Volume 12, Number 5 September–October 2010 Columns

3

From the Editor—Roy Snell Finding Problems through the Hot Line is a Limited Approach to Compliance

67

Coding and Billing—Melinda S. Stegman Focusing Internal Auditing Efforts for Recovery Audit Contractor (RAC) High-Risk Inpatient Issues

43

Pharmaceutical—Sherine B. Abdul-Khaliq / Kashmira Makwana The Impact of the Medicare Coverage Gap Discount Program on the Pharmaceutical Industry

69

Auditing and Monitoring—Joye R. Wegryn / Donna J. Killian Why is CMS Performing Risk Adjustment Data Validation (RADV) Audits?

47

Electronic Resources—Catherine M. Boerner Increasing Number of Web Sites Focus on What the Government is Auditing and What is “High Risk”

71

Lab—Christopher Young Sales Employees: Balancing Competition and Compliance

49

HIPAA—Bob Brown The Final Rules for Meaningful Use of EHRs

Features

51 53

55 57

61 65

5

Bobbi Bonnet Compliance Risk Areas Associated with Implementation of Electronic Health Records

15

Legal—C. Frederick Geilfuss / Brian McGrath / Maureen Kwiecinski Reporting Risk Management Activities to CMS under the MMSEA

Feisal Nanji The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

23

Settlements—Ryan P. Haas Justice Department Issues Revised Policies for Charging and Sentencing

Bill Fox Implementing a Compliance-Based Model of Fraud Risk Control

29

Rita Isnar Independent Review Organizations: Where to Start in the Selection Process?

33

Jack Wenik State Offices of Medicaid Inspector Generals: An Update

Best Practices—Julene Brown In the Ever-Changing Field of Compliance, Mentoring is Critical

Fraud and Abuse—Howard Fredrick Hahn / Torri A. Criger Health Care Reform’s Impact on Physician-Owned Hospitals Medicare—Thomas E. Herrmann Medicare Raises Standards for Contractor Claim Reviews Physician Compliance—Robert H. Ossoff / Christopher D. Thomason Suggestions for Handling Tensions between Compliance and Finance

For the Record

35

Roy Snell United States Sentencing Guidelines and the Minimalists

Editorial Board

EDITOR-IN-CHIEF Roy Snell

CATHERINE M. BOERNER, JD, CHC

DION P. SHEIDY, CPA

President Boerner Consulting, LLC Milwaukee, WI

Partner PricewaterhouseCoopers, LLP Pittsburgh, PA

COORDINATING EDITORS

RICHARD P. KUSSEROW

THOMAS H. SUDDATH JR., ESQ.

Susan Smith, J.D., M.A. Kelly J. Rajala, J.D. Harold M. Bishop, J.D. Kristine Chung J.D. Trinidad G. Legaspi J.D., LL.M

CEO Strategic Management Systems, Inc. Alexandria, VA

Attorney Montgomery, McCracken, Walker & Rhoads, LLP Philadelphia, PA

PORTFOLIO MANAGING EDITOR Pamela Carron, J.D.

MANAGING EDITOR Reba Kieke

COVER DESIGN

VICKIE L. MCCORMICK Vice President, Health Care Compliance DePuy Orthopaedics Warsaw, Indiana

Patrick Gallagher

INTERIOR DESIGN Jason Wommack

PRODUCTION Don Torres This magazine is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting or other professional service and that the authors are not offering such advice in this publication. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. All views expressed in the articles and columns are those of the author and not necessarily those of CCH, a Wolters Kluwer business, or any other person. Photocopying or reproducing in any form in whole or in part is a violation of federal copyright law and is strictly forbidden without the publisher’s consent. No claim is made to original governmental works; however, within this product or publication, the following are subject to CCH’s copyright: (1) the gathering, compilation and arrangement of such government materials; (2) the magnetic translation and digital conversion of data, if applicable; (3) the historical, statutory and other notes and references; and (4) the commentary and other materials.

