Preparation puts you ahead in incident response
You know it's common sense, but is it common in your workplace? I had the opportunity to attend a webinar covering incident and breach response and...
I recently had the opportunity to attend a presentation by an OCR Investigator from the Chicago region. It was very interesting to hear what the HIPAA investigation process looked like, what they ask for, a note on encrypted devices, and what covered entities do that annoy investigators (you definitely want to avoid these!)
This is the high level stuff, and I hope to do some deep dives in future posts.
A HIPAA investigation currently can be initiated by one of the two following events:
The investigation process was described as containing these 4 parts:
Q: Where does the money go (i.e.: from a Resolution Agreement or Civil Monetary Penalty)?
A: It goes to the OCR and can only be used for HIPAA enforcement.
So what will the request list look like when you go through an OCR investigation? The list can change based on what events occurred to generate the review, but here are some items that the OCR Investigator said is typically requested:
***VERY IMPORTANT: The OCR needs to see paper documentation on ALL items; they can’t take your word for it.
A NOTE ON Encryption:
20% of the breaches that involve 500 individual records or more were the result of a lost or stolen laptop. If those providers had encrypted the hard drives on those laptops (and documented that encryption), it would have not been considered a breach.
What does this mean? Avoid some likely future headaches by encrypting all your portable devices ASAP.
What are some things that annoy an OCR Investigator? Here were a few things to avoid:
Like this? Please Share:
[feather_share]
You know it's common sense, but is it common in your workplace? I had the opportunity to attend a webinar covering incident and breach response and...
On July 21, 2020, the New York State Department of Financial Services (NYDFS) issued charges against First American Financial Corporation, a...
Cyber insurance has become a critical component of any business's risk management program. With cyber threats evolving, having a cyber insurance...