What is HITECH? Is it a concern for CIOs
What are the HIPAA Implications?
The Health Information Technology for Economic and Clinical Health (HITECH) Act requires organizations to be responsible for protecting patient records and health information. The Act extends the scope of privacy and security protections available under HIPAA, increases potential legal liability for non-compliance and provides more enforcement of HIPAA rules. The HITECH Act seeks to streamline healthcare and reduce costs through the use of health information technology, including the adoption of electronic health records.
A protected health information (PHI) data breach is any unauthorized use, access or disclosure of PHI that violates the HIPAA Privacy Rule and poses significant financial, reputational or other harmful risks to an individual.
The process for determining whether a breach has occurred.
- Determine whether there has been an violation of PHI under the Privacy Rule.
- Determine and document whether the violation compromises the security or privacy of the PHI in a manner that poses a significant financial, reputational or other harmful risks to the individual.
- Determine whether the incident falls under one of the exceptions to the breach definition.
There are a number of considerations to help determine the risk involved. In a risk assessment, covered entities (CEs) will need to answer the following questions:
- Was information protected by encryption?
- Who used the information and to whom was the information disclosed?
- What immediate steps were taken to mitigate the violation by use or disclosure?
- Was the disclosed PHI returned prior to being accessed?
- What was the type and amount of PHI involved in the disclosure?
- What is the risk of re-identification of PHI contained in a limited data set?
The options to acquire the template include:
Order DRP BCP Security Bundle Download Sample