Because your patients come first.
Because your patients come first.
Because your patients come first.
HIPAA – Texting/Emailing/BYOD
Myths vs Realities
Brian L. Tuttle, CPHIT, CHA, CHP, CBRA, CISSP, CCNA, Net +
www.hipaa-consulting.com
Again, the HIPAA Privacy Rule vs. HIPAA Security Rule
– what’s the difference?
• HIPAA Privacy Rule - defined as the right of an individual to keep his/her
individual health information from being disclosed. Privacy encompasses
controlling who is authorized to access patient information; and under
what conditions patient information may be accessed, used and/or
disclosed to a third party. The HIPAA Privacy Rule applies to ALL
protected health information.
• HIPAA Security Rule - mechanisms in place to protect the privacy of
electronic health information - includes the ability to control access to
patient information, as well as to safeguard patient information from
unauthorized disclosure, alteration, loss or destruction. Security is typically
accomplished through operational and technical controls. Since so much PHI
is now stored and/or transmitted by computer systems, the HIPAA Security
Rule was created to specifically address ELECTRONIC protected health
information.
PRIVACY RULE
•The Privacy Rule covers all Protected Health
Information(PHI)
•This is information that can identify the patient to
the health record
•De-identified Information does not have to be
protected by HIPAA
•Privacy Rule is concerned with guarding the
confidentiality of PHI in ALL formats; paper, oral or
electronic.
Security Rule
Enforcement began on April 21, 2006
The Security Rule complements the Privacy Rule.
• While the Privacy Rule pertains to all Protected Health Information (PHI) including
paper and electronic, the Security Rule deals specifically with Electronic Protected
Health Information (EPHI).
It lays out three types of security safeguards required for compliance:
• Administrative
• Physical
• Technical
The Rule identifies various security standards, and for each standard, it names both
required and addressable implementation specifications. Required specifications must
be adopted and administered as dictated by the Rule. Covered entities and business
associates can evaluate their own situation and determine the best way to implement
addressable specifications.
RISK ASSESSMENT FOR HIPAA SECURITY MUST BE DONE
Business Associate (Definition)
• Business Associates (BA’s) are individuals or
entities who create, receive, maintain, or
store private health information on behalf of a
covered entity.
• Example: Answering Services, Medical
Transcription, IT groups, Billing companies,
shredding services are clearly under the
auspices of “Business Associate”
COMMON HIPAA VIOLATIONS
• Clinical documentation causing HIPAA violations
– Selecting the wrong person to CC on an e-mail containing PHI
– Selecting the wrong patient name
– Selecting the wrong account number, medical record number, or
subject ID
– Entering the wrong supervising or attending physician
– Sharing information about a patient with others when there is no
reason
for them to know
– Failure to immediately report any potential breach or security
incident to the compliance officer or your supervisor
– Improper disposal of materials containing PHI
TELEMEDICINE
Quote from Roger Severino (former OCR Director)
“We are empowering medical providers to serve patients wherever
they are during this national public health emergency. We are
especially concerned about reaching those most at risk, including older
persons and persons with disabilities.” – Roger Severino, OCR Director.
FISHING OR PHISHING
• E-mail phishing is often identified as the origin of
the breach
– Phishing is a fake e-mail or Website that attempts to
gather your personal information for identity theft or
fraud
– Phishing scams usually use a spoofed Website that
looks very much like
the real Website
What is Ransomware?
• Type of malware that prevents or limits users from
