<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Policies &amp; Procedures Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/policies-procedures/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/policies-procedures/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 26 Mar 2020 19:31:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Policies &amp; Procedures Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/policies-procedures/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Cyber Protection as Your Business Deals with Social Distancing</title>
		<link>https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Cyber Safety Tips for Businesses When Employees Work from Home</h2>
<p>With the threat of the Coronavirus, many companies are allowing or requiring employees to work from home. If your company deals with protected information such as healthcare, financial, consumer or personal, you should have policies and procedures in place to protect that data within your normal work environment. However, having your work force suddenly need to access this information from home may not be normal. Systems may be overloaded, sensitive information distributed in a way that you never anticipated and lines of communication disrupted. Do your policies and procedures cover such a situation, like a pandemic? Here are 6 tips to best protect your business and your clients.</p>
<h3>Train Your Employees</h3>
<p>We are not talking about the once a year standard, boring videos people half heartedly watch so they can print off a certificate proving they did it. Your employees <u>must</u> know key elements of cyber safety that they are regularly reminded of. If nothing else, make sure they know these 3 things.</p>
<ol>
<li><u>Anticipate phishing and spear phishing attacks</u>. Word will travel fast that everyone is working from home. Hackers will recognize you are vulnerable and try to take advantage of it. Tell your workforce to anticipate phishing and spear phishing attacks that will attempt to take advantage of pandemic fears. Give visual examples, have your IT on high alert searching for phishing attempts and contact employees immediately when one gets through your firewall.</li>
<li><u>Do not access sensitive information on unauthorized devices</u>. The biggest culprit: cell phones. Have policies about what devices they are allowed to use to remotely access information and make sure they know. Never store sensitive information unencrypted on a portable device.</li>
<li><u>Do not access sensitive information on unsecure networks</u>. Like working from Starbucks because they have free WiFi? That may be fine for personal use, but not when you’re accessing sensitive information. Public WiFi makes it easy for a hacker to infiltrate your computer, stealing the information you accessed.</li>
</ol>
<h3>Determine Critical Processes and Access Control</h3>
<p>This is a key component to any Pandemic plan. Who is authorized to access sensitive information, and how do you ensure they can actually access sensitive information in a highly distributed environment? Minimize your exposure by controlling access to data. Not everyone working from home needs access to sensitive information. Make sure you lock down access to only essential employees. Follow through by monitoring who is accessing data, what they are accessing and why.</p>
<h3>Multifactor Authentication</h3>
<p>For those employees who need to access sensitive information, require multifactor authentication every time they remotely access a private server. This is an easy step to implement that can have a big impact on keeping cyber criminals out.  Explain to your employees why the two-factor authentication is an important safety capability.</p>
<h3>Network Access Control</h3>
<p>While you should train your employees not to access sensitive information on unsecure networks (see tip #1), you can implement access controls that actually block a user if they do not meet a certain level of security. You should implement a Virtual Private Network (VPN) which provides higher security for your workers using their home and/or public internet that are not secure.   It’s fairly easy and inexpensive to implement. For more information on VPNs, <a href="https://www.techradar.com/vpn/best-vpn">click here</a>.</p>
<h3>Encrypt Data</h3>
<p>If information is stored locally on a device, make sure it is encrypted. Portable devices are often stolen that contain sensitive information. A simple step of encryption protects your clients’ information and protects you from hefty breach costs and fines.</p>
<h3>Provide Company Devices</h3>
<p>Laptops and cell phones should always be running the most up to date version of an operating system available (i.e. Windows 10 vs Windows 8). They should also have up to date firewall protections and antivirus software. If employees are permitted to use personal devices, it is difficult to ensure these protections stay up to date. Providing company devices that are properly configured and regularly updated help strengthen the barrier against cyber criminals.</p>
<p>Protection doesn’t have to be complicated, but it does have to be intentional. Simple steps taken by the company and the employees can go a long way. While we want to stay physically safe through this wave of the Coronavirus, let’s make sure we stay cyber safe too.</p>
