Compliance Management, Critical Infrastructure Security
Should healthcare cybersecurity framework be one-size-fits-all?

In its quest to ensure greater security adoption in healthcare, healthcare stakeholder groups urge OCR to avoid 'all-or-nothing' approach as it considers modifying the HITECH Act. (Photo credit: "
EMT/Nursing Pediatric Emergency Simulation - April 2013 18
" by
COD Newsroom
is licensed under
CC BY 2.0
.).
If the Department of Health and Human Services wants to improve and support adoption of best practice security measures in healthcare, it should avoid an “all-or-nothing” approach to security implementations. Rather, HHS should better educate and provide recommendations on the importance of adopting industry standards.Specifically, HHS should consider just how far along healthcare covered entities have implemented chosen security measures, rather than enacting strict requirements that may actually inhibit adoption, according to comments from several leading stakeholder groups.The comments were sent to HHS in response to its request for information released in April, which asked for feedback on the current state of security practices used in healthcare, as outlined in HITECH and suggestions on how HHS Office for Civil Rights can better support entities with implementing industry-standard security measures.HITECH was enacted in 2009 to promote the adoption of health IT and includes a host of privacy and security mechanisms for electronic data sharing as a means to bolster the Health Insurance Portability and Accountability Act. However, HIPAA only contains 42 required controls, compared with hundreds of elements outlined in the NIST Cybersecurity Framework that are routinely updated to meet the current threat landscape.The RFI received 87 public comments and more than 5,400 page views, highlighting the importance of the ongoing discussions. SC Media reviewed comments from the Medical Group Management Association (MGMA), American Health Information Management Association (AHIMA), and Association of American Medical Colleges (AAMC), finding several correlating themes.Perhaps the most notable recommendation came from AHIMA, asking OCR to recognize the HHS Workgroup’s Health Industry Cyber Practices (HICP) voluntary guidance as the guide can be easily tailored to meet the specific needs of an organization based on size and provider type.The collaborative effort behind the HICP created a host of best practice security measures readily able to strengthen the sector’s cybersecurity posture. The guide represents “a diverse range of inputs, demonstrative of industry best practices that fit the needs of all providers,” according to AHIMA’s letter.Adopting the freely available HICP will ensure there’s no cost burden passed on to providers. To AHIMA, that will translate to greater adoption and participation in the program.“The end goal of this program is to make healthcare safer by incentivizing providers to adopt security best practices,” AHIMA leaders wrote. “The adoption and recognition of the 405(d) HICP accomplishes both goals.”If OCR is considering recognizing or recommending the use of multiple best practice frameworks, AHIMA recommended the push for either the NIST CF or HITRUST Certification, a “robust certification, quality assurance and recertification process ensuring organizations … are actively engaged in securing their networks.”AAMC also recommended the use of NIST or HITRUST, as well as the measures employed by the Cybersecurity and Infrastructure Security Agency. But for AAMC, the concern is that OCR may inadvertently overstep HITECH’s statutes and burden providers using other standards or frameworks, or a combination of measures for various parts of their operations.HITECH “makes clear that the specific practices adopted ‘shall be determined’ by regulated entities, with the only condition being that the practices are consistent with the HIPAA Security Rule,” according to the AAMC letter. The terms have been carefully calibrated to remain broad, “while providing sufficient clarity for regulated entities to understand the parameters of the term.” MGMA shared similar thoughts, asking HHS to continue recognizing the broad statutory definition of recognized security practice, which will ensure providers can choose their own recognized framework, “as there are vast differences in the technical and financial capabilities between medical groups of all sizes.”“Medical groups should be allowed to continue using their professional judgment as to what is best for their practice and the unique situations they face,” according to the MGMA letter. “For many groups, the most financially viable or available option would be to bundle cybersecurity and cyber insurance with the PMSs or EHRs they already utilize.”
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds