HIPAA PRIVACY AND SECURITY FOR ACADEMIC INSTITUTIONS Presented by Brian D. Gradle, Esq. Hogan & Hartson L.L.P. Washington, D.C. December.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
1 HIPAA and Research and YOU. 2 INTRODUCTION Rule #1:Don’t Panic Rule #2:Bottom Line for Researchers: HIPAA is Manageable thru Education/Awareness and.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Presented by the Office of the General Counsel An Overview of HIPAA.
NAU HIPAA Awareness Training
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
HIPAA Health Insurance Portability and Accountability Act.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Overview of HIPAA Administrative Simplification and Privacy Regulations Darrel J. Grinstead, Partner Amy B. Kiesel, Associate Hogan & Hartson L.L.P.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA – How Will the Regulations Impact Research?.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule Melinda Hatton -- Oct. 31, 2002.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
UNDERSTANDING WHAT HIPAA IS AND IS NOT
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
HOGAN & HARTSON, L.L.P. “Publications” “Health”
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
National Congress on Health Care Compliance
Presentation transcript:

HIPAA PRIVACY AND SECURITY FOR ACADEMIC INSTITUTIONS Presented by Brian D. Gradle, Esq. Hogan & Hartson L.L.P. Washington, D.C. December 15, 2005

2 HIPAA BACKGROUND The first federal law to govern, among other things, the privacy and security of health information (Protected Health Information, or “PHI”) Key Dates: August The Health Insurance Portability and Accountability Act of 1996 becomes law April 14, HIPAA Privacy Rule compliance date April 20, HIPAA Security Rule compliance date

3 What/Who is Covered? “Covered Entities” are health plans (including group health plans), clearinghouses, and providers that engage in one of the HIPAA standard electronic transactions (e.g., claims filing)

4 Hybrids Entities that have both a covered entity and a non- covered entity function, and designate the health care components. Academic institutions frequently designate their medical center and health sciences operations in this fashion. Tip: Many hybrids will include IT Departments and personnel within the health care component. IT cannot disclose PHI to the non-health care component unless permitted under HIPAA.

5 BUSINESS ASSOCIATES “ BAs” are persons that perform functions or activities on behalf of covered entities, and receive or use PHI in the process. Examples: Consultants Attorneys Accountants IT Vendors (with access to PHI) Billing Companies Not BAs:Custodians (despite access to PHI) IT Vendors (without access to PHI)

6 BUSINESS ASSOCIATES (Continued) Required:Business Associate Agreement Tip: IT consultants working alongside employees can be treated as part of the “workforce” for purposes of HIPAA. This will require HIPAA training. Your Role: Help identify those parties that qualify as business associates. Help identify any particular privacy/security issues associated with the PHI.

7 PHI “Protected Health Information” can be electronic, paper, oral, or other form (e.g., a photograph), so long as it is individually identifiable and relates to the individual’s health, the provision of care, or the payment for care. Tip: Records subject to the Family Education Rights and Privacy Act (FERPA) are not subject to HIPAA. Interpretation of the precise scope and nature of the HIPAA/FERPA overlap may differ between institutions; your institution’s privacy officer should be able to address this for your specific situation.

8 Critical Principles and Concepts Under HIPAA Privacy 1.Permitted Uses and Disclosures of PHI A covered entity may use and disclose PHI without patient authorization: –For purposes of treatment (including providing care, consultations, and patient referrals), payment (including activities to obtain payment or be reimbursed for providing healthcare services), and healthcare operations (a broad category that includes administrative, financial, legal, and quality improvement activities). –Where required by law –For law enforcement activities –To health oversight agencies –For research, if the IRB or privacy board has waived authorization activities –Other activities set forth in Privacy Rule

9 Critical Principles and Concepts Under HIPAA Privacy (Continued) 2.Minimum Necessary Standard Even if the PHI use or disclosure is permitted, HIPAA requires CEs to take reasonable steps to limit it to the “minimum necessary” to accomplish the purpose. Exceptions: –Disclosure to providers for treatment –Disclosure to the individual –Disclosures authorized by the individual –Disclosures required by law –Disclosures to HHS for enforcement purposes and uses –Disclosures to comply with HIPAA regulations

10 Critical Principles and Concepts Under HIPAA Privacy (Continued) 3.Patient Authorization Uses and disclosures of PHI not expressly permitted by HIPAA require patient authorization. Authorizations must be “HIPAA compliant” In addition, any additional state requirements (e.g., California’s 14-point font requirement, or disease-specific authorizations) must be met. Tip:“Authorizations” you receive should be scrutinized for compliance with HIPAA, per your institution’s policies and procedures.

