Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP

Slides:



Advertisements
Similar presentations
Davis Wright Tremaine LLP HIT Legal Issues: HIPAA Implications to a Regional Health Information Organization Becky Williams, R.N., J.D. Partner, Co-Chair,
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Confidentiality and HIPAA
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Business Associate Contracts: Time Is Running Out... Rebecca L. Williams, RN, JD Partner Davis Wright Tremaine LLP Seattle, WA
Confidentiality, Ethics, Privacy, and Access REPORT FROM CONFIDENTIALITY, ETHICS, PRIVACY AND ACCESS Group B.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Developing Privacy and Security Standards Allen Briskin Allen Briskin
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Trading Partners, Legal Relationships October 2, 2001 presented by Peter B. Goldstein, Esq. Cap Gemini Ernst & Young, US LLC.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Advanced Issues in Privacy: Drafting and Negotiating Business Associate Contracts Thomas E. Jeffry, Jr. Partner Davis Wright Tremaine LLP Los Angeles,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
HIPAA For Provider Contracting Networks Paul Smith Davis Wright Tremaine LLP One Embarcadero Center Suite 600 San Francisco, CA (415)
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
THE TENTH NATIONAL HIPPA SUMMIT ELECTRONIC HEALTH RECORDS NATIONAL HEALTH INFORMATION INFRASTRUCTURE LEGAL ISSUES APRIL 7, 2005 Paul T. Smith, Esq. Partner,
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
OHCAs, ACEs and Hybrid Entities Paul Smith Davis Wright Tremaine LLP One Embarcadero Center Suite 600 San Francisco, CA (415)
A Professional Corporation Stinson, Mag & Fizzell (402) Business Associates 101 Jennifer Wolfe Jerram, B.S.N., J.D.
Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
A NATIONAL HIPAA SUMMIT AUDIOCONFERENCE Davis Wright Tremaine LLP Legal Requirements For Vendor And Clearinghouse HIPAA Compliance; Business Associate.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HEALTH INFORMATION TECHNOLOGY SUMMIT OCTOBER 23, 2004 COMMUNITY-BASED COLLABORATIONS: LEGAL ISSUE Reece Hirsch, Esq. Sonnenschein Nath & Rosenthal LLP.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule Melinda Hatton -- Oct. 31, 2002.
Health Insurance Portability and Accountability Act of 1996
Health Insurance Portability and Accountability Act HIPAA 101
Moving Health Information In An Emergency
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
Paul T. Smith Davis Wright Tremaine LLP
SHARING CLINICAL DATA: Legal and Privacy Issues
Refuah Community Health Collaborative (RCHC) PPS
Move this to online module slides 11-56
NATIONAL HEALTH INFORMATION TECHNOLOGY AUDIOCONFERENCE NOVEMBER 23, 2004 Legal Barriers to the Adoption of Health Information Technology Paul T. Smith,
Policies for Information Sharing
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Lesson 1  7 Basic Components of an Effective Compliance Plan
HIPAA Security Standards Final Rule
manatt | phelps | phillips
Business Associate Contracts: Time Is Running Out . . .
Drew Hunt Network Security Analyst Valley Medical Center
National Congress on Health Care Compliance
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Making Your IRBs and Clinical Investigators HIPAA-Ready
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Analysis of Final HIPAA Privacy Modification Rule
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
WELCOME.
Presentation transcript:

GET CONNECTED KNOWLEDGE FORUM LEGAL ISSUES IN GETTING COMMUNITIES CONNECTED JUNE 28, 2005 Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP One Embarcadero Center, Suite 600 San Francisco, CA 94111 415.276.6532 paulsmith@dwt.com

Regional Health Information Organization Public health surveillance Quality accountability Research Consumers RHIO Health Plan Provider Provider Provider Provider

Consumer Participation NHII— “Consumer-centric” Includes a personal health record Has a strong theme of consumer “ownership” Consumer consent not required for inclusion in RHIO by provider, as long as there are Appropriate safeguards Restrictions on use and disclosure

Consumer Control Many advocate an “opt-in” model What rights should the consumer have to— Control data going into the NHII? Control access to that data? HIPAA does not differentiate What are the implications for providers?

What uses and disclosures are permitted? HIPAA is permissive: the only required disclosures are to The individual HHS for HIPAA compliance investigation Treatment is a given, but what are the rules for— Health care operations, including payment Public health oversight Research Use by law enforcement

Security in a RHIO Covered entities must maintain reasonable and appropriate administrative, technical and physical safeguards— To ensure confidentiality and integrity of information To protect against reasonably anticipated-- threats to security or integrity unauthorized uses or disclosures

Security in a RHIO Basic requirements with implementation features Technology neutral, flexible and scalable To be implemented in a manner that best suits the entity’s needs, circumstances and resources, taking into account Size, complexity and capabilities Technical infrastructure and capabilities Cost of security measures Potential risks to health information

Security in a RHIO What is missing? Clearly defined, uniform security requirements Access restrictions Authentication with non-repudiation Technical restrictions on use Audit trials Enforcement, enforcement, enforcement

Policing the RHIO Not directly regulated Covered entities disclosing health information are required to obtain & enforce contractual assurances that the RHIO will-- Safeguard the data (security) Restrict uses and disclosures to those permitted to the covered entity (privacy) Return or destroy the data on termination, if feasible

Policing the RHIO A covered entity is liable for breaches by business associate if the covered entity-- Learns of a pattern or practice of violations, and Fails to take reasonable and appropriate remedial measures Weak standard

User Agreements - Structure Policies and Procedures Can be changed on notice with user opt-out Core terms Common terms Role-specific terms User agreement Designates user’s role Incorporates core terms and P&Ps

User Agreements – Policies & Procedures User enrollment and termination Technical requirements Data standards Security requirements Privacy practices (permitted uses) Consumer rights

User Agreements – Core Terms Ownership of system and data Nature of user’s right to use Permitted uses, based on user’s role

User Agreements – Core Terms User’s responsibilities: Compliance with policies and procedures Accuracy and completeness of contributed data Appropriate authorizations/NPPs Payment of fees

User Agreements – Core Terms Network’s responsibilities: Maintain and support the system Maintain privacy and security of data Gatekeeper functions Business associate provisions Credential users Police the system Afford individual rights

User Agreements – Core Terms Fees and charges Disclaimers, limitations and indemnifications Term and termination provisions What happens to the data?

User Agreements – Individual Agreements Identify user Identify user’s role Incorporate core terms and P&Ps