• EG Conley Home
  • Why EG Conley
    • Business Performance Advisors
    • Strategic Performance Plan
    • The Principa Alliance
    • Our Team
  • Our Services
    • Business Performance & Growth
    • Performance Benchmarking
    • Tax Services
    • Audit
    • Business Valuations
    • Succession Planning
    • Peer Reviews
    • Retirement Plan Services
    • Payday Solutions
  • Tax Tools
    • Tax Tips
      • Individual
      • Business
      • Financial
    • Tax Rates
    • Due Dates
    • Financial Tools
    • Retention Guide
    • IRS Forms
  • Events
    • Summits & Webinars
  • News
    • Monthly Newsletter
    • Daily News
  • Contact Us
    • Careers

EG Conley Blog

Making your business more valuable.

  • Blog Home
  • Tax Tips
    • Business
    • Individual
    • Non-Profit
    • Payroll
  • Business Performance
  • QuickBooks
  • Accounting
Home Uncategorized Analyze your health plan’s electronic security to comply with HIPAA

Analyze your health plan’s electronic security to comply with HIPAA

Posted on September 17, 2018 Written by EG Conley, PC Leave a Comment

If you’re an employer that sponsors a health care plan, you may worry about inadvertently violating the Health Insurance Portability and Accountability Act — commonly known as HIPAA. But you should also bear in mind that there is a formal requirement for ensuring electronic data security. Specifically, sponsors of most plans must do a risk analysis to comply with what’s called the HIPAA security rule.

Pertaining to PHI

The HIPAA security rule describes the required risk analysis as “an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information.”

In this context, a “vulnerability” is a flaw or weakness in a security system that could be exploited (intentionally or accidentally) to breach security. “Risk” is determined by assessing both the likelihood that a vulnerability will be exploited and the extent of the resulting impact on the health plan.

In performing the risk analysis, it’s important to remember that the HIPAA security rule applies only to electronic protected health information (PHI). Employers with insured plans may limit their compliance obligations by minimizing the amount of electronic PHI they create, receive, maintain or transmit. For example, you might structure your plan so individually identifiable information, such as claims data, is maintained exclusively by your insurer.

Also, enrollment information created by the plan sponsor — for instance, when you administer open enrollment — doesn’t constitute PHI because that information isn’t collected on behalf of the plan. Thus, the risk analysis for a small insured plan can be much simpler than that for a large, self-insured plan where the sponsor performs administrative functions.

Surveying your systems

As a first step, identify all hardware, software, facilities, workstations and information systems used in storing, receiving, maintaining or transmitting electronic PHI. You may be surprised at the amount of electronic PHI you have. Next, identify and assess security measures currently in place to protect the electronic PHI, noting specific vulnerabilities and risks. Finally, determine what, if any, additional security measures are needed to respond to the identified vulnerabilities and risks.

It’s particularly important to document completely each step of the risk analysis, including how the health plan reached its conclusions regarding vulnerabilities, risk assessment and security measures. The security rule doesn’t require perfect security but, in the event of a security breach, a health plan must be able to explain why its security measures were appropriate.

Undertaking the process

Note that the HIPAA security rule doesn’t apply to a health plan that has fewer than 50 participants and is self-administered by the employer that established and maintains the plan.

If the rule does apply to you, keep in mind that it doesn’t specify how often employers should conduct a risk analysis. Undertaking the process annually or whenever there’s a major change to your health plan or IT systems is generally recommended. For further information, please contact us.

© 2018

Filed Under: Uncategorized

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Facebook
  • LinkedIn
  • Tumblr

Search the Blog

Subscribe

Get the Adding Value email newsletter

We never share your email address. Opt out at any time.

Tags

ACA Accounts Autos Benefits Capital Gains Cash Flow Charity Credits Customers Deductions Depreciation Divorce Education Employees Estimated Tax Forms Goals Health Insurance HRAs Income Internal Controls IRAs IRS KPIs Life Insurance LLCs Losses Overtime Partnerships Passive Payroll Planning Profit R&D Regulations Rentals Sales & Exchanges S Corps Section 179 SE Tax State Travel Trucks Withholding

Copyright © 2025 · Focus Pro Theme on Genesis Framework · WordPress · Log in