<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>HIPAA Training Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/compliance-security/hipaa-training/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/compliance-security/hipaa-training/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 03 Jul 2019 01:51:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>HIPAA Training Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/compliance-security/hipaa-training/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Could this breach have been prevented? – A new series</title>
		<link>https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 26 Sep 2017 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[continuous improvement]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy training]]></category>
		<category><![CDATA[process improvement]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4572</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/">Could this breach have been prevented? – A new series</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="alignleft wp-image-4087 size-medium" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/continuous-improvment-yellow-keyboard-key.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" scale="0" style="font-size: 12px; margin-top: 5px; margin-right: 10px;" /></p>
<p>One of the first lessons of process improvement is that <em>preventing errors is much less expensive and time-consuming than remedying the damage after the fact</em>. The same is true for an information breach. The time and cost for installing new software, training staff members, and reinforcing policies and procedures pales in comparison to cleaning up the damage of an information privacy or security breach.</p>
<p>Recent headlines of multi-million-dollar OCR fines and the hundreds, thousands – even millions! – of lives affected suggest the scale of the damage to both businesses and individuals. The news reports rarely explain, however, exactly <em>how</em> the breach could have been averted. This is the first in a new series of articles using publicly reported breaches as teaching opportunities for breach prevention. These are not intended as an “I told you so” for the organizations breached – each incident could happen at almost any healthcare organization today. <em>The goal is for all of us to continuously improve our understanding of the risks to patient information and the options available to us for protecting that information without creating an oppressive atmosphere for our patients, staff, and visitors.</em></p>
<p><strong><em>Unauthorized photographs of a surgical patient</em></strong></p>
<p>This first example was reported in the <em>HIPAAJournal</em> just last week. Basically, surgical staff members photographed a patient’s genital injury using their personal phones and shared the photos with friends. Details of the incident are available in the <a href="https://www.hipaajournal.com/hospital-staff-discovered-taken-shared-photographs-patients-genital-injury-8968/">HIPAAJournal post</a>. What we want to focus on here is whether and how management could have prevented this breach.</p>
<p>This incident is particularly egregious because the information disclosed was so sensitive and because so many health care professionals and staff members – the very people charged with keeping the patient and his information safe – were complicit in the violation. I understand that in the face of such irresponsible behavior, a manager might be tempted to feel helpless &#8211; “I can’t watch every person every minute. What can I possibly do to make sure none of my staff ever do something stupid?” Here are some suggestions.</p>
<p><strong>Action 1: Policy disallowing use of personal phones in the OR (or any patient area) <em>for any reason</em></strong>.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-4187 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>As a former frontline nurse, I understand the tendency to scoff at policy – “What good’s a policy? People will do whatever they want to anyway!” There’s some truth to that – practice never perfectly matches policy – but <em>what a policy does do is establish clear guidelines for expected behavior.</em></p>
<p>If the hospital wants staff to have mobile communications, they need to supply them with Vocera badges or other devices and not rely on staff members’ personal telephones. Personal phones can be used at the desk and in the break room, but not in patient areas – period. <em>Responsibility for enforcing the policy must be shared</em> by charge nurses and circulating nurses, not just the department manager or director. A charge nurse found not to be enforcing the policy could be suspended just as if s/he had been using the phone him or herself.</p>
<p><strong>Action 2:  Intensive staff training, retraining, and reinforcement</strong>.</p>
<p>The speed and shamelessness with which these staff members brandished their phones suggests gross ignorance of the HIPAA Privacy and Security Requirements <em>and</em> of the potential consequences for violating them – termination, civil charges and fines, and criminal charges that could include probation or jail time.  <em>Staff should receive comprehensive HIPAA training during their orientation before being given access to patients or PHI.</em> That <em>training should then be reinforced</em> with shorter refresher courses and/or routine discussions of patient privacy and information security in staff meetings, organizational Town Hall sessions, and online forums on the organization’s intranet.</p>
<p><strong>Action 3:  Leadership in the moment</strong>.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4149 size-medium" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&#038;ssl=1" alt="" width="300" height="211" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=768%2C540&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=1024%2C720&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" />In the OR, the anesthesiologist, the surgeon, and the circulating nurse all possess significant authority. Any one of these individuals could have called a halt, required everyone to power off their phones, sealed the room, and called hospital security to confiscate the phones until someone from IT could sit with each individual involved to clear the photos.</p>
<p>This action is still more Band-aid than prevention, but <em>it is the actions of leaders in the heat of the moment that either reinforce or undermine policy and training.</em> It did sound like the executives were taking the incident very seriously and had applied appropriate sanctions. It may also have been the case that the circulating nurse or surgeon brought the incident to the executives’ attention – that information wasn’t included in the article. The critical takeaway is that <em>protecting patient privacy, confidentiality, and information security are now as important a leadership responsibility as patient safety and infection control.</em></p>
<p>The above actions, taken together, are the pillars of creating a Culture of Compliance. Whether the focus of the compliance is HIPAA, CLABSI protocols, or hand washing – <em>all require clear expectations, appropriate training, and unrelenting leadership</em>. Culture is powerful – the trick is to create a culture that makes it easy – automatic – to <em>do the right thing</em>.</p>
