Security & Privacy Strategies for Expanded Communities Deven McGraw Partner Manatt, Phelps & Phillips LLP 1.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
Health information security & compliance
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Health Insurance Portability & Accountability Act (HIPAA)
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Developing a Records & Information Retention & Disposition Program:
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Network security policy: best practices
New Data Regulation Law 201 CMR TJX Video.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Forms Management: Compliance, Security & Workflow Efficiencies.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Paradox in HIPAA Deven McGraw, JD, MPH, LLM Partner Manatt, Phelps & Phillips, LLP December 8, 2014.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Working with HIT Systems
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
The Internet of Things and Consumer Protection
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Western Asset Protection
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Review of The Wonderful World of HIPAA Compliance.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
HIPAA.
HIPAA Update J. T. Ash University of Hawaii System
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Health Care: Privacy in a Digital Age
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Security & Privacy Strategies for Expanded Communities Deven McGraw Partner Manatt, Phelps & Phillips LLP 1

Key Challenges in Community Data Sharing Patient-mediated data sharing Sharing data with companies whose business models include leveraging data Using cloud data storage models 2

The Patient’s Right to Access Health Information Patients have the right to access their health information in the form or format they request, as long as the info is reproducible in that form/format (originated in Health Insurance Portability and Accountability (HIPAA) privacy and security regulations). Patients can get this information electronically if information is stored electronically (clarified in the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH)). Patients can have information directly sent to a third party if the choice is “clear, conspicuous and specific.” (established in HITECH) 3

What is acceptable digital format? Must have capability to provide some human readable digital copy (for ex., PDF). Not required to adopt every format requested by patients – negotiate re: mutually acceptable format. (From HITECH Omnibus Rule) Could use tools of Certified EHRs – for example, view, download & transmit – if acceptable to patient. – Could involve “transmit” to a patient’s app, for example. 4

Sending to Third Parties “Clear, Conspicuous & Specific” means: – In writing (can be electronic) – Signed by the patient (can be electronic) – Clearly identifies designated person/entity and where to send the information. What if a patient requests a connection from an EHR to an app or device? – Per HIPAA Security Rule, provider should evaluate security risks as part of determining whether this format is “readily producible” – Taking in data from patients also triggers security concerns; should also consider whether it is data you intend to collect, act on. 5

Responsibilities of Sender Covered entities may rely on the information provided in writing by the patient and need only have reasonable procedures in place to assure that the address provided by the patient is correctly entered. – “For example, reasonable safeguards [to be followed by the covered entity] would not require the covered entity to confirm that the individual provided the correct address of the third party, but would require reasonable procedures to ensure that the covered entity correctly enters the address into its system.” (page 5635, Federal Register, January 25, 2013) 6

Must be Sent Securely? HIPAA Security Rule ordinarily requires secure transmission of PHI – but: If patient requests information be sent by unsecure , provider must send “in the form or format requested by the patient.” Yes, in this case, the patient’s wishes can trump Security Rule obligations. – Presumption is that sending by unsecure creates security risk for patient – but not for the provider; patient has the right to choose convenience over security risk. 7

Really? Yes – but you are expected to provide a “lite” warning about security risks to make sure patient is aware of choice he/she is making. – “We do not expect covered entities to educate individuals about encryption technology and the information security. Rather, we merely expect the covered entity to notify the individual that there may be some level of risk that the information in the e- mail could be read by a third party. If the individuals are notified of the risks and still prefer unencrypted , the individual has the right to receive [PHI] in that way, and covered entities are not responsible for unauthorized access of [PHI] while in transmission to the individual based on the individual’s request. Further, covered entities are not responsible for safeguarding information once delivered to the individual.” (p.5634, Federal Register, January 25, 2013) 8

What can patient do with the data? Patients are not regulated by HIPAA, nor are the vendors who create mobile and other tools for patient use. – Such vendors could be covered by state health privacy laws (for example, CA). FTC has authority to crack down on “unfair” and “deceptive” trade practices of for profit companies – For example, broken commitments in a privacy policy – HITECH breach notification provisions for “personal health records” and related apps. App platform requirements may create new norms (for example, Apple’s HealthKit) 9

Doing Business with “Data Leveragers” HIPAA permits providers to provide identifiable health information – protected health information (PHI) – to vendors who need PHI to perform a service or function for that provider. They are business associates under HIPAA and directly accountable to regulators for compliance with the Security Rule and some parts of the Privacy Rule. Entity covered by HIPAA must sign a business associate agreement (BAA) (most entities at least start with the model BAA from HHS). 10

