HIPAA COMPLIANCE: Securing Electronic Communications

By Carol Miller RN MBA

***

***

New-Wave Technology

To help hospitals and health systems comply with Health Insurance Portability and Accountability Act regulations, best practices are emerging for securing all electronic communication – cloud, wireless, and texting –  of protected health information.  These new technologies will continually be evolving with hospitals, providers and patients move to new means of communication.  Below is a description of how each are impacted by HIPAA.

Cloud Solutions.  Cloud solutions are becoming a needed commodity in treating patients today but also present a risk to privacy and security violation.  Despite the advantages of cloud computing, organizations are often hesitant to use it because of concerns about security and compliance. Specifically, they fear potential unauthorized access to patient data and the accompanying liability and reputation damage resulting from the need to report HIPAA breaches. While these concerns are understandable, a review of data on HIPAA breaches published by the HHS shows that these concerns are misplaced.  In fact, by using a cloud-based service with an appropriate security and compliance infrastructure, a facility can significantly reduce its compliance risk.

Because HIPAA compliance involves stringent privacy and security protections for electronic health information (PHI), many cloud providers are balking at signing new Business-Associate agreements. Most cloud-technology providers, such as Box and Dropbox, do not include the built-in privacy protections that guarantee HIPAA compliance. Because many cloud storage companies store plaintext data on their servers, PHI is especially vulnerable to breaches and compliance violations.

HIPAA CLOUD: https://medicalexecutivepost.com/2016/11/22/hipaa-cloud-solutions/

Mobility Solutions.  The recent launches of Apple Health and Google Fit have stirred a lot of interest in health application development.  It is important that hospitals and providers understand the laws around PHI and HIPAA compliance for any healthcare-focused mobile application or software.  While not all healthcare applications fall under HIPAA rules, those that collect, store, or share personally identifiable health information with covered entities (such as hospitals and providers) must be HIPAA-compliant. 

For years, hospitals have wanted to bring computers into exam rooms, waiting rooms, and treatment rooms to eliminate hard-to-read patient charts, making sure everyone treating the patient was seeing the same information, assuring that everything was recorded as it occurred, and enabling doctors, nurses, and technicians to stay connected to vital information and services wherever they were throughout the hospital.  Many hospitals have adopted Computer on Wheels (COWs) or tablets but many of these were hard to use, had poor touchscreen interface and did not last long on a battery.  Ipads seem to be the logical replacement as long as the iPad can comply with HIPAA rules.

HIPAA was written nearly 30 years ago, before mobile health applications were ever envisioned.  Because of this, some areas of the law make it hard to determine which applications must be HIPAA- compliant and which are exempt.  Considering the numerous ways security breaches can occur with a mobile device, it is not wonder that HHS is very leery about how PHI is handled on smartphones, wearables, and portable devices.

If the applications are going to send or share health data to a hospital, doctor or other covered entity, it MUST be HIPAA-compliant.  Adhering to the Privacy and Security Rules of HIPAA is essential, especially considering the dangers that come with handling protected health data on a device.  Examples include:

  • Phones, tablets, and wearables can be easily stolen and lost, meaning PHI could be compromised
  • Social media and email are easily accessible by the device, making it easy for users to post information that breaches HIPAA privacy laws.
  • Push notifications and other user communications can violate HIPAA laws if they contain PHI
  • Users may intentionally or unintentionally share personally identifiable information, even if the application’s intended use doesn’t account for it
  • Not all users take advanage of the password-protected screen-lock feature, making data visible and accessible to anyone who comes in contact with the device
  • Devices like the iPhone do not include physical keyboards, so users are more likely to use basic passwords that are not as safe as complex options.

This protected health information can include everything from medical records and images to scheduled appointment dates.  Regardless of the device, it is important to take all the steps possible to comply with HIPAA guidelines.

MOBILE HIPAA: https://medicalexecutivepost.com/2016/02/06/mobile-hipaa-solutions-for-hospital-health-systems/

Texting. Text (or SMS) messaging has become nearly ubiquitous on mobile devices. According to one survey, approximately 72 percent of mobile phone users send text messages. Clinical care is not immune from the trend, and in fact physicians appear to be embracing texting on par with the general population. Another survey found that 73 percent of physicians text other physicians about work. 

(Source:  Journal of AHIMA, “HIPAA Compliance for Clinician Texting”, by Adam Green, April 2012)

Texting can offer providers numerous advantages for clinical care. It may be the fastest and most efficient means of sending information in a given situation, especially with factors such as background noise, spotty wireless network coverage, lack of access to a desktop or laptop, and a flood of e-mails clogging inboxes. Further, texting is device neutral—it will work on personal or provider-supplied devices of all shapes and sizes. Because of these advantages, physicians may utilize texting to communicate clinical information, whether authorized to do so or not.