<p>Our very best wishes to the patient and everyone at UPMC Bedford Memorial trying to remedy the situation.</p>
<p>If you need assistance establishing a <em>culture of compliance</em> please contact us at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/">Could this breach have been prevented? – A new series</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4572</post-id>	</item>
		<item>
		<title>MACRA/HIPAA: Ignorance of the Law Is No Excuse</title>
		<link>https://thirdrock.com/blog/2017/06/01/macrahipaa-ignorance-of-the-law-is-no-excuse/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 01 Jun 2017 14:00:25 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[MACRA]]></category>
		<category><![CDATA[Meaningful Use]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3675</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/06/01/macrahipaa-ignorance-of-the-law-is-no-excuse/">MACRA/HIPAA: Ignorance of the Law Is No Excuse</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1662" style="margin-top: 5px; margin-bottom: 10px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-red-puzzle-pieces-c843239_s.jpg?resize=170%2C170&#038;ssl=1" alt="" width="170" height="170" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-red-puzzle-pieces-c843239_s.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-red-puzzle-pieces-c843239_s.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-red-puzzle-pieces-c843239_s.jpg?resize=160%2C160&amp;ssl=1 160w" sizes="(max-width: 170px) 100vw, 170px" /></p>
<p>Many physicians believe HIPAA is a total waste of their time and money.  That&#8217;s because they think it&#8217;s the federal government trying to force them to do something that they don&#8217;t need to be doing.  But, that&#8217;s not the intent of the HITECH and OMNIBUS rulings.  Much of the compliance that was put into place was because of the implementation of EMR/EHR systems in the healthcare industry.  The federal government&#8217;s Meaningful Use program even paid covered entities to transition from paper to electronic records. This created an entirely new set of cybersecurity issues that would need to be addressed.</p>
<p><strong>Issues introduced by moving to electronic records (EMR/EHR systems):</strong></p>
<ol>
<li>Securing the patient records (Protected Health Information) at rest (in databases, spreadsheets, faxes,copies, etc.)</li>
<li>Securing the patient records during transmission (EMR in the cloud, emailing, faxes, network drives, etc.)</li>
<li>Insuring the computers and networks had proper physical and cyber security in place.</li>
<li>Insuring the staff was training to protect the PHI physically and electronically.  Including cybersecurity awareness training of cyber threats.</li>
</ol>
<p>The need for HIPAA is real.  It is a well documented fact that the healthcare industry is lagging in the cybersecurity arena.  They need to beef up their budgets, personnel, training, software, and hardware to improve the protection of PHI.  Currently the U.S. Government says the average physician&#8217;s office is 14% compliant.  Think about that, would you bank at a financial institution if you knew they protected your money 14%?  NO, you would find a new bank.  Maybe it&#8217;s time to ask your doctor, are you protecting my PHI?  And if not, find a new doctor.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2276" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/behind-bars.jpg?resize=201%2C146&#038;ssl=1" alt="" width="201" height="146" />If you&#8217;re a doctor, executive, manager, or owner of a covered entity and you have not improved your cybersecurity then you need to rethink HIPAA and take immediate action.  Remember, <strong>Ignorance of the Law Is No Excuse.</strong> Don&#8217;t take my word for it, see how it worked out for a doctor with the courts in this article <a href="http://www.empr.com/features/hipaa-personal-patient-health-records-criminal-law/article/654196/3/" target="_blank" rel="noopener noreferrer">Doctor Gets Jail Time for HIPAA Violation</a>.  You might read the article and think, &#8220;Well, I would never do that.&#8221;  That&#8217;s probably true, but remember, he didn&#8217;t lose any data, he just looked at it outside the allowed bounds of the law. The OCR is getting stiffer on their penalties. They now expect the covered entity to be responsible and take action to protect the patient&#8217;s data and identity.</p>
<p>Make sure you find the correct solution to address HIPAA, know the <a href="http://thirdrock.com/blog/2017/04/13/why-your-meaningful-use-sra-is-not-enough/">requirements </a>and how to address them <a href="http://thirdrock.com/blog/2016/08/03/third-rock-introduces-compassdb/">completely, easily, and affordably</a>.</p>
<p><span style="color: #0000ff;"><strong>Protect Your Patients.  Protect Your Practice. Protect Yourself™.</strong></span></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/06/01/macrahipaa-ignorance-of-the-law-is-no-excuse/">MACRA/HIPAA: Ignorance of the Law Is No Excuse</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3675</post-id>	</item>
		<item>
		<title>Missing the Target of HIPAA &#8211; Part 3</title>
		<link>https://thirdrock.com/blog/2017/05/04/missing-the-target-of-hipaa-part-3/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 04 May 2017 14:00:53 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[breach of ePHI]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Risk Management Plan]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3640</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/04/missing-the-target-of-hipaa-part-3/">Missing the Target of HIPAA &#8211; Part 3</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1187 size-full alignright" style="margin-top: 8px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training_billboard.jpg?resize=267%2C200&#038;ssl=1" alt="" width="267" height="200" /></p>
<p>If you haven&#8217;t read my previous two blogs on this topic I encourage you to do so.  The <a href="http://thirdrock.com/blog/2017/03/07/missing-the-target-of-hipaa/">first blog</a> stresses the importance of being <a href="http://thirdrock.com/blog/2017/03/07/missing-the-target-of-hipaa/"><strong>risk management proficient</strong> </a>over being a HIPAA “expert”. The <a href="http://thirdrock.com/blog/2017/04/06/missing-the-hipaa-target-part-2/">second blog</a> deals with being <a href="http://thirdrock.com/blog/2017/04/06/missing-the-hipaa-target-part-2/"><strong>accountable</strong></a> in your work actions, which means not only are you responsible for your actions, but your actions can be independently verified.  These two “factors” can go a long way to protecting your organization from the risks of a breach and from substantial penalties and fines for failure to comply to HIPAA regulations.  A coworker forwarded an article to me that provides a good example of both of these traits, or rather the lack of them, but also emphasizes the next important step, <strong>training</strong>.</p>
