In the healthcare industry, it is often necessary for a need to have time-critical information delivered to patients. Healthcare voice broadcasting services represents the utilization of voice technology to provide things like medication, appointments, and schedule openings.
There are many healthcare organizations that are battling cost reduction pressures. Some have resorted to off-shore operations to handle call center activity. There are many Americans that resist the accent and difficulty of communications that can arise. One approach may be to integrate a healthcare voice broadcasting service.
The healthcare providers that use healthcare voice broadcasting services are typically looking for a reduction of cost. Many times, the information that is necessary is simply an attendant type where people can be guided to the answer of their question without the need for a live operator. This could be handled with call center automation.
Additionally, technological advances now permit an auto-attendant. The system may be setup to to answer the phone with a greeting and process voice driven auto attendance. The information gathered by the auto-attendant can further guide the client to the appropriate person for whom they were calling. (The doctor, service provider, department, etc...)
Please be aware that when dealing with healthcare, you must comply with HIPAA. Security standards have changed with HIPAA. (HIPAA Academy for more info Click here )
The HIPAA Security Rule identifies standards and implementation specifications that organizations must meet in order to become compliant. All organizations, except small health plans, that access, store, maintain or transmit patient-identifiable information are required by law to meet the HIPAA Security Standards by April 21, 2005. Small health plans have until 2006. Failing to comply can result in severe civil and criminal penalties.
The general requirements of the HIPAA Security Rule establish that covered entities must do the following:
Covered entities have been provided flexibility of approach. This implies:
Administrative safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect ePHI and to manage the conduct of the covered entity's workforce in relation to the protection of that information. Figure 3 summarizes the Administrative Safeguards' standards and their associated required and addressable implementation specifications.
Standards
|
Implementation Specifications
|
R = Required
A = Addressable
|
Security Management Process | Risk Analysis |
R
|
Risk Management |
R
|
|
Sanction Policy |
R
|
|
Information System Activity Review |
R
|
|
Assigned Security Responsibility |
R
|
|
Workforce Security | Authorization and/or Supervision |
A
|
Workforce Clearance Procedure |
A
|
|
Termination Procedures |
A
|
|
Information Access Management | Isolating Health care Clearinghouse Function |
R
|
Access Authorization |
A
|
|
Access Establishment and Modification |
A
|
|
Security Awareness and Training | Security Reminders |
A
|
Protection from Malicious Software |
A
|
|
Log-in Monitoring |
A
|
|
Password Management |
A
|
|
Security Incident Procedures | Response and Reporting |
R
|
Contingency Plan | Data Backup Plan |
R
|
Disaster Recovery Plan |
R
|
|
Emergency Mode Operation Plan |
R
|
|
Testing and Revision Procedure |
A
|
|
Applications and Data Criticality Analysis |
A
|
|
Evaluation |
R
|
|
Business Associate Contracts and Other Arrangement | Written Contract or Other Arrangement |
R
|
Figure 3: Administrative Safeguards Standards.
Physical safeguards are physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. Figure 4 summarizes the Physical Safeguards' standards and their associated required and addressable implementation specifications.
Standards
|
Implementation Specifications
|
R = Required
A = Addressable
|
Facility Access Controls | Contingency Operations |
A
|
Facility Security Plan |
A
|
|
Access Control and Validation Procedures |
A
|
|
Maintenance Records |
A
|
|
Workstation Use |
R
|
|
Workstation Security |
R
|
|
Device and Media Controls | Disposal |
R
|
Media Re-use |
R
|
|
Accountability |
A
|
|
Data Backup and Storage |
A
|
Figure 4: Physical Safeguards Standards.
Technical safeguards refer to the technology and the policy and procedures for its use that protect electronic PHI and control access to it. Figure 5 summarizes the Technical Safeguards' standards and their associated required and addressable implementation specifications.
Standards
|
Implementation Specifications
|
R = Required
A = Addressable
|
Access Control | Unique User Identification |
R
|
Emergency Access Procedure |
R
|
|
Automatic Logoff |
A
|
|
Encryption and Decryption |
A
|
|
Audit Controls |
R
|
|
Integrity | Mechanism to Authenticate Electronic PHI |
A
|
Person or Entity Authentication |
R
|
|
Transmission Security | Integrity Controls |
A
|
Encryption |
A
|
Figure 5: Technical Safeguards Standards.
The Organizational Requirements section of the HIPAA Security Rule includes the Standard, Business associate contracts or other arrangements. A covered entity is not in compliance with the standard if the it knows of a pattern of an activity or practice of the business associate that constitutes a material breach or violation of the business associate's obligation to safeguard ePHI (under the contract or other arrangement), unless the covered entity takes reasonable steps to cure the breach or end the violation, as applicable. If such steps are unsuccessful, the covered entity is required to:
The required implementation specifications associated with this standard are:
The Policies, Procedures and Documentation requirements includes two standards:
A covered entity must implement reasonable and appropriate policies and procedures to comply with the standards and implementation specifications. This standard is not to be construed to permit or excuse an action that violates any other standard, implementation specification, or other requirement. A covered entity may change its policies and procedures at any time, provided that the changes are documented and are implemented in accordance with this subpart.
A covered entity must maintain the policies and procedures implemented to comply with this subpart in written (which may be electronic) form. If an action, activity or assessment is required to be documented, the covered entity must maintain a written (which may be electronic) record of the action, activity, or assessment.
Similar to the Privacy Rule requirement, covered entities must enter into a contract or other arrangement with business associates.
Generally, the Security Rule preempts contrary state law, except for exception determinations made by the Secretary.
Enforcement of the Security Rule is the responsibility of CMS. However, enforcement regulations will be published in a separate rule, which is forthcoming.
Did you know that you can run calls yourself on the web? If you prefer, we can also control your calls for you. Either way we want to make sure your campaign is a success. We want to build a lasting business relationship with all of our clients, and we are committed to doing just that!