7 Things Healthcare Leaders Should Know About 405(d) HICP

It’s been over 25 years since HIPAA became law. During that time, the processes and frameworks that surround cybersecurity and the protection of patient data have changed significantly. Still, healthcare organizations of all sizes often struggle with the ambiguity surrounding HIPAA as the guidelines don’t stipulate how they should be applied within a specific organization’s capabilities, resources, or threats.

The practices outlined in 405(d) HICP bring clarity and alignment where previous guidelines have not, including specific guidance for cybersecurity protection based on the size of an organization, small, medium or large.

Whether you’ve been familiar with 405(d) HICP for some time or are new to the framework, here’s a quick rundown of the most important things you should know:

  1. It all started with the Cybersecurity Act of 2015. In fact, it’s section 405(d) of this act that called for a more coordinated approach to cybersecurity in the healthcare industry. In 2017, as a result of this Act, Health & Human Services (HHS) convened a task force of 200 information security officers, medical professionals, privacy experts, and industry leaders. It’s this task force that developed consensus-based guidelines, practices, and methodologies to strengthen healthcare against cyber threats. From this work, HHS issued voluntary cybersecurity guidance for healthcare entities known as Health Industry Cybersecurity Practices (HICP).
  1. 405(d) HICP is a voluntary set of federally recognized standards; adopting and documenting these practices can work in your favor should you find yourself audited by the Office for Civil Rights (OCR). In 2021, a bill named HR 7898 was signed into law as an amendment to the HITECH act and is now known as Public Law 116-321. The law requires HHS to recognize the adoption of cybersecurity best practices, like 405(d) HICP. If an organization can demonstrate that they have had 405(d) HICP in place for no less than 12 months prior to the point of an investigation, it may result in the mitigation of fines and early, favorable regulatory treatment.
  1. 405(d) HICP is not a safe harbor nor does it provide HIPAA relief. This one is really important because HR 7898 has been referred to by many as “the HIPAA safe harbor act” when in reality it does not provide regulatory relief. In other words, health organizations and their business associates still have to abide by HIPAA, can still be audited for violating HIPAA, and can still face penalties.
  1. 405(d) HICP does not replace the need for your organization to have established HIPAA policies and procedures, nor does it replace the need for risk analysis. Rather, your risk analysis process can be used to identify and prioritize the rollout of 405(d) HICP controls.
  1. Industry experts tell us that every OCR inquiry now includes a request for proof of recognized security practices, if adopted by the organization. What’s more, some investors, cyber insurers, and other third parties have begun requiring that healthcare organizations they contract with demonstrate the adoption of recognized security practices.
  1. Practices and sub-practices outlined in 405(d) HICP are broken out by organizational size – small, medium, and large. Size is determined by IT capacity, cybersecurity investment, size, and complexity; and as organizations grow, they need to reevaluate which size category they fall into. Large organizations also have to account for the practices outlined for medium and large
  1. Clearwater can help. From resources and education to assessing and documenting your 405(d) HICP progress, we’re ready. Clearwater’s IRM|405(d) HICP™ software module can help you identify, organize, and prioritize your 405(d) HICP controls and simplify the documentation process so you’re ready when you need it. If you’ve had 405(d) HICP practices in place for 12 months or longer, you may be ready for an assessment conducted by our team of experts.

Resources for Getting Started

Regardless of where you are in the process of establishing and documenting 405(d) HICP practices, the right tools and resources can go a long way. Take a look.

White Paper:

The Guide to 405(d) Health Industry Cybersecurity Practices

On-Demand Webinars:

Advancing Your Cybersecurity Practices Through 405(d)

IRM|405(d) HICP™ Demonstration

Blog Article:

HR 7898: More Incentive for Healthcare Entities to Adopt Cybersecurity Best Practices

Information from HHS:

405(d) Information (hhs.gov)

For informational purposes:  Small organization controls are stand alone; large organization controls include the medium and large controls.

Ready to learn more? Schedule a call to learn about Clearwater’s IRM|405(d) HICP™ software and how Clearwater’s consultants can help you navigate and assess your use of the 405(d) HICP framework.

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Related Blogs

Navigating the HIPAA Privacy Rule for Reproductive Healthcare: Compliance Essentials Before the December 2024 Deadline

Navigating the HIPAA Privacy Rule for Reproductive Healthcare: Compliance Essentials Before the December 2024 Deadline

In an era where the privacy of reproductive healthcare has become a topic for debate, healthcare organizations face growing fears and challenges over the potential misuse of sensitive patient data. Recent legal developments, coupled with the shifts following the Dobbs v. Jackson decision, have shown the urgent need for robust safeguards. Notably, the December 23, 2024 compliance deadline for the HIPAA Privacy Rule Final Rule to Support Reproductive Health Care Privacy offers a pivotal moment to address these concerns.
The Health Care Cybersecurity and Resiliency Act of 2024: Key Takeaways and Implications

The Health Care Cybersecurity and Resiliency Act of 2024: Key Takeaways and Implications

The Cybersecurity and Resiliency Act (HCCRA) of 2024 is yet another proposed bill aimed at strengthening the healthcare sector’s cybersecurity posture and resilience. It focuses on improving coordination between government organizations, updating cybersecurity standards, increasing breach reporting requirements, and providing grants to rural healthcare organizations that lack both financial and human resources needed to address growing cybersecurity vulnerabilities and increasing threats.

Connect
With Us