Presentation on theme: "Erin Smith Aebel, Board Certified Health Lawyer, and"— Presentation transcript:
1Patient Privacy Check Up: How to Keep Your Practice Out Of HIPAA Hot Water Erin Smith Aebel, Board Certified Health Lawyer, andKelly Ann Thompson, Esq.Shumaker, Loop & Kendrick, LLP
2Roadmap for Today’s Presentation An overview of the HIPAA Privacy and Security Rule.A discussion of breach notification requirements under the Privacy and Security Rule, as well as under Florida law.An overview of HIPAA enforcement agencies and penalties, and a discussion of recent cases involving physicians.
3What is HIPAA?The Health Insurance Portability and Accountability Act (“HIPAA”) of 1996.Created by Congress to improve many aspects of the delivery of health care in the U.S.Stated Goals:To improve the portability and continuity of health insurance;Combat waste, fraud, and abuse in health care insurance and delivery;Protect the privacy of consumers’ health information; andSimplify the administration of health insurance.In January 2013, HIPAA was updated via the Final Omnibus Rule.
4HIPAA EnforcementHIPAA was created by the U.S. Department of Health and Human Services (“HHS”)HIPAA is enforced by the Office for Civil Rights (“OCR”)This link provides educational materials, FAQs, training materials, and complaint forms.
5Two Areas of Most Concern There are two areas of HIPAA that health care providers are most concerned with:Security RegulationsConcern the security of protected health information in electronic form.Privacy RegulationsConcern the security of all protected health information.
6Who Must Comply with HIPAA Covered Entities (“CE”) must comply with HIPAA.Covered entities include:Health care providers (any provider who transmits any information in electronic form in connection with a covered entity)Health plans (i.e., HMOs, Medicare, Medicaid)Healthcare clearing houses (i.e., billing service)Business Associates (“BA”)
7Business AssociatesBusiness associates are persons or entities who create, receive, maintain, or transmit PHI for a function or activity covered by HIPAA, including claims processing or administration, data analysis, processing or administration, utilization review, quality assurance, patient safety activities, billing, benefit management, practice management or re-pricing.EX: Collection agencies, outside accountants or attorneys, etc.Covered entities are required to enter into written agreements with their BAs providing that they will appropriately safeguard and limit their use and disclosure of PHI.BAs should have already been revised for compliance with the Omnibus Rule requirements. If your BAs have not recently been revised, it is important to review/revise them to ensure the updated language is included.* Practice Tip: When in doubt, get a BA agreement.
8Business Associates Continued The Omnibus Rule extended provisions of HIPAA directly to business associates. Now, aside from contractual obligations under a BA agreement, business associates also have obligations under HIPAA to comply, and are subject to fines and penalties for failure to comply.The Omnibus Rule made it clear that subcontractors of Business Associates are also considered “business associates.”As such, providers should make sure their BA agreements include provisions requiring the BA to obtain written assurances from their own subcontractors providing they will comply with the same restrictions agreed to between the provider and their BA.* Practice Tip: Providers may want to include audit provisions allowing them to verify that their BA has secured downstream agreements.
9What do the Privacy Regulations Protect? Protected Health Information (“PHI”) in ANY form--oral, written, or electronic.PHI is any individually identifiable health information that relates to any physician or mental health of an individual or that can be used to identify the individual.What is considered identifiable information?Name, address, DOB, SSN, date of death, telephone or fax number, health plan or account number, license or vehicle ID number, biometric indicators (finger prints)Health information that has been properly de-identified is NOT protected by the Privacy Rule.The Privacy Rule affects where and how you speak about a patient’s health information.