<p> Concerned if you have the right precautions and planning in place? Contact Third Rock at info@thirdrock.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8918</post-id>	</item>
		<item>
		<title>Could this breach have been prevented? – A new series</title>
		<link>https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 26 Sep 2017 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[continuous improvement]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy training]]></category>
		<category><![CDATA[process improvement]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4572</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/">Could this breach have been prevented? – A new series</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="alignleft wp-image-4087 size-medium" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/continuous-improvment-yellow-keyboard-key.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" scale="0" style="font-size: 12px; margin-top: 5px; margin-right: 10px;" /></p>
<p>One of the first lessons of process improvement is that <em>preventing errors is much less expensive and time-consuming than remedying the damage after the fact</em>. The same is true for an information breach. The time and cost for installing new software, training staff members, and reinforcing policies and procedures pales in comparison to cleaning up the damage of an information privacy or security breach.</p>
<p>Recent headlines of multi-million-dollar OCR fines and the hundreds, thousands – even millions! – of lives affected suggest the scale of the damage to both businesses and individuals. The news reports rarely explain, however, exactly <em>how</em> the breach could have been averted. This is the first in a new series of articles using publicly reported breaches as teaching opportunities for breach prevention. These are not intended as an “I told you so” for the organizations breached – each incident could happen at almost any healthcare organization today. <em>The goal is for all of us to continuously improve our understanding of the risks to patient information and the options available to us for protecting that information without creating an oppressive atmosphere for our patients, staff, and visitors.</em></p>
<p><strong><em>Unauthorized photographs of a surgical patient</em></strong></p>
<p>This first example was reported in the <em>HIPAAJournal</em> just last week. Basically, surgical staff members photographed a patient’s genital injury using their personal phones and shared the photos with friends. Details of the incident are available in the <a href="https://www.hipaajournal.com/hospital-staff-discovered-taken-shared-photographs-patients-genital-injury-8968/">HIPAAJournal post</a>. What we want to focus on here is whether and how management could have prevented this breach.</p>
<p>This incident is particularly egregious because the information disclosed was so sensitive and because so many health care professionals and staff members – the very people charged with keeping the patient and his information safe – were complicit in the violation. I understand that in the face of such irresponsible behavior, a manager might be tempted to feel helpless &#8211; “I can’t watch every person every minute. What can I possibly do to make sure none of my staff ever do something stupid?” Here are some suggestions.</p>
<p><strong>Action 1: Policy disallowing use of personal phones in the OR (or any patient area) <em>for any reason</em></strong>.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-4187 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>As a former frontline nurse, I understand the tendency to scoff at policy – “What good’s a policy? People will do whatever they want to anyway!” There’s some truth to that – practice never perfectly matches policy – but <em>what a policy does do is establish clear guidelines for expected behavior.</em></p>
<p>If the hospital wants staff to have mobile communications, they need to supply them with Vocera badges or other devices and not rely on staff members’ personal telephones. Personal phones can be used at the desk and in the break room, but not in patient areas – period. <em>Responsibility for enforcing the policy must be shared</em> by charge nurses and circulating nurses, not just the department manager or director. A charge nurse found not to be enforcing the policy could be suspended just as if s/he had been using the phone him or herself.</p>
<p><strong>Action 2:  Intensive staff training, retraining, and reinforcement</strong>.</p>
<p>The speed and shamelessness with which these staff members brandished their phones suggests gross ignorance of the HIPAA Privacy and Security Requirements <em>and</em> of the potential consequences for violating them – termination, civil charges and fines, and criminal charges that could include probation or jail time.  <em>Staff should receive comprehensive HIPAA training during their orientation before being given access to patients or PHI.</em> That <em>training should then be reinforced</em> with shorter refresher courses and/or routine discussions of patient privacy and information security in staff meetings, organizational Town Hall sessions, and online forums on the organization’s intranet.</p>
