HIPAA Audit Guide TeachPrivacy HIPAA Training
HIPAA Audit Guide TeachPrivacy HIPAA Training
by Maggie Gloeckle
and Daniel J. Solove
HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove
Table of Contents
Introduction ...............................................................................................................2
Audit Phases ...............................................................................................................3
Phase 1 .................................................................................................................................................. 3
Phase 2 .................................................................................................................................................. 4
Audit Process ..............................................................................................................4
OCR Verification of Customer Contact Information .......................................................................... 4
Potential Auditees ................................................................................................................................. 4
OCR Communication to Covered Entities and Business Associates ..................................................... 5
Questionnaire........................................................................................................................................ 7
Contact /Entity Info ........................................................................................................................... 7
Questions ........................................................................................................................................... 7
Review and Submit .......................................................................................................................... 12
Documenting Business Associates ...................................................................................................... 12
How the Audit Program Works .................................................................................13
Selection of Auditees .......................................................................................................................... 13
Type of Audits ..................................................................................................................................... 13
Desk Audits ...................................................................................................................................... 13
Topics Covered in the Audit ............................................................................................................. 13
Desk Audit Completion .................................................................................................................... 13
Onsite Audits ................................................................................................................................... 13
Approach ......................................................................................................................................... 13
Failure of an Entity to Respond to OCRs Request for Information .................................................... 14
Timeline ............................................................................................................................................... 14
Desk Audits ...................................................................................................................................... 14
Onsite Audits ................................................................................................................................... 15
Further Investigation ........................................................................................................................... 15
After the Audit .................................................................................................................................... 15
Appendix ..................................................................................................................16
Business Associates Sample Template ................................................................................................ 16
Useful Links ......................................................................................................................................... 17
Compliance and Enforcement Case Examples .................................................................................... 18
Introduction
The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information
Technology for Economic and Clinical Health Act (HITECH) includes national standards for the privacy
of protected health information, the security of electronic protected health information, and breach
notification to consumers.
HITECH also requires that periodic audits be performed of covered entities and business associates to
ensure compliance with the HIPAA Privacy (45 CFR Part 160 and Subparts A and E of Part 164),
Security (45 CFR Part 160 and Subparts A and C of Part 164) and Breach Notification Rule (45 CFR Part
164 Subpart D)
As of December 2016, according to the Office for Civil Rights (OCR) senior advisor Linda Sanches,
there are more than 200 audits ongoing 167 focused on providers and 48 focused on business
associates.
OCR is looking for evidence that policies and procedures are being implemented.
Sanches has acknowledged that they are seeing two huge problems with implementation of risk
analysis and risk management.1
In a recent article by Tammy Worth, published December 13, 2016, the first round of HIPAA audits by
the US Department of Health & Human Services (HHS) Office for Civil Rights (OCR) found that
providers are still not doing some of the most basic tasks required by the law.
More than half of those audited failed to complete a risk assessment, a main tenet of HIPAA. Many
are not addressing weaknesses found in a risk analysis. And others still do not have required business
associate agreements in place with vendors.2
1Source: http://www.healthcareitnews.com/news/ocr-onsite-hipaa-audits-coming-2017
2Source: http://www.renalandurologynews.com/hipaa-compliance/first-round-of-hipaa-audits-exposes-providers-
weaknesses/article/578688/
Audit Phases
The audits are being conducted in two phases. Phase One was completed in December 2012 and
began with a pilot program in 2011. The more recent Phase Two began in the fall of 2016.
Phase 1
In 2011, HHS Office of Civil Rights (OCR) established a pilot program to conduct assessments to
determine the controls and processes that covered entities had put in place to comply with the
Privacy, Security and Breach Notification rule.
OCR established a program and instructions that were used to assess 115 covered entities.
The Audits provided an opportunity to look at mechanisms for compliance, identify best practices,
and discover risks and vulnerabilities that may not have previously been discovered through ongoing
complaint investigations and compliance reviews.
Covered entities ranged from covered individual and organizational providers of health services,
health plans of all sizes and functions, and health care clearinghouses.
2. Test the protocols by performing a limited number of audits, of which the results would be used to
perform the rest of the audits.
Phase 2
HHS has initiated the second phase of its HIPAA audits. Covered entities were notified July 11, 2016
and business associates received notification in the fall of 2016.
The 2016 Phase 2 HIPAA Audit Program will review policies and procedures adopted and
implemented by both covered entities and their business associates to adhere to the standards of the
Privacy, Security and Breach Notification Rules.
The audit program is organized by Rule and regulatory provision and addresses separately the
elements of the Privacy, Security and Breach Notification.
The audit will assess the compliance with the selected requirements and will vary based on the type
of covered entity or business associated selected for review.
The protocols for the audits are included in a separate Excel document.
Similar to Phase 1, the Phase 2 audit provides an opportunity to observe the mechanism for
compliance, identify best practices and identify risk and vulnerabilities which may not have previously
been discovered through OCRs ongoing complaint review process.
Audit Process
OCR Verification of Customer Contact Information
Prior to sending out notification letters, OCR conducted an exercise to obtain and verify contact
information for both covered entities and business associates. This information was then used to
determine a list of potential auditees.
Potential Auditees
Potential auditees consist of a wide range of health care providers, health plans, health care
clearinghouses and business associates.
Note: Entities that currently have open complaint investigation or are currently involved in a
compliance review will not be included in the audit.
By selecting from a large audit pool, OCR can make an assessment of HIPAA compliance and
determine its effectiveness.
