Several officials from CMS spoke at HIMSS 2014 in Orlando regarding meaningful use audits.  Approximately 5% of both physician and hospital providers are being audited, and these audits are split about 50/50 between post-payment and pre-payment audits.    “Document, Document, Document” is the advice of one CMS official.   One best practice, presented by an executive of a large health system, is to create a comprehensive “Book of Evidence” prior to each attestation.  Failure to prove compliance with Privacy and Security Objective #15 (Stage 1) is near the top of the list of reasons for failed audits so it is important to have written evidence that this task was complete.

A professionally completed risk analysis which uses one of the well accepted methodologies can typically span 50 to 150 pages for a hospital and 20 to 50 pages for a physician practice.  However, Joy Pritts, the Chief Privacy Officer for the Office of the National Coordinator of Health Information Technology, along with co-presenter Jonathan Coleman, offered advice to providers who have limited resources and may be unable to afford professional help.

file0001131719935

 

Speaking primarily to physician practices and smaller hospitals, they offered a simplified methodology:

  1. Identify the scope of the analysis.
  2. Gather data.  Include previous analyses and an inventory of all ePHI in the organization.
  3. Identify and document potential threats.  Limit this list to those that are reasonably anticipated.  It may be helpful to group threats in the following categories:
    a. Threats from people with network access
    b. Threats from people with physical access
    c. Environmental threats  – e.g. possible hurricanes or power outages if these apply
    d. System threats – e.g. system failure
  4. Assess current security measures for vulnerabilities – these include physical, technical and administrative security measures
  5. Determine the likelihood of threat occurrence – they advised not to get bogged down in detailed expectancy calculations – “high”, “medium” or “low” can be sufficient
  6. Determine level of risk.  For each threat, calculate risk which is a function of likelihood vs. severity.
  7. Identify security Measures already in place to reduce these risks, such as technical measures or policies and procedures in place.
  8. Finalize documentation.  As detailed above, this is very important.  Keep a copy of the documentation with your “Book of Evidence” to support your attestation.

The core of the report is a table detailing the risks identified.  Coleman presented the following sample: Sample Risk Table

One core message of this presentation is that meaningful use auditors will accept a properly documented meaningful use risk analysis if it is prepared with appropriate diligence, even if it lacks the polish and rigor of a professionally conducted study.

Editor’s Note: Subsequent to the publication of this article, CMS has renamed the “Meaningful Use” programs and MIPS “Advancing Care Information” category to “Promoting Interoperability”.

Pin It on Pinterest