<p>The National Law Review article published on April 27<sup>th</sup> stated that the U.S. Department of Health and Human Services&#8217; Office for Civil Rights (OCR) announced a settlement for a breach of electronic protected health information (ePHI).  This is the first settlement of a wireless health services provider, which totaled $2.5 million.  The Covered Entity (CE) reported a breach effecting 1,400 people due to a laptop being stolen from a car. Later that same year the CE reported an additional breach of 2,200 individuals.</p>
<p>The OCR audit found that the CE had 1) not performed a risk assessment, 2) lacked sufficient risk management processes and 3) had not adopted proper policies and procedures.</p>
<p>In addition to the fine, the OCR implemented a two-year compliance oversight program that includes the following corrective actions:</p>
<ol>
<li>Conduct a risk analysis of security risks and vulnerabilities.</li>
<li>Implement a risk management plan to address and mitigate the security risks and vulnerabilities identified in the risk analysis.</li>
<li>Update policies and procedures based on implementation of the risk management plan.</li>
<li>Implement secure device and media controls with proper encryption protocols for portable devices and media.</li>
<li>Review and revise its training program relating to the use, security, encryption, handling of mobile devices, and out-of-office transmissions.</li>
</ol>
<p>The complete National Law Review article can be found at <a href="http://www.natlawreview.com/article/stolen-laptop-and-lack-understanding-hipaa-leads-to-25-million-settlement">http://www.natlawreview.com/article/stolen-laptop-and-lack-understanding-hipaa-leads-to-25-million-settlement</a>.</p>
<p>The first 3 corrective actions are standard elements of risk management, which define how to perform corrective actions 4 and 5.  Obviously, cybersecurity is a top priority, but <strong>workforce training</strong>, corrective action 5, is a key component of any organization’s security.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3650 " style="margin-top: 5px; margin-bottom: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/broken-link.jpg?resize=250%2C181&#038;ssl=1" alt="" width="250" height="181" /></p>
<p><strong><em>Your security is only as good as any single individual in your organization.</em></strong>  One person clicking on an unverified hyperlink can introduce ransomware to your systems, stop delivery of healthcare and potentially damage a practice beyond repair. Training strengthens accountability and enables efficient and effective risk management.  Regular up-to-date training and ongoing awareness campaigns emphasize the importance of security and maintains vigilance, helping to build a &#8220;<a href="http://thirdrock.com/blog/2016/02/04/create-a-human-firewall-hipaa-training/">human firewall&#8221;</a>.</p>
<p>These are standard deliverables for our customers and we support them throughout the process.  If you’d like to learn how we can help your organization better protect your customer’s ePHI and avoid costly fines, contact us at <a href="mailto:support@thirdrock.com">support@thirdrock.com</a>.</p>
<p><strong>Protect Your Patients.  Protect Your Practice. Protect Yourself™.</strong></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/04/missing-the-target-of-hipaa-part-3/">Missing the Target of HIPAA &#8211; Part 3</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3640</post-id>	</item>
		<item>
		<title>5 Tips for Creating an Information Security Culture</title>
		<link>https://thirdrock.com/blog/2017/03/30/5-tips-for-creating-an-information-security-culture/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 30 Mar 2017 14:00:54 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[5 Tips]]></category>
		<category><![CDATA[barriers to compliance]]></category>
		<category><![CDATA[behavior change]]></category>
		<category><![CDATA[educate]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[track progress]]></category>
		<category><![CDATA[train]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3125</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/03/30/5-tips-for-creating-an-information-security-culture/">5 Tips for Creating an Information Security Culture</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3134 " style="margin-top: 8px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Red-Information-Security-on-blue-keywords.jpg?resize=180%2C120&#038;ssl=1" width="180" height="120" scale="0" /></p>
<p>Engaging clinical staff in information security can be an uphill challenge. For people doing the tangible, social, and physical work of healthcare, a Security Officer’s cautions regarding the invisible threat of cyber-theft can seem like science fiction paranoia. Further, among the healthcare practitioners who do recognize information security as a relevant concern, a substantial number still see it as an “IT issue.”  And finally, as if those barriers weren’t enough, the mere mention of “HIPAA compliance” can cause practitioners to yawn (or groan!).  So how do you convince a bunch of very busy providers and staff members that it’s worth their while to take the few extra steps necessary or to alter some processes slightly in order to comply with HIPAA policies and procedures? There is no one size fits all solution, but one or more of the following tips may augment your current change efforts.</p>
<ol>
<li><strong>Create awareness of the threat.</strong></li>
</ol>
<p>Understandably, you may have begun your awareness and training campaign with <em><u>what</u></em> staff members need to do to comply. Until they understand <em><u>why</u></em> they need to take the required precautions, however, consistent behavior change is unlikely. They need to know that healthcare organizations are being actively targeted by cybercriminals and that any organization with an internet connection is at risk – no matter how large or how small.</p>
<ol start="2">
<li><strong>Reframe HIPAA as a clinical safety issue.</strong></li>
</ol>
<p>Practitioners also need to understand that an information breach could impact their ability to deliver care, not just the administrative functions. <strong><em>Cybersecurity is a clinical issue.</em></strong> An organization paralyzed by ransomware is unable to access medication records, lab results, or radiology records, making it impossible for clinicians to deliver safe care. Even “smart” medical devices, such as glucometers or infusion pumps, can be hijacked to give inaccurate readings or operate at dangerous levels. Explain cybersecurity as the electronic equivalent of infection control precautions, measures staff members take every day to keep their patients safe.</p>
<ol start="3">
<li><strong>Educate <em>everyone</em>!</strong></li>
</ol>
<p>The Board, C-suite executives, volunteers – no one is immune! Everyone should understand the threat, their own responsibility for keeping PHI secure, and how to identify suspicious activity in their realm. Once everyone is educated, remind them – again and again. Frequency, redundancy, and variety are key to information retention. Use every channel available to you – staff meetings, newsletters, performance reviews, email, screen saver and/or text messages. Use games and contests to make it fun. Use images and slogans to make it memorable and to emphasize the importance.</p>
