Notice of Proposed Rulemaking (NPRM) Comments Privacy and Security Workgroup Deven McGraw, chair Stan Crosley, co-chair April 27, 2015.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Quality Measures Vendor Tiger Team January 30, 2014.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Where to start Ben Burton, JD, MBA, RHIA, CHP, CHC.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
Understanding Meaningful Use Presented by: Allison Bryan MS, CHES December 7, 2012 Purdue Research Foundation 2012 Review of Stage 1 and Stage 2.
Privacy & Security Tiger Team: Accounting of Disclosures Recommendations November 18, 2013 Office of the National Coordinator for Health Information Technology.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 12, 2015.
MU Stage 3 Notice of Proposed Rulemaking (NPRM) Comments Privacy and Security Workgroup Deven McGraw, chair Stan Crosley, co-chair May 7, 2015.
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair August 3,
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
Privacy and Security Tiger Team Subgroup Discussion: MU3 RFC July 29, 2013.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 22, 2015.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Meaningful Use Security Risk Analysis Passing Your Audit.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 12, 2015.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 12, 2013.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 18, 2015.
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA Privacy Rule Access Right: Assessing Fees When an Individual Requests Electronic Access to PHI Privacy and Security Workgroup Stan Crosley, Chair.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
1 HIPAA Administrative Simplification Standards Yesterday, Today, and Tomorrow Stanley Nachimson CMS Office of HIPAA Standards.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Working with HIT Systems
Larry Wolf Certification / Adoption Workgroup May 13th, 2014.
Health Big Data Discussion Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair June 8, 2015.
Privacy and Security Tiger Team Trusted Identity of Patients in Cyberspace Initial Impressions on November 29 Hearing December 5, 2012.
Kickoff Meeting Josh Mandel, Co-Chair Meg Marshall, Co-Chair November 30, 2015 API Security Task Force.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
HIPAA Security Final Rule Overview
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
Final Rule Regarding EHR Certification Flexibility for 2014 Today’s presenters: Al Wroblewski, Client Services Relationship Manager Thomas Bennett, Client.
Meaningful Use Workgroup Subgroup 2 - Engaging Patients and Families Christine Bechtel, Subgroup Chair Paul Tang, MU WG Chair July 2,
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Regulatory Roundtable Meaningful Use & HIPAA Kathy Branca Ray Harms.
In-depth look at the security risk analysis
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
Disability Services Agencies Briefing On HIPAA
Modified Stage 2 Meaningful Use: Objective #1 – Protect Electronic Health Information July 5, 2016 Today’s presenter: Al Wroblewski, PCMH CCE, Client.
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Privacy and Security Update - 5 Years After Implementation
HIPAA Security Risk Assessment (SRA)
Presentation transcript:

Notice of Proposed Rulemaking (NPRM) Comments Privacy and Security Workgroup Deven McGraw, chair Stan Crosley, co-chair April 27, 2015

Agenda Meaningful Use Stage 3 Notice of Proposed Rulemaking (NPRM) Discussion 1

PSWG NPRM Workplan - Detail 2 MeetingsTask April 20, :30-4:30pm ET Certification NPRM Data Segmentation for Privacy (DS4P) Pharmacogenomics April 27, :00-1:30pm ET MU3 NPRM Objective 1: Protect Patient Health Information Ramifications of increased patient access to data May 1, :00-11:30am ET NPRM Finalization Finalize outstanding comments May 12, 2015 HITPC Meeting Present NPRM Comments

PSWG MU NPRM Assignments Meaningful Use (MU) Stage 3 NPRM Review proposed Objective 1 (Protect Patient Health Information), pp – 16747; § 495.7, pp Ramifications of increased patient access to data (Objective 5: Patient Electronic Assess to Health Information), pp – 16755; Section 495.7, pp

Objective 1: Protect Patient Health Information Proposed objective: Protect ePHI created or maintained by the CEHRT through the implementation of appropriate technical, administrative, and physical safeguards New: adding Administrative safeguards (e.g., risk analysis, risk management, training, etc.) and Physical safeguards (e.g., facility access controls, workstation security) 4

Objective 1: Protect Patient Health Information Proposed Risk Analysis Requirements: – Must assess the risks and vulnerabilities to ePHI created or maintained by the CEHRT – Must be conducted or reviewed for each EHR reporting period (a full calendar year) – Include any security updates and deficiencies identified in the risk management process and implemented or corrected by the process Consistent with previous P&S Tiger Team (P&S TT) recommendations 5

