RSI Security

A Beginner’s Guide to HITECH in Healthcare

Email Security Tips

The HITECH Act changed how patient health information is processed and stored. It encourages healthcare organizations to transition from paper to electronic files allowing patients to access their records in a secure online environment. It also affected HIPAA and how its rules are enforced. In short, the HITECH Act benefited patients by making it easier for them to access their records while improving and enforcing security protocols.

This is the simple explanation but there is more to understanding HITECH, its goals, and requirements for certification. This guide covers everything healthcare organizations, third-party associates, and patients need to know about the HITECH Act.

 

What is the HITECH Act?

The Health Information Technology for Economic and Clinical Health Act (HITECH) is part of a stimulus package that was passed in 2009. Sometimes referred to as HIPAA 2, the act has several goals that address technology and security. This includes encouraging healthcare organizations to adopt technology, especially regarding patients’ files. The other goal addresses HIPAA compliance, especially where third-party associates are concerned.

Also Read : Main Goals of HITECH: Everything You Need to Know

The HITECH Act is designed for patients. It encourages healthcare organizations to transition from paper to electronic patient files. The cost to do so often made organizations reluctant to switch, but the HITECH Act gives organizations financial incentives that counter the expense. Electronic files are easier for patients to access and be shared with different healthcare providers. This can improve patient care.

HITECH also works with HIPAA. It requires organizations and their associates to be compliant with HIPAA. Previously, loopholes existed that made it easy to avoid non-compliance fees. Healthcare organizations could plead ignorance if a violation was caused by a non-compliant associate. Patient protected health information could be breached, without any repercussions against the organization. HITECH closed these loopholes and requires all parties to be HIPAA certified. With HITECH, patients have access to their information and it is protected from breaches. 

 

Assess your HIPAA / HITECH compliance

 

HITECH Compliance Rules

HITECH encourages healthcare organizations to transition to electronic patient files, but it also emphasizes the importance of and needs for adequate security. This is where the HITECH Act strengthens the HIPAA Act. An organization also needs to be HIPAA certified before it is HITECH compliant.

For an organization to be compliant several data components will be assessed for security, response, and maintenance. The following HITECH compliance rules apply to healthcare organizations and any third-party associate that manages or stores patient protected health information. This includes billing and claims houses. 

One of the primary HITECH rules is complete compliance with breach notification. A breach is when protected health information (PHI) is accessed or stolen from a non-authorized entity. Before HITECH, organizations often did not notify patients that their information had been breached. Now, organizations must notify everyone affected in a security breach within 60 days of its occurrence. If the breach included 500 people or more, the Department of Health and Human Services must also be notified within the 60-day timeframe. 

Often compliance regulations included in the breach notification rule include the following.

There are exceptions to the breach rule, even if security was violated. These can include if the protected information was disclosed to an authorized recipient in error or if the data was encrypted and deemed unreadable. There is also a threshold that determines the level of harm the security breach poses to affected individuals. This is also a minor downside to the HITECH Act, healthcare organizations affected by the breach determine the level of potential harm. 

 

Audits

The HITECH Act gives funding to federal regulators to perform routine audits on the security systems used by healthcare organizations. These audits will occur regardless if there was a breach or not. The audit simply assesses if the organization is meeting all HIPAA security and privacy rules. Healthcare organizations must agree to the audits if they want to be in compliance. 

 

Minimum disclosure rule

HITECH compliance limits the uses and sharing of a patient’s protected health information with other entities. This was primarily put into effect to limit security risks. It also ties in with the marketing compliance rule.

 

Marketing compliance rule

HIPAA previously allowed healthcare organizations to accept fees from marketing companies for basic patient information. Since the marketing companies were considered to be a third-party associate, sharing patient information was legal. HITECH has limited the sharing off patient information to companies that manufacture the patient’s prescribed medications. Fees to healthcare organizations from marketers are also capped, though only in broad terms. This is currently under review and regulations are expected to be released in the future. 

As previously stated, HITECH compliance rules center around patients and security regarding the sharing and storage of their protected health information. Organizations that aren’t compliant face stiff penalties under the HITECH Act

 

Penalties for HITECH Non-Compliance

Before HITECH, healthcare organizations and non-compliant associates could avoid or ignore breach penalties. This has changed, and now both entities must be HITECH compliant or pay penalties based on the level of the security breach and their response to it. There are four tiers with a maximum penalty of 1.5 million for willful neglect of HIPAA security rules and minimal effort to resolve the problem. The lowest fine is $100 for unknowingly violating HIPAA rules.

