Breach SHOULD Be a Four Letter Word HIPAA Omnibus.

Slides:



Advertisements
Similar presentations
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Privacy and Security Cindy Cummings, RHIT.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
Informed Consent.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
 Health Care Information Portability and Accountability Act  Passed in 1996  2 objectives 1) Ensure people could maintain health insurance between.
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health information security & compliance
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HIPAA: It Doesn’t Only Impact Medical Records Basic HIPAA Stuff and Overall Information Protection 1.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
From HIPAA to HITECH OMH Briefing.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA Business Associates Leadership Group Meeting June 28, 2001.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Arkansas State Law Which Governs Sensitive Information…… Part 3B
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
HIPAA CASE STUDY- BREACHES OF PHI IN HEALTHCARE Amanda Foster Erin Frankenberger.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Western Asset Protection
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
ELECTRONIC HEALTH RECORD PRIVACY TRAINING
HIPAA PRIVACY & SECURITY TRAINING
Enforcement, Business Associates and Breach Notification. Oh my!
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
HIPAA & PHI TRAINING & AWARENESS
The Health Insurance Portability and Accountability Act
Presentation transcript:

Breach SHOULD Be a Four Letter Word HIPAA Omnibus

Objectives Recall two examples of recently reported breaches Define breach and post event risk analysis guidance. List three strategies a practice can implement to reduce the likelihood of a breach. 4/28/2015

Breaking News QCA Health Plan has agreed to pay a $250,000 monetary settlement. o Breach in February an unencrypted laptop computer containing the ePHI of 148 individuals was stolen. o After the breach data on equipment was encrypted by QCA. o QCA failed to comply with multiple requirements of the HIPAA Privacy and Security Rules, beginning from the compliance date of the Security Rule in April 2005 and ending in June Concentra has agreed to pay OCR $1,725,220 to settle potential violations and will adopt a corrective action plan to evidence their remediation of these findings. o Breach – stolen laptop from a PT facility. o Several risk analysis’ had identified the risk. 4/28/2015

Breaches Advocate Medical Group in Chicago had 4 desktop computers taken in a burglary that contained the personal information of over 4 million patients. A St. Louis orthodontist office was burglarized and company computers were taken with the data for over 10,000 patients. A physician practice at the University of Texas Health Science Center at Houston discovers a laptop has been stolen containing data for nearly 600 patients. 4/28/2015

Protected Health Information Includes Health information whether oral or recorded in any form or medium Names All geographical subdivisions smaller than a State, including street address, city, county, precinct, zip code All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death Fax numbers Electronic mail addresses Social Security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web Universal Resource Locators (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images; and Any other unique identifying number, characteristic, or code

BREACH

What is a Breach? The unauthorized acquisition, access, use, or disclosure of PHI not permitted under the privacy rule, which compromises the security or privacy of such information. An acquisition, access, use, or disclosure of protected health information in a manner not permitted under the privacy rule is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised. Compliance date September 23, 2013.

Breach Exclusions Worker who has the authority to access information accidentally accesses a record in which they are not involved in the care of that patient. Worker who has the authority to access information inadvertently shares the information with another worker who is not involved in the care of the patient. Information is shared with an individual/entity who is not authorized but the unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information.

Risk Analysis Must Be Completed 1)The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification. 2)The unauthorized person who used the protected health information or to whom the disclosure was made. 3)Whether the protected health information was actually acquired or viewed. 4)The extent to which the risk to the protected health information has been mitigated.

Breach Notification Patients must be notified without reasonable delay and no later than 60 days of the discovery of the breach. Breaches involving 500 or more individuals: Notify prominent media outlets serving the State or jurisdiction with the notification sent to the individual. Notify the Secretary of HHS concurrently with the notification sent to the individual. Breaches involving less than 500 individuals: Maintain a log or other documentation of the breaches and report no later than 60 days after the end of each calendar year in which the breach was discovered. Provide the notification as listed on HHS website.

Reporting Breach Information

Breaches Impacting 500 or More 4/28/2015

Breach Notification and Business Associates Must provide notice to the covered entity (CE) without reasonable delay and no later than 60 days from the discovery of a breach. MUST address timing of reporting either known breaches or suspect situations in the BA contract. It is the CE ultimate responsibility to report the breach to impacted individuals. o Reporting of the incident may be delegated by contract to the BA. o Does not lessen the responsibility of the CE. o Both parties should NOT report.

What Does This Mean? All events must be documented; this includes exclusion events and why they are determined to meet the definition. CE and BA have the burden of proof: To demonstrate that all breach notifications were provided. An impermissible use or disclosure did not constitute a breach such as by demonstrating through a risk assessment that there was a low probability that the protected health information had been compromised. Must maintain documentation sufficient to meet that burden of proof. CRITICAL QUESTION: How will BAs communicate potential breach scenarios?

Patient Notification Process Written notice to affected individuals, provided by first class mail or by electronic mail is specified as the preferred method by the individual. o May be provided in one or MORE mailings as information becomes available. o Phone notice is allowed in an urgent situation, but must be followed by written notice. Substitute notice to affected individuals if contact information is insufficient or out-of-date must be provided. This may be provided via . Insufficient contact information for 10 or more individuals, the notice must be a conspicuous posting on the home page of the covered entity’s Web site for 90 days or notice in major print or broadcast media in the geographic areas where the affected individuals likely reside. o Toll-free number must be included where individuals can learn whether their information was included in the breach.