<ol start="4">
<li><strong><em>Train</em></strong><strong> everyone!</strong></li>
</ol>
<p>Wait, isn’t that what I just said in the previous paragraph?  No – <em>educating</em> everyone is making sure they know <em>what</em> to do and <em>why</em>. <em>Training</em> ensures they know <em>how</em> to do it. Any security precautions that require physical action, such as logging out of a workstation, should be physically demonstrated, either in person or by video. In order to complete training, each learner should then demonstrate the ability to correctly perform the required action. Note: In some of our client organizations, staff members have not understood the difference between logging out of the EHR and logging out of the workstation.</p>
<ol start="5">
<li><strong>Track and discuss progress – <em>and</em> any barriers to compliance.</strong></li>
</ol>
<p>We’ve all experienced “flavor of the day” initiatives, and in the current political climate, some people may think HIPAA was a politically-motivated initiative that might be overturned.  The fact is, HIPAA or no HIPAA, your organization’s PHI is a valuable asset central to the delivery of safe care and the organization’s financial solvency. Signal your staff that whatever the political climate, your commitment to information security is here to stay. Choose 3-5 metrics that provide some indication of HIPAA compliance, then review and discuss them regularly. Again, use every channel available.</p>
<p>But make sure these communications aren’t a one-way street. Often there are valid reasons why staff are having difficulty complying with the requirements, such as equipment location or contradictory role demands. Listen, then do everything you can to <strong><em>make it easy to do the right thing</em></strong>.</p>
<p>Good luck!  If you have additional recommendations, please share them with us via <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>. If we receive several suggestions, we’ll post them in a future blog.</p>
<p>Until then, be safe, not sorry!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/03/30/5-tips-for-creating-an-information-security-culture/">5 Tips for Creating an Information Security Culture</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3125</post-id>	</item>
		<item>
		<title>HIPAA’s “Last Mile” Challenge</title>
		<link>https://thirdrock.com/blog/2017/01/12/hipaas-last-mile-challenge/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 12 Jan 2017 15:00:00 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA["last mile of HIPAA"]]></category>
		<category><![CDATA["walk the talk"]]></category>
		<category><![CDATA[change management]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[leadership]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2855</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/12/hipaas-last-mile-challenge/">HIPAA’s “Last Mile” Challenge</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2853 " style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/five-male-figures-running-toward-goal.jpg?resize=260%2C194&#038;ssl=1" width="260" height="194">The phrase “last mile” is commonly used across many industries to denote the final leg of a project or process &#8211; reaching the goal! More often than not, it’s referring to the most <em>difficult </em>part of the journey.&nbsp; In logistics, it is delivering your iPhone made in China to your doorstep in rural Texas.&nbsp; In the communications industry, it is installing the last few hundred yards of new optical fiber cabling for high speed internet to your home or office that is extremely costly and disruptive.&nbsp; And literally, although I have never run a marathon, I’ve heard that the last mile is often the toughest.</p>
<p>So, what is the “last mile” of HIPAA?&nbsp; Given that HIPAA is a never-ending journey can there even be a “last mile&#8221;?&nbsp; After many assessments, at a wide range of healthcare facilities, I think there is a &#8220;last mile&#8221;.&nbsp; I’ve seen it many times &#8211; the practice has done its annual risk assessment, has a risk management plan, yearly training for its staff, and policies and procedures. The IT group has implemented security safeguards and is taking corrective action.&nbsp; Yet, in my opinion, they haven’t completed the last mile.&nbsp; Why?&nbsp; Because they haven’t changed their attitudes.&nbsp; They believe HIPAA is just another government mandated requirement.&nbsp; More paperwork, processes, and cost.&nbsp; And if the management team doesn’t believe it is worthwhile, the staff will just go through the motions.&nbsp; Failure is almost assured.&nbsp; Patient data will be lost or stolen. &nbsp;&nbsp;People’s lives will be negatively impacted &#8211; some severely.</p>
<p>So how do you successfully complete the “last mile” of HIPAA?&nbsp; Start at the top.&nbsp; The management team must embrace the responsibility for protecting their patient’s most sensitive data &#8211;&nbsp; private data on their children, wives, husbands, and parents.&nbsp; Protect their data in the same way you work to protect yours.&nbsp; When you “walk the talk,” your staff will get the message. &nbsp;Encourage them, and they will step up to the challenge to successfully complete the “last mile of HIPAA” as well.</p>
<p><em>I was inspired to write this blog by one of my business partners, Dr. Julie Rennecker, who leads our customer experience discipline.&nbsp; She has 10 years bedside clinical experience as a hospital RN, a PhD from MIT in Organizational Behavior, and 20 years research and consulting experience in high-tech and healthcare, and is a recognized industry expert in Change Management.&nbsp; Contact Third Rock if you’d like more information on Change Management and HIPAA compliance.</em></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/01/12/hipaas-last-mile-challenge/">HIPAA’s “Last Mile” Challenge</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2855</post-id>	</item>
		<item>
		<title>Value Proposition of a Next-Generation Compliance Platform (2 of 2)</title>
		<link>https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 14:00:51 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[business operations]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[next-generation management platform]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[value proposition]]></category>
		<category><![CDATA[Worry-Free Compliance]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2323</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/">Value Proposition of a Next-Generation Compliance Platform (2 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2533 " style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Next-Generation.jpg?resize=120%2C90&#038;ssl=1" alt="Next Generation Concept - Golden Color Text on Dark Blue Digital Background." width="120" height="90" /></p>
<p>This is the second in a two part series concerning the value of compliance.  Our mission is, Worry-Free Compliance, to help you obtain a <em><strong>culture of compliance</strong></em> through normal business operations.  Our vision is to reduce the complexity, cost and burden of HIPAA compliance using a next-generation compliance management platform.</p>
