Tag Archives: HIE

Maryland HIMSS Spring Educational Meeting – April 26, 2012

CynergisTek CEO, Mac McMillan, will provide the Privacy and Security Update at the Spring Meeting of the Maryland HIMSS chapter.

The meeting, titled, “HIT Industry Updates – Privacy & Security, Social Media, Mobile Commuting and HIE,” will be hosted by Sheppard Pratt Health System in its Conference Center on Thursday, April 26, 2012.  The conference will be held from 8:30 am – 3:00 pm.

For more information, please visit http://www.mdhimss.org/ 

Thanks to the team at Maryland HIMSS for inviting us to participate!

Patients getting short shrift in EHR privacy and access

Author: Greg Goth, Contributing Editor, FierceHealthIT

Healthcare providers and health information exchanges must do a better job of protecting patients’ privacy, allowing them to access their own healthcare data, and developing consistent “rules of the road” to safeguard information, according to studies published by the New York Civil Liberties Union and Consumers Union.

The Consumers Union study, conducted by University of California-San Francisco professor Robert H. Miller, examined the performance of five California-based provider organizations in meeting nine principles–intended to simultaneously increase provider access to data and protect patients’ privacy–adopted by state patient and consumer groups in 2010.

“For organizations to comply with all nine principles, clear ‘rules of the road’ for information sharing must be defined, and patient education in health information exchange and control over personal data must be increased,” Miller concluded in his study, published this week in the journal Health Affairs.

Miller found that while the organizations he studied had adopted numerous privacy and security policies to demonstrate their seriousness about protecting data, none of them did much to educate patients about controlling or monitoring access to their data. For example, he said, the provider organizations were not transparent about providers’ use of patient data. Although they maintained audit trails and provided them to patients on request, they did not tell patients what audit trails are or that they even existed. When patients did ask, the organizations provided the information in byzantine formats that had to be interpreted by staff members.

The authors of the NYCLU report also noted a lack of patient control over their data under New York law. The law says that a one-time “opt-in” consent at any HIE-participating provider results in “blanket permission to release all medical information.”

The NYCLU report concludes that the state should revisit its policy on uploading individual medical information to a shared network and adopt a requirement that such information cannot be uploaded without affirmative patient consent–or, at the very least, allow patients to opt out of the system at any time.

NYCLU contends that giving patients the ultimate authority in deciding who accesses their data, to a much more granular degree than the law currently allows, is consistent with positions taken by both the National Committee on Vital and Health Statistics and the Office of the National Coordinator for Health IT and should be adopted in New York.

The reports differ to some extent in the recommended course of action the respective states should take to improve patient trust and participation. The NYCLU calls for an outreach component in its 10-point position but emphasizes explicit legislative action. Miller makes more general recommendations, calling for policies that set timetables for organizations to offer patient portals that give consumers more control and access.

However, both studies make clear the idea that, in order to realize the public health benefit of comprehensive data exchange, individual patients must be assured of their ultimate control over who sees and moves their data. The greater public interest and that of the individual, the NYCLU asserts, “are not irreconcilable; they must be balanced.”

 

Checklist or Scorecard

CynergisTek Announces “Surveyor for Providers” Program

A couple of weeks ago, we announced our Surveyor for Business Associates Program designed to support the BA that wants to ensure that their privacy and security programs are not only compliant with HIPAA/HITECH, but demonstrate their commitment to the industry and their clients that privacy and security are a priority.

This week we are pleased to announce the second solution in the Surveyor Suite, Surveyor for Providers.

Read more about Surveyor for Providers here:

PR-2012-Surveyor for Providers-FINAL

FACT-2012-Surveyor for Providers

Health systems’ privacy and security challenges are not confined to their “four walls.”  The growing demand for and value in information exchange, the pace of merger and acquisition activity, and the increasing number of business associates with whom we have sensitive data sharing relationships really does stretch the boundaries of our privacy and security programs.

And while the burden of responsibility to demonstrate business-appropriate and compliance-aware privacy and security lies with each of those partners, the moment we share sensitive data or allow someone to connect to our networks, our risk increases, unless we have taken our own steps to evaluate and/or mitigate that risk.

Introducing more rigor into business associate agreements and adding data security agreements to the BAA are good first steps.  More organizations that we work with are doing this.  Performing additional due diligence before you execute new contracts or renew existing agreements with partners with whom you share sensitive data  is emerging as a best practice.

I know, the first thing that you want to know is “who pays” for this due diligence.  We are seeing the costs associated with an outside review, if it is required, being built into the agreements and contracts.  Like other “pay for performance” arrangements, if a business associate cannot demonstrate compliance with your requirements, they pay for the cost of a review, but YOU get to select the vendor (or mutually agree to a vendor).  In other cases, we see costs being shared.  Finally, in the case of M&A, the cost is most commonly attributed to the acquiring entity, but built into the cost of the transaction like other due diligence activities.

CynergisTek to Present at HIMSS South Central Texas March Meeting

Mac McMillan, National Chair, HIMSS Privacy and Security Policy Task Force, and CEO of CynergisTek, will be the keynote speaker at the HIMSS South Central Texas Chapter’s March Education Meeting.

