Medicare Compliance & Reimbursement

HIPAA:

Feds Get 'Hands On' With HIPAA Security Compliance

New security rule crackdown could strike you.

A low-key approach to keeping tabs on your protected health information (PHI) may leave you with a costly compliance headache.

New development: In March, the HHS Office of Inspector General (OIG) made its first move to audit a health care provider for compliance with the Health Insurance Portability and Accountability Act (HIPAA) security rule, which regulates PHI stored or transmitted electronically. The OIG's first provider target is Piedmont Hospital in Atlanta.

"This is the government's first systematic hands-on examination of compliance with any HIPAA regulation," says Rebecca Williams, attorney and partner with Davis Wright Tremaine in Seattle, WA.

Background: The HHS Office for Civil Rights enforces the HIPAA privacy rule--and has been doing so for several years.

The agency acts primarily on complaints, however, and then either helps cooperative covered entities correct their violations or refers egregious cases to the Department of Justice for potential criminal prosecution. The Centers for Medicare & Medicaid Services (CMS) enforces the security regulation, which until now hasn't been routinely enforced. Identify Your Vulnerabilities Providers transmitting PHI from laptops and other mobile devices should be especially vigilant about complying with a related guidance released late last year, the "HIPAA Security Guidance for Remote Use of and Access to Electronic Protected Health Information."

The guidance addresses a variety of mobile devices, notes Williams. Besides laptops, these include home-based personal computers, personal digital systems or PDAs, smart phones, public work stations, wireless access points, USB flash drives, memory cards, floppy disks, CDs, DVDs, back-up media, e-mail, and smart cards.

3 red flags: HHS highlights three key areas of concern for remote use of and access to electronic protected health information, Williams tells Eli: access, storage, and transmission.

"Everyone affected should be looking over this document carefully," says Williams.

Required reading: Though the document is called a "guidance," it carries more weight than other documents in the same category.

In issuing the document, the HHS emphasized that the feds "may rely upon this guidance document in determining whether or not the actions of a covered entity are reasonable and appropriate for safeguarding the confidentiality, integrity and availability of [electronic PHI], and it may be given deference in any administrative hearing" under the HIPAA enforcement rule. Get Cracking On Protection Strategies Providers can employ a number of tactics to protect electronic PHI, according to experts familiar with the guidance.

In addition to locking down laptops and encryption, providers should consider investing in flash drives. Flash drives prohibit staff from putting PHI on laptops or other hard drives, advises Michael Roach, partner with Aegis Compliance and Ethics Center in Chicago. Password-protected flash drives are the way to go, he advises.

Caveat: Policies and procedures, no matter how well [...]
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in Revenue Cycle Insider
  • 6 annual AAPC-approved CEUs
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more

Other Articles in this issue of

Medicare Compliance & Reimbursement

View All