Data leveragers Business Associate permitted uses of data must be set forth in the BAA. – Data aggregation – De-identification and further use of de-identified data – Off-shore storage (not required to be covered in BAA but most entities do include such provisions) Violation of BAA could be punished by regulators; also breach of contract remedies Also possibility: sharing of limited data set (with data use agreement) for operations, public health or research – But in that case, entity is NOT a BA providing a service or function for the provider 11

HIPAA and the Cloud – May I? Does HIPAA permit use of the Cloud for storage/maintenance of PHI? Yes. In most cases, a cloud storage provider would be considered to be a HIPAA business associate. – Def. of business associate (BA): “creates, receives, maintains, or transmits [PHI]” for a covered entity. – Exception: mere conduits. – Still some confusion about this, because BAs are presumed to require access to PHI “on a routine basis.” 12

HIPAA & the Cloud – Should I? Cloud service providers (CSPs) may be better positioned to provide IT, data storage services But provider cannot be “hands off”: – Need to do reasonable due diligence in choosing CSP vendor, monitoring – Look behind marketing phrase “HIPAA Compliant” – Regulators look to covered entity for compliance with HIPAA – what is the CSP committing to do, what responsibilities do you still have – See HIPAA enforcement settlement with Phoenix Cardiac Surgery, ples/pcsurgery_agreement.pdf ($100,000 fine). ples/pcsurgery_agreement.pdf 13

Thank you! Deven McGraw Partner Manatt, Phelps & Phillips, LLP

Security & Privacy Strategies for Expanded Communities Florence Hudson Senior VP and Chief Innovation Officer Internet2 15

Source: Kaiser Permanente Let us consider an aspirational view of connected healthcare 16

Connected healthcare can streamline care Real time remote monitoring and management Remote triage Real time remote patient/provider connectivity Interoperability among many devices – Infusion pumps – Refrigerators – Mirrors – Smartphones Sharing of PHI… everywhere Risks and challenges need to be addressed 17

Key Challenges in Community Data Sharing Apps on personal devices - fixed and mobile Protecting data from device to the “cloud” End to end trust and security 18

Apps and data on personal devices Fixed and mobile Growing number and type of connected devices – Smartphones – BYOD – Biomedical devices – Fitbits – Scales – Appliances Payers, Providers, Patients need to be aware 19

Mitigating risks in connected healthcare and expanded communities Multi-factor authentication Multi-level security, “Defense in Depth” – Service – Software – Firmware – Hardware TIPS for device, user, data, app, PHI – Trust – Identification – Privacy – Security 20

Securing data in the “cloud” Virtual and physical security – Servers – Storage – Data – Network – Physical site User, application, data access and security Hybrid clouds are growing…need to understand the system of systems architecture HIPAA compliant clouds 21

End to end trust and security Must consider all elements of the connected ecosystem – Users – patients, family, providers, payers… insider risks – Endpoint devices – smartphones, biomedical, health/wellness devices, sensors – Gateways – home clouds, in hospital, in cities – Communications - channel and network – Cloud systems – servers, storage – Hybrid clouds – Software – middleware, applications – Services – Data security, at rest and in motion Focus on TIPS – Trust, Identify, Privacy, Security Requires end to end ecosystem partnerships – Across the technology ecosystem – chip to device to network to servers to storage to software to cloud – Technologists, providers, device manufacturers, standards, policy, payers, patients 22

Managing realized risk Constant monitoring – Identify anomalies – Intrusion detection Quickly act to isolate the anomaly / intrusion / threat / breach Notify the source, if a trusted partner Notify the authorities, as needed Increase security at all levels – software, services, firmware, hardware 23

Data Breaches…What to do 1.Inform company personnel 2.Investigate which information and systems were compromised 3.Isolate your network and/or systems affected 4.Collect evidence 5.Notify those affected, including external partners and clients with the facts and mitigation plans 6.Address regulatory concerns 24

How to Prepare, Protect, Secure against a Data Breach 1.Establish company policies and train employees 2.Implement an enterprise-grade security solution – systems and processes 3.Hire a security expert 4.Contract with ethical hackers to try to breach your system, learn from this to thwart attacks 5.Maintain regulatory requirements 25

Thank you! Florence Hudson Senior Vice President and Chief Innovation Officer Internet