A Guide to Compliant Data Management

Slides:



Advertisements
Similar presentations
SIMPLIFYING PRIVACY: HIPAA PRIVACY STANDARDS AND RESEARCH Angela M. Vieira General Counsel Childrens Hospital and Health Center June 5, 2004.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
1 The HIPAA Privacy Rule and Research This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
HIPAA (health insurance portability and accountability act)
HIPAA – How Will the Regulations Impact Research?.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
HIPAA SURVIVAL SKILLS: An Update University of Miami1 Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Health Insurance portability and Accountability Act (HIPAA)‏
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
HIPAA Health Insurance Portability and Accountability Act.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA 2017 JHSPH IRB Clarifications and Changes
Health Insurance Portability and Accountability Act of 1996
Protecting PHI & PII 12/30/2017 6:45 AM
To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you.
HIPAA Privacy & Security
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
The HIPAA Privacy Rule: Implications for Medical Research
HIPAA Administrative Simplification
HIPAA.
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
The HIPAA Privacy Rule and Research
Health Care: Privacy in a Digital Age
HIPAA Privacy & Security
Making Your IRBs and Clinical Investigators HIPAA-Ready
HIPAA Overview.
School of Medicine Orientation Information Security Training
Presentation transcript:

A Guide to Compliant Data Management Rebecca Hulea, MS, JD Director of Regulatory Compliance UMHS Compliance Office Education Series, 101 Data Management

Learning Objectives Understand data management principles with a law and policy mindset. Understand your role in complying with data management compliance in daily research activities. Identify ways that you can take to assure compliance with law and policy.

Governmental Enforcement The DHHS entered HIPAA settlements totaling nearly $2 million with two covered entities that reported relatively small breaches involving stolen unencrypted laptop computers. 2013 –Researcher downloaded PHI to personal unencrypted laptop while part of research team at UMHS, data stored on laptop after employment ended. Researcher no longer a collaborator on the study. Laptop stolen. 384 patients/research subjects notified. 2013 & 2014 (2 unrelated incidents) Research coordinator sent mass e-mail containing PHI to all research subjects – email addresses viewable by all recipients. 85 and 63 patients/subjects notified, respectively.

Each Word has Significance HIPAA is a powerful law Health -"individually identifiable health information" created, held or transmitted by UMHS in any form or media, (electronic, paper, or oral). Insurance - simplify the administration of health insurance Portability – improve availability and continuity of health insurance coverage in the group and individual markets, to combat waste, fraud, and abuse in health insurance and health care delivery, to promote the use of medical savings accounts, to improve access to long-term care services and coverage. Accountability – appropriately protect and secure health information. Each Word has Significance

Privacy Rule permits UMHS to disclose Patient PHI for research, under certain circumstances. ` UM IRB approval for project & data Patient gives his or her permission to use certain data IRB approved HIPAA Waiver of Authorization required. Minimum necessary only De-identify to extent possible (stripped of all direct & indirect identifiers). Research justification for PHI. Data Use Agreement is in place. Data Management Plan is in place identifying how the study team will address data privacy & security protections through life cycle of project. PHI Privacy Barrier Research ≠ TPO

Privacy & Security Protection Considerations

Let’s Talk Technical Safeguards for a Minute…. No matter where sensitive data is stored – it must be secured, it must be protected... HIPAA Requires the Strongest Encryption Methods available. ALWAYS CONSULT IT SERVICES (MCIT OR MSIS)

What if I suspect PHI is inappropriately disclosed? All HIPAA violations are PRESUMED a “BREACH” 4-prong test: Nature and extent of information involved, including the types of identifiers and risk of re-identification Unauthorized person who used the PHI or to whom it was disclosed Whether the PHI was actually acquired or viewed Extent to which risk to the PHI has been mitigated All HIPAA incidents must be analyzed by the UMHS Compliance Office using a 4-prong test to overcome the presumption of a Breach, Documentation is retained for 6 years. (Do NOT do this analysis yourself!) Your Role: Report all actual and suspected HIPAA privacy or information security violations!

Planning will avoid HIPAA Non-compliance throughout the life cycle of the Project Project Planning Know Data Elements Know Data Source (incoming/outgoing) Follow Minimum Necessary Principles Define User Roles Understand privacy & security requirements Store data in a HIPAA compliant environment Engage IT Early in the discussions Budget for privacy & security costs through data life cycle. Obtain Date Use Agreements Understand UM is the data owner Ask questions Project Phase Know who has your Data at all times Monitor data security environment periodically Monitor & Track PHI use Account for all PHI disclosures (applies if PHI obtained via a HIPAA Waiver) Amend IRB Application EARLY when investigators plan to leave the project or the institution. Obtain signed DUA from external collaborators’ institution. Retrieve data from departing investigators. Report suspected security & privacy concerns to IRB & UMHS Compliance Office Ask questions Project Wrap-Up Minimize improper disclosures – secure data throughout storage period. Destroy data if it is no longer needed. If data was shared externally, obtain certification of external collaborators data destruction. Engage IT for long-term data storage options – Budgets should include cost for long-term storage and security. Report suspected security & privacy concerns to UMHS Compliance Office. Ask questions Project Planning Know Data Elements Know Data Source (incoming/outgoing) Follow Minimum Necessary Principles Define User Roles Understand privacy & security requirements Store data in a HIPAA compliant environment Engage IT Early in the discussions Budget for privacy & security costs through data life cycle. Obtain Date Use Agreements Understand UM is the data owner Ask questions Project Phase Know who has your Data Monitor data security environment periodically Monitor & Track PHI use Account for all PHI disclosures (applies if PHI obtained via a HIPAA Waiver) Amend IRB Application EARLY when investigators plan to leave the project or the institution. Obtain signed DUA from external collaborators’ institution. Retrieve data from departing investigators. Report suspected security & privacy concerns to IRB & UMHS Compliance Office Ask questions Project Wrap-Up Minimize risk to institution – destroy data if no longer needed Obtain certification of external collaborators’ data destruction. Engage IT for long-term data storage – Budgets should have included costs for long- term storage and security. Report suspected security & privacy concerns to UMHS Compliance Office. Ask questions

Compliance is a Partnership, Together We Make it Work. Questions? Thank You!

How to Report Concerns Contact the Compliance Office Phone: 734-615-4400 Email: Compliance-group@med.umich.edu Website: http://med.umich.edu/u/compliance/index.htm Hot Line or Web Form Submission (Anonymous): (866) 990-0111 or http://www.tnwinc.con/WebReport/