The meeting will be held on Friday, March 23, 2012 beginning at 11:00 am at the MD Anderson Cancer Center Conference Center in Houston, TX.

The first part of this presentation will bring attendees current with the efforts underway at HIMSS nationally in the areas of privacy and security and solicit their feedback to inform the national agenda.

The second part of this presentation will focus on the topics that continue to be of the greatest common interest to HIMSS members – IT security under Meaningful Use and the OCR HIPAA Audit Program.

Amidst heightened security regulations under HITECH and the rush to achieve Meaningful Use, healthcare organizations have felt the increasing need to implement sound security procedures. For those that participate in health information exchange, no one wants to be the “weakest link.”

Demonstrating a well thought-out approach to protecting patient data and compliance with HIPAA/HITECH provisions builds confidence and trust among patients and business partners.  With the renaissance of owned physician practices, the imperative to broaden information security and privacy programs beyond the four walls adds responsibility and complexity.

So, how does a healthcare enterprise go about building an appropriate information security program for its specific business operation?  Why have some succeeded while others still cannot even meet the basic requirements of HIPAA, let alone HITECH and its new rules? Does Meaningful Use close the gap between those with sound IT security programs and those without and should a commitment to health information exchange participation accelerate this process? What are the implications of the various enforcement programs – from OCR, CMS, OIG and the State of Texas?

Learning Objectives:

  1. Inform participants of privacy and security initiatives at the forefront of the HIMSS agenda nationally
  2. Provide participants the opportunity to inform the HIMSS national agenda in the areas of privacy and security
  3. Describe the unique challenges for hospitals in meeting both the operational and compliance requirements for IT security in the era of Meaningful Use – Stage 1 and beyond
  4. Describe practical strategies and technologies for HIPAA/HITECH compliance
  5. Identify best practices and practical strategies for privacy and security management for the enterprise and in health information exchange
  6. Understand the OCR HIPAA Audit Program process
For more information, please visit the HIMSS South Central Texas Chapter website at http://www.himsssct.org/.

CynergisTek to Present at Arkansas HIMSS Chapter February Meeting

Mac McMillan, National Chair of the HIMSS Privacy and Security Policy Task Force and CynergisTek CEO will be a featured speaker at the upcoming Arkansas HIMSS Chapter Education Meeting, “HIEs and Telemedicine in the REAL World on February 10, 2012.

The faculty of the event includes Ray Scott, MSW, Arkansas HITE Coordinator, Arkansas Office of Health Information Technology and Dr. Julie Hall-Barrow, Education Director for the UAMS Centers for Distance Health.

The event starts at 2:00 pm and will be held at the UAMS Cancer Institute in the Sam Walton Auditorium.  For more information, please visit the Arkansas HIMSS Chapter website at http://www.arkansashimss.org/.

CynergisTek to Present at HIMSS Austin Chapter

Mac McMillan, National Chair, HIMSS Privacy and Security Policy Task Force, and CEO of CynergisTek, will be the keynote speaker at the Austin, TX HIMSS Chapter’s February Education Meeting.

The meeting will be held on Tuesday, February 14, 2012 from 11:30 am – 1:00 pm at the Offices of Vinson & Elkins LLP.

The first part of this presentation will bring attendees current with the efforts underway at HIMSS nationally in the areas of privacy and security and solicit their feedback to inform the national agenda.

The second part of this presentation will focus on the topics that continue to be of the greatest common interest to HIMSS members – IT security under Meaningful Use and the OCR HIPAA Audit Program.

Amidst heightened security regulations under HITECH and the rush to achieve Meaningful Use, healthcare organizations have felt the increasing need to implement sound security procedures. For those that participate in health information exchange, no one wants to be the “weakest link.”

Demonstrating a well thought-out approach to protecting patient data and compliance with HIPAA/HITECH provisions builds confidence and trust among patients and business partners.  With the renaissance of owned physician practices, the imperative to broaden information security and privacy programs beyond the four walls adds responsibility and complexity.

So, how does a healthcare enterprise go about building an appropriate information security program for its specific business operation?  Why have some succeeded while others still cannot even meet the basic requirements of HIPAA, let alone HITECH and its new rules? Does Meaningful Use close the gap between those with sound IT security programs and those without and should a commitment to health information exchange participation accelerate this process? What are the implications of the various enforcement programs – from OCR, CMS, OIG and the State of Texas?

Learning Objectives:

  1. Inform participants of privacy and security initiatives at the forefront of the HIMSS agenda nationally
  2. Provide participants the opportunity to inform the HIMSS national agenda in the areas of privacy and security
  3. Describe the unique challenges for hospitals in meeting both the operational and compliance requirements for IT security in the era of Meaningful Use – Stage 1 and beyond
  4. Describe practical strategies and technologies for HIPAA/HITECH compliance
  5. Identify best practices and practical strategies for privacy and security management for the enterprise and in health information exchange
  6. Understand the OCR HIPAA Audit Program process
For more information, please visit the Austin HIMSS Chapter website at  http://www.austinhimss.org/.