Workflow technology and HIPAA compliance: Challenges and best practices
Healthcare is continually challenged with properly managing information. Because it has traditionally operated in a paper-intensive environment, that struggle continues, even while most providers have begun to actively transition to electronic health record (EHR) systems. While work is being done to ensure that EHR systems are better able to “talk” to each other and to other health information systems, the day-to-day experience of many healthcare organizations is still rooted in paper and in the need to print, copy, scan, and fax innumerable paper documents.
Because virtually all healthcare organizations use electronic transactions of one form or another (for example, billing and payment) even their paper records are subject to the HIPAA privacy and security rules – a set of federal rules first adopted about fifteen years ago and substantially revised in 2013 under the HITECH Act. If healthcare organizations aren’t careful with how they use these office devices, the risk of non-compliance can greatly increase. As a result, it is incumbent upon healthcare providers – regardless of size – to institute sound data handling practices.
To ensure compliance with HIPAA (and other data privacy and security rules) healthcare organizations must implement policies and procedures that are tailored to the work that they do as well as to the size of their organization. HIPAA is not a one-size-fits-all regulatory regime, and best practices for data privacy and security programs demand attention to the specific operating environment of each and every healthcare provider.
Once an organization has its policies and procedures in place, it must conduct a risk assessment (and repeat it annually – or even more frequently if it changes any of its hardware, software, or other controls). This includes taking an inventory of assets that may be related to health data – including office equipment such as scanners, printers, fax machines, and copiers – to identify both the breach potential inherent in those pieces of equipment and their related software tools, and the steps taken to minimize the likelihood of a data breach. At the same time, a healthcare organization should also be thinking about how to ensure data integrity.
Maintaining good data “hygiene” with paper records and files is made easier when one has access to user-friendly, compliant software and equipment, with workflows implemented to take full advantage of their technical capabilities. Knowledgeable solution providers can work with you and your team to acquire and integrate the hardware and software necessary to ensure the best practices described above. Some examples of this include:
- Locking individual machine functions by user (specifically features such as Print, Copy, Scan, Fax Send, Fax Receive and PC Fax). This control specifically limits the ability of unauthorized users to share data inappropriately. The “key” can be an NFC-enabled device, a swipe card or an individual key code.
- Allowing a user to password-protect print jobs to secure a document until that user enters a personal PIN via the machine’s control panel. (This prevents sensitive documents from sitting unattended in the output trays of shared printers.)
- Scanning sensitive or confidential documents to a secure FTP site, securing data as soon as it is scanned.
- Ensuring that all faxes are received into memory and cannot be printed without a password
- Preventing unauthorized users from sending faxes, limiting the potential for inappropriate sharing of personal health information.
- Enabling secure faxing and fax forwarding to help maintain patient confidentiality.
- Designing equipment to support face-down printing and faxing, which guards against inadvertent unauthorized document viewing.
- Bypassing hard-copy printouts by using PC-to-fax or “e-fax” function.
- Relaying faxes to clinicians on the go with fax forwarding which improves their efficiency and reduces potential data breaches related to fax printouts.
- Scanning integration with some EHR systems.
The key principle that binds these functionalities together is the minimization of exposure of protected health information to anyone but the personnel who have a “need to know.” This approach, informed by the regulatory environment and underpinned by the hardware and software capabilities of compliant information systems, enable the workflows needed to provide care while maintaining compliance with required data privacy and security policies. The end result is a more efficient use of copiers and printers, with significantly reduced risk created by non-compliance.
Trackback from your site.