All forms of communication involve some level of risk. Text messaging merely represents a different set of risks that, like other communication technologies, needs to be managed appropriately to ensure both privacy and security of the information exchanged.

Text messages may reside on a mobile device indefinitely, where the information can be exposed to unauthorized third parties due to theft, loss, or recycling of the device. Text messages often can be accessed without any level of authentication, meaning that anyone who has access to the mobile phone may have access to all text messages on the device without the need to enter a password.

Texts also are generally not subject to central monitoring by the IT department. Although text messages communicated wirelessly are usually encrypted by the carrier, interception and decryption of such messages can be done with inexpensive equipment and freely available software (although a substantial level of sophistication is needed.  If text messages are used to make decisions about patient care, then they may be subject to the rights of access and amendment. There is a risk of noncompliance with the privacy rule if the covered entity cannot provide patients with access to or amend such text messages.

According to 2012 data from CTIA–The Wireless Association, U.S. citizens alone exchange nearly 200 billion text messages every month. So it’s not surprising that an increasing number of clinicians are using text messaging to exchange clinical information, along with a wide range of other modes — smartphones, pagers, computerized physician order entry, emails, etc. Electronic communication is certainly faster, can be more efficient, enhances clinical collaboration and enables clinicians to focus on patient care. But with these benefits comes an increased risk of security breaches.

HIPAA TEXTING: https://medicalexecutivepost.com/2016/11/22/hipaa-cloud-solutions/

(Source:  Clarifying the Confusion about HIPAA – Compliant Texting, by Megan Hardiman and Terry Edwards, May 2013)

Unfortunately, vendor hype about the Health Insurance Portability and Accountability Act is causing many hospitals and health systems to implement stop-gap measures that address part — but not all — of a problem. To identify all vulnerabilities, health care leaders need to consider not only text messaging, but all mechanisms by which protected health information in electronic form is transmitted — as well as the security of those mechanisms.

Mobile device-to-mobile device SMS text messages are generally not secure because they lack encryption.  The sender does not know with certainty that his or her message is indeed received by the intended recipient.  In addition, telecommunications vendor/wireless carrier may store the text messages.  Recent HHS guidance indicates text messaging, as a means of communicating PHI, can be permissible under HIPAA depending in large part on the adequacy of the controls used.  A hospital or provider may be approved for texting after performing a risk analysis or implementing a third-party messaging solution that incorporates measures to establish a secure communication platform that will allow texting on approved mobile devices.

A study reported in Computer World in May 2013 by the Ponemon Institute with 577 healthcare and It professional in facilities that ranged from fewer than 100 beds to over 500 beds stated that fifty-one percent of the respondents felt HIPAA compliance requirements can be a barrier to providing effective patient care.  Specifically HIPAA reduces time available for patient care (85% of the respondents), makes access to electronic patient information difficult (79% of the respondents) and restricts the use of electronic mobile communications (56% of the respondents).  The study stated “respondents agreed that the deficient communications tools currently in use decrease productivity and limit the time doctors have to spend with patients. “ They also stated “they recognized the value of implementing smartphones, text messaging and other modern forms of communications, but cited overly restrictive security policies as a primary reason why these technologies were not used.”  Clinicians in the survey stated that only 45% of each workday is spent with patients; the remaining 55% is spent communicating and collaborating with other clinicians and using the electronic medical record and other clinical IT systems. 

Several other statements made were:

  • Because of the need for security, hospitals and other healthcare organizations continue to use older, outdate technology such as pagers, email and facsimile machines.  The use of older technology can also delay patient discharges – now taking an average of 102 minutes.
  • The Ponemon Institute estimated that the lengthy discharge process costs the U.S. hospital industry more than $3.189 billion a year in lost revenue, with another $5 billion lost through decrease doctor productivity and use of outdated technology.  Secure text messaging could cut discharge time by 50 minutes.   

(Source:  Computer World, “HIPAA rules, outdate tech cost U.S. hospitals $3.38 B a year”, by Lucas Mearian, May, 2013)

Several suggestions offered for these preferred mobile devises are:  1) ensure encryption and access to individuals who need to have access; 2) use secure texting applications; and 3) even consider alerting employees with warnings before they send an email or share files that lets them know they are liable for the information sent.

COMMENTS APPRECIATED

EDUCATION: Books

Refer, Like and Subscribe

***

***

Mental Health Entrepreneurial Start-Up Companies

Top Ten [10] Venture Capital Backed

By Dr. David Edward Marcinko MBA MEd CMP

By Carol Miller RN MBA

***

***

Mental Health White Paper:

FILE: https://medicalexecutivepost.com/wp-content/uploads/2019/05/mental-health-dr.-marcinko.pdf

COMMENTS APPRECIATED

Thank You

***

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

LINK: https://www.routledge.com/Risk-Management-Liability-Insurance-and-Asset-Protection-Strategies-for/Marcinko-Hetico/p/book/9781498725989

***

HIPAA Cloud Solutions?

