1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.

Slides:



Advertisements
Similar presentations
The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
Navigating HIPAA & Recent Healthcare Reform: What You Need to Know.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
 July 10, 2013 Richard D. Sanders T HE S ANDERS L AW F IRM, P.C. 7 Piedmont Center, Suite Piedmont Road Atlanta, Georgia (404)
Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City This Employer.
HIPAA Update: So what’s new with HIPAA?? And, what does it have to do with you? Ellen Cannon, WV DHHR HIPAA Privacy Officer WV Attorney General’s Office.
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
What You Don’t Know Can Cost You HIPAA in a HITECH World Alaina N. Crislip, Esq. October 10, 2013.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Business Associate Contracts: Time Is Running Out... Rebecca L. Williams, RN, JD Partner Davis Wright Tremaine LLP Seattle, WA
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
Health Insurance Portability & Accountability Act (HIPAA)
OCR HITECH Enforcement Tips: Prevent, Detect and Quickly Correct HIPAA COW 2010 Spring Conference Privacy/Security Session 1 HIPAA Privacy Best Practices:
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Security Breach Notification © 2009 Fox Rothschild A Webinar for the Medical Society of New Jersey October 28, 2009 Presented by Helen Oscislawski, Esq.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Office of the Secretary Office for Civil Rights (OCR) HIPAA Privacy and Security Rules Updates HIPAA COW 2010 Spring Conference April 16, 2010.
ARRA/HITECH Update HIPAA COW Webinar February 23, 2010 Welcome! Everyone please mute your phone at this time by pressing *6 This session is being recorded.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
From HIPAA to HITECH OMH Briefing.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
California :: Delaware :: Florida :: New Jersey :: New York :: Pennsylvania :: Virginia :: Washington, D.C. :: 1 NEW OBLIGATIONS.
HIPAA and HITECH The Latest Developments Presented By: Michele Madison Partner, Healthcare Practice Morris, Manning & Martin, LLP
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Office of the Secretary Office for Civil Rights (OCR) Indian Health Service HIPAA Training Hosted by the Aberdeen Area Office July 24, 2012.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
David G. Schoolcraft Ogden Murphy Wallace, PLLC
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Office of the Secretary Office for Civil Rights (OCR) The HITECH NPRM: Overview of Research Comments October 19, 2010 Christina Heide, JD HHS Office for.
Advanced Issues in Privacy: Drafting and Negotiating Business Associate Contracts Thomas E. Jeffry, Jr. Partner Davis Wright Tremaine LLP Los Angeles,
CAHF 2010 HIPAA II and HITECH “Your Plan” Rhonda Anderson, RHIA, President Lizeth Flores, RHIT, Consultant Anderson Health Information Systems, Inc. 940.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The American Recovery and Reinvestment Act of 2009: Changes to HIPAA Privacy and Security Requirements And its Impact on Hospitals Presented By: Michele.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Finally, the Final HIPAA/HITECH Regulations are Here! By LYNDA M. JOHNSON Friday, Eldredge & Clark.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
1 Kansas Health Solutions July 9, 2009 HIPAA Goes HITECH Martie Ross Lathrop & Gage LLP (913)
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Enforcement, Business Associates and Breach Notification. Oh my!
HIPAA CONFIDENTIALITY
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
HITECH’s Impact on Research
Presentation transcript:

1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine LLP

2 HIPAA 2.0 American Recovery and Reinvestment Act (Economic Stimulus Package) Title XIII Health Information Technology for Economic and Clinical Health Act EHR funding and incentives Expanded privacy and security obligations (HIPAA 2.0) Breach notification rule

3 Data Breach Notification  Existing Law:  No HIPAA data breach notification requirement, but may have been part of mitigation  Most states have notification requirements  HITECH: First federal law mandating breach notification  Affects covered entities, business associates, vendors of personal health records, and PHR service providers  FTC: Final regulations  HHS: Interim final regulations

4 Data Breach Notification  Upon the discovery of a  Breach of  Unsecured PHI  Covered entities or business associates must make required notifications

5 Data Breach Notification  “Breach”  Unauthorized acquisition, access, use, disclosure of PHI  In a manner not permitted by the HIPAA Privacy Rule  That compromises the security or privacy of such PHI  Poses a significant risk of financial, reputational, or other harm to the individual  De-identified information does not pose risk of harm  Fact specific analysis  Exceptions  Unauthorized person would not reasonably have been able to retain the PHI  Certain good faith or inadvertent access by or disclosures to workforce in same organization

6 Data Breach Notification  “ Unsecured ”  Not protected by “technologies and methodologies that render PHI unusable, unreadable, or indecipherable to unauthorized individuals”  Basically information that is not encrypted or destroyed (per NIST standards)

7 Data Breach Notification  Timing  Notification without unreasonable delay but not later than 60 days after “discovery”  Clock starts ticking on first day it is known – or using reasonable diligence would have been known – to any workforce member or agent (per federal common law of agency) (other than person committing the breach)  Subject to law enforcement delay

8 Examples of Timing Breach occurs Employee learns of breach Employee informs Privacy Officer Latest possible time to notify Oct. 1Oct. 3Nov. 15Dec days But remember without unreasonable delay Beware: Clock starts when entity leans of – or using reasonable diligence should have learned of – the breach