The hhs.gov website recently reported (November 28, 2016) that a phishing email has been
circulating disguised as Official OCR Audit communication. The phishing email address that is being
used is OSOCRAudit@hhs-gov.us and directs individuals to a URL at http://www.hhs-gov.us.
If you do receive an email from this address, please contact HHS using the correct email
OSOCRAudit@hhs.gov.
The letter is time sensitive. Upon receipt of the letter, an entity has fourteen (14) days to confirm
their identity and email address, or provide updated primary and secondary contact information.3
3 http://www.hhs.gov/sites/default/files/ocr-address-verification-email.pdf
Questionnaire
When an organization (covered entity, business associate) is contacted by OCR and their contact
information has been confirmed, a questionnaire is sent.
The purpose of the questionnaire is to gather information about the size, type and operations of the
potential auditees.
The data will be used along with other information to develop pools of potential auditees.
Questions
Every question requires a response. A message will be displayed indicating the information that is
still required if questionnaire is not fully completed.
Healthcare Providers
Health Plans
Business Associates
Upon completion of the questionnaire, the system will display all questions with the completed
responses. Keep a copy of your responses for your records and then submit your responses. Once
submitted, the questionnaire is no longer available for review.
Below is a link and a copy of a sample template supplied by OCR to document a list of business
associates. The use of this template is optional.
http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/batemplate/index.html
Once selected, the auditees will be notified of their participation in the audit process.
Type of Audits
Desk Audits
Desk and onsite audits will be conducted for both covered entities and their business associates:
Round 1 Desk audits of covered entities
Round 2 Desk audits of business associates.
*Auditees will be notified of the subject(s) of their audit in a document request letter.
According to HHS, desk audit completion was targeted to be the end of December 2016.
Onsite Audits
Onsite audits will review a broader scope of requirements than desk audits.
Auditees who may have recently had a desk side audit may also be subject of an onsite audit.
Approach
Entities selected for an audit will be sent an email notification. The letter will:
Introduce the audit team
Explain the audit process
Discuss OCRs expectations in more detail.
Request initial documentation
Entities will be asked to provide documents and other data in response to a document request letter.
Auditees will submit the documents via an audit portal on OCRs website.
Auditors will review documentation and provide draft findings to the entity.
Auditees will be provided an opportunity to respond to the draft findings. These responses will be
included as part of the final report. The audit report will describe how the audit was conducted,
discuss any findings, and contain entity responses to the draft findings.
During the audit process, auditees should be ready for an onsite visit as requested by OCR.
Timeline
Desk Audits
Entity to submit requested information (in digital format) via the OCR secure portal within 10
days from the data requested.
Information reviewed by the auditor who will issue draft findings to the auditee.
Auditee has 10 days to review and provide any written updates to auditor.
A final copy of the report from OCR will be shared with the audited entity.
The same process for notification and document requests is also applicable to business associates.
A final copy of the report from OCR will be shared with the audited business associate.
Onsite Audits
Auditors will schedule an entrance conference to provide details of the onsite audit process
and expectations.
On site audit from OCR can range from three (3) to five (5) days depending on the size of the
entity.
Information reviewed by the auditor who will issue draft findings to the auditee.
Auditee has 10 days to review and provide any written updates to auditor.
A final copy of the report from OCR will be shared with the audited entity.
Onsite audits are comprehensive covering a wider range of requirements from the HIPAA rules.
Further Investigation
If an audit indicates a compliance issue, OCR may initiate a compliance review to further investigate
4
http://www.healthcareitnews.com/news/ocr-onsite-hipaa-audits-coming-2017
Appendix
Business Associates Sample Template
The following is a list of the specific information that OCR is requesting:
1. Covered entities should provide the requested information to the best of their knowledge and
include the name and types of services provided by each business associate.
3. Covered entities responding to the request should identify each element for each business
associate.
Useful Links
Topic Link
HIPAA Privacy Rule https://www.hhs.gov/hipaa/for-professionals/privacy/index.html
Organized by Issue
Access
Authorizations
Business Associates
Conditioning Compliance with the Privacy Rule
Confidential Communications
Disclosure to Avert a Serious Threat to Health or Safety
Impermissible Uses and Disclosures
Minimum Necessary
Notice
Safeguards5
Woman & Infants Hospital of Rhode Island (WIH), a covered entity member
of Care New England Health System (CNE)6
Violation: Privacy and Security rules by not reviewing and updating as necessary business associate
agreements.
Summary: From September 23, 2014 until August 28, 2015, WIH disclosed protected health
information (PHI) and allowed its business associate, CNE, to create, receive, maintain, or transmit
PHI on its behalf, without obtaining satisfactory assurances as required under HIPAA. WIH failed to
renew or modify its existing written business associate agreement with CNE to include the applicable
implementation specifications required by the HIPAA Privacy and Security Rules.
From September 23, 2014, until August 28, 2015, WIH impermissibly disclosed the PHI of at least
14,004 individuals to its business associate when WIH provided CNE with access to PHI without
obtaining satisfactory assurances, in the form of a written business associate agreement, that CNE
would appropriately safeguard the PHI.
Summary: Violation of the HIPAA Security rule after the theft of a mobile device that compromised
the protected health information (PHI) of hundreds of nursing home residents, 412 in total.
7 http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/cathoic-health-care-
services/index.html?language=es
About TeachPrivacy
TeachPrivacy was founded by Professor Daniel J. Solove. He is deeply involved in the creation of all
training programs because he believes that training works best when made by subject-matter experts
and by people with extensive teaching experience.
TeachPrivacy has a library of nearly 100 training courses that cover a wide array of privacy and security
topics including HIPAA, FERPA, PCI, phishing, social engineering, and many others.
www.teachprivacy.com