Topic: HIPPA Security Risk Assessment and Compliance
Moderator: Monique Dever
Presenter: Srini Kolathur, Director, EHR 2.0
We're going to go ahead and get started. My name is Monique Dever, and I’m the Marketing Executive here at Patagonia Health. I’ll be today’s moderator.
You’ll be on mute throughout the presentation. You can shrink or expand the attendee panel at any time using the small red arrow. If you have questions during the webinar, please type them into the Questions or Chat box. We’ll address those at the end of the presentation unless we receive a large number, in which case we may answer a few along the way.
You’ll also see poll questions appear on your screen. Please answer those—they’re simple yes/no questions to help guide our discussion.
Today’s presenter is Srini Kolathur, Director at EHR 2.0. Srini helps companies comply effectively with regulatory requirements such as SOX, PCI, and HIPPA compliance. He advocates for best-practice-based security and compliance programs that help organizations achieve their business objectives.
Srini:
Thank you, Monique, for the wonderful introduction. Before we get started, shall we go ahead and do the first poll?
Monique:
Sure.
Srini:
Great. Most of you should now see a question on your screen. This helps us understand the kind of participants we have on the call so we can tailor our presentation accordingly. The question is: Have you conducted a comprehensive security risk assessment in the last year?
Please select Yes, No, or Not sure.
We’ll give it another 10 seconds before closing the poll. Okay, thank you—let’s close it and share the results.
So, 53% of you said No, 26% said Yes, and 21% are Not sure. Essentially, we can take that as about half of the participants having done a security assessment within the last year.
The next question relates to participation in the Meaningful Use Program. About 40% of today’s attendees are currently participating. This is important because if you’re attesting “Yes” to your security risk assessment question under Meaningful Use, that means you should have already completed your assessment to qualify for incentive payments.
Thanks again for participating in the poll. Let’s move into the main presentation.
As Monique mentioned, I’m with EHR 2.0. We help healthcare organizations develop and implement best practices to secure their IT systems—particularly patient data—and comply with HIPPA and HITECH regulations.
We provide consulting, customized assessments, and a wide range of educational programs including webinars, onsite training, and online courses. If your organization requires customized HIPPA training, we can accommodate that as well.
Before we go further, please note that this webinar is for educational purposes only and should not be construed as legal advice. Always consult your attorney for specific legal questions.
Agenda
We’ll spend about 35–40 minutes covering key points about:
If we don’t have time for all questions today, we’ll follow up with you afterward.
Key Terms
You’ll hear several terms throughout this presentation:
Covered Entities are organizations that provide direct patient care and access to health data. Business Associates perform services for covered entities involving PHI.
Some organizations, such as public health departments, may be hybrid entities—partially covered under HIPPA.
If you’re not handling any electronic protected health information, you’re not considered a HIPPA-covered entity or business associate.
Public health departments are particularly vulnerable to data breaches. HHS maintains a public database of reported breaches affecting 500 or more individuals.
Here are the five main causes of reported data breaches:
Unencrypted data and internal mishandling remain the most common causes.
Medical data is especially valuable on the black market, so securing it must be a top priority.
When a data breach occurs, HHS may investigate and impose financial penalties. For example:
These cases highlight the importance of proper encryption, timely breach notification, and maintaining valid business associate agreements.
Originally, investigations began only after patient complaints. Now, under the HITECH Act, OCR conducts random audits of covered entities and business associates.
Violations can lead to civil monetary penalties depending on severity:
Penalties range from $100 to $50,000 per violation, up to $1.5 million per year per category. Repeated violations across multiple years can quickly multiply these totals.
OCR is also expanding its pool of HIPPA auditors to increase enforcement.
Key reasons to focus on security risk assessments:
HIPPA focuses on three primary areas:
Business associates are directly liable for compliance with the Security and Breach Notification Rules.
HITECH strengthened HIPPA in several ways:
Since 2011, CMS and state Medicaid agencies have paid over $30 billion in incentives to organizations adopting compliant EHR systems.
HIPPA requires compliance with three safeguard categories:
Encryption remains one of the most critical safeguards.
Your organization should maintain:
Auditors may request up to six years of documentation, including policies, training logs, and access reviews.
OCR’s second phase of audits is currently in progress. Roughly 200 entities, including covered entities and business associates, have been selected for desk and onsite audits. Future enforcement actions will depend on findings from these audits.
Typical security risk assessments range from $3,000 and up, depending on organization size, number of sites, servers, and systems involved.
Deliverables include:
Follow-up engagements typically cost about 20–30% less in subsequent years.
Q: Can we get a copy of the presentation?
A: Yes. All attendees will receive a copy of the presentation via email.
Q: Is there a sample risk assessment template?
A: Yes. We’ll provide a de-identified sample report for reference. Keep in mind that every organization’s setup is unique, so templates should only be used as guidance.
Q: Would the risk analysis include recommendations for text messaging policies?
A: Yes. We provide guidance on secure text messaging practices and policy development.
Q: What issues do you see most during assessments?
A: The most common problems are missing formal risk reports, incomplete device inventories, and lack of annual staff training.
Q: Is the $3,000 fee one-time?
A: The assessment should be done annually. The initial year is typically the most detailed; follow-up assessments usually cost less.
Closing Remarks
Monique:
Thank you very much, Srini, for your presentation and insights.
Srini:
Thank you, Monique. It was a pleasure.
Monique:
And thank you to everyone who attended today’s webinar. We’ll email you the presentation and additional materials soon. We hope to see you at our future webinars.