<p><strong>Action 3:  Leadership in the moment</strong>.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4149 size-medium" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&#038;ssl=1" alt="" width="300" height="211" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=768%2C540&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=1024%2C720&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" />In the OR, the anesthesiologist, the surgeon, and the circulating nurse all possess significant authority. Any one of these individuals could have called a halt, required everyone to power off their phones, sealed the room, and called hospital security to confiscate the phones until someone from IT could sit with each individual involved to clear the photos.</p>
<p>This action is still more Band-aid than prevention, but <em>it is the actions of leaders in the heat of the moment that either reinforce or undermine policy and training.</em> It did sound like the executives were taking the incident very seriously and had applied appropriate sanctions. It may also have been the case that the circulating nurse or surgeon brought the incident to the executives’ attention – that information wasn’t included in the article. The critical takeaway is that <em>protecting patient privacy, confidentiality, and information security are now as important a leadership responsibility as patient safety and infection control.</em></p>
<p>The above actions, taken together, are the pillars of creating a Culture of Compliance. Whether the focus of the compliance is HIPAA, CLABSI protocols, or hand washing – <em>all require clear expectations, appropriate training, and unrelenting leadership</em>. Culture is powerful – the trick is to create a culture that makes it easy – automatic – to <em>do the right thing</em>.</p>
<p>Our very best wishes to the patient and everyone at UPMC Bedford Memorial trying to remedy the situation.</p>
<p>If you need assistance establishing a <em>culture of compliance</em> please contact us at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/">Could this breach have been prevented? – A new series</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4572</post-id>	</item>
		<item>
		<title>Flooding: Are You Prepared?</title>
		<link>https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 25 Aug 2017 12:03:08 +0000</pubDate>
				<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Project Management]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4346</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/">Flooding: Are You Prepared?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4355 " style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/man-sitting-on-roof-in-flood-cartoon.jpg?resize=198%2C174&#038;ssl=1" alt="" width="198" height="174" /><span style="font-size: 12px;"></span></p>
<p><span style="font-size: 12px;">Here in Texas, the Gulf Coast is about to take a direct hit from a hurricane that is expected to dump up to 30 inches of rain in some locations and up to 10 inches across large areas. That kind of rain will definitely cause serious flooding.  It&#8217;s a little late for the Texas coastal bend area and the large inland areas that will be hit the hardest to take planning steps for disaster recovery. They&#8217;re in emergency evacuation mode already, protecting life and reducing property damage. What we can learn from these tremendous forces of nature is that disaster recovery needs to be part of all businesses&#8217; Standard Operating Procedures &#8211; including our own.  What does this mean?</span></p>
<ol>
<li>Make sure the backups of your critical data are current &#8211; <em>and can be restored</em>.</li>
<li>Make sure your important equipment &#8211; servers, workstations, laptops, medical equipment, etc. needed to perform regular work &#8211; is protected or stored above flood level.</li>
<li>Have a plan for communicating with co-workers and employees, including a list of phone numbers or a text group set up on your phone in advance.</li>
<li>Have a plan and the phone numbers for communicating with authorities &#8211; e.g. 911, police, fire department, EMS.</li>
<li>Have a plan outlining how to recover the core equipment and personnel necessary to bring your business and services back online.</li>
</ol>
<p><strong>The preferred approach is to create a Disaster Recovery (DR) plan.</strong> These can easily be 50 page documents, so it will take a lot of time and knowledge to create the plan. I would not suggest buying a template &#8211; these are typically instructions for creating a plan, not an actual plan.</p>
<p>To help you get started, here&#8217;s an outline from our own Disaster Recovery Plan.</p>
<p>We include a DR plan with our HIPAA compliance package.  It&#8217;s required by the Federal government, so we help our clients by providing a ready to use DR plan.  You still have to fill in your business&#8217; specific information, but it will reduce your initial creation time by about 70%.</p>
<p>Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/">Flooding: Are You Prepared?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4346</post-id>	</item>