accessing their system, either by locking the system's
screen or by locking the users' files unless a ransom
is paid.
• More modern ransomware families, collectively
categorized as crypto-ransomware, encrypt certain
file types on infected systems and forces users to pay
the ransom through certain online payment methods
to get a decrypt key
BYOD
Positives
• Provide flexibility
• Streamlines communications
• Increases productivity due to familiarity with
the device
• Can save the practice or business money (i.e.
equipment, data plans, etc.)
• Allows for easier tele-working
• Preferred by most staff members
• Employees can use apps which they prefer for
productivity
Negatives
• Who is responsible for support or repair?
• Audit devices for security may be considered
intrusive and troublesome
• Device compatibility problems
• Problems with monitoring how and where PHI is
stored
• Encryption?
• Are non-authorized individuals using the device?
(i.e. kids playing games on phone)
• Theft?
• Weak passwords?
DO NOT
• Allow PHI to be written to the mobile
device
• Permit integration with insecure file
sharing or hosting services
• Set it and forget it (always include BYOD
in risk assessments)
Best Practices
• Ensure security updates on the phone are done
• Use multi-factor authentication (i.e. passwords and
biometrics)
• Encrypt the device using whole disk encryption (P.S. – a
lost or stolen encrypted device is not a reportable breach
under HIPAA)
• Train staff on appropriate apps and software as well as
cyber threats
• Force complexity in the passwords
• Perform risk assessments annually to identify threats
2024 Mobile Devices
• HHS issued guidance addressing the extent to which PHI is protected on mobile
devices. Although the HIPAA Privacy Rule and Security Rule (protecting PHI when
maintained or transmitted electronically) provide protections for the use and
disclosure of PHI held or maintained by covered entities and their business
associates, they do not address PHI accessed through or stored on personal
devices owned by individual patients.
• Example: although PHI maintained on electronic devices owned by a covered
entity would be protected from disclosure by HIPAA, once a patient downloads
that information to a personal device, HIPAA would no longer protect it.
• The guidance does provide tips to help individuals protect their own PHI, such as:
• Avoiding downloads of unnecessary or random apps to personal devices; and
• Avoiding (or turning off) permissions for apps to access an individual's location
data. (This reduces information about a person's activities that can be used by the
app or sold to third parties, such as the name and address of health care providers
a person visits.)
TEXTING and HIPAA
• Almost 90% of mobile phone users send SMS
text messages
• Texting has become entrenched in medical
care too
• Many physicians and medical professionals are
sending identifiable health information via
non-secure texting
TEXTING Positives in Healthcare
• Texting CAN provide great advantages in
health care
– Fast
– Easy
– Loud background noise problems are mitigated
– Bad signal issues mitigated
– Device neutral
TEXTING Negatives in Healthcare
• DO NOT TEXT APPOINTMENT REMINDERS WITHOUT
CONSENT IF SUBSTANCE ABUSE OR MENTAL HEALTH
• Reside on device and not deleted
• Very easily accessed
• Not typically centrally monitored by IT
• Can be compromised in transmission relatively easy
• HIPAA Privacy Rule requires disclosure of PHI to patient
(i.e. text message is used to make a judgement in patient
care)
• Patient Orders via Text Must Be Encrypted
Include Texting in Policies
• Administrative policy on workforce training
(i.e. minimum necessary)
• Appropriate use of texting
• Password protections and encryption
• Mobile device inventory
• Retention period (require immediate deletion
of PHI texts)
• Use of secure texting applications
THE END
Q&A
www.hipaa-consulting.com
Register Now

