855.519.7328

HIPAA Compliance

 

HIPAA compliance solutions assist healthcare providers, doctors, private practitioners, hospitals, clinics, nursing home facilities and other health agencies maintain and/or implement Health Insurance Portability and Accountability Act (HIPAA) compliance.

There are three main HIPAA compliance requirements; the Security Rule, the Privacy Rule and the Breach Notification Rule. The over-arching guidance  Omnibus Rule, which took effect in 2013.  The rule for the first time is  leading to enforcement actions being taken on business associates.

The Omnibus Rule was put into effect by under the Health Information Technology for Economic and Clinical Health (HITECH) Act, passed in 2009 as part of the American Recovery and Reinvestment Act.  HITECH purpose is  to promote the adoption and meaningful use of health information technology.  Implementing HIPAA security appropriate for protecting health data and protected health information can reduce liability and protect the reputation of health organizations.

 

What Are The HIPAA Compliance Rules?HIPAA Compliance

HIPAA (Health Insurance Portability and Accountability Act of 1996) is a federal law that protects an individuals medical information – called “protected health information (PHI)”.  HIPAA has three rules: the Privacy Rule, Security Rule, and the Breach Notification Rule which protect the privacy of an individuals health information and set the notification requirements for breach.

Security Rule:

The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information (“ePHI”).

Privacy Rule:

The objective of the Privacy Rule is protection of medical information and governance over the way certain health care providers and benefits plans collect, maintain, use and disclose protected health information (“PHI”). The rule covers many uses  and disclosures that need to be addressed when receiving health care.  The Privacy Rule applies to organizations called “covered entities”, as well as standards for individuals’ privacy rights for controlling how their health information is used.

Breach Notification Rule:

 Requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media. In addition, business associates must notify covered entities if a breach occurs at or by the business associate.

Penalties for HIPAA Rule Violations:

The U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) has the responsibility for implementing and enforcing the Privacy Rule with respect to voluntary compliance and civil penalties.

 

HIPAA Rules, Covered Entity or Business Associate?

 

If an entity does not meet the definition of a covered entity or business associate, it does not have to comply with the HIPAA Rules.  A covered entity can generally be considered one of the following: (if they transmit any information in an electronic form in connection with a transaction for which Health and Human Services (HHS) has adopted a standard)

 

  • Health Care Providers: Doctors, Clinics, Psychologists, Dentists, Chiropractors, Nursing Homes, Pharmacies
  • Health Plans: Health insurance companies, HMOs, Company health plans, Government programs that pay for health care, such as Medicare, Medicaid, and the military and veterans health care programs
  • Health Care Clearing House: entities that process nonstandard health information they receive from another entity into a standard (i.e., electronic format or data content)

 

How Can We Help with HIPAA Compliance and HITECH?

 

Our consultants can assist with protecting confidentiality, maintaining integrity and optimize availability of protected health information under the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). These health acts require all healthcare organizations to apply uniform data security and privacy processes to uphold patient and physician confidentiality.

Praetorian Secure has security expertise and experienced gained in securing the networks of the largest medical and dental insurance carriers in the world.  Our team will work to reduce data loss, improve the protection of health information by reducing the risk of improper disclosure and unauthorized access that occurs due to breaches.

When investing in an overarching security framework, most Healthcare organizations estimate their program costs on the ability to meet the minimum requirements of HIPAA and HITECH. While meeting compliance is mandatory, a program based on continuous improvement of protecting data, enforcing policies, monitoring both people and technologies will ultimately reduce risk. Praetorian helps organizations simplify the process of implementing key components of an overarching security framework and program.

To ensure the right tools and processes are in place, Praetorian Secure provides the following comprehensive security services.

 

HIPAA Compliance Solutions We Offer:

  • HIPAA Auditing, Vulnerability Assessments & Mitigation – Our auditing services are performed to give precise data to generate short term and long term mitigation strategies to reduce risks.
  • Network & Equipment Hardening – Even though they are advertised to meet or exceed best commercial standards, our skilled engineers implement state-of-the-art security configurations for computer equipment and devices that store patient data
  • Information Assurance & Risk Management – Praetorian Secure’s IA specialists work with your organization to ensure that an overall security framework is in place to achieve and maintain an acceptable level of risk for your infrastructure and data.
  • Incident Response – Praetorian assists its clients with developing, and implementing a response plan should a breach occur. Distribution of personal information or protected data within your organization requires a legal response and an immediate regulated process.
  • Disaster Recovery Programs – Praetorian Secure will assist your organization with developing a business continuity plan that fits your needs. When implemented, our Disaster Recovery Program will allow your organization to operate uninterrupted, even in the midst of a potentially catastrophic disaster.
  • Penetration Testing, Scanning, Monitoring & Response Planning – Our testing procedures and approach provide strong remediation recommendations, designed to improve your overall Security, IT Architecture and reduce the threat of attack or compromise.