Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
This document is intended to be a template which should be customized to fit the unique needs of the provider's operations. Step 2: Privacy and Security Event Analysis – Potential Breach Investigation Date of Event Date of Discovery Event ID: Facility: Date Reported : WHO REPORTED EVENT AND WHEN Name Phone DETAILS OF EVENT Paper Electronic Verbal Format: Type of Event Select all that apply. If selecting “other”, describe in greater detail. Theft Hacking / IT incident Physical Security Breach Loss or misplacement Improper Disposal Virus/other malicious software Unauthorized Access/Use/Disclosure Other Unknown Location of Information Select all that apply. If selecting “other”, describe in greater detail. Laptop computer Network Server Desktop computer Email Paper Other DETAILS OF SECURITY OF PHI Other Portable Electronic Device Electronic Medical Record Secured PHI is PHI that is rendered unusable, unreadable or indecipherable to unauthorized individuals At Rest In Motion Being cleared, purged or destroyed State of Data: Was the electronic PHI encrypted as specified according to HHS guidance (74 CFR 19006)? Yes No N/A OR Was the PHI rendered unusable, unreadable or indecipherable to unauthorized individuals? Yes No Describe details of security: ______________________________________________________________________ If this section ends with YES, stop process. Sign report. Maintain documentation per policy. Type of Protected Health Information Involved Select all that apply. If selecting “other”, describe in greater detail. Demographic Financial Clinical Name Credit Card # Diagnosis/ Conditions SS# Bank Account # Lab results Address/ Zip Claims Information Medications Drivers License Other Other Treatment Info Date of Birth Other Safeguard(s) in Place Prior to Event Select all that apply. If selecting “other”, describe in greater detail. Firewalls Strong Authentication Physical Security Secure Browser Sessions Biometrics Logic al Access Control Packet filtering (router-based) Encrypted Wireless NA Additional Safeguard(s) in Place Prior to Event Select all that apply. Encryption Locked Storage Room(s) Shredding Bin(s) Other If applicable, # of residents involved Anti-virus Software Intrusion Detection Locked File Cabinet(s) Brief Description of the Unauthorized Event: Did this event occur at or by a Business Associate: Yes BA Name: BA Address: BA Contact: No If yes, describe actions taken by CE: Contacted BA- BA agreed to correct Termed agreement w/BA Contacted BA- BA refused to correct Other: Contact Phone: Contact email: ©2013, The Long Term Care Consortium (LTCC). These materials may be reproduced and used only by long-term health care providers and their health care affiliates for their internal use, in connection with their efforts to comply with relevant legal rules and regulations. All other reproduction, transfer and use is prohibited without the express written consent of the LTCC. Neither the LTCC nor its members make any representation that use of these materials will ensure other legal compliance. Published 12/2013 This document is intended to be a template which should be customized to fit the unique needs of the provider's operations. Step 2: Privacy and Security Event Analysis – Potential Breach Investigation Breach Risk Tool Notifiable breach determined – risk assessment for low probability not completed. (Skip to Breach Notification section below.) This incident involves a use or disclosure of unsecured Protected Health Information: The information identifies or could reasonably be expected to identify a person. The information is about the person’s present, past or future physical or mental health, healthcare received, or payment for care. The information was unsecured: it was usable, readable, or otherwise decipherable to any individual (i.e. electronic data was NOT encrypted, wiped, or destroyed.) If ALL boxes are checked proceed to Section 1. Section 1: Does this incident qualify as one the following exceptions? Answer each question in order. 1. Was this an unintentional acquisition, access, or use of PHI? o By a workforce member or person acting under the authority of the CE or the CE’s BA, made in good faith, within the person’s scope of authority, and did not result in further use/disclosure in a manner not permitted by the Privacy Rule? Y N DK N/A Yes: Low Probability demonstrated – Stop 2. Was this an inadvertent disclosure of PHI? o By a person who is authorized to access PHI at a CE, BA, or OHCA, to another person authorized to access/receive PHI at the same CE, BA, or OHCA, and did not result in further use/disclosure in a manner not permitted by the Privacy Rule? Y N DK N/A No, Don’t Know, or N/A: Low Probability fails – Continue 3. The unauthorized recipient could not reasonably have retained the data: (e.g., the data was only heard or seen momentarily or in passing) Y N DK N/A Section 2: Choose all options that apply for each category – total the points for all choices or check “Fail” Method of Disclosure: Was the PHI actually acquired or viewed? No 0 pts Verbal 1pt Paper 