10How do Privacy Regulations Protect PHI Certain restrictions are placed on the use and disclosure of PHIThere are 3 basic categories of restrictions on PHI:Certain uses and disclosures of PHI are permitted without a patient’s written authorizationOther uses and disclosures require a patient’s written authorizationPHI can be disclosed to another person if you notify the patient in advance and give them the opportunity to object
11Uses and Disclosures of PHI that do not require a Patient’s Authorization Disclosures for treatment purposesDisclosure to health care providers outside of your practice, for treatment purposesDisclosures for payment purposesDisclosures for health care operations (i.e., coordination of care, advice about treatment options, business management, general administrative activities)
12Disclosures Required by Law Certain uses and disclosures of PHI are required by lawFor example:To law enforcementFor certain public health activities such as preventing or controlling disease (i.e., Recent Ebola concerns)To report child abuse or domestic violenceFor judicial or administrative proceedingsUpon receipt of the written consent of the patientUpon a court orderIn response to a subpoena, discovery request, or other lawful process if the provider has received satisfactory assurances from the party seeking the information that:Reasonable efforts have been made to ensure the individual has been given notice of the request; orHas made reasonable efforts to secure a protective order.For worker’s compensation
13Disclosures Requiring Patient’s Written Authorization When an employee tries to seek or use a patient’s PHI for purposes other than treatment, payment or health care operations, or disclosures required by law, the employee must first obtain the patient’s authorization.EX: marketing purposesThe patient should sign an authorization form which is kept in the patient’s file, and a copy should be given to the patient.Only use or disclose the PHI as permitted by the authorization.The authorization must be maintained in the patient file as long as it is valid and for at least 6 years thereafter.TIP: When in doubt, the best policy is to obtain the patient’s written authorization PRIOR to a use or disclosure.
14Disclosures to Family Members Situations arise where a patient comes for treatment with a friend or family memberYou may disclose PHI in the presence of the friend or family member with the patient’s permission.You may, but are not required, to obtain an authorization for this type of disclosure. However, you should note their permission on the patient’s chart either way.Generally do not need authorization or permission from a child to discuss their PHI with a legal guardian.You may send appt. reminders to patients, leave voic s, or send correspondence to patients regarding treatment options UNLESS the patient has requested in writing that you do not do so.
15Patient’s RightsRight to request that certain restrictions be placed upon the use and/or disclosure of their PHI;Practices also need to comply with the provisions in their Notice of Privacy Practices which specify how the practice will process restrictions.Practice Tip: Make sure the staff marks restrictions on patient charts clearly to ensure it is complied with.Right to request that PHI is communicated by an alternate means or in an alternate location;Right to access his or her PHI;Right to request an amendment to his or her PHI;Right to request an accounting of disclosures of his or her PHI.All staff should be aware of these rights. They should be a part of your compliance plan and training. Additionally, you should have procedures for dealing with patients who exercise these rights consistent with the privacy regulations.
16Reasonable Measures to Safeguard PHI Employees must only access or disclose the minimum PHI necessary for their functions.Employees are also required to employ reasonable measures to safeguard a patient’s PHI. For example, do not leave a patient’s PHI in plain view of others.Practice Tips:Cover or turn over patient’s chart when it could be seen by other peopleLimit persons with access to patient charts, lock file cabinets or file rooms as appropriate, and/or block access with signage.Ensure employees, including receptionists, are mindful or protecting PHI in their oral communications.Use passwords to protect computer patient information.Only allow appropriate system access settings that are tailored to an employee’s job duties.
17Notice of Privacy Practices CE must create and provide to patients a “Notice of Privacy Practices” regarding its use and disclosure of a patient’s PHI and the patient’s rights with respect to this information.The Notice should be posted in your practice in a clear location where patients can read it.It should also be posted on any website associated with your practice.Attempt to obtain an acknowledgement that each patient has received the Notice.Additionally, with limited exceptions, HIPAA requires an individual’s written authorization before a use or disclosure of his or her PHI can be made for marketing.The OCR has a model Notice of Privacy Practices for providers located at However, each notice should be tailored for your practice.
18Notice of Privacy Practices Continued If a patient files a complaint with the OCR, the letter from the OCR will likely request a copy of the providers Notice of Privacy Practices, along with a copy of the signed acknowledgement form.*Practice Tip: Require staff to review the Notice of Privacy Practices form from time-to-time.Staff should be familiar with what the Notice of Privacy Practices form says, and they are expected to follow it when speaking with patients, and working with PHI.
19Notice of Privacy Practices Requirements Description of types of uses and disclosures that require authorizationStatement regarding individual’s rights with respect to PHIStatement of CE’s legal duties, including duty to notify of breachStatement regarding ability to make complaintsEffective date and contact informationIn an investigation of an alleged breach of the Privacy Rule and Security Rule, the government will ask for all of your written privacy and security policies and forms. It is important to have those compliant and in good form.*Practice Tip: Review policies and procedures at least annually and indicate that you have done so in your records (for audit purposes). The second round of OCR audits begins this year and the OCR will look for revisions for compliance with the Omnibus Rule updates. They strongly dislike policies that haven’t been dusted off in a while, (i.e. 2003).
