Leveraging 405(d) HICP: A recap and overview of 2023 updates

If the U.S. Department of Health and Human Services’ (HHS) 405(d) Health Industry Cybersecurity Practices (HICP) guidelines have been on your organization’s radar or already implemented in your organization, you likely know that updates were recently released for 2023 reflecting changes in healthcare risks and vulnerabilities and how organizations should respond to the changing threat landscape.[1]

405(d) HICP is a voluntary set of federally recognized standards, and according to Pub. L. No, 116–321—which was signed into law in 2021—HHS must recognize the adoption of cybersecurity best practices—like 405(d) HICP during an investigation.[2] If an organization can demonstrate that they have had 405(d) HICP in place for no less than 12 months prior to the point of an investigation, it may result in the mitigation of fines and early, favorable regulatory treatment.

To be clear, Pub. L. No. 116–321 doesn’t provide regulatory relief regarding HIPAA compliance but offers much-needed alignment and guidance between National Institute of Standards and Technology/Cybersecurity Framework and 405(d) HICP. In the event of an HHS Office for Civil Rights (OCR) investigation, OCR will ask which framework you’ve adopted and expect that you can demonstrate when the implementation and use of these best practices.

This document is only available to members. Please log in or become a member.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field