9 Examples of Timing Oct. 1Oct. 3Nov. 1Dec. 2Dec. 30 Breach occurs Breach is discovered by Business Associate BA notifies CE Outside notification time (if BA is not an agent) Outside notification time (if BA is an agent) 60 days Business associate must notify without unreasonable delay, but in no event longer than 60 days 60 days

10 Notification of Data Breach  Notification to affected individuals  Written notice  Electronic notice if individual agrees  Next of kin/personal representative for deceased patients  Substitute notice  Insufficient or out-of-date contact information  Reasonably calculated to reach individual  Not required for next-of-kin/personal representative  If fewer than 10 individuals have incomplete information  Alternative written, telephone, or other notice  If 10 or more individuals have incomplete information  Conspicuous posting on website for 90 days or  Conspicuous notice in major print or broadcast media and  Must include a toll-free number to get more information

11 Notification of Data Breach  Notification to HHS  If 500 or more residents in a state affected  notice contemporaneous with individual notice  If fewer than 500 individuals are affected  notice through log submitted annually  Notification to the media  If more than 500 residents in a state or jurisdiction affected  notice to prominent media outlet  Also may be part of substitute notice

12 Content of Notification  What happened  Types of unsecured PHI involved  Steps individuals should take to protect themselves  What the covered entity is doing to  Investigate the breach  Mitigate harm  Protect against further breaches  Contact procedures for questions/information  Business associates, as possible, should provide:  Identification of each individual affected  Other available information CE must provide

13 Data Breach Notification  Administrative Requirements  Policies and procedures  Training  Burden on organization to prove compliance  Need a plan to respond

14 Business Associates  Existing Law: Business associates have not been directly regulated by HIPAA  Instead Covered Entities were required to enter into business associate contracts with their business associates  Way to backdoor some of the HIPAA requirements

15 Business Associate: HITECH  Clarification of business associate status  HIEs  RHIOs  e-Prescribing Gateway  PHR vendors that provide PHRs to covered entities  No change to definition of business associate

16  Business associates are required to:  Notify covered entities if they discover a data breach  Directly comply with sections of the HIPAA security rule ― as if they were covered entities  Administrative safeguards  Physical safeguards  Technical safeguards  Documentation requirements  Not use or disclose PHI in a manner that is not in compliance with the privacy portions of their business associate contracts Business Associate: HITECH

17  Other HITECH privacy and security requirements that apply to covered entities  “Shall be incorporated into business associate agreement”  Differing interpretations  Application of law?  Requirement to amend business associate contracts?  Now subject to civil and criminal enforcement and penalties under HIPAA  Criminal enforcement – previously a possibility  Civil enforcement and audits – new liability exposure Business Associates

18 Expanded Accountings of Disclosures  Existing Law: Individuals have right to receive accounting of disclosures of their PHI, but no TPO in accounting  HITECH: If CE uses/maintains an EHR  Right to accounting of TPO through EHR  For previous 3 years (as opposed to 6)  Affected by rulemaking (coming soon)  Compliance Date:  January 1, 2011  Reprieve for existing EHRs (as of 1/1/09): January 1, 2014

19 Access to PHI  Existing Law: Individual has a right to access/receive a copy of medical record  HITECH: If CE uses/maintains an EHR  Right to electronic copy of records  Right to direct CE to transmit electronic copy to another entity or person  Fees = no more than labor costs

20 Individually Requested Privacy Restrictions  Existing Law: Individual has right to request privacy restrictions but binding on CE only if CE agrees  HITECH: No disclosure to health plans for self- pay services if so requested by individual

21 Minimum Necessary  Preference for  De-Identified Information  Limited Data Sets  Clarifications

22 Marketing  Existing Law: Exceptions to “marketing” (treatment, care coordination, part of plan of benefits, etc.)  HITECH: Marketing exceptions do not apply if CE receives direct or indirect payment for a communication unless the communication:  Regards a drug currently prescribed for the recipient and payment is “reasonable in amount”  Is made by the CE pursuant to a valid authorization in accordance with HIPAA  Is made by a BA, on behalf of a CE, and is consistent with its business associate contract

23 No Sale of PHI  Existing Law: No prohibition on a CE being paid for PHI as long as the disclosure is otherwise permitted  HITECH: Prohibits a covered entity or business associate from directly or indirectly receiving payment in exchange for any PHI without a valid authorization from the individual (that includes a specification of whether the PHI is subject to sale for re-disclosure)

24 No Sale of PHI  Exceptions:  Public health activities  Research – with price reflecting costs for preparation and transmittal  Treatment of the individual, subject to any regulation  Sale, transfer, merger, or consolidation  Payment to business associate for its BA services  Provision to an individual with a copy of his/her record  As otherwise determined by HHS

25 New Penalties  Tier A (if offender did not know, and by exercising reasonable diligence would not have known, that he or she violated the law): $100 for each violation, up to $25,000 for identical violations  Tier B (if the violation was due to reasonable cause and not willful neglect): $1,000 for each violation, up to $100,000 for identical violations  Tier C (if the violation was due to willful neglect but was corrected): $10,000 for each violation, up to $250,000 per year  Tier D (if the violation was due to willful neglect and was not corrected): $50,000, up to $1,500,000 per year

26 New Enforcement Approaches  Clarifies/expands liability for criminal violations  Increases civil penalties  Harmed individuals to receive percentage of CMP  State Attorneys General may bring civil actions  Continuation of OCR corrective action plans  Audits

27