🛡️

HIPAA Policy Suite
Replacement

Leadership Briefing
HealthConnect Texas  |  March 2026  |  Presented by Kevin Moreira, IT Manager

Why We Did This

⚠️ Wrong Scope

Our policies were written for a hospital, not a health information exchange. They assumed we store patient data on our own servers — we don't.

⚠️ 73 Phantom Controls

The independent assessment found 73 controls protecting against risks that don't exist at HTX — creating liability without providing protection.

⚠️ Policy Theater

20 overlapping documents with contradictions, references to roles that no longer exist (CISO, CTO), and procedures nobody could follow.

An independent HIPAA assessment in January 2026 identified this as the #1 finding.

What Changed

Before
  • 20 overlapping policy documents
  • Written for a hospital, not an HIE
  • References to CISO and CTO (both vacant)
  • Procedures mixed into policies
  • No vendor accountability framework
  • 73 controls for risks that don't exist
After
  • 13 clean, non-overlapping policies
  • Scoped to our actual BA role
  • IT Manager with formal delegation
  • 20 separate operational procedures
  • 61-control shared responsibility matrix
  • Zero scope mismatches

Every policy statement is now testable and reflects what we actually do.

By the Numbers

33
Total Documents
Delivered
13
Governance
Policies
20
Procedures
& Forms
0
Scope
Mismatches

Completed in 5 phases · February – March 2026 · Counter Measures Security LLC

What's in the Suite

⚖️

Governance

  • Anchor Policy
  • Risk Management
  • Shared Responsibility Matrix
👥

People

  • Workforce Security & Training
  • Acceptable Use & Confidentiality
  • Onboarding Checklist
📋

Privacy & Breach

  • Privacy Policy (BA-scoped)
  • Breach Notification
  • Incident Response
⚙️

Technical

  • Endpoint / Network / Infrastructure
  • Access Control & Identity
  • Audit & Monitoring
🔄

Vendors

  • Third-Party Management
  • BAA Review Checklist
  • Vendor Register
📄

Operations

  • Business Continuity & DR
  • Physical Security
  • + 14 more procedures

How This Protects HTX

Reduced Audit Exposure

Policies match what we actually do. No auditor can point to a gap between stated policy and practice — eliminating the #1 source of regulatory findings.

Clear Vendor Accountability

The Shared Responsibility Matrix documents exactly who owns each security control. If a vendor has a breach, our documentation shows we did our part.

Right-Sized for Our Team

Every control is proportionate to an 18-person organization. No more pretending we have a CISO, a CTO, and an IT department we don't have.

Defensible in Litigation

If HTX ever faces an OCR investigation or breach lawsuit, these policies demonstrate that our security program was thoughtful, proportionate, and grounded in actual operations.

Key Decisions Made

These architectural choices shape the entire suite and are consistent across all 33 documents.

DecisionWhat It Means
BA scope, not provider scopeWe're not a hospital. Our policies now reflect our actual role as a data exchange facilitator.
All PHI resides with InterSystemsNo local PHI means no local PHI controls. We protect the access chain instead.
CISO duties delegated to IT ManagerRather than pretend we have a CISO, we formally delegate those responsibilities with a documented reversion clause.
6 old technical policies → 1Endpoint, Network, Wireless, Transmission, Configuration, and Media policies consolidated to eliminate contradictions.
Passwords aligned to NIST standards12-character minimum, no forced rotation, no complexity rules — current best practice.
Vendor accountability via SRM61 controls mapped to who owns them: HTX, InterSystems, or Microsoft. Verification methods documented.

What This Means Day-to-Day

All Staff
Sign updated Acceptable Use Acknowledgment and Confidentiality Agreement. Annual security awareness training continues.
IT Manager
Leads quarterly compliance reviews, semi-annual access reviews, log reviews, and patch management per documented procedures.
Leadership
Receives quarterly compliance reports with measurable metrics. Approves the annual risk assessment and policy review cycle.
Vendors
Held accountable through the Shared Responsibility Matrix. Annual assurance reviews for critical vendors (InterSystems, Microsoft).

How We'll Measure Compliance

Quarterly reviews will track these metrics. Targets are adjustable annually.

MetricTargetReview Frequency
Training completion≥ 95%Annual
Endpoint compliance≥ 90%Quarterly
Critical patch latency≤ 14 daysQuarterly
Access reviews completed100%Semi-annual
Log reviews completed100%Per schedule
Vendor assurance current100%Annual
Overdue corrective actions0Quarterly
Policy reviews current100%Annual

Next Steps

1
Leadership review and approval of the policy suite
This month
2
Workforce acknowledgments — all staff sign the updated Acceptable Use and Confidentiality forms
Within 30 days
3
First quarterly compliance review establishes baseline metrics
Q2 2026
4
Annual risk assessment conducted under the new framework
Q3 2026
Questions?