Ignorance is not an acceptable excuse for a Health Insurance Portability and Accountability Act (HIPAA) violation.
Just like you are still liable if your taillight is busted, whether you knew about it or not, the security of your patient’s health records is your responsibility. Ensuring you’ve met all the requirements on your HIPAA compliance checklist keeps you and your business in the green.
With the passing of the Health Information Technology for Economic and Clinical Health (HITECH) Act, HIPAA covered entities were incentivized to adopt technological solutions that would increase the security of patient data and reduce the risk of unauthorized access.
Naturally, there are some challenges when it comes to adopting new technology – not least in terms of capital investment – which is why cloud services providers make valuable partners for businesses in the healthcare industry.
Since compliance is an ongoing activity, it helps to have a checklist that your HIPAA security or compliance officer can use to review your electronic communications compliance level.
We provide a free HIPAA compliance checklist for secure file sharing and messaging, which you can download here.
In this article, we go through the various items you’ll find on that checklist and explain their relationship to HIPAA regulations.
When dealing with an IT service provider, the first thing to ensure compliance is to initiate a Business Associate Agreement (BAA).
A BAA binds the provider to the same HIPAA requirements that bind you. This means that their internal policies and procedures are designed to protect all patient information in their custody.
You can read more on the Department of Health and Human Services (HHS) requirements for cloud service providers (CSPs) here.
Although the entirety of HIPAA applies to your service provider, we will concentrate on the preventive measures that can be put in place to ensure compliance.
There are two main areas that we will examine – the HIPAA Security Rule and the HIPAA Privacy Rule.
The Security Rule was established to protect electronic Private Health Information (ePHI) created, received, used, or maintained by a HIPAA-covered entity. It comprises three parts: technical safeguards, physical safeguards and administrative safeguards.
For this article, we will focus on technical and administrative safeguards.
One of the most common violations lies in the lack of risk assessments. Just like conducting fire drills and safety checks in the absence of a fire, you are required to analyze your business environment for potential risks continuously. The lack of an incident will not save you from penalization.
Under the risk assessments, you need to identify every area in which ePHI is being used and highlight any possible areas that could lead to a breach. That’s why it is advisable to have a checklist.
The HHS’s Office of Civil Rights (OCR) has recently devoted resources to responding to complaints about access to personal health records.
This part of HIPAA ensures that patients can access their health records within 30 days of making a request. It also provides that unauthorized persons don’t view the communication of PHI.
The key to safeguarding information is encryption. Even though HIPAA does not make encryption mandatory, the covered entity must show that they have put inadequate measures to ensure information security. In reality, encryption is the only practical way to ensure the necessary security, making it the preferred security measure.
The first part of the HIPAA audit checklist looks at the use of encrypted technology:
For emails between employees:
In the case of remote access, the emails need to be encrypted, so your staff need to have the right software to do that.
This is where the Privacy Rule comes into play. Healthcare providers need to find a safe way to relay sensitive information to patients.
When communicating with the patient:
Once you incorporate the regulations into your policies and procedures, HIPAA compliance becomes a part of your operation. Tools like our compliance checklist help you conduct thorough risk assessments and identify possible gaps that require remedying.
But what if you could never worry about compliance again? If you implement WisperMSG, that’s just what happens.
Ransomware-proof with beyond-military grade encryption for secure communications and file transfer. It has it all for your business to thrive and maintain compliance.
For more information on WisperMSG or our other solutions, talk to us here at Central Data Storage. Or if you’re fully interested, try WisperMSG today!