Avoid a compliance audit horror story. Attend our upcoming Medicare Misconceptions webinar to find out which rules are most likely to catch you off-guard. Register now.
Today's blog post comes from WebPT copywriters Charlotte Bohnett and Erica Cohen.
So, you probably remember a few weeks ago we wrote a pretty comprehensive overview on how you can ensure HIPAA compliance in your clinic. We covered everything from HIPAA basics to continuing education and training. In case you didn’t have a chance to read it, here’s a refresher:
US Congress established the Health Insurance Portability and Accountability Act in 1996. They implemented Title II: Preventing Health Care Fraud and Abuse to protect a patient’s private health information (PHI).
“Under this act, all healthcare providers, insurers, and their business associates may only collect, share, or use a patient’s PHI in approved methods and only for the explicit purpose of furthering patient care.
“A HIPAA violation can be anything from discussing identifiable patient information with your friends over lunch to leaving your not-password-protected work laptop open at a coffee shop. And, if you are found to have committed wrongful disclosure of individually identifiable health information, there are financial and criminal repercussions—including fines of up to $50,000 and one-year imprisonment.”
Now that we all know the basics, how about we tackle something a bit more tricky: HIPAA myths. There’s a lot of lore out there surrounding mobile devices and technology. What’s compliant? What isn’t? Can I use this? What about that? Let’s nip these worrisome quandaries in the bud here and now. Enter the WebPT mythbusters!
Myth: iPads are not HIPAA compliant.
According to an article on ipodnn.com, “FaceTime and iOS as a whole should be compliant with HIPAA (Health Insurance Portability and Accountability Act) security rules, an Apple spokesperson suggests.”
“iPad supports WPA2 Enterprise to provide authenticated access to your enterprise wireless network. WPA2 Enterprise uses 128-bit AES encryption, giving users the highest level of assurance that their data will remain protected when they send and receive communications over a Wi-Fi network connection. In addition to your existing infrastructure each FaceTime session is encrypted end to end with unique session keys. Apple creates a unique ID for each FaceTime user, ensuring FaceTime calls are routed and connected properly."
Well, that’s all well and fine. But what happens if your device is lost or stolen? In an article on CultofMac.com, Ryan Faas suggests practitioners shouldn’t save patient records onto any device. This will ensure “a lost or stolen device doesn’t immediately create a major security concern.” So if not on your device, where should you save your data? Check out the next myth for that nugget o’ wisdom.
Want to learn more about securing your mobile devices? Here are five steps to securing mobile data for HIPAA compliance from SC Magazine. Or have questions about other mobile devices? Check out this blog post from LuxSci on Blackberry HIPAA compliance as well as this marketing piece on compliance from MOTOROLA.
Myth: Storing my patient’s personal health information myself is safer than storing it in the cloud.
Would you store cash under your mattress? We’re thinking probably not. So why would you store your most valuable patient information in a server under your desk? The same principles apply—there is no fail safe.
A few months ago, we posted a blog about the benefits of cloud computing. There, we cited Software Advice’s analysis on the US Department of Health and Human Services (HHS) 2011 HIPAA security violation report. Key findings?
- 6,800 paper records were supposedly mailed but never received.
- An impostor posing as a recycling-service employee stole over 1,300 individuals’ records and films
- A former employee stole a laptop that contained personal health records of over 50,000 patients
Clearly, there’s a case for going digital to stay compliant and keeping your valuable documents stored in one safe place (that isn’t in a file folder, on a server tucked away in the supply closet, or on an easy-to-steal laptop’s hard drive).
And with secure data houses—like WebPT’s IO Data Center, which boasts a defensible perimeter, digital video surveillance, biometric screening, and 24x7xForever guard staff—there is practically no threat of a physical or hacker-caused breach. Learn more about our gold-standard security here.
Myth: Digitally documenting with an EMR is safer than paper documentation.
So, we know your data is safe and secure in the cloud, but how is an EMR better than paper for your documentation? Well, besides being wholly more legible and organized for your sanity’s sake, there are the matters of controlled access, encryptions, and privacy. Take WebPT for example: we use 256-bit SSL encryption—the same as online banks—for all customer interfaces. And as a recipient of the TRUSTe Certified Privacy badge, we employ strict password guidelines to ensure login security. Plus, because we issue unique user IDs and passwords for each clinic staff member, you (the clinic owner) control access to your patients’ personal health information.
Sure, accessing your patient’s protected health information via a HIPAA-compliant device is the first step. But it’s just that—a step. Ultimately, it’s your use of these devices in a compliant manner—like saving your files appropriately, keeping your devices safe, and not discussing sensitive health information in public or on social—that will ensure you’re doing what’s right for your clinic, your patients, and the law.
Have a few myths of your own that we didn’t cover here? Let us know in the comments section below. We’d love to help you prove ‘em true or truly debunk ‘em.