HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.

Slides:



Advertisements
Similar presentations
The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
An Overview for In-Home Service Providers Legal advice must be tailored to specific circumstances. Information provided in this presentation should not.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
Navigating HIPAA & Recent Healthcare Reform: What You Need to Know.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
HIPAA In The Workplace What Every Employee Should Know and Remember.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
 July 10, 2013 Richard D. Sanders T HE S ANDERS L AW F IRM, P.C. 7 Piedmont Center, Suite Piedmont Road Atlanta, Georgia (404)
Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City This Employer.
HIPAA Update: So what’s new with HIPAA?? And, what does it have to do with you? Ellen Cannon, WV DHHR HIPAA Privacy Officer WV Attorney General’s Office.
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
Importance of the Information Risk Assessment. Compliance Programs are intended to proactively audit and assess an organization’s operations to detect.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
HIPAA Privacy of Health Information Claudia Allen, Esq. General Counsel HealthBridge.
Health information security & compliance
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
Health Insurance Portability & Accountability Act (HIPAA)
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
From HIPAA to HITECH OMH Briefing.
HIPAA PRIVACY AND SECURITY AWARENESS.
California :: Delaware :: Florida :: New Jersey :: New York :: Pennsylvania :: Virginia :: Washington, D.C. :: 1 NEW OBLIGATIONS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA and HITECH The Latest Developments Presented By: Michele Madison Partner, Healthcare Practice Morris, Manning & Martin, LLP
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The American Recovery and Reinvestment Act of 2009: Changes to HIPAA Privacy and Security Requirements And its Impact on Hospitals Presented By: Michele.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Finally, the Final HIPAA/HITECH Regulations are Here! By LYNDA M. JOHNSON Friday, Eldredge & Clark.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
1 Kansas Health Solutions July 9, 2009 HIPAA Goes HITECH Martie Ross Lathrop & Gage LLP (913)
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
UNDERSTANDING WHAT HIPAA IS AND IS NOT
HIPAA CONFIDENTIALITY
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
HITECH’s Impact on Research
Presentation transcript:

HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for Physician Practices Claudia Allen, JD Privacy Officer HealthBridge

ARRA Privacy Provisions American Recovery and Reinvestment Act (“ARRA”) established new rules for electronic health data: Established the Office of the National Coordinator for Health Information Technology (“ONC”) Extended HIPAA Privacy and Security requirements directly to Business Associates (“BA”) Established breach identification and notification requirements Supports education initiatives on the uses of health information Established further restrictions on “sales” of health information Set out new disclosure accounting requirements Increased enforcement initiatives Generally effective February 17,

A Bit of History The Health Insurance Portability and Accountability Act (“HIPAA”) was passed in 1996, but the Privacy and Security Rules did not go into effect until HIPAA does not pre-empt state law if the state law requires a higher standard. Ohio, Kentucky and Indiana follow HIPAA rules. Covered Entities (“CEs”)are subject to rules protecting the privacy of Protected Health Information (“PHI”) 3

A Bit of History (cont.) Covered Entities Providers of health care services Physicians, dentists, chiropractors, psychologists Clinics, Nursing Homes, Pharmacies, Laboratories Health Plans and Clearinghouses PHI is medically related information that is Identifiable to the individual E.g., includes name, address, phone, birth date, social security number Transmitted or maintained by electronic media in any other media 4

Permitted Uses of PHI without patient consent: Treatment Payment Operation of Business Limited uses for research Public health As required by law 5 A Bit of History (cont.)

BAs are required to enter into an agreement with CEs in which they agree to protect PHI Breach by the BA would subject the CE to liability Redress against BA was by breach of contract lawsuit 6 A Bit of History (cont.)

An Overview for Physician Practices

ARRA and HITECH Extends Privacy and Security to Business Associates (“BA”) Business Associates are now directly subject to the Security Rule and privacy/confidentiality requirements Breach by BA results in direct liability for criminal and civil penalties imposed by HIPAA on CEs Four tiers ranging from $100 to $50,000 per violation Individuals harmed may recover part of penalty States Attorney General authorized to bring suit Attorneys fees may be awarded BA required to respond to privacy non-compliance by CE BA Agreements are now required with entities that provide data transmission of PHI on a regular basis such as Health Information Exchanges 8 1. Business Associates

ARRA Requires Breach Notification of Unsecured PHI Breach is defined as unauthorized acquisition, access, use or disclosure of Unsecured PHI (“UPHI”) which compromises the security or privacy of information Unsecured PHI is defined as PHI that is not secured through the use of technology or methodology specified by the Secretary that renders the information unusable, unreadable, or undecipherable to unauthorized persons. Breach does not include: Unintentional acquisition, access or use made in good faith within the course of employment with BA or CE and not further acquired, used, or disclosed by any person made by an individual acting under the authority of the CE or BA of information the disclosure of which could not reasonably be retained 9 2. Breach Notification

Notification upon discovery of Breach CEs must notify each individual whose UPHI is breached BA must notify the CE Time period: without unreasonable delay but no later than 60 calendar days after discovery (first day known or should have been known) – BAA may modify this timeframe Burden on discoverer Written notice by mail unless urgent If more than 9 individuals involved, must post on web Notice to media if over 500 residents in state or jurisdiction affected Immediate notice to Secretary if over 500 affected Breach log required to be sent to Secretary annually 10 Breach Notification (cont.)

Breach Notice contains Description of what happened Description of types of data involved Steps individuals should take to protect themselves What CE is doing to investigate, mitigate losses, and protect from further breaches Contact procedures 11 Breach Notification (cont.)

ARRA Requires Accounting for Disclosures of PHI New rules require CEs to account for all electronic disclosures of PHI including those for Payment, Treatment and Operations Records for the prior 3 years must be available Proposed rule: CEs with EHR technology prior to January 1, 2009 must comply by January 1, 2014 Proposed rule: CEs acquiring EHR technology after January 1, 2009 must comply by January 1, 2013 or if later, when it acquires an EHR Accounting for Disclosure

ARRA Prohibits Sales of PHI No direct or indirect remuneration in exchange for PHI unless covered by a valid authorization. Exceptions: Public Health Research Data where the cost is all that is reimbursed Exchange for health care operations or treatment as permitted by regulation Prohibition on Sale of Data

ARRA allows restrictions on Disclosures Individuals may restrict disclosure to a health plan for payment or operations Individual must have paid out of pocket in full Disclosure Restrictions

Inventory and review all BAAs to determine if they need to be amended. ARRA Security and Privacy provisions are required to be incorporated into the BA Agreements. Review all policies and procedures to incorporate the new obligations of ARRA. Modify training of personnel to include the changes made by ARRA. Enter into BA Agreements with any organizations with which the CE transmits PHI electronically. 15 Practical Guidance

Conduct a risk assessment to determine if office procedures are consistent with protecting PHI:  Doors locked except for business entrances and exits during business hours  Employee access restricted during non-business hours  Patients, families not allowed access to provider offices  Patient sign-up sheets not visible to non-employees  Employees’ visitors not allowed access  Employees are restricted from mentioning patients on social media sites  Remote access to data is limited, inventoried  Portable electronics secured, if not encrypted  Keys, pass codes inventoried  Workstations secured, screens not in view of public  Implement procedures for terminated employees to limit access to PHI  Implement procedures to report suspicious activity  Implement hiring practices that minimize risk, check references and background  Conduct periodic training on privacy and security 16 Practical Guidance

Questions? The Tri-State REC can help!