20Important Changes that Require Updates to “Notice of Privacy Practices” The Omnibus Rule now requires for providers to include a patient’s right to receive an electronic copy of their designated record set, as well as a patient’s right to direct covered entities to transmit a copy of PHI to another person.This request must be in writing, signed by the individual, and clearly identify the designated person, as well as where to send the copy of the PHI.Providers must honor a patient’s request to restrict communication to a health plan where the disclosure is for the purpose of payments or health care operations, and the PHI pertains solely to a health care item or service for which the health care provider involved has been paid out of pocket.
21Security RuleThe Security Rule is designed to complement the HIPAA Privacy Rule.The Privacy Rule covers health information in any form.The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic format (“e-PHI”).The Security Rule is flexible to allow covered entities to analyze their own needs and implement solutions appropriate for their practice size. The covered entity will need to consider:Its size, complexity, and capabilitiesIts technical, hardware, and software infrastructureThe costs of security measures, andThe likelihood and possible impact of potential risks to e-PHI
22Security Rule Implementations Covered Entities must:Perform a risk analysis. This is the single most important part of HIPAA Security Rule compliance, and the first thing the OCR looks at when investigating a security breach and an alleged HIPAA violation.Evaluate the likelihood and impact of potential risks to e-PHI,Implement appropriate security measures to address the risks identified in the risk analysis;Document the chosen security measures and the rationale for these measuresMaintain continuous, reasonable, and appropriate security protectionsThe OCR has a risk assessment tool available online for small practices that do not have the resources to hire a third party.Practice Tip: It is recommended to perform an annual risk assessment.
23Security Rule Implementations Continued Covered Entities must also:Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain, or transmit;Identify and protect against reasonably anticipated threats to the security or integrity of information;Protect against reasonably anticipated impermissible uses or disclosures; andEnsure compliance by the workforce.* Practice Tip: Designate a Security Official and Privacy Officer, regardless of practice size, to ensure compliance with HIPAA requirements
24What if a Breach of PHI Occurs? First, determine if a breach occurred under HIPAA.Complete a risk assessment to determine the probability of PHI being compromised as a result of the improper use or disclosure of PHI.If a breach occurred, what are your notification requirements?
25What is a Breach Under HIPAA? A breach is an impermissible use or disclosure that compromises the security or privacy of the PHI. An impermissible use or disclosure of PHI is presumed to be a breach unless the covered entity or BA demonstrates there is a low probability that the PHI has been compromised.A breach excludes:Unintentional acts by CEs or BAs if breach occurred in good faith and within the scope of authority.An inadvertent disclosure among workforce members without further use or disclosure.Disclosure with the good faith belief that information would not be able to be retained.
26Breach Risk Assessment There is a presumption of a breach unless the CE or BA can demonstrate a low probability of PHI being compromised based on a risk assessment of:The nature and extent of information involved, including types of identifiers and likelihood of re-identification;The unauthorized person who used the PHI or to whom the disclosure was made;Whether the PHI was actually acquired or viewed;The extent to which the risk has been mitigated.A breach can only occur if the PHI is unsecured.Unsecured PHI is PHI that has not been rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of technology or methodology specified by the Secretary of Health and Human Services. (i.e., encryption).
27Breach Notification Requirements under HIPAA Covered entities must notify individuals of a breach without unreasonable delay and in no case later than 60 calendar days after discovery of a breach.Remember, notification to affected individuals is only required if the breach involved unsecured PHI, and is likely to be compromised based on your risk assessment.Use first class mail to individual, or electronic notice if the individual has consented.Substitute notice required if contact information is insufficientTelephone or alternate written notice if under 10 individuals.Conspicuous posting for 90 days on web or by notice to media if 10 or more individualsNotify the OCR within 60 days if 500 or more individuals, or at year end for fewer than 500 individuals.OCR filings are done online and are relatively painless.
28Civil Monetary Penalties Penalties can range from $100 to $50,000 per violation.Breaches from reasonable cause result in $1,000 to $50,000 per violation.Breaches caused by willful neglect range from $10,000 to $50,000 per violation.In all cases, the penalty will not exceed $1.5 million for identical violations within a calendar year.No penalties if there was no willful neglect, and the breach was corrected within 30 days of the violation.
