COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,

Slides:



Advertisements
Similar presentations
Davis Wright Tremaine LLP HIT Legal Issues: HIPAA Implications to a Regional Health Information Organization Becky Williams, R.N., J.D. Partner, Co-Chair,
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
2 H. Westley Clark, M.D., J.D., M.P.H., CAS, FASAM Director Center for Substance Abuse Treatment Substance Abuse Mental Health Services Administration.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
HIPAA Health Insurance Portability and Accountability Act of 1996.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
COMMUNITY-BASED COLLABORATIONS: Legal Issues In Structuring Health Information Exchanges The Health Information Technology Summit October 23, 2004 Reece.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
The Health Insurance Portability and Accountability Act 
Health Insurance Portability and Accountability Act of 1996
HIPAA PRIVACY & SECURITY TRAINING
iSecurity Compliance with HIPAA
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
Health Insurance Portability and Accountability Act
SHARING CLINICAL DATA: Legal and Privacy Issues
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
Health Insurance Portability and Accountability Act
HIPAA Security Standards Final Rule
manatt | phelps | phillips
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
National Congress on Health Care Compliance
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort, Esq. Manatt, Phelps & Phillips, LLP 1675 Broadway, 27th Floor New York, New York (212)

2 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP HIPAA Relationships in a “Hub and Spokes” Health Information Exchange Consortium v Members of the Consortium are covered entities under HIPAA v The hub organization is not a covered entity unless it converts standard transactions and functions as a health care clearinghouse v The hub organization is a business associate of each member of the Consortium – business associate provisions should be included in each user agreement between members and the hub organization v The members are not business associates of one another -- the members are not providing services to or on behalf of one another

3 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Oversight of Hub Organization and its Vendor by Consortium Members v HIPAA does not technically require affirmative oversight by covered entities of their business associates – representations in business associate agreements are legally sufficient v Covered entities are liable for privacy breaches of business associates only if they know of an improper pattern of activity or practice and fail to take appropriate action v But higher level of oversight may be imposed in practice given the amount of data concentrated in a single location and the highly structured nature of the enterprise v There may be opportunities for Consortium members to jointly perform privacy and security oversight of the hub organization or its vendor through a mutually selected agent

4 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Key Privacy Screens for Data Access Requests v Is patient authorization required for access? v If so, did the patient provide sufficient authorization? v If not, is the party requesting the “minimum necessary” information for the intended purpose? v Has the data holder agreed to a restriction on uses? v Does the party requesting the data have a treatment or coverage relationship with the patient? v Is the party requesting the data who they say they are?

5 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Is Patient Authorization Required for Access? v HIPAA has liberal rule that permits disclosure without authorization for treatment, payment and health care operations – this will cover almost all disclosures among Consortium members v But patient consent may be appropriate from risk management standpoint before sharing the patient’s data electronically through the Consortium

6 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Is Patient Authorization Required for Access? v State law confidentiality laws may also require consent and are likely to pose the greatest challenge:  often more stringent consent requirements than HIPAA  requirements vary with the type of information (e.g., HIV/AIDS, mental health, Medicaid)  separate laws may have differing consent requirements (oral vs. written, required elements, etc.)  laws may be applicable only to a subset of Consortium members (e.g., insurers, hospitals, mental health facilities, public agencies) v Federal regulations governing substance abuse treatment records are also more stringent than HIPAA

7 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Is the Party Requesting the Minimum Necessary Information? v HIPAA requires covered entities to request the minimum necessary information for the intended purpose v If Consortium consists exclusively of covered entities, each party disclosing data may rely on the requesting party’s minimum necessary determination if reliance “is reasonable under the circumstances” v Other minimum necessary exceptions may also apply:  Disclosures to providers for treatment  Disclosures to the patient or pursuant to the patient’s authorization v Minimum necessary rules can also be embedded in system

8 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Has the Data Holder Agreed to Restrict Uses? v HIPAA allows patients to request restrictions on uses of data for treatment, payment or health care operations v Covered entities do not have to agree to all restriction requests v Data holders must have the capacity to over-ride otherwise permissible access requests based on agreed upon restrictions

9 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Does the Requesting Party Have a Relationship with the Patient? v Health care providers and health plans are not entitled to data on any person without regard to whether there is a treatment or coverage relationship v Centralized system enabling each provider and plan to verify and register their relationships with patients can avoid case-by-case verification v May elect “break the glass” capability for emergency situations, subject to back-end audit

10 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Is the Requesting Party Who They Say They Are? v HIPAA requires covered entities to verify identity of parties receiving protected health information v Assignment of unique user ID and password by hub organization will be required v Use of digital certificates may be warranted

11 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Consortium Must Perform Security Risk Analysis v Great importance placed on risk analysis in HIPAA security rule  Underlies decisions regarding all “addressable” specifications  Basis for selecting competing security options  Integral to making scalability decisions related to compliance v Sophisticated risk analysis would be expected for this type of venture v Each Consortium member may rely on the risk analysis performed centrally by the Consortium or its vendor – but internal review of the analysis by a member may be appropriate, depending on its size and resources

12 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Hub Organization Responsible for Network Security Issues v Encryption – this is an “addressable” standard but a risk analysis is likely to identify this as a necessary measure for any internet-based transmission (encryption of stored data may be deemed appropriate as well) v Audit trail – required for privacy and security monitoring and could assist in meeting accounting of disclosures mandate v Authentication – issuance of unique user IDs and passwords, and digital certificates if utilized v Physical safeguards in data center (access control, environmental control, emergency power, disaster recovery plan, etc.)

13 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Consortium Members Not Relieved of Own Security Responsibilities v Workforce clearance and termination procedures v Role-based access controls v Virus protection v Data back-up v Device and media controls v Physical safeguards

14 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Consortium May Set Minimum Security Standards for Each Member v Standards may be scalable based on size and resources of members v Minimum standards may be included in user agreements v Consortium may audit compliance by each member

15 Ninth National HIPAA SummitManatt, Phelps & Phillips, LLP Security Training May be Shared Responsibility v Hub organization may develop curriculum v Hub organization may use “train the trainer” model or conduct training of all users v Division of training responsibility may depend on size and sophistication of individual members v Evidence of training should be maintained by each member