy Policy is an internal facing document and contains your organization's intentions vis-a-vis protecting the confidentiality of Personal Data. It should contain information about your Data Protection Officer (or Representative) and how you intend to resource this position.
Surprisingly there is only one Article in the GDPR (Article 32) that deals directly with security. It's not that security is not important under the GDPR, it obviously is; rather, it's that the emphasis on Privacy dominates.
The GDPR introduces Breach Notification into the EU for the first time. Given what we have witnessed under HIPAA (post the HITECH Act) Breach Notification will also emerge as the GDPR's 800-pound Gorilla.
If you have any additional questions regarding GDPR Compliance, please contact us via email at [email protected] or by telephone at 800-516-7913.
Posted at 02:38 PM in Health IT, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR) | Permalink | Comments (0)
HIPAA Survival Guide® Webinar
The semantics that underpin NIST's Risk Assessment Equation
|
HOW TO COMPLY WITH HIPAA?
|
Posted at 08:34 PM in Healthcare, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR), Internet Resources | Permalink | Comments (0)
Tags: HIPAA Compliance Vendor
"Why does health care seem to be disproportionately the target of ransomware attacks, and what can be done about it?
To understand why somebody would attack healthcare organizations using ransomware as their strategy, you have to know what the motivation of the attacker is," wrote Tim Jarrett, Senior Director, Enterprise Security Strategy in an article in Health Leaders Media, Senior Director, Enterprise Security Strategy.
In addition, on April 14th, Becker's Healthcare IT and CIO Review reported: "There were 1,519,521 breached patient records in March, representing a 155 percent increase in the number of breached records in January (388,307) and February (206,151) combined."
Healthcare information has been featured in the news of late for data breaches, ransomware, and phishing schemes. If you don't have a plan in place to deter these actions, I recommend taking a look at the HIPAA Survival Guide's Risk Assessment and Mitigation products. They are offering a FREE test drive of their signature Risk Assessment product, Expresso™.
Posted at 03:12 PM in Healthcare, HITECH / HIPAA, Information Technology for Healthcare (EHR/EMR) | Permalink | Comments (0)
Tags: Expresso, HIPAA Survival Guide