Software

Gain a 360-degree view of third-party risk by using our SaaS software to centralize, track, automate, assess and report on your vendors. 

Managed Services

Let us handle the manual labor of third-party risk management by collaborating with our experts to reduce the workload and mature your program. 

Overview
Document Collection
Policy/Program Template/Consulting
Virtual Vendor Management Office
Vendor Site Audit

Ongoing Monitoring

Let us handle the manual labor of third-party risk management by collaborating with our experts.

VX LP Sequence USE FOR CORPORATE SITE-thumb
Venminder Exchange

As Venminder completes assessments for clients on new vendors, they are then made available inside the Venminder Exchange for you to preview scores and purchase as you need.

CREATE FREE ACCOUNT

Use Cases

Learn more on how customers are using Venminder to transform their third-party risk management programs. 

Industries

Venminder is used by organizations of all sizes in all industries to mitigate vendor risk and streamline processes

Why Venminder

We focus on the needs of our customers by working closely and creating a collaborative partnership

1.7.2020-what-is-a-third-party-risk-assessment-FEATURED
Sample Vendor Risk Assessments

Venminder experts complete 30,000 vendor risk assessments annually. Download samples to see how outsourcing to Venminder can reduce your workload.

DOWNLOAD SAMPLES

Resources

Trends, best practices and insights to keep you current in your knowledge of third-party risk.

Webinars

Earn CPE credit and stay current on the latest best practices and trends in third-party risk management.  

See Upcoming Webinars

On-Demand Webinars

 

Community

Join a free community dedicated to third-party risk professionals where you can network with your peers. 

Weekly Newsletter

Receive the popular Third Party Thursday newsletter into your inbox every Thursday with the latest and greatest updates.

Subscribe

 

Venminder Samples

Download samples of Venminder's vendor risk assessments and see how we can help reduce the workload. 

resources-whitepaper-state-of-third-party-risk-management-2023
State of Third-Party Risk Management 2023!

Venminder's seventh annual whitepaper provides insight from a variety of surveyed individuals into how organizations manage third-party risk today.

DOWNLOAD NOW

Third-Party Risk Management in Healthcare: A Quick Overview

6 min read
Featured Image

After publication, Venminder created and released a new, simplified third-party risk management lifecycle that is more user-friendly. Learn why we made this big change here. And, learn the stages of the new risk lifecycle here.

 

When it comes to third-party risk, regulators in the healthcare industry, such as the Office for Civil Rights (OCR), Centers for Medicare and Medicaid Services and the Office of the National Coordinator for Health Information Technology, are primarily focused on how health providers, plans and clearinghouses (otherwise known as covered entities) manage their third parties that help them carry out healthcare activities and functions (otherwise known as their business associates).

Typically, the primary guidelines on how they need to do this are established by OCR’s Health Insurance Portability and Accountability Act (HIPAA) and Health Information Trust Alliance (HITRUST).

Decoding the Healthcare Lingo

The healthcare industry’s management of their third parties essentially has a language of its own, when compared to other third-party risk management programs. For example, a typical risk management question such as, “What are you doing to protect your organization from risks associated with outsourcing?” becomes:

“As a Covered Entity (CE), do you have Business Associate Agreements (BAAs) in place with any service provider that has access to Protected Health Information (PHI)?” or “How are you assuring your BAs are meeting the requirements outlined in the terms of the BAA?”

Unfortunately, I’ve noticed that because of this language barrier, some other important areas of vendor risk management take a backburner to service providers that specifically handle PHI. 

How to Translate for Third-Party Risk Management

Don’t get me wrong, HITRUST is one of the most comprehensive guidelines for information security out there.

It maps leading regulations which include:

  • FFIEC - Federal Financial Institutions Examination Council
  • ISO - International Organization for Standardization
  • COBIT - Control Objectives for Information Technologies by ISACA
  • AICPA - American Institute of Certified Public Accountants
  • NIST - National Institute of Standards and Technology
  • PCI DSS - Payment Card Industry Data Security Standard
  • HIPAA - Health Insurance Portability and Accountability Act
  • HITECH - Health Information Technology for Economic and Clinical Health Act
  • CRR - Capital Requirements Regulation (UK)
  • And more.