ROBERT H. OSSOFF, DMD, MD, CHC Assistant Vice-Chancellor for Compliance and Corporate Integrity Maness Professor of Laryngology and Voice Vanderbilt University Medical Center Nashville, TN

DEBBIE TROKLUS, CHC Assistant Vice President Health Affairs/Compliance/HIPAA University of Louisville School of Medicine Louisville, KY

SHERYL VACCA, CHC-F, CHRC, CCEP SVP/Chief Compliance and Audit Officer University of California Oakland, California

FRANK SHEEDER

ALAN YUSPEH

Partner Jones Day Dallas, TX

Senior Vice President and Chief Ethics and Compliance Officer HCA Nashville, TN

© 2010 CCH. All Rights Reserved. This material may not be used, published, broadcast, rewritten, copied, redistributed, or used to create any derivative works without prior written permission from the publisher. Journal of Health Care Compliance (ISSN: 15208) is published bimonthly by CCH. Postmaster: Send address changes to Journal of Health Care Compliance, 7201 McKinney Circle, Frederick, MD 21704. Subscription Price: $279 per year plus postage, handling and appropriate state sales tax. Single issue price: $56. Business and circulation: Distribution Center, Aspen Publishers, 7201 McKinney Circle, Frederick, MCD 21704. Permission requests: For permission on how to obtain permission to reprint content, please send an e-mail to [email protected] or FAX 847 267-2516. Purchasing reprints: For customized article reprints, please contact FosteReprints at 866-879-9144 or go to FosteReprints website at www.fostereprints.com.

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters? Organizations Must Build In Security with the Right Balance of Processes, Behavior Changes, and Technology Controls Feisal Nanji “You need to divorce operations monitoring from the integrity monitoring, because operations will always be the one driving behavior. They’re motivated by the need to keep things going, and the finances rolling.” — David Doig, chief executive officer, Offshore Petroleum Industry Training Organization, Britain. (Commenting on the failure of compliance in the BP crisis, New York Times, May 7, 2010)

Feisal Nanji works fo for or Techumen, LLC and can be reached ed at feisal@ techumen.com. Copyright 2010.

W

e have witnessed and are still suffering from the largest environmental disaster in our nation’s history. The British Petroleum (BP) oil spill has ripped apart our hearts and also our nation’s sense of complacency. We no longer can trust machines to do everything for us by clockwork. We trusted the human operators in the Gulf, but that too was not enough. The devastation has been extraordinary and mind numbing. Could better monitoring or compliance have prevented this? This article is a wake-up call to compliance professionals in health care. Like the persistent shrill ringing of an alarm to someone in a deep slumber, its tone may be harsh. The message may be uncomfortable, but it is very necessary. This article aims to lay out some of our information security shortcomings in health and how they can be fixed through better information governance. This is not about meeting Health Insurance Portability and Accountability Act (HIPAA) standards for security or privacy. It is about

Journal of Health Care Compliance — September – October 2010

15

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

compliance officers doing the right thing for their employers and their country. With the passage of the Health Information Technology for Economic and Clinical Health (HITECH) Act, the country has embarked on a massive transformation of health information technology (IT). HITECH’s intent is to use information technology to make a major dent in controlling health care costs and to improve patient outcomes. HITECH represents a public investment of more than $19 billion toward health care IT-related initiatives. It is a sorely needed transformation. We need better information systems and their adoption by health providers to coordinate what will amount to 20 percent of the nation’s gross domestic product (GDP) by 2015. Health care is the largest industry in the United States, yet most technologists (and others) would agree it serves its customers poorly in information delivery. The government’s passage of HITECH is a clear recognition that this has to change. With the muscle of large incentives offered to health providers, we are hopeful that it will succeed. The transformation does not come without costs. Of note, it forces health providers and other covered entities (CEs) to face new compliance challenges for information security and privacy. This article addresses several aspects of these challenges and argues for some fundamental changes for compliance groups at CEs. Briefly, we cover: why information security is a matter of national urgency and priority; the current state of health information security in the United States; Congress’ response to improving security and privacy of protected health information (PHI); key new provisions for achieving compliance; what can go wrong and the possible damage from inadequate security; and how CEs might consider fixing a fundamental flaw in current compliance efforts.