11 Critical Principles and Concepts Under HIPAA Privacy (Continued) 4.Notice of Privacy Practices Health plans and providers are obligated to provide their members/patients with a Notice of Privacy Practices. Notices set forth the CE’s obligations and the member/patient’s rights regarding PHI. NOTE: CEs that establish standards that exceed HIPAA requirements must comply with those enhanced standards.

12 Critical Principles and Concepts Under HIPAA Privacy (Continued) 5. De-identification HIPAA does not regulate health information that has been “de-identified.” Two Methods: 1.“Safe Harbor” method. Removal of all identifiers listed in Privacy Rule, plus no actual knowledge that the remaining information could be used to identify the individual (e.g., job title). 2.“Statistician” method. Statistician opinion that the risk is “very small” that the information could be used, alone or in combination with other reasonably available information, to identify the individual.

13 Critical Principles and Concepts Under HIPAA Privacy (Continued) 6.Limited Data Sets HIPAA permits Limited Data Sets, which contain limited amounts of PHI (dates, town, city, state, and zip code) to be used and disclosed for research, public health, or health care operations, pursuant to a written agreement.

14 Critical Principles and Concepts Under HIPAA Privacy (Continued) 7.Role-Based Access Simply because a person can access PHI does not mean he/she should access PHI. HIPAA’s role-based access principle means that persons should use/disclose PHI only in the scope/ context of their role at the organization. Tip: For IT professionals, with sometimes unrestricted access, this is a critical concept to understand and follow.

15 Critical Principles and Concepts Under HIPAA Privacy (Continued) 8.Training All members of the CE workforce must be trained on the HIPAA policies and procedures as necessary and appropriate to carry out their functions. Tip: The format and style of training (e.g., by department, in person, on-line) is up to the CE to decide.

16 Critical Principles and Concepts Under HIPAA Privacy (Continued) 9.HIPAA provides individuals with certain rights regarding their health information, including: –The Right to Request Access to their records (if not granted, CE must explain basis for decision). –The Right to Request an Amendment to their records (if not granted, individual has right to provide a statement of disagreement for the records). –The Right to Request an Accounting of Disclosures (excludes treatment, payment, healthcare ops, incidental, and others). –The Right to Request Restrictions on Disclosures for treatment, payment, healthcare ops (CE does not need to comply, but is bound if it does). –The Right to Request Communications by alternative means or alternative locations (CE to accommodate, if reasonable).

17 Unintended Consequences/ Key Challenges of HIPAA Privacy 1.Unintended Consequence: Disrupting the flow of PHI between providers for treatment. HIPAA expressly permits the flow of PHI between providers for treatment purposes, and without the “minimum necessary” requirement.

18 Unintended Consequences/ Key Challenges of HIPAA Privacy (Continued) 2. Key Challenge: Dealing with “Representatives” of Patients HIPAA defines “personal representatives” as those persons that under applicable law (usually state law) have the authority to make healthcare decisions for the patient. Adult children of elderly patients, parents of teenage patients, patient friends or companions, may not necessarily be “personal representatives” under applicable law.

19 Unintended Consequences/ Key Challenges of HIPAA Privacy (Continued) 3.Unintended Consequence: Creation of BA Agreement backlog. Many CEs continue to negotiate with BAs regarding the terms and conditions of BA Agreements, particularly “business points” (liability, indemnification, insurance).

20 Unintended Consequences/ Key Challenges of HIPAA Privacy (Continued) 4.Key Challenge: Mitigation HIPAA requires CEs to mitigate the harmful effects of an improper use/disclosure of PHI, to the extent practicable. What does this mean, particularly in terms of patient notification? Tip: Do not forget state law in this situation.