29Reasonable Cause & Willful Neglect Reasonable cause--covered entity of business associate knew, or by exercising reasonable diligence, would have known that the act or omission violated an administrative simplification provision.Willful neglect--conscious, intentional failure, or reckless indifference.For example: You don’t have any privacy protection rules or required forms in place, you failed to document a risk assessment, you ignored or failed to cooperate with the OCR investigation.
30Assessing Penalties Nature and extent of violation Number of individuals affectedTime period during which violation occurredNature and extent of harmPhysical, financial, reputational harmEffect on ability to obtain health carePrior Compliance
31Florida Information Protection Act 2014 (“FIPA”) FIPA applies to entities that acquire, maintain, store, or use personal information (more than just health care providers).Personal information includes a person’s first name or first initial and last name in combination with any of the following elements:addresses & account numbers with passwordsFirst and last names with health or medical informationSocial security or driver’s license numbersOnline account credentialsPersonal information also includes a “health insurance policy number or subscriber identification number and any unique identifier used by a health insurer to identify the individual.”Covered entities must take reasonable measures to protect and secure data in electronic form, such as encrypting data or removing personally identifiable information from data.
32FIPA RequirementsAfter a covered entity discovers a “breach,” which includes unauthorized access to personal information, the covered entity has 30 days to notify the affected individual. For breaches affecting under 500 people, FIPA requires notice to each person residing in Florida. If the breach affects 500 or more people, in addition to the individual, notice must also be provided to the Florida Dept. of Legal Affairs. If the breach affects more than 1,000 people, notice must also be given to consumer credit reporting agencies.Third party vendors (business associates) have 10 days to notify a covered entity of a breach (as opposed to 60 days under HIPAA).Practice Tip: Require business associates to notify the CE without unreasonable delay and to not exceed 5 days to ensure the CE has time to comply with their notification requirements.Covered entities must, within 30 days, notify all individuals in writing located in Florida whose personal information was accessed as a result of a breach, UNLESS, after appropriate investigation and consultation with law enforcement, the covered entity determines and documents in writing that the breach will not likely result in identify theft or financial harm to those affected.Failure to comply with FIPA results in a fine of $1,000 per day for the first 30 days and $50,000 for each subsequent 30 day period, up to a maximum of $500,000.
33Recent HIPAA News HIPAA data breaches have climbed 138% since 2012. The Office of Civil Rights (“OCR”), which handles HIPAA privacy and security violations, has warned that enforcement will get “aggressive”.The Federal Trade Commission has begun to use consumer protection laws to go after health care entities that don’t adequately protect patients health information.3 Recent Examples:Anthem BreachMedical Records DumpingData BreachSecurity Rule Violation
34Anthem BreachHealth insurer, Anthem, reported to the FBI this month that 80 million of its customers may have been exposed to a data breach.Anthem allegedly failed to encrypt its data. The stolen data includes information such as names, DOB, home addresses, addresses, and income data.Morgan & Morgan has already filed a proposed class action suit against Anthem.
35Medical Records Dumping Case A covered entity left 71 cardboard boxes of medical records unattended and accessible to unauthorized persons during a transition of patients to new providers following the retirement of one of their physicians.Resulted in an $800,000 HIPAA settlement
36Data BreachA breach occurred when a physician attempted to deactivate a personally owned computer server on the covered entities network containing patient PHI.During the deactivation, a lack of technical safeguards resulted in PHI being accessible on internet search engines.Resulted in 4.8 million dollars in HIPAA settlements.
37Security Rule Violation A security breach occurred from malware that compromised the systems security.Resulting in a breach of unsecured PHI.OCR investigation revealed the covered entity failed to conduct an accurate and thorough assessment of the potential risks and vulnerabilities of its electronically stored medical records.$150,000 settlement.
38A Few Final ThoughtsEnsure your Notice of Privacy Practices is updated and covers all the required information.Establish policies to control employee’s use of social media on the job.Encrypt anything that can move – phones, flash drives, disks, laptops – and look at encryption solutions for data in motion, particularly if you are texting.
39QUESTIONS?Erin Smith Aebel, Esq. Board Certified Health Lawyer