16

THE INFORMATION SECURITY CRISIS IN THE UNITED STATES As the 2008 financial crisis unfolded, experts worldwide were stunned by the rapid collapse of Bear Stearns and Lehman brothers. It took a heroic, nail-biting, coordinated bail-out effort on the part of several governments to save us from financial calamity. Likewise, in 2010 we have come to trust the workings of the Internet without question. Many of us assume that the Internet is safe, robust, and adequately protected. This is a dangerous complacency. Consider these two excerpts reported in a piece by Steve Kroft’s CBS’ 60 minutes that aired in November 2009. “It is now clear this cyber threat is one [of] the most serious economic and national security challenges we face as a nation,” President Obama said during a speech. Four months after taking office, Obama made those concerns part of our national defense policy, declaring the country’s digital infrastructure a strategic asset and confirming that cyber warfare had moved beyond theory. “We know that cyber intruders have probed our electrical grid, and that in other countries cyber attacks have plunged entire cities into darkness,” the president said. Until February of this year, Mike McConnell was the nation’s top spy. As chief of national intelligence, he oversaw the Central Intelligence Agency, the Defense Intelligence Agency, and the National Security Agency. Few people know as much about cyber warfare, and our dependency on the power grid, and the computer networks that deliver our oil and gas, pump and purify our water, keep track of our money, and operate our transportation systems. “If I were an attacker and I wanted to do strategic damage to the United States, I would either take the cold of winter or the heat of summer, I probably would sack electric power on the U.S. East Cost, maybe the West Coast, and attempt to cause a cascading effect. All of those things are in the art of the possible from a sophisticated attacker,” McConnell explained.

Journal of Health Care Compliance — September – October 2010

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

“Do you believe our adversaries have the capability of bringing down a power grid?” Kroft asked. “I do,” McConnell replied. Asked if the United States is prepared for such an attack, McConnell told Kroft, “No. The United States is not prepared for such an attack.” To be sure, there have been vast improvements in our cyber-security since our 9/11 wake-up call, but much of this has occurred in financial services firms and at the Department of Defense. At Techumen, our principals were pioneers in reducing information risk for several of the country’s leading banks and financial institutions. We know that after 9/11 it took dedicated, consistent effort for banks to build adequate teams and protections to improve information security. In our view, however, this has not hit home for health providers, insurers, or other CEs. We know this because Techumen now focuses exclusively on securing health care information. We find that most of our clients have immature information security operations and offer poor protection of PHI.

THE CURRENT STATE OF HEALTH INFORMATION SECURITY Based on our experience with securing both financial and health care information systems, the current state of information security in health care is shoddy. Perhaps most dangerously, in most health care organizations the fox is running the henhouse. How can this be true? Many health leaders will argue that “we have a good compliance office” and a superb chief information officer (CIO) who “looks over” information security. That is precisely the point. No CIO should have purview over the information security realm. The duties of the CIO at any health provider are to deliver economic, efficient, and seamless information technology services that improve the health of patients. These are operational considerations, and they are indeed vital; however, as the BP crisis has demonstrated, if integrity monitor-

ing is also a function for CIOs, we are setting ourselves up for failure. Compliance officers may disagree and state that the compliance office is in charge. The central question then is to whom does the security officer report? If your chief information security officer (CISO) also reports to the CIO, then his allegiance is to make operations hum and not to “impede” information flow by introducing security checkpoints. The fox is really running the henhouse. The fox may be well meaning and kind, but he is still a fox. Like all other industries, health care has turned sophisticated and technically complex. Most hospital information systems function with a bevy of routers, switches, email servers, magnetic resonance imaging (MRI) devices, bedside monitors, electronic medical record (EMR) applications, practice management systems, and laboratory information systems. As such, the role of a CIO has become largely operational. The CIO’s primary responsibility is to make sure that information flows freely and that applications work. Without question, all this advanced technology we have in health care requires a certain degree of operational heroism. It takes real science blended in with the correct amount of art, negotiation, and persuasion to deliver good information technology on time and under budget. We acknowledge that a successful modern health care CIO is an expert at making his operations run despite his many constraints. The CIO, however, also should not be saddled with the responsibility of making sure that these operations run with integrity and securely. In an informal survey we conducted, we found that seven out of 10 leading health care providers had the CISO role reporting directly to the CIO. So how did integrity monitoring and operations in health care become so comingled? As our health infrastructure matured, it was only natural for the most senior “technical” person (i.e., the CIO) to supervise another technically oriented person but one who was solely responsible for security — the CISO. It seems like a rational and natural enough