2pts Electronic Scores 3pts Any Two Methods or All 3: Low Probability Fails Recipient(s): Who was the Another Covered Entity or Federal Agency obligated to comply with Privacy Act of unauthorized person who acquired 1974 and FISMA or used the PHI? Known Recipient(s) Fail 1 3 Unknown Recipient(s): Low Probability Fails Circumstances of access, use or disclosure Unintentional access, use or disclosure of PHI Fail 1 All Other Circumstances: Low Probability Fails (includes loss, theft, and any intentional access, use or disclosure w/o authorization) Disposition: What happened to the Returned intact/unopened/complete or Properly destroyed by facility Workforce, BA, info after the acquisition, use, or another Covered Entity, a Federal Agency or Authorized Patient Family disclosure? Remained inside facility and returned (opened) or Electronically deleted (backup status known) Fail 1 2 All Other Dispositions: Low Probability Fails (includes not returned, unable to retrieve, unknown disposition, suspicion of or actual re-disclosure) Type of Information: Were the identifiers direct or indirect? No specific names – for example, only MRN, room number, photographs or other identifiers which could be re-identified based upon context Impact Risk: What is potential impact of the use or disclosure? No known or low impact risk: no sensitive clinical, financial, or personal information Fail 1 Direct Identifiers Used: Low Probability Fails Fail 0 All Other Potential Impact Risks: Low Probability Fails Not applicable Additional Controls for Electronic Devices (Laptops, Data determined to be Wiped (remote or auto), Destroyed, or Encrypted computers, handheld devices, etc.) Password protected only – not compromised Fail 0 0 1 Fail ©2013, The Long Term Care Consortium (LTCC). These materials may be reproduced and used only by long-term health care providers and their health care affiliates for their internal use, in connection with their efforts to comply with relevant legal rules and regulations. All other reproduction, transfer and use is prohibited without the express written consent of the LTCC. Neither the LTCC nor its members make any representation that use of these materials will ensure other legal compliance. Published 12/2013 This document is intended to be a template which should be customized to fit the unique needs of the provider's operations. Step 2: Privacy and Security Event Analysis – Potential Breach Investigation No Controls: Low Probability Fails Risk Score: Low: 5 Section 3: Decision Medium: 6 – 9 High: 10+ Low: Do not notify Total Score: Fails: 2+ Fails: Auto-Fail – Score Preempted Medium: Consider mitigating factors High or 2+ Fails: Notify Notes / Mitigating Factors: An evaluation of the above factors Decision: does does not demonstrate a low probability that the PHI been compromised. Do Not Notify Notify the Resident and HHS Action Taken in Response to Event: Select all that apply. If selecting “other”, describe in greater detail. Security/Privacy Safeguards Policy/Procedure/Guideline Re-Education Mitigation Sanctions/Disciplinary Actions Policy/Procedure/Guideline Updates Other Complete Following Section if Breach Occurred BREACH NOTIFICATION: Yes No Law Enforcement: Was law enforcement notified? Request for Delay Received: Verbally? Yes No; Date ________ Who? ________ Written? Yes Date ________ No; Date Specified: ________ Delivery of Notification to Affected Parties Written notice to be delivered via first class mail to last known address or electronic notice via email if agreed Date(s) written notice mailed: ____________________ Include example letter with event documents Does urgency exist because of possible imminent misuse? Yes No ; If YES, How was this addressed: ____________________ Is there out of date contact information for 10 or more individuals? Yes No; If YES, What substitute notice (CE website or media release) was used? ____________________(Include example of substitute notice with event documents.) HHS Notification Did breach involve more than 500 individuals at one covered entity? No; IF NO, Document on event log. Sign report. Maintain documentation per policy. Yes; IF YES, HHS Notification Date ________ Did breach involve more than 500 individuals from a state or jurisdiction? No; IF NO, Document on event log. Sign report. Maintain documentation per policy. Yes ; IF YES, Date(s) of prominent media outlet notification ________ (in no case > 60 calendar days after discovery); Names of prominent media outlets notified ________ Report Completed by: Privacy/Security Officer’s Signature : ____________________ Date: ____________________ ©2013, The Long Term Care Consortium (LTCC). These materials may be reproduced and used only by long-term health care providers and their health care affiliates for their internal use, in connection with their efforts to comply with relevant legal rules and regulations. All other reproduction, transfer and use is prohibited without the express written consent of the LTCC. Neither the LTCC nor its members make any representation that use of these materials will ensure other legal compliance. Published 12/2013