Вы находитесь на странице: 1из 6

DATAMOTION ™

HEALTHCARE: HOW TO DISAPPOINT YOUR HIPAA Contact Us at:


AUDITORS AND GAIN THE RESPECT OF YOUR BOARD OF DataMotion, Inc.
35 Airport Road
DIRECTORS (not necessarily in that order) Morristown, NJ 07960
|p| +1 800 672 7233
|f| +1 973 455 0750
www.datamotion.com
With HIPAA audits now randomized, you when the data is lost by a third party. sales@datamotioncorp.com
must be prepared for them every day. This increases the need for
And with state regulations requiring subcontractors to implement the same
compliance‐breach reporting, you must level of security typically found in larger
become your own auditor. organizations.

HIPAA is the Health Insurance Portability The guidelines governing audits have
and Accountability Act, the 1996 federal changed. Prior to 2008, an organization
regulation that mandated health‐data was only put through an intense
About DataMotion
privacy. investigation when a routine audit found
DataMotion is the first
an egregious problem—and such routine Intelligent Information
This regulation requires compliance by all audits were usually scheduled. Transport service that
insurers and health care providers, automates key business
including physician’s offices, hospitals, But in February 2008, the U.S. processes, so you can easily
health plans, employers, public health Department of Health and Human and quickly exchange
authorities, life insurers, clearinghouses, Services, which oversees HIPAA information with your
billing agencies, information systems compliance, contracted with the firm partners, customers, and
vendors, service organizations, and PricewaterhouseCoopers to conduct colleagues.
universities. surprise audits of hospitals. The DataMotion solution
automates key business
But that’s not all. If you work at a hospital, or communicate processes, such as
with one, you could be targeted for a automated billing, credit
The Act’s Privacy Rule also regulates surprise audit this year. This changes the application processing, or
medical payment history privacy. Simply stakes for everyone’s need to be ready. customer outreach, to help
put, it requires that all health entities you send critical
take reasonable steps to ensure the And if that’s not enough to worry you, the information over the
confidentiality of all communications that states are getting into the picture as well. Internet.
contain patient or customer information. In New York State, the loss or
compromise of 10 or more patient
And things could get even more serious records must now be reported to the
very quickly. The passage of the HITECH New York State Department of Health.
Act creates mandatory reporting
requirements of HIPAA violations, even
So, ask yourself, “Would my company And relieves your board of directors.
know if we lost 10 patient records?” If
you’re in the state of New York, your And satisfies your customers and
answer must be “Yes.” patients.

And keeps you from paying penalties or


HIPAA: Healthcare made difficult. For more
risking prison time.
One of the consequences of HIPAA is that information:
it makes all kinds of medical research http://www.datamotion.com/Solutions/
And the way to do that is to outfit your HealthcareInsurance.aspx
more difficult. That’s because people are
organization with the technologies it
more reluctant to participate as subjects,
needs to secure information when it
and it is more difficult to reach the right
travels, as well as when it is used, stored,
people to request their participation in
and communicated both inside and
research projects.
outside your organization.
Another noticeable consequence of
To avoid auditors, and penalties,
HIPAA is that doctors are reporting less
you have a lot of planning to do.
communicable diseases to state
The penalties for failure to conform to
authorities.
HIPAA regulations go far beyond the
What’s worse is that even the public hundreds of thousands of dollars in fines.
HIPAA was designed to protect doesn’t They include public humiliation, loss of
really like it. In a nationwide survey of reputation, brand damage, class‐action
2,392 adults quoted in the Oct, 2007 lawsuits, and yes, even prison.
Government Health IT Newsletter, nearly
But there are practical ways to avoid
3 out of 5 Americans agree that privacy of
these penalties. The goal is to keep
For a free 5-user,
their health information is not well
private information private, to keep 30 day trial
protected by federal and state laws and http://www.datamotion.com/Resources/
prying eyes out, and to be able to prove FreeTrial.aspx
organizations.
both to auditors.
Any health provider who has struggled to
Here are some methods:
help someone who needs information but
doesn’t have the right identification on 1. Take secure measures, in case people
the phone, will tell you it gets in the way make mistakes.
more than it helps.
One of the most common causes of any
So what’s the answer? kind of security breach is human error.
Whether conscious, accidental, or simply
The only thing an organization can do is
due to laziness, human error can result in
to fulfill the requirements in a way that
Personally Identifiable Information (PII) or
allows everyone to get their jobs done in
Personal Health Information (PHI) being
an efficient, cost‐effective manner.
sent over the internet as unencoded text
And satisfies the auditors. unless filters are put in place to detect
these messages and encode or reroute transferred between two or more
them safely. systems.