Alignment with Previous PSTT Recommendations 6 Previous Recommendations*Proposed 2015 NPRM When an entity attests to conducting or reviewing a security risk analysis for CEHRT and MU requirements, such attestation supports compliance with the HIPAA Security Rule Consistent with past P&S TT recommendations. By adding administrative and physical safeguards, CEHRT risk assessments are aligned with the Security Rule Add an accountability measure; identify the individuals responsible for conducting and documenting the risk assessment Not addressed Link attestation to specific MU objectives, rather than present it as a single, stand-alone measure; risk assessment is an ongoing process Not tied to a specific MU objective Emphasize the importance of involving security professionals fully about how EHR system’s functionality is deployed States that it “may be necessary to involve security or health IT support team.” CMS and OCR should provide additional education to the providers References OCR’s Guidance on Risk Analysis Requirement Tool and ONC’s Security Risk Assessment Tool * 10/29/2013 HITPC Transmittal Letter: recommendations-national-coordinator-health-ithttp:// recommendations-national-coordinator-health-it

Straw Comment for Discussion The Workgroup supports the proposed MU Stage 3 security requirements. By adding administrative and physical safeguards to the current requirements, the CEHRT risk assessments and attestations are now more closely aligned with the compliance requirements of the HIPAA Security Rule 7

Ramifications of Increasing Patient Access to Data either through VDT or APIs 8

Why discuss patient access? Paul Tang, Vice Chair, HITPC, asked us to investigate the ramifications of increasing patient access to data – We have taken on this topic before (Tiger Team). HITPC Consumer WG is addressing Objective 5 – Objective 5: Patient electronic access to health information (receive) – Objective 6: Coordination of care through patient engagement (use) Consumer WG raised questions about the level of privacy and security in non-HIPAA regulated apps – Once a patient pulls data through an API to an app, the data is largely unprotected (only FTC enforcement) 9

Objective 5: Patient Electronic Access to Health Information Proposed objective: Use communications functions of CEHRT to engage with patients or their authorized representatives about a patient’s care. Must report all 3 and meet thresholds for 2/3. Measures: – Measure 1: > 25% of unique patients “actively engage” with EHR either through “view/download/transmit” or through the use of an ONC-certified API that can be used by patient third party apps or devices. – Measure 2: secure message sent to >35% of unique patients – Measure 3: patient generated health data or data from nonclinical setting incorporated into CEHRT for >15% of unique patients Exclusion: EP with no office visits. EP/EH in area with insufficient broadband 10

Ramifications of increasing patient access to data either through VDT or APIs Risks/Provider Responsibility: – Heightened security risks from increasing numbers of APIs connecting to EHRs – Vendors’ unclear or incorrect understanding and implementation of privacy and security legal requirements – Vendors’ inadequate or incorrect implementation of entity’s privacy and security policies 11 Risks/Patient Responsibility: – Use of app/device with weak security controls – Use of app/device without privacy policy, or with unclear policy, or with policy that shares data liberally with third parties or allows broad uses

HIPAA Privacy Rule – Patient Access (1) Privacy Rule – patient right of access regardless of format of PHI (§ ) – 2013 Omnibus Rule made clear that patients have right to request electronic copy of information (in a designated record set) maintained electronically Covered Entity (CE) must provide information in the form and the format requested by an individual, if it is “readily producible – Individual can direct a CE to transmit directly to an individual's designee (third party) – No access to provider admin systems (not designated record set) – Applies only to information present at the time the request is fulfilled – CE may reject use of external portable media if unacceptable level of risk (Security Rule risk analysis) 12 Source: Fed. Reg. Vol 78, No. 17, January 25, 2013:

HIPAA Privacy Rule – Patient Access (2) Privacy Rule – patient right of access regardless of format of PHI (§ ) CE can deny (non-reviewable) if: – PHI is not covered by right of access (e.g., psychotherapy notes) – CE is a correctional institution – PHI is collected as part of research – Information is covered by Privacy Act & exempt from disclosure – Information was obtained under commitment of confidentiality CE may reject use of external portable media if unacceptable level of risk (Security Rule risk analysis) (format is not “readily producible”) 13 Source: Fed. Reg. Vol 78, No. 17, January 25, 2013:

HIPAA Privacy Rule – Patient Access (3) Provider can deny (reviewable) if: – A licensed health care professional has determined that the access requested is reasonably likely to endanger the life or physical safety of the individual or another person; – The PHI makes reference to another person (not a provider) and a professional determines that the access is reasonably likely to cause substantial harm to the other person; and – The access is requested by a personal representative – and the professional determines that access by the personal representative is reasonably likely to cause substantial harm to the individual or another person. In all three cases, professional must be exercising “professional judgment” 14 Source: Fed. Reg. Vol 78, No. 17, January 25, 2013:

Previous Recommendations on View and Download 15 Offered flexibility of “best practices” for providers instead of a certification requirement or a “standard” Recommended that ONC share the guidance through REC and the entities certifying EHR technology Best Practices for Providers: Providers participating in the MU program should offer patients clear and simple guidance regarding use of the view and download in functionality in Stage 2 With respect to the “view” functionality, such guidance should address the potential risks of viewing information on a public computer, or viewing sensitive information on a screen that may be visible to others, or failing to properly log out after viewing Source: 8/16/2011 HITPC Transmittal Letter.