The four tiers used to determine the level of non-compliance the corresponding penalty is,

When it comes to assessing fines, the minimum is usually applied to first offenses and increasing with each documented security breach. 

Within HHS is the Office of Civil Rights. This is the branch that is responsible for enforcing breach notification rules. If the healthcare organization is found to be non-compliant HHS can assess and determine penalty amounts and patients affected can file civil lawsuits against the entity. This stricter enforcement was one of the goals of the HITECH Act. 

How to Meet HITECH Compliance Rules

In order for healthcare organizations to avoid costly penalties, they must be HITECH and HIPAA compliant. The first step in achieving HITECH compliance is being HIPAA certified. This means that electronic patient records are protected against security breaches. Organizations must have security protocols clearly outlined and implemented by employees that understand and are familiar with the technology across all facilities and third-party associates. This is a major requirement for HIPAA compliance

HITECH compliance is separated into three phases, each one supports the other to ensure patient access to medical records in a secure online environment.  

 

Phase 1: Rules for phase one depend on the type of healthcare organization. Not all standards will apply to every healthcare provider. In this case, the provider will be exempt from that standard.

The core objectives are used to assess patient files and how quickly information is updated, along with the measures taken to secure EHRs. 

 

Phase 2: The second phase covers EHRs (electronic health records). It assesses their use and security protocols that are in place. HITECH compliance requires organizations to use EHRs or their computer resources to:

The second phase focuses mainly on security, while also addressing patient’s rights to privacy and access. It encourages routine risk assessments, along with strong encryption codes.

 

Phase 3: The third phase deals with the operability of the EHRs, and the ability to share the health records with patients and other authorized professionals. It assesses the protocols used in the first and second stages for workability and improvements.

The third phase focuses on improvements made in security protocols and patient access to health information. It also addresses EHRs and the incentives provided in the HITECH Act that encourage all healthcare facilities to switch to electronic patient files. 

Meeting the standards outlined in the three phases, along with HIPAA certification are required for HITECH compliance

HITECH compliance does resolve many technical security problems, but there will always be the possibility of human error. This is why routine assessments and regular maintenance are a part of the compliance requirements. Passwords on employee devices can be weak putting the network at risk. Patients can also access an unattended healthcare organization’s computer. If access to other patients’ records is obtained this is a breach. There are tools that can help prevent security breaches due to some errors, and CSF certified firms like RSI Security can provide additional information. 

 

How HITECH Affects Healthcare Workers

The HITECH Act not only affects patients but also healthcare professionals. It gives patients easier access to their health records, prevents organizations from selling information to marketers, and ensures adequate security protocols are in place. How the act affects healthcare organizations is a little different.

Switching to electronic files and improving security measures falls on healthcare professionals. Transcribing patient’s health information into an electronic format takes time. Most healthcare workers do not know how to implement security protocols or set up a database that patients can access.

This has created jobs for IT professionals, and the HITECH Act requires that all third-party individuals or organizations be certified. This helps to ensure that anyone with access to protected health information knows how to keep it secure and out of reach from unauthorized individuals. 

The act has also made it easier for healthcare professionals to share patient information with other authorized entities. This can improve a patient’s healthcare and help streamline treatment between different physicians. 

 

HIPAA and HITECH Compliance

The Omnibus Rule joined HIPAA and HITECH on the same legislation. According to the standards healthcare providers had to be HIPAA certified before they would be considered HITECH compliant. To prevent healthcare organizations from continuing to ignore non-compliance fees, the HITECH Act dramatically increased them.

To avoid penalties and stay HITECH compliant, call to ask about an assessment from RSI Security. It will locate any weaknesses and resolve the problem before non-compliance becomes an issue. 

 

 


Download Our Complete Guide to Navigating Healthcare Compliance Whitepaper

Not sure if your HIPAA or healthcare compliance efforts are up to snuff? Unsure about where to even start? Download RSI Security’s comprehensive guide to navigating the HIPAA and healthcare compliance labyrinth. Upon filling out this brief form you will receive the whitepaper via email.

Exit mobile version