Join Our Mailing List 

On New-Wave Technology

Carol S. Miller

By Carol Miller RN MBA

To help hospitals and health systems comply with Health Insurance Portability and Accountability Act regulations, best practices are emerging for securing all electronic communication – cloud, wireless, and texting – of protected health information.

These new technologies will continually be evolving with hospitals, providers and patients move to new means of communication.  Below is a description of one.

Cloud Solutions

Cloud solutions are becoming a needed commodity in treating patients today but also present a risk to privacy and security violation.  Despite the advantages of cloud computing, organizations are often hesitant to use it because of concerns about security and compliance.

Specifically, they fear potential unauthorized access to patient data and the accompanying liability and reputation damage resulting from the need to report HIPAA breaches. While these concerns are understandable, a review of data on HIPAA breaches published by the HHS shows that these concerns are misplaced.

In fact, by using a cloud-based service with an appropriate security and compliance infrastructure, a facility can significantly reduce its compliance risk.

***

cloud-tech-1

***

Business-Associate Agreements

Because HIPAA compliance involves stringent privacy and security protections for electronic health information (PHI), many cloud providers are balking at signing new Business-Associate agreements.

Assessment

Most cloud-technology providers, such as Box and Dropbox, do not include the built-in privacy protections that guarantee HIPAA compliance. Because many cloud storage companies store plaintext data on their servers, PHI is especially vulnerable to breaches and compliance violations. 

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

***

Continued Barriers and Issues with eHRs

More on the electronic documentation of medical information

By Carol S. Miller BSN, MBA, PMP

Many providers of health care are moving forward with electronic medical records [eMRs] and documentation of related information.

However,  there are still significant perceived and real barriers impacting some doctors and practitioners of care in moving forward with this process.

Here’s why in four brief points:

  • High Start-up Cost is probably the foremost barrier or concern of providers.  The EHR product, hardware, initial and annual software license, training both initially during implementation and ongoing, and other peripherals,  and the follow on module updates, maintenance, and/or replacements are all associated with a cost that can be quite an expensive proposition especially to a small provider practice.
  • Loss of productivity does occur as the staff and providers learn the new system and associated process changes in day-to-day operation.
  • There are many EHR products in the marketplace.  Providers are faced with decision points on which vendor system to purchase and the degree of modules needed to successfully support the clinical work within that practice.  In general, technical integration such as uncertain quality of system purchased, functionality issues, lack of integration with other applications and other like issues can impact a smooth transition to EHRs and actually create more problems and cost than the existing process in place.  In addition, incompatibility between systems (user interface, system architecture and functionality) can vary between suppliers’ products.
  • Certification, security, ethical matters, privacy and confidentiality issues are still a high concern.  The increased portability and accessibility of electronic medical records may increase the ease with which they can be accessed and stolen by unauthorized persons or unscrupulous users.  Even today large-scale breaches in confidential records occur and others can easily happen whena more integrated connectivity exists between systems, providers, hospitals, and wireless devices.  Continued concerns about security contribute to the widespread adoption of EHRs still are pervasive in the provider community.  Still lingering is the privacy concern and the adequate protection of individual records being managed electronically.  As an example, with an electronic record in a hospital setting, there can easily be over 100 individuals from doctors, nurses, technicians, admissions, quality control, billing staffing and many more who have access to at least part of a patient’s record during an average hospital stay.  In addition, there are multiple individuals at payers, clearinghouses, research firms, and others that have access to patient information at any given time.

Order Book Now [more from this author]

Healthcare Organizations” [Management Strategies, Tools, Techniques and Case Studies].

In-Process from: (c) Productivity Press 2012

http://www.crcpress.com/product/isbn/9781439879900

About the Author

Carol S. Miller has an extensive healthcare background in operations, business development and capture in both the public and private sector. Over the last 10 years she has provided management support to projects in the Department of Health and Human Services, Veterans Affairs, and Department of Defense medical programs. In most recent years, Carol has served as Vice President and Senior Account Executive for NCI Information Systems, Inc., Assistant Vice President at SAIC, and Program Manager at MITRE. She has led the successful capture of large IDIQ/GWAC programs, managed the operations of multiple government contracts, interacted with many government key executives, and increased the new account portfolios for each firm she supported.

She earned her MBA from Marymount University; BS in Business from Saint Joseph’s College, and BS in Nursing from the University of Pittsburgh. She is a Certified PMI Project Management Professional (PMP) (PMI PMP) and a Certified HIPAA Professional (CHP), with Top Secret Security clearance issued by the DoD in 2006. Ms. Miller is also a HIMSS Fellow, Past President and current Board member and an ACT/IAC Fellow.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors

Product DetailsProduct DetailsProduct Details

Product Details  Product Details

   Product Details