		<item>
		<title>Incidental Exposures – What are they and what is their impact?</title>
		<link>https://thirdrock.com/blog/2017/08/10/incidental-exposures-what-are-they-and-their-impact/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 10 Aug 2017 14:00:05 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[incidental exposure]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4181</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/10/incidental-exposures-what-are-they-and-their-impact/">Incidental Exposures – What are they and what is their impact?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4186" style="margin-left: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Security-Breach-in-green-on-wooden-tiles.jpg?resize=209%2C92&#038;ssl=1" alt="" width="209" height="92" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Security-Breach-in-green-on-wooden-tiles.jpg?resize=300%2C132&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Security-Breach-in-green-on-wooden-tiles.jpg?w=453&amp;ssl=1 453w" sizes="(max-width: 209px) 100vw, 209px" /></p>
<p>A number of customers contacted me recently concerning possible breaches and what they should do.  After reviewing their situations, these were actually <em>incidental exposures</em>.  What is an incidental exposure? <strong>It is a secondary use or disclosure that cannot reasonably be prevented, is limited in nature, and that occurs as a result of another use or disclosure that is permitted by the Rule. </strong> Typical examples of such in the healthcare setting include conversations between patients and doctors where complete privacy is not practical, or patients&#8217; charts visible to unauthorized people during transfer between areas.</p>
<p>The Privacy Rule does not require elimination of all incidental exposures.  That is just not practical.  In August 2002, specific modifications to the Rule were adopted to clarify that <strong>incidental disclosures do not violate the Privacy Rule when you have policies which reasonably safeguard and appropriately limit how protected health information (PHI) is used and disclosed.</strong> (note 45 CFR 164.502(a)(1)(iii))  If the incidental exposure is a by-product of an underlying use or disclosure which violates the Privacy Rule, then incidental exposure is a violation as well.</p>
<p><strong>Whether an incidental exposure is a violation primarily depends on if you have “policies which reasonably safeguard and appropriately limit how PHI is used and disclosed.”</strong> What does that mean?  A covered entity must have the appropriate administrative, technical and physical safeguards in place.  Appropriate means reasonable for the size of your organization.  If your organization has performed a security risk assessment yet is not practicing risk management, you are not there.  Covered entities must also implement reasonable <em>minimum necessary</em> policies and procedures that limit how much PHI is used, disclosed, and requested for certain purposes.  Like before, an incidental use or disclosure that occurs as a result of a failure to apply reasonable safeguards or the minimum necessary standard, is a violation of the Privacy Rule.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4187" style="margin-left: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>In summary, if your organization is actively engaged in HIPAA compliance, has adopted the proper policies and procedures, you probably don’t have to worry about incidental exposures.  Take time to document them and make them “teachable moments” for the workforce. This will improve your processes, compliance, and security.  On the other hand, if you aren’t taking HIPAA compliance seriously, an incidental exposure can result in an audit and significant fines if reported by an unhappy patient or disgruntled employee.</p>
<p style="text-align: center;">If you have any questions about incidental disclosures or HIPAA, please contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/10/incidental-exposures-what-are-they-and-their-impact/">Incidental Exposures – What are they and what is their impact?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4181</post-id>	</item>
		<item>
		<title>Missing the Target of HIPAA &#8211; Part 3</title>
		<link>https://thirdrock.com/blog/2017/05/04/missing-the-target-of-hipaa-part-3/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 04 May 2017 14:00:53 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[breach of ePHI]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Risk Management Plan]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3640</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/04/missing-the-target-of-hipaa-part-3/">Missing the Target of HIPAA &#8211; Part 3</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1187 size-full alignright" style="margin-top: 8px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training_billboard.jpg?resize=267%2C200&#038;ssl=1" alt="" width="267" height="200" /></p>