Previous Recommendations on View and Download With respect to the “download” functionality, such guidance should be offered at the time the patient indicates a desire to download electronic health information and, at a minimum, address the following three items: 1.Remind patients that they will be in control of the copy of their medical information that they have downloaded and should take steps to protect this information in the same way that they protect other types of sensitive information 2.Include a link or links to resources with more information on such topics as the download process and how the patient can best protect information after download 3.Obtain independent confirmation that the patient wants to complete the download transaction or transactions 16 Source: 8/16/2011 HITPC Transmittal Letter.

Previous Recommendations on View and Download Providers should utilize techniques, if appropriate, that avoid or minimize the need for patients to receive repeat notices of the guidance on view and/or download risks Providers should request vendors and software developers to configure the view and download functionality in a way that no cache copies are retained after the view session is terminated Providers should request that their view and download functionality include the capability to automatically terminate the session after a period of inactivity 17

Previous Recommendations on View and Download ONC should also provide the above guidance to vendors and software developers, such as through entities conducting EHR certification Providers can review the Markle Foundation policy brief, and the guidance provided to patients as part of the MyHealtheVet Blue Button and Medicare Blue Button, for examples of guidance provided to patients using view and download capabilities 18

Straw Comment for Discussion Generally, the Workgroup supports the proposal to use open APIs to increase patient electronic access to health information, as this advances the principles of individual access and openness and transparency However, the Workgroup is concerned about potential privacy and security risks associated with patient’s access to health information electronically ONC should reference and adopt previous P&S TT recommendations regarding best practices for view and download ONC should specifically address the scope of a provider’s ability to deny a patient’s request to transmit electronic health information to a third party application or other entity where – based on a current security risk analysis – such a request may pose a security threat to a provider’s health IT systems ONC should also address the extent to which provider’s may reject the request on other grounds. 19

Backup Slides 20

Objective 1 Comparison with HIPAA Security Rule 21 Proposed Objective 1HIPAA Security Rule (45 CFR (a)(1)) Limited to annually conducting or reviewing a security risk analysis to assess whether the technical, administrative, and physical safeguards and risk management strategies are sufficient to reduce the potential risks and vulnerabilities to the confidentiality, availability, and integrity of ePHI created by or maintained in CEHRT. Must continually assess the potential risks and vulnerabilities to the confidentiality, availability, and integrity of all ePHI that an organization created, receives, maintains or transmits. Includes all electronic media, such as hard drives, floppy disks, disks, smart card or other storage devices, personal digital assistants.

HIPAA Privacy Rule – Patient Access Right of Access: P – Comment: concern that rule would give access to provider admin systems – Final Rule: CE not required to provide direct access to CE systems; must only provide individuals with an electronic copy of their PHI 22 Source: Fed. Reg. Vol 78, No. 17, January 25, 2013:

HIPAA Privacy Rule – Patient Access Form and Format: P – Final Rule: electronic form and format requested by the individual, if it is readily producible, or, if not, in a readable electronic form and format as agreed to by the CE and the individual – Security Rule requires risk analysis; not required to accept external media if determine risk is unacceptable – Provide information CE possesses “at the time the request is fulfilled” – CE may require requests in writing (includes ) – Duty to notify/warn (not educate) individuals of risks of unencrypted 23 Source: Fed. Reg. Vol 78, No. 17, January 25, 2013:

Previous P&S Tiger Team Recommendations 24 ONC should develop and disseminate best practices for identity proofing and authentication for patient access to portals * ONC should strongly encourage providers to use more than single factor authentication to permit patient access; ONC should encourage providers to protections analogous to those used in online banking * ONC should develop and disseminate best practices for assuring that access to adult patient VDT be extended to friends and family authorized by the patient, and, where appropriate, legal personal representatives** * 5/3/2013 HITPC Transmittal Letter. ** 6/24/2014 HITPC Transmittal Letter _01.pdfhttp:// _01.pdf

Previous P&S TT Recommendations to HITPC 25 HITPC 1/8/2013 HITPC Meeting: “Recommendations on Patient Identity Proofing and Authentication” ent_authentication_hitpc_010813_0.pdf ent_authentication_hitpc_010813_0.pdf HITPC 4/8/2014 HITPC Meeting: “Privacy & Security Tiger Team: Family, Friends & Personal Representative Access Recommendations” lRepresentativeUpdate_ pdf lRepresentativeUpdate_ pdf