21 Unintended Consequences/ Key Challenges of HIPAA Privacy (Continued) 5.Key Challenge: Preemption Most state laws are not preempted by HIPAA, including those that are more protective of individuals than HIPAA. Frequently, states will create heightened protection for certain conditions/diseases, such as HIV/AIDS, STDs, pregnancy, genetic testing.

22 Unintended Consequences/ Key Challenges of HIPAA Privacy (Continued) 6.Key Challenge: Use/Disclosure of PHI for Research HIPAA generally requires patent authorization, or IRB/privacy board waiver, for PHI to be used/disclosed for research. Conflict between Common Rule, which permits non- study specific informed consent, and HIPAA, which requires study-specific authorizations.

23 HIPAA Security in a Nutshell “Covered entity must [e]nsure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits.” HIPAA Security Rule. “A covered entity must have in place appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information.” The “mini Security Rule” under the HIPAA Privacy Rule.

24 Security Rule The Security Rule includes 22 standards, along with 19 required implementation specifications and 20 addressable specifications under its physical, administrative, and technical safeguard categories. This includes an overall “risk analysis” that must be conducted.

25 Key Security Rule Implementation Challenges 1.Recognizing that the Security Rule’s flexible approach (measures must be “reasonable and appropriate”) means that “one size does not fit all.” Tip:Even among academic institutions with HIPAA compliance obligations, standards for compliance will vary significantly

26 Key Security Rule Implementation Challenges (Continued) 2.Building a team (IT, Compliance, Legal) that can evaluate security risks, develop and implement safeguards, and appropriately document policies, procedures, and the overall decision- making process.

27 Key Security Rule Implementation Challenges (Continued) 3.Balancing competing interests between confidentiality, integrity, and availability. Data that is “too secure” and not readily available to a provider upon request can be just as problematic as non-secure data.

28 Key Security Rule Implementation Challenges (Continued) 4.What are the expectations for business associates? The Security Rule does not prescribe the safeguards for BAs – only that they be reasonable and appropriate. Tip:IT may be asked to participate in an evaluation by the CE of a BA’s security safeguards.

29 Key Security Rule Implementation Challenges (Continued) 5.Commercial Off-the-Shelf Software in Medical Devices Medical devices that utilize COTS may be impacted by software security patches and enhancements.

30 Security Rule Implementation Myths and Misunderstandings 1.The Security Rule requires to be encrypted. The Security Rule does not require containing PHI to be encrypted. What it does require is a covered entity to address whether or not it is going to encrypt , as part of its security evaluation. Tip:This assessment is often a key role for IT.

31 Security Rule Implementation Myths and Misunderstandings (Continued) 2.You can purchase “HIPAA Compliant” software, hardware, medical devices, etc. The level of security that a CE should establish is affected by a number of factors, including the CE’s size, costs, and the probability and criticality of risks. These are unique to CEs, and software, hardware, and devices’ security features typically do not take these factors into consideration.

32 Security Rule Implementation Myths and Misunderstandings (Continued) 3.The government has authorized certain vendors to deem parties as “HIPAA compliant.” While the use of outside consultants and vendors can be useful, no outside party has been vested with the authority to deem a CE as HIPAA compliant.

33 HIPAA Enforcement and Penalties HHS Office for Civil Rights: Privacy Rule (civil) HHS Office of E-Health Standards and Services: Security Rule (civil) DOJ for criminal enforcement (over 200 cases under review) Penalties: For Covered Entities: $100 per violation, up to $25,000/year for multiple violations of same standard (civil penalties). Criminal penalties go up to $250,000 fine, 10 years in jail for wrongful receipt or disclosure of PHI with intent to use for commercial advantage, personal gain, or malicious harm. For Any Person: June 2005 DOJ memorandum stated that any person could be prosecuted for aiding and betting or conspiring to commit a HIPAA violation.

34 HIPAA Enforcement and Penalties (Continued) Finally, enforcement is essentially complaint-driven at this time. Privacy: Since April 2003, 15,000 complaints Security: Since April 2005, 20 complaints Criminal Prosecution: U.S. v. Gibson, resulted in $9,000 fine and 16-month jail sentence for healthcare worker that used cancer patient records to obtain credit cards.