<p>If you haven&#8217;t read my previous two blogs on this topic I encourage you to do so.  The <a href="http://thirdrock.com/blog/2017/03/07/missing-the-target-of-hipaa/">first blog</a> stresses the importance of being <a href="http://thirdrock.com/blog/2017/03/07/missing-the-target-of-hipaa/"><strong>risk management proficient</strong> </a>over being a HIPAA “expert”. The <a href="http://thirdrock.com/blog/2017/04/06/missing-the-hipaa-target-part-2/">second blog</a> deals with being <a href="http://thirdrock.com/blog/2017/04/06/missing-the-hipaa-target-part-2/"><strong>accountable</strong></a> in your work actions, which means not only are you responsible for your actions, but your actions can be independently verified.  These two “factors” can go a long way to protecting your organization from the risks of a breach and from substantial penalties and fines for failure to comply to HIPAA regulations.  A coworker forwarded an article to me that provides a good example of both of these traits, or rather the lack of them, but also emphasizes the next important step, <strong>training</strong>.</p>
<p>The National Law Review article published on April 27<sup>th</sup> stated that the U.S. Department of Health and Human Services&#8217; Office for Civil Rights (OCR) announced a settlement for a breach of electronic protected health information (ePHI).  This is the first settlement of a wireless health services provider, which totaled $2.5 million.  The Covered Entity (CE) reported a breach effecting 1,400 people due to a laptop being stolen from a car. Later that same year the CE reported an additional breach of 2,200 individuals.</p>
<p>The OCR audit found that the CE had 1) not performed a risk assessment, 2) lacked sufficient risk management processes and 3) had not adopted proper policies and procedures.</p>
<p>In addition to the fine, the OCR implemented a two-year compliance oversight program that includes the following corrective actions:</p>
<ol>
<li>Conduct a risk analysis of security risks and vulnerabilities.</li>
<li>Implement a risk management plan to address and mitigate the security risks and vulnerabilities identified in the risk analysis.</li>
<li>Update policies and procedures based on implementation of the risk management plan.</li>
<li>Implement secure device and media controls with proper encryption protocols for portable devices and media.</li>
<li>Review and revise its training program relating to the use, security, encryption, handling of mobile devices, and out-of-office transmissions.</li>
</ol>
<p>The complete National Law Review article can be found at <a href="http://www.natlawreview.com/article/stolen-laptop-and-lack-understanding-hipaa-leads-to-25-million-settlement">http://www.natlawreview.com/article/stolen-laptop-and-lack-understanding-hipaa-leads-to-25-million-settlement</a>.</p>
<p>The first 3 corrective actions are standard elements of risk management, which define how to perform corrective actions 4 and 5.  Obviously, cybersecurity is a top priority, but <strong>workforce training</strong>, corrective action 5, is a key component of any organization’s security.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3650 " style="margin-top: 5px; margin-bottom: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/broken-link.jpg?resize=250%2C181&#038;ssl=1" alt="" width="250" height="181" /></p>
<p><strong><em>Your security is only as good as any single individual in your organization.</em></strong>  One person clicking on an unverified hyperlink can introduce ransomware to your systems, stop delivery of healthcare and potentially damage a practice beyond repair. Training strengthens accountability and enables efficient and effective risk management.  Regular up-to-date training and ongoing awareness campaigns emphasize the importance of security and maintains vigilance, helping to build a &#8220;<a href="http://thirdrock.com/blog/2016/02/04/create-a-human-firewall-hipaa-training/">human firewall&#8221;</a>.</p>
<p>These are standard deliverables for our customers and we support them throughout the process.  If you’d like to learn how we can help your organization better protect your customer’s ePHI and avoid costly fines, contact us at <a href="mailto:support@thirdrock.com">support@thirdrock.com</a>.</p>
<p><strong>Protect Your Patients.  Protect Your Practice. Protect Yourself™.</strong></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/04/missing-the-target-of-hipaa-part-3/">Missing the Target of HIPAA &#8211; Part 3</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3640</post-id>	</item>
		<item>
		<title>Knock, Knock &#8211; We&#8217;re here to perform an onsite HIPAA audit.</title>
		<link>https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/</link>
					<comments>https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/#comments</comments>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 05 Jan 2017 15:04:44 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[electronic documentation]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2773</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/">Knock, Knock &#8211; We&#8217;re here to perform an onsite HIPAA audit.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2801 " style="margin-top: 5px; margin-bottom: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ducks-in-a-row.jpg?resize=275%2C183&#038;ssl=1" width="275" height="183" /></p>