<p>What does a next-generation management platform provide?  Here&#8217;s a list:</p>
<ul style="padding-left: 1em;">
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Complete</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Manages the entire compliance process</li>
<li style="text-indent: -1em;">Maintains custom policies and procedures</li>
<li style="text-indent: -1em;">Provides and tracks training</li>
<li style="text-indent: -1em;"><span style="color: #0000ff;"><strong>Creates &amp; maintains Body of Evidence for audits</strong></span></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Simple and Easy</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Understandable format, HIPAA expertise not required</li>
<li style="text-indent: -1em;">Logic driven questions reduces assessment time</li>
<li style="text-indent: -1em;">Supporting documentation easily attached and managed</li>
<li style="text-indent: -1em;"><strong><span style="color: #0000ff;">Generates electronic reports for audits</span></strong></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Significantly Reduces Time and Effort</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Intuitive, step-by-step workflow</li>
<li style="text-indent: -1em;">Provides remediation guidance and support</li>
<li style="text-indent: -1em;">Automates building the body of evidence</li>
<li style="text-indent: -1em;">Reduces man-hours by over 50%</li>
<li style="text-indent: -1em;"><strong><span style="color: #0000ff;">Reduces overall cost of HIPAA compliance by 65%</span></strong></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Greatly reduces liabilities</b></li>
</ul>
</li>
</ul>
<p>Before you buy a HIPAA kit that will sit on your shelves and collect dust or hire a HIPAA auditor/consultant to perform a security risk analysis for you, then leaves you a checklist of issues to correct, you should consider using an online tool that makes you more compliant, in less time and helps you maintain your culture of compliance.</p>
<p>The first post in this two-part series was <a href="http://thirdrock.com/blog/2016/10/13/value-proposition-of-hipaa-compliance-1-of-2/"><em>Value Proposition of HIPAA Compliance</em></a>.</p>
<p>Take our <a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a> to see how compliant you are.</p>
<p><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/">Value Proposition of a Next-Generation Compliance Platform (2 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2323</post-id>	</item>
		<item>
		<title>Protect your patients, protect your practice, protect yourself.</title>
		<link>https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 29 Sep 2016 14:00:10 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2288</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/">Protect your patients, protect your practice, protect yourself.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1668" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Audit-on-blue-puzzle-in-magnifier-c903339_s.jpg?resize=64%2C85&#038;ssl=1" alt="Audit through Lens on Missing Puzzle Peace. Selective Focus. 3D Render." width="64" height="85" scale="0" /></p>
<p>The healthcare industry is beginning to realize that HIPAA is here to stay and they are probably going to be audited sooner or later.  What physicians and all healthcare providers need to understand is that if you don&#8217;t protect your patients&#8217; PHI/ePHI the following can happen to your patients as a result of their identity being stolen and used.</p>
<h4>NOT Protecting Your Patients&#8217; (PHI/ePHI):</h4>
<ol>
<li>You can cause them financial difficulties or even financial ruin.</li>
<li>You can cause them undue stress, even a stroke or heart attack.</li>
<li>You can cause them to be denied healthcare insurance.</li>
<li>You can cause them to be denied healthcare services.</li>
<li>You can cause them to be denied medicines, treatments, and therapies.</li>
<li>You can cause them to be misidentified during healthcare treatment, causing incorrect operations, procedures, medicines, or even death.</li>
<li>You can cause the death of your patient.</li>
<li>You will suffer the consequences listed under &#8220;NOT Protecting Your Practice&#8221;.</li>
</ol>
<p>You might think, these can&#8217;t happen, but all of them have already happened, with the exception of causing a death, but there have been several close calls with death because of identity theft.</p>
<p>What HIPAA &#8220;forces&#8221; you to do, is what you should already be doing:  operating a safe, secure, efficient, productive, and profitable healthcare provider organization.  That&#8217;s right, if you were doing what needs to be done to protect your patients&#8217; PHI/ePHI, you would be HIPAA compliant and you would be protecting your practice (business) and yourself.</p>
<h4>NOT Protecting Your Practice:</h4>
<ol>
<li>You will likely be breached and lose access to or have your patient&#8217;s ePHI stolen.</li>
<li>You will receive the maximum fine from the HHS OCR audit, which may close your doors.</li>
<li>You will likely have a class action lawsuit by your patients against you.</li>
<li>You will have approximately 40% of your patients abandon you and your services.  (People don&#8217;t like having their identity stolen.)</li>
<li>You will have to pay for the remediation of your HIPAA non-compliance issues with government oversight.</li>
<li>You will have to pay for cyber theft protection insurance for all of your patients.</li>
<li>You will suffer from negative social media.</li>
<li>You will suffer major interruption to your cash flow.</li>
</ol>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2276" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/behind-bars.jpg?resize=168%2C122&#038;ssl=1" alt="behind-bars" width="168" height="122" scale="0" />And last but not least, you must realize you need to protect yourself.  The HIPAA law provides for the prosecution of individuals who neglect to protect their patients&#8217; PHI/ePHI or those individuals who destroy, lose, or steal a patient&#8217;s PHI/ePHI. If you don&#8217;t want to wear an orange jump suit you might want to consider working on becoming HIPAA compliant.</p>
<h4>NOT Protecting yourself:</h4>
<ol>
<li>You could find yourself sued by patients.</li>
<li>You could find yourself fined for failure to protect PHI.</li>
<li>You could find yourself found guilty of breaking the law.</li>
<li>You could find yourself in federal prison.</li>
</ol>
<h4><strong><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></strong></h4>
<p>I would strongly suggest you use a Compliance Management Platform to build the required body of evidence, reduce the work load, increase compliance, simplify electronic reporting and save money while working to become HIPAA compliant.  Check out <a href="http://compassdb.com/">CompassDB</a>™ at <a href="http://compassdb.com/">http://compassdb.com/</a>.</p>
<p>If you want to know where you stand with your HIPAA compliance take the <a href="http://cyberquickcheck.com">free HIPAA Quick-Check</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/">Protect your patients, protect your practice, protect yourself.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2288</post-id>	</item>
		<item>
		<title>Achieving Your HIPAA Gold Medal</title>