At the same time, you can’t afford to stop It can happen any time and any place
communications. Likewise, you can’t where data is transferred between:
afford to handle hundreds of false For more
positive alerts— alarms signaling that a • People inside your company’s information:
breach has occurred when one hasn’t. No firewall http://www.datamotion.com/Solutions
/HealthcareInsurance.aspx
one has time for that. • People inside and outside your
company’s firewall
Many companies are hesitant to apply • Your people and your partners
filters to their most important • Your people and your customers (or
communications— email and patients)
attachments. For example, if a filter were • Two different systems
to keep every piece of mail from leaving
your company that included the word Whenever information passes between
“diabetes” and a person’s name, you systems and people, the data needs to be
couldn’t send out an email message with secured at all times, even when in transit.
an attachment that says, “Watch for You must also ensure the data that is sent
these symptoms, they may indicate you to people outside your firewall is always
have diabetes.” sent in encrypted format, so that no one
but its intended recipients can read it.
On the other hand, you must be sure that
the attachments that include a patient’s For example, should you need to transmit
name, id number, and blood‐test results patient data from a doctor’s office to a For a free 5-user,
can never be intercepted accidentally, or central database, if it is encrypted, it 30 day trial
be sent outside your company could be sent automatically as an email http://www.datamotion.com/Resources/
FreeTrial.aspx
unencrypted. attachment.

To accomplish this, you need to: 3. Make sure your internal


communications are secure.
• Install smart filters that analyze both
the email and its attachments, Your people who work from home
• Correlate fields in both documents provide a specific example of HIPAA
and attempt to match them to boundary issues. It is critical that any data
known patient databases, that they transfer to their home
• And quarantine or redirect those computers from work is sent securely,
messages. one copy of a database file, one
spreadsheet, one PDF attachment, or one
2. Make sure the boundaries between presentation that someone works on over
systems are secure. the weekend.