Journal of Health Care Compliance — September – October 2010

17

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

solution. Information technology is complex, and only the office of the CIO really understands what all these bits and bytes do. It is unlikely for a lawyer, unless suitably trained, to understand the difficulties of keeping a server farm up when faced with a deluge of HTTP requests. By not infusing technical capability in the compliance office, leadership cannot see the peril of mixing operations with integrity. Maintaining integrity is the role of the compliance officer and cannot be fully deferred to the office of CIO. Information security requires a deep understanding of information technology to prevent such technology from being misused or attacked. This is not to say that everything in information security is highly technical. For example, having adequate security policies and procedures in place and providing security awareness training to employees is not rocket-science. Yet, any compliance officer must have someone technically capable that she can rely on 100 percent for doing the right thing. Simply saying that it is too technical for compliance to understand and then deferring to the CIO is not a good enough answer. Compliance officers must seek help to understand the technical environment. They must have at least a trusted “technical” expert reporting directly to her (and not the CIO). We believe this role can be fulfilled adequately by a CISO. A good CISO is that special blend of person who genuinely understands technology, knows to suggest controls to navigate through a thicket of regulations, while balancing business needs. There should be a necessary and healthy tension between CIO and CISO, not a master-servant relationship. The CISO must report directly to the CEO or to the head of compliance.

and Human Services (HHS) made some administrative simplifications. On October 7, 2003, HHS delegated to the Centers for Medicare & Medicaid Services (CMS): the authority and responsibility to interpret, implement, and enforce the HIPAA security rule provisions; the authority to conduct compliance reviews and to investigate and resolve complaints of HIPAA security rule noncompliance; and the authority to impose civil monetary penalties for a covered entity’s failure to comply with the HIPAA security rule provisions. After five year of CMS responsibility for enforcement, the Office of Inspector General (OIG) provided, in 2008, pointed criticism of CMS’ lackadaisical approach to covered entity enforcement. The OIG concluded CMS has “taken limited action to ensure that covered entities adequately implement the HIPAA Security Rule.” The report revealed CMS has not conducted a compliance review of covered entities. Further, however, the OIG found this process “unproductive.” So here, even the government’s main enforcement agency for information security and privacy violations in health care has failed to take cyber security seriously.

CONGRESS: CORRECTING THE SITUATION This lax oversight was not lost on lawmakers. In its passage of the HITECH Act, Congress realized that without secure and private electronic health information, we would not be successful. As such it made one of its five pillars or health policy objectives a clear focus on security and privacy of PHI. This clearly demonstrates Congress’ intent to make sure that privacy and security considerations are not given short shrift.

GOVERNMENT SHORTFALLS Even the government has been slow to enforce security and privacy provisions in health care. As most compliance officers know, the fundamental bulwark for ensuring the safety of PHI is HIPAA, finalized on August 21, 1996. Subsequently, the U.S. Department of Health

18

THE FIVE PILLARS OF MEANINGFUL USE FOR HITECH Urged on by Congress, various new provisions in HITECH (extensions to HIPAA effectively) have significantly tightened restrictions and enforcement and will