More Related Content

PDF
Upcoming New 2025 HIPAA Changes and Beyond
PPTX
Hipaa overview 073118
PDF
2024 HIPAA Compliance Training Guide to the Compliance Officers
PPTX
RAMOS, DAVID MARC_HIPAA PPT ONLY...............................
PDF
Medical Data Encryption 101
PDF
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
PPTX
How to avoid being caught out by HIPAA compliance?
PDF
CAHU EXPO Grove City, OH 2014
Upcoming New 2025 HIPAA Changes and Beyond
Hipaa overview 073118
2024 HIPAA Compliance Training Guide to the Compliance Officers
RAMOS, DAVID MARC_HIPAA PPT ONLY...............................
Medical Data Encryption 101
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
How to avoid being caught out by HIPAA compliance?
CAHU EXPO Grove City, OH 2014

Similar to Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices (20)

PDF
HIPAA Compliance For Small Practices
PPTX
Are You HIPAA Safe?
PPTX
Mha 690 week 1 discussion presentation
PPTX
Final copy 7
PDF
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
PPTX
how to really implement hipaa presentation
PPTX
health insurance portability and accountability act.pptx
PPTX
HIPAA Compliance Email
PPTX
Marc etienne week1 discussion2 presentation
PPTX
HIPAA Presentation
PPSX
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
PDF
Constructing a HIPAA-compliant healthcare app from scratch
PDF
Crowdsurf - HIPAA & FERPA Data Privacy Training.pdf
PPTX
The mobile health IT security challenge: way bigger than HIPAA?
PPTX
Small actions with big consequences Data Encryption a must do for Medical Pra...
PDF
HIPAA Compliance for Developers
PPTX
Confidentiality and information security33.pptx
PDF
HIPAA Compliant Cloud Computing, An Overview
PDF
How to Secure Your Medical Devices
HIPAA Compliance For Small Practices
Are You HIPAA Safe?
Mha 690 week 1 discussion presentation
Final copy 7
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
how to really implement hipaa presentation
health insurance portability and accountability act.pptx
HIPAA Compliance Email
Marc etienne week1 discussion2 presentation
HIPAA Presentation
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Constructing a HIPAA-compliant healthcare app from scratch
Crowdsurf - HIPAA & FERPA Data Privacy Training.pdf
The mobile health IT security challenge: way bigger than HIPAA?
Small actions with big consequences Data Encryption a must do for Medical Pra...
HIPAA Compliance for Developers
Confidentiality and information security33.pptx
HIPAA Compliant Cloud Computing, An Overview
How to Secure Your Medical Devices
Ad

More from Conference Panel (20)

PDF
HIPAA and the New Rules Regarding Reproductive Health Care
PDF
Prepare for the 2025 ICD-10-CM Code Updates
PDF
3-Hour FDA Audit Preparation Virtual Seminar
PDF
21 CFR Part 11 Electronic Records and Signatures FDA Compliance
PDF
USDA Final Genetically Modified Organism (GMO) Label Rule
PDF
Chronic Care Management What do you need to know to Design and Implement Succ...
PDF
FDA Best Audit Practices – Get Ready For The Inspection That Is Coming
PDF
Master CMS Medicare PECOS 2.0: New Enrollment and Validation Portal 2024
PDF
Corrective and Preventive Action (CAPA): Our Most Important Quality Process
PDF
G2211 and New 2024 Billing Opportunities
PDF
Understand and Apply ISO New Climate Change Requirements
PDF
Navigating Most Problematic CMS Standards - Hospital Restraint and Seclusion
PDF
DEI at the Hospital - Addressing Bias in Medical Staff Credentialing and Peer...
PDF
Medicare and Medicaid Managed Care Enrollments in 2024
PDF
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
PDF
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
PDF
The 2024 Prior Authorization Process For Medical Providers
PDF
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
PDF
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
PDF
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
HIPAA and the New Rules Regarding Reproductive Health Care
Prepare for the 2025 ICD-10-CM Code Updates
3-Hour FDA Audit Preparation Virtual Seminar
21 CFR Part 11 Electronic Records and Signatures FDA Compliance
USDA Final Genetically Modified Organism (GMO) Label Rule
Chronic Care Management What do you need to know to Design and Implement Succ...
FDA Best Audit Practices – Get Ready For The Inspection That Is Coming
Master CMS Medicare PECOS 2.0: New Enrollment and Validation Portal 2024
Corrective and Preventive Action (CAPA): Our Most Important Quality Process
G2211 and New 2024 Billing Opportunities
Understand and Apply ISO New Climate Change Requirements
Navigating Most Problematic CMS Standards - Hospital Restraint and Seclusion
DEI at the Hospital - Addressing Bias in Medical Staff Credentialing and Peer...
Medicare and Medicaid Managed Care Enrollments in 2024
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
The 2024 Prior Authorization Process For Medical Providers
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
Ad

Recently uploaded (20)