Communication security breaches


commonly occur where data is
Your business information must pass personally identifiable information (PII)
across the Internet securely, even though and or personal health information (PHI)
it will remain inside your company and about clients or patients via email or
your firewall. It must never be attachments.
compromised—or vulnerable.
Sometimes, attachments can be For more
But one mistake is all it takes. extremely large. For example, a single information:
mammogram image can reach 500 http://www.datamotion.com/Solutions
How do you ensure that this never /HealthcareInsurance.aspx
megabytes. So not only would you need
happens? Despite your most well to exchange this file securely, you would
intended policies, there is always a need to send it in a way that does not
chance that someone somewhere will let overburden—or stop—your email system.
your guard down.
Healthcare‐related institutions must use
Today you hope it never happens, or if it solutions that make it possible to
does, that it won’t cause a problem. communicate with anyone, anytime,
anywhere, no matter what email system
But hoping isn’t acting. You must act.
the other party uses.
You must put a comprehensive filter in
Likewise, you must demand the ability to
place, so that you can implement and
securely transfer extremely large files
enforce business rules to prevent these
with all these same people.
occurrences.
5. Make sure your communications with
You could either encrypt the file and send
it, and email a warning to the sender, or
telecommuters are secure. For a free 5-user,
you could quarantine the suspicious file People who telecommute create another 30 day trial
and report the sender to his or her http://www.datamotion.com/Resources
group of boundary issues. /FreeTrial.aspx
manager, the legal department, or
whomever else you chose. Medical professionals, such as
radiologists, who choose to work from
4. Make sure your partner home, are moving in this direction.
communications are secure.
When people must transfer large,
Your people, when working with business important, time‐sensitive files such x‐rays
partners, bring up another case of or mammograms as email attachments
boundary issues. through your company’s email system,
they have the potential to bring your
It’s likely that they must regularly transfer
email system to a standstill.
information back and forth with external
partners. In some cases this can contain So you must find the time, the budget,
very sensitive information. and the resources to set up file‐transfer
sites for these large files. And you must
Your partners may use different email
systems. They often need to send
make absolutely sure that they offer The customer or patient can receive their
unbreakable security. email replies securely in their inbox
without visiting a portal.
With a sophisticated system in place, you
could manage and track the secure 7. Make sure when your customers—or
transfer of confidential, large files so patients—communicate with you, For more
you’d know they were delivered to, and everything they do is secure.
information:
opened by your intended recipient. http://www.datamotion.com/Solutions
Your customers and patients must often /HealthcareInsurance.aspx
6. Make absolutely sure your submit forms, ask questions of specific
communications with customers—or people and departments, or submit
patients—are absolutely secure. follow up information about an ongoing
illness or other matter.
When communicating with customers (or
patients), your people most likely have no For a long time, these needs were served
knowledge of the recipient’s email by paper‐based processes, but can now
system. be handled through secure electronic
forms on your web site.
Which means that although your
company might have created a secure But the question is how does this data
email portal, extensive research shows reach the right department or employee
that customers do not want to use a to process it? And can this data be
browser to visit a portal to communicate integrated into existing knowledge
with—or get information from—you. worker software such as the company’s
customer relationship management
They want to use email. And they want system to track its status? If the request
For a free 5-user
you to send important information contains sensitive information, is it 30 day trial
quickly, via email. And if you do, they http://www.datamotion.com/Resources
received from the customer in a secure /FreeTrial.aspx
want it, of course, to be secure. manner, or did the company’s method of
collecting data cause a privacy violation?
Not just because it’s the law. Because it’s
And if any follow up is needed with the
common sense that people don’t want
customer, can this be sent securely?
anyone to have access to their private
medical information, any more than With a messaging system in place that
anyone should have access to their provides secure inbound and outbound
private banking information. service, uses email and ad hoc forms for
message composition, and provides web
Healthcare‐related institutions can now
service and XML workflow integration,
adopt solutions that allow them to
you can streamline your operations and
communicate securely with anyone—
cost effectively serve customers.
regardless of whether the other party has
the same email system or not—without Such a system eliminates the need to
the trouble of using a portal. All they retype data from paper‐based forms—an
need to do is establish a password.
error prone, time‐consuming and costly 10. Make sure that you can demonstrate
way of doing business. that your system is compliant and
auditable.
8. Make sure your customer workflow is
automated, so there are fewer mistakes. After an email message is sent, how do
you know what happened to it? Did its
When you enter information into your intended recipient open it? Were its At DataMotion, we’ve
system, you should only enter patient attachments opened? Is there proof that been solving email
information once. Multiple entries of the the message was received and was read? security and auditing
same information are big bright red flags
challenges for a long
for auditors. Should a question arise about who
viewed a message or its attachments, can time.
To avoid this, you need to make very sure you prove who read them to an auditor?
that any time information is entered We’d be very happy to
securely, it is routed to its destinations in It’s increasingly obvious that a secure talk with you about yours.
your CRM system or case handling messaging system must be auditable. To
systems without the need for humans to make this possible, messages and their Please call us at
unencrypt, read, retype, fax, or otherwise attachments, their metadata and the 1.800.672.7233 or send
invite errors. Or auditors. fingerprinting data must be both viewable an email to
and traceable. sales@datamotioncorp.com
9. Make it easy to transfer files
securely— even very large ones. The fingerprint data must record—
permanently—the IP addresses of the
FTP, or file transfer protocol, is the recipient’s computers, and the system’s
standard way to transfer files across the time must be synchronized with an
Internet. However, it requires big atomic clock so that message times are
investments of time and effort to make it never a point of dispute.
work, and even when it does work, it
transmits user login credentials and the Such a system would allow your
contents of files in an unencrypted administrators—and, if necessary,
manner. auditors—to easily review and sort
through volumes of message information,
So while your people face a constantly and quickly retrieve a particular message,
changing list of partners with whom they as well as all the tracking and fingerprint
must exchange sensitive files, how can information associated with it.
you offer them a secure, easy, reliable
method of doing so?

You need a secure messaging system that


automatically routes large files, alerts the
recipient that they are available, and that
tells you when they’ve been opened and
by whom.

Вам также может понравиться