		<link>https://thirdrock.com/blog/2016/08/16/achieving-your-hipaa-gold-medal/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 14:00:56 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[compliance management platform]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2035</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/08/16/achieving-your-hipaa-gold-medal/">Achieving Your HIPAA Gold Medal</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>With the 2016 Summer Olympics in full swing I thought it apropos to use the analogy of achieving a gold medal to obtaining HIPAA compliance.  I know, not really fair or nice to the Olympics and Olympians, but it makes a decent blog post and a good analogy.   So, bear with me and work on achieving your HIPAA gold medal.</p>
<p><span style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 13px;">Vision</span></p>
<p>You need a clear vision.  You will obtain your goal of being HIPAA compliant.  You need to clearly understand what that requires.  Take our <a href="http://hipaa-quickcheck.com/">Free Risk Assessment</a> to better understand what is now required by law to be HIPAA compliant.</p>
<h4></h4>
<h4>Mindset</h4>
<p>Just like an Olympian has to have the proper mindset, or mental fortitude, to achieve the highest award in sports, you too need to make the decision to achieve HIPAA compliance.  It&#8217;s going to take a lot of time, effort, money, sweat and tears to become the best or be compliant.  Once you&#8217;re performing at the peak you must continue practicing to maintain that level of performance.  Compliance is a culture, a way of life, how you should be operating your business.</p>
<h4>Plan</h4>
<p>Becoming a Gold Medal Olympian doesn&#8217;t happen because you decide you want to be one.  You must have a plan.  You need to understand what steps are required to become the best athlete or compliant.  It&#8217;s best if you perform an assessment of where you are and what is needed to reach your goal (gap analysis), then sketch out a plan and timeline to obtain the goal.  You&#8217;ll need training, work on correcting things you&#8217;re not doing or how to do them better, you should write down policies of how you will do certain things and the steps to do them properly (policies and procedures).  Most medal winners have great coaches that provide expertise, experience, leadership, planning and encouragement to obtain their goals.  You might want or need a HIPAA coach to help you achieve your HIPAA gold medal.</p>
<h4>Communications (Talk)</h4>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1422" style="margin-left: 10px; margin-top: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-on-Red-Puzzle-Pieces-c707712_s.jpg?resize=112%2C112&#038;ssl=1" alt="Training on Red Puzzle Pieces. Educational Concept." width="112" height="112" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-on-Red-Puzzle-Pieces-c707712_s.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-on-Red-Puzzle-Pieces-c707712_s.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-on-Red-Puzzle-Pieces-c707712_s.jpg?resize=160%2C160&amp;ssl=1 160w" sizes="(max-width: 112px) 100vw, 112px" />The entire team needs to understand the Vision and Plan for how to achieve it.  Set a clear vision, then write an outline on how the team will take action to become HIPAA compliant.  It makes it much easier when everyone is in the same boat and rowing in the same direction.  Let the team know the office will become HIPAA compliant, it will take 6 months.  Everyone will need to do their part.  HIPAA training will be provided to each individual.  Set the expectation that the entire office will create and maintain a &#8220;culture of compliance™&#8221;.  It means the entire staff will provide better and safer care to patients who ultimately pay the bills.</p>
<h4>Action (Hard Work)</h4>
<p>What sets the Olympian medalist apart from the rest? Sometimes it&#8217;s 1/1000th of a second, but what got them there was action, they practiced over and over and over.  Their actions became muscle memory.  They worked hard to make it to the highest stage in the world.  They built a culture of consistent training and practice.  Their daily operations were to get better or maintain their superior level of performance.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1664" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-blue-puzzle-pieces-c736353_s.jpg?resize=111%2C111&#038;ssl=1" alt="Compliance on Blue Puzzle on White Background." width="111" height="111" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-blue-puzzle-pieces-c736353_s.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-blue-puzzle-pieces-c736353_s.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-blue-puzzle-pieces-c736353_s.jpg?resize=160%2C160&amp;ssl=1 160w" sizes="(max-width: 111px) 100vw, 111px" /></p>
<p>You will need to work on your plan to improve your compliance over the next year.   Then you will need to maintain your compliance.  The key is to make HIPAA compliance part of your office culture.  Once you have created a &#8220;culture of compliance™&#8221;, being compliant becomes second nature, it&#8217;s part of running a more efficient, effective, productive, profitable and safer healthcare business.</p>
<p>Check out our free <a href="http://thirdrock.com/resources/">resources </a>to help you achieve your HIPAA Gold medal.  The information provided in our resources and on our Third Rock Assurance™ solution and our <a href="http://https;//www.compassdb.io/">CompassDB</a>™ Compliance Management Platform pages will help you understand the steps you will need to take to become HIPAA compliant.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/08/16/achieving-your-hipaa-gold-medal/">Achieving Your HIPAA Gold Medal</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2035</post-id>	</item>
		<item>
		<title>Is HIPAA Worth It?</title>
		<link>https://thirdrock.com/blog/2016/08/11/is-hipaa-worth-it/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 14:00:56 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[OCR audits]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[ROI]]></category>
		<category><![CDATA[Third Rock Assurance™]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1988</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/08/11/is-hipaa-worth-it/">Is HIPAA Worth It?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1997 " style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Physician-reception-area.jpg?resize=252%2C168&#038;ssl=1" alt="Doctors And Nurses At The Reception Area Of A Hospital" width="252" height="168" />HIPAA is yet another government mandate for American healthcare businesses to address.  We all know it&#8217;s time consuming, requires a lot of effort to learn, stay current on and to implement.  Plus, it&#8217;s costly.  But, is it worth it?  Does it truly help the covered entity or business associate in the long run.  You might be surprised by the answer.</p>
<p>The simple answer is ABSOLUTELY.</p>
<p>First, let&#8217;s look at HIPAA goals.</p>
<h4>Basic Goals of HIPAA</h4>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;"><strong>Portability</strong>: To allow patients to transfer their records between doctors.</li>