It also includes control objectives that are further broken down based on the size of the organization implementing them.

(Note: Size, according to HITRUST, is a tiered system based on how many “beds.” i.e., patients or member records a company manages.)

HIPAA standards provide excellent guidance on how to protect the privacy of our health information without inhibiting services.

The Problem that Can Arise in Healthcare Vendor Risk Management

The problem is that since the regulatory language is focused on business associates, it’s easy to fall into the assumption that these are the only engagements that require the time and attention of risk management programs. Healthcare regulators, by no means, tolerate lapses in security, privacy OR risk management. However, they’re best implemented when built on top of existing best practices to make sure covered entities pay special attention to protected health information.

It’s important to remember that any organization that interfaces with customers, members, patients or clients poses risk, even if they are not exposed to protected health information, per se. There are also other areas of vendor risk, such as:

All of which can be threat to your organization if not properly managed. Furthermore, we all know that it doesn’t take a signed contract to open us up to risk. Anyone that we interface, interact or integrate with could potentially pose a threat if we don’t properly maintain our own security. 

Follow the Third-Party Risk Management Lifecyle

No matter what industry you fall into, the Golden Rule of third-party risk management is to follow the lifecycle. Getting a good process in place for the beginning to end management of all contracts and engagements is the best way to make sure you don’t miss anything.

In case you need a refresher, the lifecycle goes as follows:

The first stage is Scoping. Have a clearly defined scope of who (vendors) do and don’t need to go through the lifecycle process. To do this, you’ll need to define what a vendor is to your organization.

The second stage is Inherent Risk and Criticality Assessment. Here, you’ll perform a risk assessment to review the vendor’s inherent risk and determine exactly how critical they are to your organization. 

The third stage is Due Diligence and Residual Risk Determination. In this stage, you’ll begin your initial due diligence to analyze and verify that your prospective vendor meets your needs, comes with a risk level you’re comfortable with and is in regulatory compliance. This will ultimately lead you to the residual risk. 

The fourth stage is Vendor Selection and Contract Management. Now that a vendor has been selected, you’ll begin the contract process. Vendor contract management includes negotiating the terms of contracts and ensuring compliance, change management and ongoing maintenance of the relationship.

The fifth stage is Ongoing Monitoring. Ongoing monitoring is critical to the success of a vendor risk management program. As you may already know, risk fluctuates, and a vendor’s performance can change at any moment. This is why it’s important to periodically request, collect and reassess vendor due diligence.

Finally, the sixth stage is Termination. If you decide the vendor no longer meets your needs, then it may be time to end the relationship. This should involve facilitating a proper exit strategy and notifying the vendor of contract non-renewal. 

3 Healthcare Third-Party Risk Management Tips to Know

Once you have the lifecycle stages in place, consider the following 3 tips:

  1. Validate compliance with BAAs. It's one thing to make sure the BAAs include the language and terms required by HIPAA, but it doesn't always mean they're being followed. A solid third-party risk management program is the only way to truly protect your organization from risk.
  2. Round out your healthcare industry requirements. Leverage existing guidance on cross-industry standards for how to manage third-party risk.
  3. Pay attention to your contracts. Pay attention to all contracts, especially business associate agreements. Make sure to get your paperwork in order, sign a well-reviewed, mutually agreeable contract and continuously monitor.

Regardless of the industry, the formula works. However you want to slice it, it’s still our job to make sure we’re all doing our part to maintain security and the best interests of our partners, clients, stakeholders and customers.  

 

Subscribe to Venminder

Get expert insights straight to your inbox.

Ready to Get Started?

Schedule a personalized solution demonstration to see if Venminder is a fit for you.

Request a Demo