Journal of Health Care Compliance — September – October 2010

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

make health providers accountable for data breaches and information security. In particular, any breach of more than 500 records will be reported to the media for analysis. It is quite likely that hospitals and other providers who become repeat offenders for poor security will lose patients. Some of the key provisions of HITECH include the following: establishes a federal security breach notification requirement for breach of PHI; requires each individual be notified if his or her “unsecured” PHI is accessed, acquired, or disclosed as a result of the breach; a breach notice provided to the individual must include: the date of the breach, the date of discovery, and the steps the individual should take to protect himself from potential harm; requires notification to the federal government and prominent media outlets if more than 500 individuals are affected; applies to personal health record (PHR) vendors such as Google and Microsoft; ensures that new entities that were not contemplated when HIPAA was written are subject to the same privacy and security rules as others covered under HIPAA; these include PHR vendors, regional Figure 1.

health information organizations (RHIOs), and health information exchanges (HIEs); provides an individual the right to have access to certain information about him or her in electronic format, for which the provider may charge a fee; and gives individuals the right to receive an electronic copy of their PHI, if it is maintained in an electronic health record. (See Figure 1)

PENALTIES UNDER ARRA The penalties for violations under the American Recovery and Reinvestment Act of 2009 (ARRA) can be severe for both organizations and individuals responsible for the safety of health information. Since this is a broad definition, it likely includes various executives and practitioners who handle or supervise the systems that house this information. The specifics include: allows criminal penalties to apply to individuals; provides a new system of civil monetary penalties; modifies distribution of certain civil monetary penalties collected; requires the Secretary of Health and Human Services to provide for periodic audits of covered entities and business associates; and ■ allows state attorneys general to bring civil actions in federal court on behalf of the residents of their state. It will now be up to CMS and state attorneys general to enforce violations and mete out penalties. Leading CMS executives have stated publicly that enforcement levels and capabilities will be more aggressively handled. We believe this is a critical juncture for health care and the enforcement tide has turned. Compliance officers at health providers and other CEs have to become far more assertive. They can “hope” for lax enforcement at considerable peril.

Journal of Health Care Compliance — September – October 2010

19

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

SAFE HARBOR AND THE ENCRYPTION FALLACY Breach notification requirements for large data breaches can tarnish substantially a health provider’s reputation. While there is a strict new environment for information security under HITECH, the government has provided for a “safe harbor” from penalties due to data breaches or privacy violations if a health care entity makes adequate use of encryption controls. Fundamentally, information (data) must be protected from theft or tampering when being transferred over an electronic network or wherever it is physically located. These two parameters are known as “data in motion” or “data at rest.” Encryption is the process which is applied to data and alters it to make it humanly unreadable except by someone who knows how to decrypt it. The complexity of the algorithms used means that a strongly encrypted message might require thousands of hours of processing by very fast computers to break the encryption. Encryption of data then is the control technology that prevents data from being tampered with or stolen. Given the wide types of application data stores and transmission methods in use, various encryption approaches and techniques can and must be used. Figure 2.

20

Under the revised HIPAA security rule, PHI is deemed to be encrypted by “the use of an algorithmic process to transform the data into a form in which there is a low probability of assigning meaning without use of a confidential process or key” and the decryption process or key has not been breached. For many compliance officers, this may appear to be panacea or magic bullet. Many may believe that we can and should encrypt everything. This is a fallacy. While it may limit damage from breaches, the wholesale encryption of every piece of data in rest or motion at a health provider or CE is simply not feasible. Adding encryption willy-nilly can break old systems ill equipped to handle encryption. Poorly executed encryption also can consume an inordinate amount of CE bandwidth and processing power and bring information delivery to a crawl. Cost considerations also factor into encryption decisions, and finally, the complexity of encrypting “everything” can be a nightmare to manage. Most CEs deliver information through applications sometimes numbering in the hundreds (each with a separate data store) to thousands of devices over an internal network. Thus, taking advantage of the safe-harbor provision under HITECH will not be a small undertaking. Careful analysis of the considerations listed above must be understood for each application and data repository; else you could force your employer into chaos. As of now the items that can be encrypted efficiently are limited and include end-user storage devices such as laptops, blackberries, and flash drives. This clearly is a good start, but it is not enough. Encrypting “everything” is simply not a reasonable approach at this time and cannot be used as a panacea.

