Difference between revisions of "HIPAA Compliance Checklist"

From MgmtWiki
Jump to: navigation, search
(References)
 
Line 95: Line 95:
  
 
==References==
 
==References==
* [https://www.vox.com/recode/22363011/hipaa-not-hippa-explained-health-privacy What is in HIPAA and what is NOT in HIPAA}.
+
* [https://www.vox.com/recode/22363011/hipaa-not-hippa-explained-health-privacy What is in HIPAA and what is NOT in HIPAA].
  
 
[[Category: Health]]
 
[[Category: Health]]

Latest revision as of 17:01, 21 April 2021

Full Title

HIPAA Compliance Checklist

https://www.hipaajournal.com/hipaa-compliance-checklist/

Contents

  • The HHS’ Office for Civil Rights has identified the following area to be essential elements of an effective HIPAA compliance program. How does your organization fare?
  • Use the checkboxes below to self-evaluate HIPAA compliance in your practice or organization.

The following are the major points.

  1. What is the purpose of the app. In particular what question will the user be expected to give a response for authentication and privacy consent.
  2. A User Experience Design is helpful, but can be pen and ink or wire frames at this point.
  3. A Data flow diagram is critical before a threat analysis can be undertaken This should be created when the architecture is complete and again when coding is complete.
  4. The expectations of the EHR interface (HL7, json, xml, etc.) plus an requirements that will be placed by the EHR on the apps.
  5. Control all code checked into a code management systems with a bug tracking feature.
  6. Understand the complete supply chain, know where every module comes from and what the checksum or other tracking method is used.

HIPAA Rules

  • HIPAA for Professionals is a good place to start. Pay special attention to the security an privacy tabs in the left hand navigation panel.
  • Note that HIPAA its not necessary for data that is not held in a HIPAA covered entity. Still the rules are good and expected to apply well to patient apps as well as professional apps.
  • The following six annual audits/assessments are required elements of a HIPAA compliance program. Have they been completed?
  1. Security Risk Assessment
  2. Privacy Assessment (Not required for BAs)
  3. HITECH Subtitle D Audit
  4. Security Standards Audit
  5. Asset and Device Audit
  6. Physical Site Audit
* Do you have documentation to show you have conducted the above audits/assessments for the past six years?
 Have you identified all gaps uncovered in the audits above?
 Have you documented all deficiencies?
 Have you created remediation plans to address deficiencies found in all six audits?
 Are these remediation plans fully documented in writing?
 Do you update and review these remediation plans annually?
 Are annually documented remediation plans retained in your records for six years?
 Have all staff members undergone annual HIPAA training?
 Do you have documentation to confirm each employee has completed their annual training?
 Is there a staff member designated as the HIPAA Compliance, Privacy, and/or Security Officer?
 Have all staff members received Security Awareness training?
 Do you have documentation to confirm each member of the workforce has completed their security awareness training?
 Do you provide periodic reminders to reinforce security awareness training?
 Have you developed a contingency plan for emergencies?
 Have you developed policies and procedures for responding to emergency situations?
 Are you creating backups of all ePHI to ensure an exact copy can be recovered in the event of a disaster?
 Have you developed procedures to ensure critical business processes continue when operating in emergency mode?
 Are your contingency plans regularly updated and tested?
 Have you, by means of a risk analysis, assessed whether encryption of ePHI is appropriate?
 If encryption is not appropriate, have you implemented alternative and equivalent measures to ensure the confidentiality, integrity, and availability of ePHI?
 Have you implemented controls to guard against unauthorized accessing of ePHI during electronic transmission?
 Has the decision-making process covering the use of encryption been documented?
 Have you implemented identity management and access controls?
 Have you assigned unique usernames/numbers to all individuals who require access to ePHI?
 Is access to ePHI restricted to individuals that require access to perform essential work duties?
 Have you implemented policies and procedures for assessing whether employees’ access to ePHI is appropriate?
 Have you developed policies and procedures for terminating access to ePHI when an employee leaves an organization or their role changes?
 Do you have policies for recovering all electronic devices containing ePHI when an employee leaves your organization?
 Does your system automatically logout a user after a period of inactivity?
 Do you create and monitor ePHI access logs?
 Are auditable ePHI access logs created for successful and unsuccessful login attempts?
 Are ePHI access logs routinely monitored to identify unauthorized accessing of ePHI?
 Have you implemented controls to ensure ePHI cannot be altered or destroyed in an unauthorized manner?
 Are all permitted uses and disclosures of PHI/ePHI limited to the minimum necessary information to achieve the purpose for which the PHI/ePHI is disclosed?
 Have you developed policies and procedures covering the secure disposal of protected health information and electronic PHI?
 Have you developed policies and procedures for rendering physical PHI unreadable, indecipherable, an incapable of being reconstructed when no longer required?
 Have you developed policies and procedures for permanently erasing ePHI on electronic devices when they are no longer required, or the devices reach end of life?
 Are electronic devices containing ePHI and physical PHI stored securely until they are disposed of in a secure fashion?
 Have you developed policies and procedures for providing patients with access to their health information?
 Are you providing individuals with access to their health information or copies of their health information on request?
 Are you providing copies of PHI in the format requested by the individual?
 Are you providing individuals copies of their health information in a timely manner and within 30 days?
 If fees are charged, are those fees reasonable and cost-based?
 Do you obtain and store HIPAA authorizations for uses and disclosures of PHI not otherwise permitted by the HIPAA Privacy Rule?
 Do your authorizations clearly explain the specific uses and disclosures of PHI and are they written in plain language?
 Do your authorizations state the classes of people to whom PHI will be disclosed?
 Do the authorizations include an expiry date or event?
 Do the authorizations contain the individual’s signature and date of signature?
 Have you created a Notice of Privacy Practices (NPP)?
 Do you provide periodic reminders to reinforce security awareness training?
 Have you provided your notice of privacy practices to all patients?
 Has every patient stated in writing that they have received the notice of privacy practices?
 Has your notice of privacy practices been published in a prominent location and on your website?
 Have you developed procedures for dealing with complaints about failures to comply with the NPP?
 Do you have policies and procedures relevant to the annual HIPAA Privacy, Security, and Breach Notification Rules?
 Have all staff members read and legally attested to the HIPAA policies and procedures?
 Do you have documentation of their legal attestation?
 Do you have documentation for annual reviews of your policies and procedures?
 Have you identified all of your vendors and business associates?
 Do you have Business Associate Agreements (BAAs) in place with all business associates?
 Have you performed due diligence on your business associates to assess their HIPAA compliance?
 Are you tracking and reviewing your Business Associate Agreements annually?
 Do you have Confidentiality Agreements with non-business associate vendors?
 Do you have a defined process for security incidents and data breaches?
 Do you have the ability to track and manage the investigations of all incidents?
 Are you able to provide the required reporting of minor or meaningful breaches or incidents?
 Do your staff members have the ability to anonymously report a privacy/security incident or potential HIPAA violation? 
.

References