Patient Notification to Include Brief description of what happened. Description of the types of unsecured PHI that were involved in the breach (name, Social Security Number, etc.). Steps individuals should take to protect themselves from potential harm. Brief description of what the covered entity is doing to investigate the breach, mitigate damage, and protect against further breaches. Contact information at the covered entity for questions by patients. Must make a decision on credit monitoring services.

Four Tiered Penalty Structure For violations involving unknown violations (that is, where entity did not know of the violation and would not have known of it if exercising reasonable diligence): o The penalty for each violation will be between $100 and $50,000. For violations involving reasonable cause (that is, where circumstances would make it unreasonable to comply with HIPAA, despite exercising ordinary business care and prudence): o The penalty for each violation will be between $1,000 and $50,000. Maximum annual penalties for same violations: $1.5 million 4/28/2015

Willful Neglect Violation was due to willful neglect and was timely corrected, an amount not less than $10,000 or more than $50,000 for each violation. Violation in which it is established that the violation was due to willful neglect and was not timely corrected, an amount not less than $50,000 for each violation. Penalty for violations of the same requirement or prohibition under any of these categories may not exceed $1,500,000 in a calendar year. Secretary of HHS has waiver authority.

How Much of a Fine and Investigations Nature and extent of the violation. Number of individuals impacted. Nature and extent of harm, including reputational harm. Indications of non-compliance – Broadly includes past issues around compliance. Investigations: o Indications of willful neglect will result by law in an investigation. o Civil money penalties will NOT be imposed if the violation is corrected within 30 days from when the entity is aware of the violation UNLESS due to willful neglect.

Calculation of Penalties Where multiple individuals are affected by an impermissible use or disclosure, such as in the case of a breach of unsecured protected health information, it is anticipated that the number of identical violations of the Privacy Rule standard regarding permissible uses and disclosures would be counted by the number of individuals affected. Continuing violations, such as lack of appropriate safeguards for a period of time, it is anticipated that the number of identical violations of the safeguard standard would be the number of days the entity did not have appropriate safeguards in place to protect the protected health information. Reference: Federal Register January 25, 2013

Individual Employee Liability (1) uses or causes to be used a unique health identifier; (2) obtains individually identifiable health information relating to an individual; or (3) discloses individually identifiable health information to another person, o A person (including an employee or other individual) shall be considered to have obtained or disclosed individually identifiable health information in violation of this part if the information is maintained by a covered entity (as defined in the HIPAA privacy regulation) and the individual obtained or disclosed such information without authorization. 4/28/2015

OCR Enforcement Example The Hospice of North Idaho (HONI) has agreed to pay HHS $50,000 to settle potential violations of the HIPAA Security Rule. First settlement involving a breach of unsecured ePHI affecting fewer than 500 individuals. Unencrypted laptop computer containing the ePHI of 441 patients had been stolen in June OCR discovered that o HONI had not conducted a risk analysis to safeguard ePHI. o Did not have in place policies or procedures to address mobile device security as required by the HIPAA Security Rule.

Tips to Protect Information

Use or Release Information For treatment, payment and healthcare operations after providing a Notice of Privacy Practices. To the individual or legal representative. To friends and family with informal approval or for emergencies. o May ask the patient for permission to discuss healthcare if accompanied by another person during exam. As authorized by the patient. Based on professional judgment of the healthcare provider which is in the best interest of the patient.

ePHI – Think Broader Than Your Computer Laptops, office PCs, servers Smartphones Thumb or flash drives Back up devices CD/DVD Equipment such as fax or copiers ePHI during transmission o o Healthcare providers o Personal health records

Risk Analysis and Audits Risk Analysis required by the Security Rule Audits o Logons outside usual business hours o Remote access report o File update or change reports o Review of daily activity o Review of employees logged in o Record access. o Logon when person is out of office o Change report o Exceptional access or print o VIP record access

What Can Others See or Hear? Be mindful of hallway conversations which may be overheard. Know what you can discuss with who in patient care areas when others are brought back into the exam area. What information is viewable on your computer screen? Are the appointments for the day posted? Is patient information in the regular trash? When PHI is printed out, double check whose information it is before it is given to a patient (common problem!). Conversations outside of the work environment?

Safeguarding ePHI Access information with personal login and password. o Passwords must not be shared! Log off or lock computer when moving away from work area. Be mindful of the physical security of especially mobile devices containing ePHI (laptops, smart phones). Only open /attachments from reliable sources. Access only approved internet sites. Patient information should not be mentioned on personal social media accounts. Data encryption – back-up devices, phones, servers, computers.

containing PHI must be sent in a secure manner. o This includes ing information for referral purposes. o ing between employees within the practice is acceptable if the system is secure. Means of protection include: o Patient portal. o Encryption. At the patient’s request, PHI may be sent unsecured if you have informed the patient of the risk. o Request should be in writing using the Authorization for Release - Compound Release form. 4/28/2015

Training Train all employees o Including Admin staff o Physicians Baseline training for all new employees o Train specific job functions on targeted areas of need Priority to train employees regarding breach o Definition Protection strategies o Minimum necessary o Logins/passwords o Computer protections – physical security o Social media o Acceptable information sharing sites o Remote access

Quotes from HHS Attorneys If you find you have a problem, report it. If you hinder the investigation by hiding the facts, they will bring the heaviest fines. They don’t care how sorry you are, or how you will do things differently next time. The facts will always speak for themselves. Simply, did you have a good compliance program, and have an incident that happened, or did you have nothing, and did nothing? The real cold comment the Federal attorney made in closing, “ I don’t care if a company or practice goes out of business because of the fine.” 4/28/2015

Thank you! Bill Fivek President & CEO