Journal of Health Care Compliance — September – October 2010

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

COMPLACENCY AT HEALTH CARE PROVIDERS

Figure 3.

Governments are not alone in being complacent. Health providers, and by implication compliance officers, also should shoulder a significant part of the blame. The industry-leading health information industry organization — Health Information Management Systems Society (HIMMS) — has clearly pointed out the complacency of health organizations with regard to patient information. In its report entitled 2010 HIMSS Analytics Report: Security of Patient Data, commissioned by Kroll’s Fraud Solutions, HIMSS researchers noted the following in the report’s executive summary: There is cause for concern, however, as our new study shows that the security practices in place continue to overemphasize “checklist” mentality for compliance without implementing more comprehensive and sustainable changes needed for meaningful improvements in the day-to-day handling of patient PHI and PII. Increased activity around security practices adopted to achieve compliance with new laws and regulations related to patient data security has not changed the fact that data in the industry continues to be at risk and may be targeted by individuals for fraudulent gain…hospitals appear to be focusing on how to handle a breach after it has taken place rather than focusing on risk assessments. There continues to be a lack of awareness of the extremely high costs associated with a health care breach. …Full enforcement of HITECH — including sanctions — which took effect February 22, 2010, will make the costs associated with a breach even more burdensome.

While there is expanding awareness around the importance of data security, it continues to be an issue addressed through cyber security in siloed departments (IT, security policy), adhoc training, or policy approval events. Awareness has yet to translate into organization-wide responsibility that is addressed through a holistic solution that covers all data (cyber and offline) across the entire organization’s continuum of care (including third-party vendors).

WHAT CAN GO WRONG IN SECURING HEALTH CARE INFORMATION? The metaphor of a leaky house is apt to describe information security in health care. Information, like heat or cold air, can escape from areas through thousands of small cracks and poorly insulated windows or seams. Today’s health information systems are exactly that — complicated Rube Goldberg contraptions with thousands of places from which information can escape. Security can be breached by an outside attacker or from within by employees of covered entities. Indeed, this internal threat should be a serious cause for concern because compliance officers have not asked the right questions or cannot receive easy answers to them.

Journal of Health Care Compliance — September – October 2010

21

The BP Crisis and Information Security Compliance in Health Care: Parallel Disasters?

For example, can you as a compliance officer obtain from your CIO answers to the following questions in five minutes or less? 1. Identify any user accessing medical records of a person living on the same street or in the same zip code. 2. Identify any gynecologist on your staff who has looked at male patient records in the last week? 3. Identify which users viewed records of others working for the same department/cost center? If, as a compliance officer, you cannot have a ready answer in five minutes, then you already may have suffered a massive data breach and do not know it. There are literally hundreds of such misuse cases or anomalies that constitute a data breach or violation. So again, we urge compliance officers to understand the technical limitations or capabilities at getting this information. They must not expect this answer from the CIO but from someone who reports to them. Recall, the CIO is responsible for operating a large infrastructure on a very tight budget. Saving the hospitals from perceived security issues will not garner him kudos from his doctor bosses; implementing a new cardiology application might.

HOW MUCH DAMAGE CAN BE DONE? Considerable damage can be done when patient records are breached. The consequences to a health provider or CE can be tangible or intangible. Examples include: fines imposed by CMS or by state attorneys general; cost to rectify a patient’s potential loss of identity; civil lawsuits from patients; and loss of market value, customers, or patients suffered from the lack of trust in protecting patient data. Thus, under new breach definitions a data breach of 500 records is now considered sizable and potentially very damaging. Figure 2 illustrates the severity of the problem; the chart was initially published by Kevin Prince, Chief Architect Perimeter eS-

22

ecurity, in a report entitled “A Comprehensive Study of Healthcare Data Security Breaches In the United States from 2000 – 2007.” The chart displays all types of records lost from 2000 to 2007. The key point is that this trend is accelerating, not slowing. From our prior work, we know that outside counsel, forensic, and privacy experts will be involved in breaches greater than 500. (The PR disaster for not seeking expert help could be far worse than spending the necessary money). We conservatively estimate that tangible costs (fines, fees, and direct expenses) to restore a patient’s identity are in the $300 per record range for any breach over 500 records. Thus, a breach of 1,000 records could result in direct or “tangible” expenses of over $ 300,000. For CEs on tight health budgets, this is a lot of money, and it does not include any intangible losses such as patient trust.