<li style="text-indent: -1em;"><strong>Privacy</strong>: To protect the privacy of the patient.  No one wants the world or nosy neighbor to know about our warts or health issues.</li>
<li style="text-indent: -1em;"><strong>Security</strong>: To protect our EXTREMELY valuable PHI from cyber-theft or loss.</li>
</ol>
<p>Here&#8217;s a list of benefits and the indirect Return On Investment (ROI), even though it may not be quantifiable and directly traceable to revenue or profit.</p>
<h4>Benefits of HIPAA</h4>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">The Risk Assessment (Security Risk Analysis) helps your business identify issues you need to address to reach the goals listed above.</li>
<li style="text-indent: -1em;">HIPAA training helps your entire staff to be better at obtaining those goals and not accidentally causing a breach.</li>
<li style="text-indent: -1em;">The Policies and Procedures help you run a more standard, effective and efficient business operation.  If everyone knows the policies and the procedures to fulfill those policies, work will flow smoother, training new staff will be faster and cheaper, and the chances of a HIPAA violation (loss of PHI) will be reduced.</li>
<li style="text-indent: -1em;">Cyber security scans and remediation help harden your cyber security and protect your valuable PHI from being stolen or destroyed.</li>
<li style="text-indent: -1em;">Keeping records of your HIPAA work shows the auditors you&#8217;re doing what is expected and attempting to meet the goals of HIPAA.  Building a body of evidence is now a requirement of HIPAA auditors.</li>
</ol>
<p>You might say, &#8220;Great this is all good and wonderful, but I&#8217;m still out time, effort and money without any financial benefit.&#8221;  You might want to consider NOT being HIPAA compliant.  Let&#8217;s assume you are NOT doing anything to be HIPAA compliant.  You get breached and lose 2,500 patient records.  You don&#8217;t report the breach to the OCR.   One of your patient&#8217;s identity is stolen, the information is tracked back to your practice, which is fairly easy, and now the OCR audits your practice.  You&#8217;re staring at a potential $500,000 fine.  A class action lawsuit that could cost well over a million dollars.  Plus, months and months of time to address the audit and reinforcements.  Then you have to implement HIPAA and show every step to the OCR.  Even if you have cyber-theft insurance, it probably won&#8217;t cover all of the expenses and it may cover none of them because you can&#8217;t show any proof (body of evidence) that you took steps to secure the patient&#8217;s data (ePHI).</p>
<h4>ROI of HIPAA</h4>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">The potential HHS OCR fines are greatly reduced if not eliminated.</li>
<li style="text-indent: -1em;">The likelihood of physical PHI and electronic PHI breaches are reduced.</li>
<li style="text-indent: -1em;">The likelihood of lawsuits from PHI breaches and data loss are reduced.</li>
<li style="text-indent: -1em;">Your business operates more effectively, providing better care and patient privacy, security and data protection.</li>
<li style="text-indent: -1em;">Your business operates more efficiently, training new staff faster with less effort.</li>
<li style="text-indent: -1em;">Your business is a more ethical place of work, working to be a safe place for your patients to come for healthcare.</li>
<li style="text-indent: -1em;">The negative social media impact is reduced or eliminated.</li>
<li style="text-indent: -1em;">The likely loss of your livelihood is greatly reduced.</li>
</ol>
<h4></h4>
<h4>Conclusion on ROI of HIPAA</h4>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">Do you earn more money by implementing HIPAA?  No.</li>
<li style="text-indent: -1em;">Do you save money by implementing HIPAA?  Not directly.</li>
<li style="text-indent: -1em;">Do you reduce your liabilities and likelihood of financial loss by implementing HIPAA?  Absolutely.</li>
<li style="text-indent: -1em;">Do you do the morally and ethically correct thing and protect your patients personal privacy and financial security by implementing HIPAA?  Absolutely.</li>
<li style="text-indent: -1em;">If you invest a $1,000 in HIPAA and you save yourself $1.5 million in fines and expenses, it&#8217;s an extremely cheap investment with many benefits.</li>
</ol>
<p>Whether you look at HIPAA as an investment or insurance, it&#8217;s time to invest in a solution that is comprehensive, easy and affordable that will build your body of evidence and help you reach the HIPAA goals. What we at Third Rock refer to as your &#8220;Culture of Compliance™&#8221;. Consider a Managed Compliance Service Provider (MCSP) that provides HIPAA expertise, is your virtual HIPAA team, has an online, easy to use compliance management tool that reduces your learning curve, your effort to implement and your time to become compliant, all at a reasonable price.  That&#8217;s our goal with Third Rock Assurance™ powered by CompassDB™.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/08/11/is-hipaa-worth-it/">Is HIPAA Worth It?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1988</post-id>	</item>
		<item>
		<title>Focus on Security: Phishing for Malware</title>
		<link>https://thirdrock.com/blog/2016/08/02/focus-on-security-phishing-for-malware/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 02 Aug 2016 14:00:18 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1877</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/08/02/focus-on-security-phishing-for-malware/">Focus on Security: Phishing for Malware</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 class="p1">85 percent of organizations have suffered phishing attacks!</h3>
<p><span class="s1">That is straight from the <a href="https://www.wombatsecurity.com/press-releases/new-report-state-of-phishing-attacks" target="_blank" rel="noopener noreferrer">Wombat</a></span><em><span class="s1"><a href="https://www.wombatsecurity.com/press-releases/new-report-state-of-phishing-attacks" target="_blank" rel="noopener noreferrer"> 2016 State of the Phish</a> </span></em>report.  Is that depressing or what!  The sad thing is, phishing can be thwarted most of the time.  But, it requires diligent training of your ENTIRE staff.  Including the board members, owners, executives and doctors.  Everyone needs to be trained to identify phishing attacks and resist opening the link and/or attachment.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1948 size-medium" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Phishing-white-on-red-puzzle.jpg?resize=300%2C141&#038;ssl=1" alt="Phishing - White Word on Red Puzzles on White Background. 3D Render." width="300" height="141" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Phishing-white-on-red-puzzle.jpg?resize=300%2C141&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Phishing-white-on-red-puzzle.jpg?w=425&amp;ssl=1 425w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>A few stats from the report.</p>
<ol>
<li>85% of organizations have suffered phishing attacks.</li>
<li>37% of executives have been victims of phishing.</li>
<li>30% of phishing emails get opened.</li>
<li>#1 delivery of malware is via email attachments.