<p>Welcome to 2017.  If you haven&#8217;t heard, the Health and Human Services Office of Civil Rights (OCR) will perform several hundred <strong>on-site</strong> HIPAA audits this year. The possibility of being selected is highly unlikely, but if you are one of the &#8220;lucky&#8221; covered entities that is audited you had better be ready &#8211; with all your ducks in a row. <strong>Current</strong> HIPAA training is only one duck, you need at least four more.  So, prepare to go duck hunting and get them in order sooner rather than later.</p>
<p>There are two very important issues to understand about this new process and the protocol the OCR implemented in 2016. The OCR now requires documented proof that covered entities and business associates have &#8230;</p>
<ol>
<li>Implemented HIPAA specific Policies and Procedures (P&amp;P) in 2016 showing a plan for risk management.</li>
<li>Documentation, including the P&amp;Ps and logs of HIPAA activity, in electronic format for uploading to their web site.</li>
</ol>
<p><strong>Don&#8217;t forget</strong> the OCR expected the following for a HIPAA desk audit starting in 2015 and 2016.</p>
<ol>
<li>A current annual Security Risk Analysis (SRA) based on the OCR SRA questions and/or the NIST 800 standard.  In addition, a risk assessment that includes privacy is needed as well.</li>
<li>Current HIPAA training that includes privacy and cyber security training for all staff with access to PHI and ePHI.</li>
</ol>
<p><strong>The real takeaway?  </strong>The OCR expects to automate auditing and <strong>all covered entities and business associates will be audited by 2019</strong>.  The OCR expects covered entities and business associates to have HIPAA compliance documentation in electronic format starting in 2016.  Make sure your HIPAA report, corrective actions and logs are in electronic format and that you can show improvement in your HIPAA compliance.</p>
<p><strong>Call-To-Action:</strong> If you haven&#8217;t started and done all of the necessary steps to be HIPAA compliant, it&#8217;s time to take action and have a Risk Assessment done immediately and make sure it&#8217;s delivered and available in electronic format, preferably online.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/">Knock, Knock &#8211; We&#8217;re here to perform an onsite HIPAA audit.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2773</post-id>	</item>
		<item>
		<title>Value Proposition of HIPAA Compliance (1 of 2)</title>
		<link>https://thirdrock.com/blog/2016/10/13/value-proposition-of-hipaa-compliance-1-of-2/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 13 Oct 2016 14:00:26 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[business operations]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[value proposition]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2320</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/10/13/value-proposition-of-hipaa-compliance-1-of-2/">Value Proposition of HIPAA Compliance (1 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2480" style="margin-top: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Value-Proposition-gold-watch.jpg?resize=210%2C175&#038;ssl=1" alt="Value Proposition on Black-Golden Watch Face with Closeup View of Watch Mechanism." width="210" height="175" /></p>
<p>If you&#8217;ve been reading our blog very long you know we&#8217;ve discussed Is HIPAA worth it?, What&#8217;s the ROI?, etc, etc.  This article is really another way to think about why you need to start working on your HIPAA compliance today.</p>
<p>What is the Value Proposition of HIPAA Compliance?</p>
<ul>
<li>Identifies weaknesses that make your business vulnerable and liable</li>
<li><b>Improves protection of your patients’ valuable PHI</b></li>
<li>Protects your business from disruptive events – natural and man-made</li>
<li><b>Fortifies your cyber-security</b></li>
<li>Enhances insurability and marketability</li>
<li><b>Reduces your liabilities</b>
<ul>
<li style="text-indent: +1em;">Costly breach remedies</li>
<li style="text-indent: +1em;">Expensive audit fines</li>
<li style="text-indent: +1em;">Lawsuits from lost PHI</li>
<li style="text-indent: +1em;">Negative social media</li>
<li style="text-indent: +1em;"><b>Disruption of cash flow</b></li>
<li style="text-indent: +1em;"><b>Devaluation of your practice</b></li>
</ul>
<p>Once you have built a culture of compliance into your business operations, you will actually achieve the values outlined, and will likely reduce your costs as you learn to operate more efficiently, effectively and securely. Having standard and reasonable processes helps streamline the workflow, thus making your staff more efficient.</p>
<p>Next up in this two part series will be our post on <em>Value Proposition of </em><em>Next-Generation Compliance Platform</em>. We&#8217;ll cover the value of performing your compliance using a cloud based, Software-as-a-Service (SaaS) solution to perform and maintain your compliance &#8220;body of evidence&#8221;.</p>
<p>Take our <a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a> to see how compliant you are.</p>
<p><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/10/13/value-proposition-of-hipaa-compliance-1-of-2/">Value Proposition of HIPAA Compliance (1 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2320</post-id>	</item>
	</channel>
</rss>