WORST CASE: A DOOMSDAY SCENARIO Consider the following hypothetical scenario: A. A category 5 hurricane is bearing down on New Orleans. B. There hasn’t been enough time to evacuate many residents; many of these will suffer major trauma, e.g., head injuries, shock, shattered limbs, punctured organs, et cetera. C. The information infrastructure of the two level-one trauma centers in Louisiana is targeted by terrorist groups using nonU.S. servers a few hours before the hurricane strikes. (They don’t even have to be on U.S. soil!) D. Ten minutes later, as the full force of the hurricane is felt, the electronic medical record, admission discharge and transfer, and lab systems, as well as the MRI machines and PACs systems in the trauma centers, have all been rendered useless. Restoring all the systems may take several days. E. How many people will have died or suffered? Is this a scenario we want to have played out? Is this an unreasonable situation or hypothesis? I think not. (A team of expert CONTINUED

Journal of Health Care Compliance — September – October 2010

ON PAGE

78

I found several problems this way. I got very few serious issues from our hot line. Now don’t get me wrong. I absolutely believe you have to have an anonymous reporting mechanism. They do find problems. All I am saying is that you need to supplement it. I believe asking these sorts of questions randomly, regularly, and all year long produces more results than the anonymous reporting mechanism. If you have trouble buying this argument, think about some of the great leaders of this country and companies within this country. Great leaders were known for their interest in talking to the people. They were known for asking questions. They were known for talking to staff and asking question about how things were going. Leaders who lock themselves in their office, spend time in endless meetings, or connect only with a small group of people are less successful. If you choose to find all your problems through the hot line, I have some advice. The next time you do a risk assessment, put yourself down as a risk area. I would rank the risk as “high.”

NANJI CONTINUED

FROM

22

“red team” hackers can do this in less than 30 minutes). ficers have a duty and reCompliance offi sponsibility to do better. You must have purview of information security and privacy, and you must excel in it. It will be difficult, ficult, diffi but it is not a chore. It is a necessity. Your country, your organization needs you.

WHAT WE RECOMMEND CEs must begin with a correct governance structure in place for information security. This is the one fundamental requirement for good information security compliance. We recently recommended the organizational construct in Figure 3 for an academic medical center to prevent the mixing of operations with integrity monitoring (compliance).

78

CONCLUSION Without adequate security, there is no trust. Insecure EHRs will result in rampant violafines and sanctions or breaches, inevitable fines tions, and ruined reputations. More tragically, the promise of EHRs to dramatically reduce health care costs and improve patient care will be in tatters. As citizens we simply cannot let this happen. We must design-in security with the right balance of processes, behavior changes, and technology controls. We need to start at the very top — with better information security governance.

PHARMACEUTICAL CONTINUED

FROM

46

3. CMS, Medicare Coverage Gap Discount Program Beginning in 2011: Revised Part D Sponsor Guidance and Responses to Summary Public Comments on the Draft Guidance, § 20 (May 21, 2010) [hereinafter Discount Program Revised Guidance], available at www.cms.gov/PrescriptionDrugCovContra/Dow nloads/2011CoverageGapDiscount_Revised%20 Guidance%20052110.pdf (last visited Jul. 12, 2010). 4. Discount Program Revised Guidance, § 20. 5. Id. 6. Id. 7. Medicare Prescription Drug Benefit Manual, CMS Pub. 100-18, ch. 13, Appendix A. 8. CMS, Part D Information to Pharmaceutical Manufacturers, available at www.cms.gov/ PrescriptionDrugCovGenIn/05_Pharma.asp (last visited Jul. 12, 2010). 9. Discount Program Revised Guidance, § 100.2. 10. Id. § 20. 11. Id. § 100.11; 42 C.F.R. § 423.100. 12. CMS, Medicare Coverage Gap Discount Program – Manufacturer Agreements, available at http://www. cms.gov/PrescriptionDrugCovGenIn/Downloads/ CGDMemo_08.03.10.pdf (last visited Aug. 24, 2010) [hereinafter Discount Program Final Manufacturer Agreement Memo]. CMS issued the draft model manufacturer agreement for public comment on May 26, 2010 (75 Fed. Reg. 29,555). 13. Id. 14. CMS, Medicare Coverage Gap Discount Program Agreement Between the Secretary of Health and Human Services and the Manufacturer, § IV(a), available at http://www.cms.gov/ PrescriptionDrugCovGenIn/Downloads/ ManuAgreement.pdf (last visited Aug. 24, 2010). 15. Id. § II. 16. Discount Program Revised Guidance, § 30. 17. Id. 18. Id. 19. CMS, Medicare Coverage Gap Discount Program