<ol>
<li style="margin-left: 20px;">#2 delivery of malware is web based.</li>
<li style="margin-left: 20px;">#3 delivery of malware is hyperlinks in email.</li>
</ol>
</li>
<li>250% increase in phishing attacks in first quarter of 2016.
<ol>
<li style="margin-left: 20px;">You are under attack by the cyber criminals.</li>
</ol>
</li>
<li>93% of phishing emails carried ransomware.</li>
<li>Average cost of a phishing attack is $1.6 million.  Obviously, this is because huge corporations have experienced successful phishing attacks.  But, never the less a phishing attack will cost your dearly.</li>
</ol>
<p><a class="author-link" href="https://blog.barkly.com/author/jonathan-crowe">Jonathan Crowe</a> at Barkly has a great <a href="https://blog.barkly.com/phishing-statistics-2016">blog</a> with charts for more details.  He also has a <a href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=8632ab27-7913-43dd-aed0-9541c9782e2e&amp;placement_guid=ff6b267b-0f5c-4ca3-99f8-7b69751b0b04&amp;portal_id=468115&amp;redirect_url=APefjpGeQhgQ1T2ku3Ku2qwAoOVyVjNgyP-nv3sBAES8NrnHhjsJ71mKfHmoV5S61HOXtHqJd6uANvuARNTx6gmuqsOtQPfTxYoUqtAeJAOS0WWAQVqXOF5e6md_JdahhgoFFWYbIJKAz0vNhcfxQNOgq25gH5rF-POuztQL5xvELak9x1uxldDFVwfIMzvEJylqtesmMzmXfb0g5BWHQFX5c0mw9AyzywEiVcLEehNkkDEWEiDTzsdzVJ0yQYUKyFONXVXd_3lSCIMvkPnpg6VrUDBvDSCYiv2hE5okJUBPMup9hmv5ufpftv-w0GlMOfKx-NY507wM&amp;hsutk=4a6b0d7ce9d0efc82f37061aa234962d&amp;utm_referrer=https%3A%2F%2Fblog.barkly.com%2Fphishing-statistics-2016&amp;canon=https%3A%2F%2Fblog.barkly.com%2Fphishing-statistics-2016&amp;__hstc=146311083.4a6b0d7ce9d0efc82f37061aa234962d.1468265723496.1468930921160.1469545032133.3&amp;__hssc=146311083.3.1469545032133&amp;__hsfp=227753642"><strong>Phishing Field Guide: How to Keep Your Users Off the Hook</strong></a></p>
<p>Here are a few tips to help you avoid catching the wrong phish (malware, computer bug).</p>
<ol>
<li>Train your staff on cyber security.  Our HIPAA course covers phishing and other cyber security training.</li>
<li>Train your staff using a false phishing campaign.</li>
<li>Configure your email to filter out phishing emails.</li>
<li>Double check the email address is from someone you know.  Otherwise, you should probably NOT open it.</li>
<li>Double check the url, does it go to the right web site?  Do you recognize the url, does it make sense?</li>
<li>Not sure about an email?  Call and talk to the sender first.</li>
<li>Turn off macros if asked when opening any file.</li>
<li>Setup an email gateway to block all attachments and require users to download expected attachments from the server.</li>
</ol>
<p><a href="http://resources.infosecinstitute.com/top-9-free-phishing-simulators/">Here </a>are some free phishing simulators you might try <a href="http://resources.infosecinstitute.com/top-9-free-phishing-simulators/">http://resources.infosecinstitute.com/top-9-free-phishing-simulators/</a>.  The DOD also offers a free phishing test tool <a href="http://iatraining.disa.mil/eta/phishing_v2/launchpage.htm">at http://iatraining.disa.mil/eta/phishing_v2/launchpage.htm</a>.</p>
<p>Hope these tips help you <strong>protect your patients, protect your practice, and protect yourself.</strong></p>
<p>@barklyprotects, #phishing</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/08/02/focus-on-security-phishing-for-malware/">Focus on Security: Phishing for Malware</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1877</post-id>	</item>
	</channel>
</rss>
