© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

An Overview for In-Home Service Providers Legal advice must be tailored to specific circumstances. Information provided in this presentation should not.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
Steps to Compliance: Managing Business Associates PRESENTED BY.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Importance of the Information Risk Assessment. Compliance Programs are intended to proactively audit and assess an organization’s operations to detect.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA Privacy of Health Information Claudia Allen, Esq. General Counsel HealthBridge.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
1 HIPAA Privacy & Security Overview Know HIPAA Presents.
Health information security & compliance
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
What is HIPAA? H ealth I nsurance P ortability and A ccountability A ct (Kennedy-Kassenbaum Bill) nAdministrative Simplification –Privacy –Transactions.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA Update J. T. Ash University of Hawaii System
Health Advocate HIPAA Privacy Information
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
Presentation transcript:

© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon, Esq. Karilynn Bayus, Esq. Saul Ewing LLP March 31, 2015

© Copyright 2014 Saul Ewing LLP Why are we here today? HIPAA Privacy and Security Rule Overview Understand the HIPAA Breach Rule Learn lessons from HIPAA Breaches in the News 2

© Copyright 2014 Saul Ewing LLP HIPAA What Is This About? 3

© Copyright 2014 Saul Ewing LLP Breaches in the News This is not a movie This is a real issue  1 billion data records compromised in

© Copyright 2014 Saul Ewing LLP 2014 Year in Review 1,023,108,267 records breached in ,541 breach incidents 78% increase in breached records from 2013 Source: 2014 Breach Level Index 5

© Copyright 2014 Saul Ewing LLP Breaches in the News Affects every sector of the economy 6

© Copyright 2014 Saul Ewing LLP Breaches in the News Education 7

© Copyright 2014 Saul Ewing LLP Breaches in the News Healthcare 8

© Copyright 2014 Saul Ewing LLP HIPAA Overview The Health Insurance Portability and Accountability Act of 1996 (P.L ) (HIPAA). In 2009 Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act as part of the American Recovery and Reinvestment Act of 2009, which made changes to HIPAA, including a new breach notification requirement The HITECH final rule has been in effect since September 23,

© Copyright 2014 Saul Ewing LLP Administrative “Simplification” 10 Privacy Standards Electronic Transactions and Code Sets Standards Security Standards Breach Notification Enforcement Provisions

© Copyright 2014 Saul Ewing LLP What is the Privacy Rule? The Privacy Rule sets national standards to protect the privacy of individuals’ “protected health information” and applies to “covered entities” 11

© Copyright 2014 Saul Ewing LLP Individually Identifiable Health Information Individually Identifiable Health Information (IIHI) is the health information that identifies an individual or there is a reasonable basis to believe it could be used to identify an individual. “Health Information” is any information (including genetic), whether oral or recorded in any form or medium, that: 12

© Copyright 2014 Saul Ewing LLP Individually Identifiable Health Information (cont’d)  Is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and  Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual. 13

© Copyright 2014 Saul Ewing LLP Protected Health Information The focus of the Privacy Rule is Protected Health Information (PHI). PHI is IIHI that is transmitted or maintained in electronic or any other form or medium, with limited exceptions. 14

© Copyright 2014 Saul Ewing LLP Applicability Health Care Providers that transmit health information in electronic form in connection with a covered transaction Health Plans Health Care Clearinghouses 15 Privacy Rule applies to covered entities:

© Copyright 2014 Saul Ewing LLP Uses and Disclosures of PHI General Rule: Covered entities may not use or disclose PHI except as permitted by the Privacy Rules When PHI is to be disclosed for purposes of Treatment Payment Health Care Operations An individual’s consent is not required 16

© Copyright 2014 Saul Ewing LLP PHI and Research PHI may be used or disclosed for research without a patient’s authorization if the waiver of an authorization has been approved by an IRB or privacy board. Otherwise, a patient’s authorization is required for use or disclosure of PHI for a research study. 17

© Copyright 2014 Saul Ewing LLP My University and HIPAA How does my university fit in? Are we a covered entity? Are we a business Associate? What documentation do we have in place? 18

© Copyright 2014 Saul Ewing LLP HIPAA Security Rule Standards  9 Administrative Safeguard Standards  12 Required Implementation Specifications  11 Addressable Implementation Specifications  4 Physical Safeguard Standards  4 Required Implementation Specifications  6 Addressable Implementation Specifications  5 Technical Safeguard Standards  4 Required Implementation Specifications  5 Addressable Implementation Specifications 19

© Copyright 2014 Saul Ewing LLP 9 Administrative Safeguard Standards  Security Management Process  Assigned Security Responsibility  Workforce Security  Information Access Management  Security Awareness and Training  Security Incident Procedures  Contingency Plan  Evaluation  Business Associate Contracts and Other Arrangements 14

© Copyright 2014 Saul Ewing LLP 4 Physical Safeguard Standards  Facility Access Controls  Workstation Use  Workstation Security  Device and Media Controls 21

© Copyright 2014 Saul Ewing LLP 5 Technical Safeguard Standards  Access Control  Audit Controls  Integrity  Person or Entity Authentication  Transmission Security 22

© Copyright 2014 Saul Ewing LLP We think there was a breach…. What do we need to do? 23

© Copyright 2014 Saul Ewing LLP Breach Notification: General Rule Covered entities are required to report breaches of unsecured PHI to the individuals involved, the Secretary of HHS and possibly the media. 24

© Copyright 2014 Saul Ewing LLP Breach Definition  A “breach” is an acquisition, access, use or disclosure of PHI in a manner not permitted under the Privacy Rule which compromises the security or privacy of the PHI.  Three exclusions: ● Good faith, unintentional acquisition, access or use by a workforce member that does not result in further use or disclosure; ● Inadvertent disclosure by authorized person to another authorized person and info is not further used or disclosed; ● Disclosure by which info could not be reasonably retained. 25

© Copyright 2014 Saul Ewing LLP Risk Assessments Risk Assessments must include at least the following factors: (1) Nature and extent of the PHI involved, including the types of identifiers and likelihood of re-identification; (2) Unauthorized person who used the PHI or to whom the disclosure was made; (3) Whether PHI was actually acquired or viewed; and (4) The extent to which the risk to the PHI has been mitigated. 26

© Copyright 2014 Saul Ewing LLP Notification Requirements  Always to the individual(s) affected – without unreasonable delay and no later than 60 days  Always to Secretary – timing depends on whether more than 500 individuals If less than 500 individuals, must keep a log of breaches and report to HHS within 60 days of the end of a calendar year  To the media if more than 500 residents of a State or jurisdiction affected – without unreasonable delay and no later than 60 days 27

© Copyright 2014 Saul Ewing LLP Recent HIPAA Resolution Agreements – University Related New York and Presbyterian Hospital and Columbia University paid HHS $4.8 million for failing to secure electronic PHI on their network (May 2014) Idaho State University paid HHS $400,000 for unsecured PHI caused by the disabling of fire wall protections at servers maintained by the University (May 2013) 28

© Copyright 2014 Saul Ewing LLP How To Respond If There Is A Breach Hit the ground running Gather evidence Disclose and inform Customer/Patient relations Media strategy Source: IT Governance USA Blog 29

© Copyright 2014 Saul Ewing LLP Hypothetical Scenarios 30

© Copyright 2014 Saul Ewing LLP Takeaways Make sure e-PHI is secured and risk assessments are regularly performed Know your institution’s policies and procedures for reporting breaches Err on the side of caution Do not make system changes without confirmation on the effect of security of e-PHI 31

© Copyright 2014 Saul Ewing LLP Thank you! 32