PPTX
Wound care MNEMONICS MNEMONICS health care
PPTX
1. FAMILY PLANNING-1-2, nursing students
PPT
DENGUE_FEVER_&_DHF.pptfffffffffhffffffffffff
PPTX
ACUTE CALCULAR CHOLECYSTITIS: A CASE STUDY
PPTX
Management Basics Applied to Nursing.pptx
PPTX
FOOD IN RELATION TO NUTRITION AND HEALTH
PDF
health promotion and maintenance of elderly
PPTX
ANALGESIC AND ANTI-INFLAMMssssssATORY DRUGS.pptx
PDF
Fundamentals Final Review Questions.docx.pdf
PDF
Gastro Retentive Drug Delivery System.pdf
PDF
Zuri Health Pan-African Digital Health Innovator.pdf
PDF
Art Therapy Exercises and Worksheets.pdf
PPTX
MEDICAL NURSING. Endocrine Disorder.pptx
PPTX
OSTEOMYELITIS and OSTEORADIONECROSIS.pptx
PPTX
concepts of smart hospitals-details with applications
PDF
ENT MedMap you can study for the exam with this.pdf
PPTX
AUTOIMMUNITY - Note for Second Year Pharm D Students
PPT
Immune System presentation for high school
PPTX
Signs of Autism in Toddlers: Pediatrician-Approved Early Indicators
PDF
mycobacterial infection tuberculosis (TB)
Wound care MNEMONICS MNEMONICS health care
1. FAMILY PLANNING-1-2, nursing students
DENGUE_FEVER_&_DHF.pptfffffffffhffffffffffff
ACUTE CALCULAR CHOLECYSTITIS: A CASE STUDY
Management Basics Applied to Nursing.pptx
FOOD IN RELATION TO NUTRITION AND HEALTH
health promotion and maintenance of elderly
ANALGESIC AND ANTI-INFLAMMssssssATORY DRUGS.pptx
Fundamentals Final Review Questions.docx.pdf
Gastro Retentive Drug Delivery System.pdf
Zuri Health Pan-African Digital Health Innovator.pdf
Art Therapy Exercises and Worksheets.pdf
MEDICAL NURSING. Endocrine Disorder.pptx
OSTEOMYELITIS and OSTEORADIONECROSIS.pptx
concepts of smart hospitals-details with applications
ENT MedMap you can study for the exam with this.pdf
AUTOIMMUNITY - Note for Second Year Pharm D Students
Immune System presentation for high school
Signs of Autism in Toddlers: Pediatrician-Approved Early Indicators
mycobacterial infection tuberculosis (TB)

Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices

  • 1. Because your patients come first. Because your patients come first. Because your patients come first. HIPAA – Texting/Emailing/BYOD Myths vs Realities Brian L. Tuttle, CPHIT, CHA, CHP, CBRA, CISSP, CCNA, Net + www.hipaa-consulting.com
  • 2. Again, the HIPAA Privacy Rule vs. HIPAA Security Rule – what’s the difference? • HIPAA Privacy Rule - defined as the right of an individual to keep his/her individual health information from being disclosed. Privacy encompasses controlling who is authorized to access patient information; and under what conditions patient information may be accessed, used and/or disclosed to a third party. The HIPAA Privacy Rule applies to ALL protected health information. • HIPAA Security Rule - mechanisms in place to protect the privacy of electronic health information - includes the ability to control access to patient information, as well as to safeguard patient information from unauthorized disclosure, alteration, loss or destruction. Security is typically accomplished through operational and technical controls. Since so much PHI is now stored and/or transmitted by computer systems, the HIPAA Security Rule was created to specifically address ELECTRONIC protected health information.
  • 3. PRIVACY RULE •The Privacy Rule covers all Protected Health Information(PHI) •This is information that can identify the patient to the health record •De-identified Information does not have to be protected by HIPAA •Privacy Rule is concerned with guarding the confidentiality of PHI in ALL formats; paper, oral or electronic.
  • 4. Security Rule Enforcement began on April 21, 2006 The Security Rule complements the Privacy Rule. • While the Privacy Rule pertains to all Protected Health Information (PHI) including paper and electronic, the Security Rule deals specifically with Electronic Protected Health Information (EPHI). It lays out three types of security safeguards required for compliance: • Administrative • Physical • Technical The Rule identifies various security standards, and for each standard, it names both required and addressable implementation specifications. Required specifications must be adopted and administered as dictated by the Rule. Covered entities and business associates can evaluate their own situation and determine the best way to implement addressable specifications. RISK ASSESSMENT FOR HIPAA SECURITY MUST BE DONE
  • 5. Business Associate (Definition) • Business Associates (BA’s) are individuals or entities who create, receive, maintain, or store private health information on behalf of a covered entity. • Example: Answering Services, Medical Transcription, IT groups, Billing companies, shredding services are clearly under the auspices of “Business Associate”
  • 6. COMMON HIPAA VIOLATIONS • Clinical documentation causing HIPAA violations – Selecting the wrong person to CC on an e-mail containing PHI – Selecting the wrong patient name – Selecting the wrong account number, medical record number, or subject ID – Entering the wrong supervising or attending physician – Sharing information about a patient with others when there is no reason for them to know – Failure to immediately report any potential breach or security incident to the compliance officer or your supervisor – Improper disposal of materials containing PHI
  • 7. TELEMEDICINE Quote from Roger Severino (former OCR Director) “We are empowering medical providers to serve patients wherever they are during this national public health emergency. We are especially concerned about reaching those most at risk, including older persons and persons with disabilities.” – Roger Severino, OCR Director.
  • 8. FISHING OR PHISHING • E-mail phishing is often identified as the origin of the breach – Phishing is a fake e-mail or Website that attempts to gather your personal information for identity theft or fraud – Phishing scams usually use a spoofed Website that looks very much like the real Website
  • 9. What is Ransomware? • Type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. • More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key
  • 10. BYOD
  • 11. Positives • Provide flexibility • Streamlines communications • Increases productivity due to familiarity with the device • Can save the practice or business money (i.e. equipment, data plans, etc.) • Allows for easier tele-working • Preferred by most staff members • Employees can use apps which they prefer for productivity
  • 12. Negatives • Who is responsible for support or repair? • Audit devices for security may be considered intrusive and troublesome • Device compatibility problems • Problems with monitoring how and where PHI is stored • Encryption? • Are non-authorized individuals using the device? (i.e. kids playing games on phone) • Theft? • Weak passwords?
  • 13. DO NOT • Allow PHI to be written to the mobile device • Permit integration with insecure file sharing or hosting services • Set it and forget it (always include BYOD in risk assessments)
  • 14. Best Practices • Ensure security updates on the phone are done • Use multi-factor authentication (i.e. passwords and biometrics) • Encrypt the device using whole disk encryption (P.S. – a lost or stolen encrypted device is not a reportable breach under HIPAA) • Train staff on appropriate apps and software as well as cyber threats • Force complexity in the passwords • Perform risk assessments annually to identify threats
  • 15. 2024 Mobile Devices • HHS issued guidance addressing the extent to which PHI is protected on mobile devices. Although the HIPAA Privacy Rule and Security Rule (protecting PHI when maintained or transmitted electronically) provide protections for the use and disclosure of PHI held or maintained by covered entities and their business associates, they do not address PHI accessed through or stored on personal devices owned by individual patients. • Example: although PHI maintained on electronic devices owned by a covered entity would be protected from disclosure by HIPAA, once a patient downloads that information to a personal device, HIPAA would no longer protect it. • The guidance does provide tips to help individuals protect their own PHI, such as: • Avoiding downloads of unnecessary or random apps to personal devices; and • Avoiding (or turning off) permissions for apps to access an individual's location data. (This reduces information about a person's activities that can be used by the app or sold to third parties, such as the name and address of health care providers a person visits.)
  • 16. TEXTING and HIPAA • Almost 90% of mobile phone users send SMS text messages • Texting has become entrenched in medical care too • Many physicians and medical professionals are sending identifiable health information via non-secure texting
  • 17. TEXTING Positives in Healthcare • Texting CAN provide great advantages in health care – Fast – Easy – Loud background noise problems are mitigated – Bad signal issues mitigated – Device neutral
  • 18. TEXTING Negatives in Healthcare • DO NOT TEXT APPOINTMENT REMINDERS WITHOUT CONSENT IF SUBSTANCE ABUSE OR MENTAL HEALTH • Reside on device and not deleted • Very easily accessed • Not typically centrally monitored by IT • Can be compromised in transmission relatively easy • HIPAA Privacy Rule requires disclosure of PHI to patient (i.e. text message is used to make a judgement in patient care) • Patient Orders via Text Must Be Encrypted
  • 19. Include Texting in Policies • Administrative policy on workforce training (i.e. minimum necessary) • Appropriate use of texting • Password protections and encryption • Mobile device inventory • Retention period (require immediate deletion of PHI texts) • Use of secure texting applications