RSI Security

HIPAA Security Risk Assessment – What you Need to Know

Whether your business is directly involved in healthcare or indirectly connected to the industry through trade, there’s a good chance you’ll need to comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Enforced by the US Department of Health and Human Services (HHS), HIPAA exists to protect the vast amounts of sensitive information stored, shared, and otherwise processed across the industry. Some of the trickier factors you’ll need to account for are the HIPAA risk assessment requirements—read on to learn precisely how to meet them.

 

How to Conduct a HIPAA Security Risk Analysis

The risk assessment protocols are among the most stringent and challenging elements of HIPAA compliance, especially for smaller businesses newer to the framework. Beyond controlling access to sensitive data, companies also need to scan for and mitigate all threats.

This blog will break down everything you need to know about HIPAA risk analysis, including:

By the end of this blog, you’ll have all the knowledge and resources necessary to implement the Security Rule and all of HIPAA to the fullest. But first, let’s cover whether it even applies to you.

 

Request a Free Consultation

 

Do You Need to Conduct a HIPAA Risk Analysis?

It’s easy to assume that a regulatory framework like HIPAA applies to only a select few kinds of business, such as doctors’ private practices and hospitals. However, the list of covered entities to which HIPAA applies includes all providers, including private practices, group care facilities, and even pharmacies of all types. It also extends to administrators of healthcare plans and what the HHS calls “health clearinghouses,” which translate health data into or out of standard forms.

Even if you’re just a vendor or contractor for one of these entities, HIPAA may still apply to you. In 2009, the Health Information Technology for Economic and Clinical Health Act (HITECH) was passed, extending HIPAA protections to business associates of covered entities. Now, there are special contracts for business associates that guarantee that all parties in the relationship help uphold compliance.

Understanding the HIPAA Security Rule

To fully understand the HIPAA risk assessment requirements, you’ll need to grasp the Security Rule, which contains risk analysis. The Security Rule itself builds upon the Privacy Rule, which we’ll detail below. Its primary function is to extend the protections for all medical and financial records of clients beyond access and disclosure to all reasonable vectors of misuse. It intensifies and expands the scope of all HIPAA protections for this class of data.

This information, defined in the Privacy Rule as “protected health information” (PHI), is what all HIPAA rules and protocols strive to protect. Another major impact of HITECH is the extension of Privacy and Security Rule protections to all electronic PHI (ePHI), beyond just hard copies of files. To that effect, the Security Rule general requirements, safeguards, and risk analysis protocols all apply unilaterally to all PHI and ePHI. Let’s take a closer look at them.

 

HIPAA Security Rule General Requirements

The HIPAA security risk assessment protocols fit squarely into the “general rules,” or sub-rules, of HIPAA Security. And, per the HHS’s Security Rule Summary, these break down as follows:

HIPAA security assessment refers to the second and third of these sub-rules, as it is the primary way in which “reasonably anticipated threats” are identified and prevented.

 

HIPAA Security Rule Required Safeguards

The other primary controls dictated by the Security Rule, besides the risk assessment protocols, are the categories of safeguards. Per the Security Rule Summary, these break down as follows:

These controls set the stage for HIPAA security assessment by reducing the overall potential for risks or vulnerabilities while establishing how the system is supposed to function at a baseline.

 

Implementing HIPAA Security Risk Analysis

As noted above, security risk analysis or assessment is another critical part of the Security Rule more broadly. Per the Security Rule Summary, its primary objectives are straightforward:

The HHS has collaborated with other security experts to develop tools and resources facilitating HIPAA compliant risk assessment. One example is the NIST Security Toolkit, with the National Institute for Standards and Technology (NIST). Another is the Security Risk Assessment Tool (SRA), from The Office of the National Coordinator for Health Information Technology (ONC) and the HHS Office for Civil Rights (OCR). Let’s take a look at what these tools can facilitate.

 

Vulnerabilities, Threats, and Risks, Per HIPAA

Another critical resource devoted to HIPAA risk assessment is the HHS’s own guidance on risk analysis, which synthesizes and simplifies the specifications from the HIPAA base text and NIST resources. The most essential components to understand are definitions for objects of analysis:

Vulnerabilities and threats are variables in and of themselves, whereas risk measures the dynamic relationship between them and other factors. Accounting for all three indicators of a breach, companies should take heed and code each separately to address it accordingly.

Seven Steps for HIPAA Security Risk Analysis

The HHS does not require any particular methodology to assess risk, but it provides an easily adaptable template. Per the risk assessment guidance, its steps break down as follows:

While the last step above suggests closure, the HHS is also careful to note that risk assessment should continue. Rather than closing the loop after one sweep, companies should periodically review assessments and update findings with new threats, vulnerabilities, and risks.

 

Following the Rest of the HIPAA Framework

As comprehensive as the protocols for HIPAA risk analysis and the broader Security Rule are, there is still more companies need to do to maintain full compliance. To avoid the penalties that the Enforcement Rule specifies, companies also need to abide by the Privacy Rule, as noted above, and the Breach Notification Rule. Before taking a look at those, it can be helpful to appreciate what the costs of non-compliance are and how the enforcement process works.

Overall, HIPAA Enforcement begins with an intake and review by the OCR. If violations of the Privacy or Security Rules (or failure to report on them) includes criminal activity, HHS may involve the US Department of Justice (DOJ). After a thorough investigation, HHS OCR may assess civil money penalties of up to $59 thousand dollars per occurrence (about $1.7 million dollars max, per year). The DOJ may bring criminal charges up to 10 years’ imprisonment.

 

HIPAA Privacy Rule: Overview and Requirements

The Privacy Rule is the original basis for all of HIPAA. Its definition of PHI determines Security protections, including the risk analysis protocols detailed above. Per the Privacy Rule Summary, its primary focuses are on restricting use and disclosure of PHI, per the following parameters:

Certain use or disclosure cases are required rather than just permitted. These include disclosure to the subjects and to select government agencies.

 

HIPAA Breach Notification Rule: Requirements

Finally, the Breach Notification Rule differs from both the Privacy and Security Rules in that it does not factor in any controls to prevent attacks or leaks from happening. Instead, it specifies special protocols for reporting on breaches when they do occur. A breach is defined as any instance in which the Privacy or Security Rule has been broken and PHI is exposed to (possible) misuse.

Should that breakage occur, there are several levels of breach reporting a covered entity must set in motion. Firstly, companies need to address all stakeholders impacted by the breach in question no later than 60 days after the breach’s discovery. If the violation affects 500 or more people within a given location, notice must be provided to media outlets within the area. Finally, all breaches must also be reported to the HHS Secretary immediately if they impact 500 or more people or within 60 days of the end of the calendar year for breaches that affected fewer.

 

Professional HIPAA Compliance and Security

Implementing all required elements of the Privacy, Security, and Breach Notification Rules to avoid the penalties of non-compliance can be challenging for all companies. The HIPAA risk assessment requirements, in particular, can be especially burdensome for smaller companies with fewer dedicated IT and cybersecurity resources. RSI Security is happy to help with robust HIPAA compliance advisory services. To see just how easy HIPAA can be, get in touch today!

 

 

Exit mobile version