Journal of Health Care Compliance — September – October 2010

Feisal Nanji --- Article - Journal Of Health Care Compliance -- On ...

Christopher D. Thomason ... 69 Auditing and Monitoring—Joye R. Wegryn / .... Journal Of Health Care Compliance -- On Information Security Governance.pdf.

228KB Sizes 0 Downloads 200 Views

Recommend Documents

Feisal Nanji --- Article - Journal Of Health Care Compliance -- On ...
Feisal Nanji --- Article - Journal Of Health Care Compliance -- On Information Security Governance.pdf. Feisal Nanji --- Article - Journal Of Health Care ...

Original Article - Iranian Journal of Pathology
Nov 2, 2005 - also 40 (55.6%) of cases had prison history with mean duration of 60 .... prisons in Spain, 81.4% of HIV positive patients had HCV infection and ...

Original Article - Iranian Journal of Pathology
Nov 2, 2005 - General Physician, Kermanshah University of Medical Sciences, Kermanshah, Iran. ABSTRACT. Objectives: Immunodeficiency duo to HIV infection can produce unusual diseases in infected individuals & CD4 count is the main predictor of diseas

Impact of Antenatal Care on Infant Health Outcomes ...
I construct an index of antenatal care to identify each component of the program and their level of completion. This index takes values from zero to four and ...

Journal of Intensive Care Medicine
for in the specialized neuroendocrine center (a sec- tion of the ... stress dose steroids “on call” to the operating room is critical. ... cant variation across centers in outcome assess- ...... Surgical management of pituitary tumors has advance

Journal of Intensive Care Medicine
sy) [1-5]. Pituitary tumors encompass a diverse spectrum of disease, and perturbations of the endocrine ..... surgery, and the paucity of quality data has left this.

Journal Article - Joint Fire Science Program
system. Individually, blowdown or fire caused similar decreases in live carbon and total ecosystem car- ..... Canadian Journal of Forest Research 37, 627–633.

Writing an academic journal article
This section deals with three issues related to the drafting of an introduction. ... Internet and e-commerce and increasing deregulation of many service industries ... [Element 1] Today's fast-paced world is becoming increasingly characterised by ...

Journal article for Chris.pdf
and long-distance walks. He has served as President of. the Mountaineering Council of Scotland and is currently. Vice President of the Backpacker's Club and.

Psychology Journal of Health
Feb 6, 2007 - vary in their degree of self-determination are likely to relate ... motivation represent different degrees of internal- ization of ...... Chatzisarantis, N. L. D., Hagger, M. S., Biddle, S. J. H., .... Sociology of Sport Journal, 12, 42

International Journal of Health Geographics
Dec 18, 2008 - PDF and full text (HTML) versions will be made available soon. Habitat analysis of ..... center with urban areas, depicted in black, on the right.

article on gentrification.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. article on gentrification.pdf. article on gentrification.pdf. Open.

Quality of care - World Health Organization
WHO Library Cataloguing-in-Publication Data. Quality of care : a ... The responsibility for the interpretation and use of the material lies with the read- er. In no event ..... In each case, they will ideally be committed to the broad aims of quality