Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,

Slides:



Advertisements
Similar presentations
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
Issue Brief National Association of School Nurses Privacy Standards for Student Health Records.
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Presented by the Office of the General Counsel An Overview of HIPAA.
NAU HIPAA Awareness Training
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Colorado Children and Youth Information Sharing (CCYIS) Educational Stability Summit April 10, 2015.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
HIPAA Privacy Rule Training
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
CompTIA Security+ Study Guide (SY0-401)
HIPAA Security Standards Final Rule
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland, Baltimore County

2 Regulatory Topics Family Educational Rights and Privacy Act of 1974 Health Insurance Portability and Accountability Act of 1996 Gramm-Leach-Bliley Act of 1999 Sampling of Other, Applicable Federal Laws Legislation and Liability - Coming soon to a campus near you!

3 Family Educational Rights and Privacy Act (FERPA) Cornerstone of federal privacy requirements in higher education Prohibits disclosure of “personally identifiable education information” without student’s permission Applies to educational records in any format No individual right of action, but enforced by DoEd. Family Policy Compliance Office. Penalty is loss of federal funding. Avoid penalty with substantial compliance No loss yet by any institution.

4 Health Insurance Portability and Accountability Act of 1996 (HIPAA) Provides for individual medical records rights, privacy obligations of PHI holders, security obligations, e-transactions standardization Privacy Rule included mini-security requirements Security obligations go into effect April 2005 Security Rule includes Administrative, Physical and Technical Safeguards

5 Gramm-Leach-Bliley Act of 1999 (GLB) In 2002 the Federal Trade Commission interpreted its regulations to include educational institutions as covered financial institutions Covers the security of all non-public personally-identifiable financial information of customer of the organization, in any format whether in paper, electronic, or other form, that is handled or maintained by or on behalf of the organization or its affiliates Compliance with FERPA is deemed to be compliance with GLB Educational institutions remain responsible for following GLB security requirements

6 Privacy Coverage Compared FERPA Protects “educational records” (maintained by Inst.), in any format, containing personally identifiable information such as: Individual Grades GPA SSN Date of Birth Gender Class Schedule Hours earned Work Study records HIPAA Protected Health Information* (PHI) means: Medical Records Lab Reports Radiology Reports Provider Notes Billing and Payment records for health care Immunization Records Mental Health Notes – Special care provided under MD law *Privacy covers all PHI, Security covers E-PHI GLB Personally Identifiable Financial Information in any format includes: Financial aid application Credit data Tax returns of parents Reports for direct lending/student loans and request for federal draw reports Student financial information included on various athletic compliance forms University-administered loans to employees Loan collections

7 Security Requirements Compared FERPA No set, specific requirements No clear consensus in higher ed on what is needed No court decisions on third party breach HIPAA Administrative Safeguards 8 subsections on processes, procedures, and training Risk Analysis is foundation Physical Safeguards 4 sections on facility access, workstation security, and device and media controls Technical Safeguards 5 sections covering mechanisms for Access control, Audit control, Data integrity, Authentication, Transmission security GLB Develop comprehensive security program Risk Assessment Risk Mitigation Assess employee training needs Flow down confidentiality obligations to business partners with access to covered information

8 FERPA Issues Communication of digital records across the campus network and the internet Security of protected educational records (3rd party breach/access liability not yet tested in court) FPCO interpretation of FERPA to disallow use of “last 4” of SSN for grading Impact of E-SIGN and UETA on FERPA Release viability No individual right of action, but state laws may allow for action.

9 HIPAA Security Issues Requirements within each Safeguard category are either “Required” or “Addressable” Required safeguards must be implemented Addressable safeguards provide a choice: Implement action Develop an equivalent measure that provides adequate security (equivalency documentation required) Do not implement any action, but document why implementation is not reasonable and appropriate for the organization

10 A Sampling of Additional Federal Laws Electronic Communications Privacy Act (ECPA) - prohibits unauthorized use or interception of any wire, oral, or electronic communication (likely substance only) Also protects against unauthorized access to/disclosure of electronically stored communications (private network may have some added flexibility) USA PATRIOT Act - allows release of stored e-communications to law enforcement if reasonable belief that info must be provided to avoid injury to any person Computer Fraud and Abuse Act - criminalizes unauthorized access to computers used in interstate or foreign commerce or communication TEACH Act (Technology Education And Copyright Harmonization) - relaxes copyright restrictions for certain types of content used in distance ed, provided privacy and security (“technologically feasible”) restrictions are in place to limit transmission to enrolled students

11 Legislation and Liability - Coming soon to a campus near you! The expanding multitude of privacy laws has sensitized people and legislators to privacy rights Although no private right of action in HIPAA, various state medical records laws do allow for private action. These laws previously gave no security standards upon which plaintiffs could rely. HIPAA safeguards may bootstrap state claims. Many states are considering information collection laws involving children, health records, consumer information, library patron records, and ANY records involving SSN (e.g. new CA law bars schools and healthcare providers from printing the SSN on any materials mailed to individuals-may impact out of state providers of distance ed!).