HIPAA Privacy & Security old
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules establish federal requirements for ensuring patient health information is protected. Compliance with the HIPAA Privacy and Security regulations can help ensure health information is not accessible to hackers, bad actors and others that pose a threat to patients’ privacy and security.

For health care providers, although complex, compliance with HIPAA is especially important. The federal government can impose severe sanctions on organizations found in violation of HIPAA. Federal regulations for meaningful use and MACRA/QPP also require participating providers to perform a security risk assessment each year to be eligible for incentives or bonuses.

The Kentucky REC can help with navigating HIPAA’s requirements to safeguard the confidentiality, integrity and availability of patient information. We offer two services to aid health care organizations: Security Risk Analysis and Project Management services.

For more information on these services, click the boxes below or contact the Kentucky REC today.


HIPAA Privacy & Security: Contingency Planning Series – Part 2

What should be included in your Contingency Plan?

The HIPAA Security Rule requires that Covered Entities and Business Associates have the following parts of a Contingency Plan: 45 CFR 164.308 (a)(7)(ii)(A-C)

    1. Data backup plan (required)- Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information.
    2. A disaster recovery plan (required)- Establish (and implement as needed) procedures to restore any loss of data.
    3. Emergency mode operation plan (required)- Establish (and implement as needed) procedures to enable the continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode.
      Contingency planning can help your practice:

      1. Mitigate patient safety issues such as the difficulty of sending prescriptions to the pharmacy for high-risk patients;
      2. Protect, and if necessary, recover patient records;
      3. Effectively protect and recover revenue.

Check out our Weekly HIPAA Tips next week for Part 3 of this series.

This reminder is part of a series of HIPAA Security Reminders from the Kentucky Regional Extension Center. These reminders can be used by covered entities and business associates looking to comply with the HIPAA Security Rule’s CFR §164.308(a)(5)(ii)(A), which states, “Security reminders (Addressable). Periodic security updates.”

Feel free to share this with your workforce/staff to remind them of the importance of safeguarding protected health information (PHI), especially PHI that is in electronic form (ePHI).  A new security reminder is posted at the beginning of each week.  If you have any questions or would like to speak to someone at the REC about HIPAA Privacy and Security please contact us at Kentucky REC or call (859) 323-3090.

Security Risk Analysis

A Security Risk Analysis is an accurate and thorough analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic patient health information (ePHI).

Project Management Services

Planning is essential to mitigating risks. Whether it’s a policy limiting the use of unencrypted portable devices or testing back-ups to ensure a disaster recovery plan is effective, having a strategy and a plan helps prevent the unauthorized access, use, or disclosure of ePHI.