COMMUNITY-BASED COLLABORATIONS: Legal Issues In Structuring Health Information Exchanges The Health Information Technology Summit October 23, 2004 Reece.

Slides:



Advertisements
Similar presentations
Davis Wright Tremaine LLP HIT Legal Issues: HIPAA Implications to a Regional Health Information Organization Becky Williams, R.N., J.D. Partner, Co-Chair,
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
1 The HIPAA Privacy Rule and Research This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA Privacy Rule Training
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA Health Insurance Portability and Accountability Act.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Informed Consent and HIPAA Tim Noe Coordinating Center.
2 H. Westley Clark, M.D., J.D., M.P.H., CAS, FASAM Director Center for Substance Abuse Treatment Substance Abuse Mental Health Services Administration.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
THE TENTH NATIONAL HIPPA SUMMIT ELECTRONIC HEALTH RECORDS NATIONAL HEALTH INFORMATION INFRASTRUCTURE LEGAL ISSUES APRIL 7, 2005 Paul T. Smith, Esq. Partner,
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
OHCAs, ACEs and Hybrid Entities Paul Smith Davis Wright Tremaine LLP One Embarcadero Center Suite 600 San Francisco, CA (415)
Working with HIT Systems
HIPAA Health Insurance Portability and Accountability Act of 1996.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HEALTH INFORMATION TECHNOLOGY SUMMIT OCTOBER 23, 2004 COMMUNITY-BASED COLLABORATIONS: LEGAL ISSUE Reece Hirsch, Esq. Sonnenschein Nath & Rosenthal LLP.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
The HIPAA Privacy Rule: Implications for Medical Research
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
HOGAN & HARTSON, L.L.P. “Publications” “Health”
Refuah Community Health Collaborative (RCHC) PPS
Confidential Records and Protected Disclosures
Disability Services Agencies Briefing On HIPAA
The HIPAA Privacy Rule and Research
HIPAA Security Standards Final Rule
manatt | phelps | phillips
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
National Congress on Health Care Compliance
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

COMMUNITY-BASED COLLABORATIONS: Legal Issues In Structuring Health Information Exchanges The Health Information Technology Summit October 23, 2004 Reece Hirsch Sonnenschein Nath & Rosenthal LLP San Francisco, CA (415)

Health Information Exchanges Are Local l Like health care generally, a health information exchange is a local enterprise. l Unique state law considerations l Exchanges can take many forms n Peer-to-peer systems n Facilitating financial transactions n Clinical data repositories

Health Information Exchanges Are Local l Review of legal issues that generally apply to exchanges, regardless of structure or locality l Devil is in the details – and the details involve state law

Governance and Organization l Early discussions l Statement of Purpose and Objective l Memorandum of Understanding n Entity’s purpose and objective n Which organizations may participate in network n How network’s efforts will be funded n Potential liabilities n How the network will be governed and operated

Governance and Organization l Initial structure n Tax status n Board composition l Sources of funding n eHealth Initiative sub-grants to communities as part of “Connecting Communities for Better Health” initiative n Health plans

Governance and Organization l Testing the waters n Health information exchange may be organized more simply during beta test stage n Adding a broader range of participating organizations and functions after beta stage

Governance and Organization l Someone has to be in Charge l Corporate Formation and Tax Status l Governance l Creating a Business Plan and Budget l Sources of Revenue l Criteria for Involvement

Tax Status l Is a health information exchange “organized and operated exclusively for charitable and educational purposes” under IRC Section 501(c)(3)? l Must distinguish IRS private letter rulings regarding 501(c)(6) organizations or “business leagues,” such as medical societies

Tax Status l Factors that will favor tax-exempt status: n Control by community board n Improvement in delivery and access to health care services n Broad sources of support n Open participation n Exchange is not solely intended to further the common business interests of participants

Tax Status l Revenue Ruling n “A nonprofit organization formed to encourage and assist in the establishment of nonprofit regional health data systems … is operated exclusively for scientific and educational purposes,” and thus qualifies for 501(c)(3) status n Activities were “not carried on to set standards for or to police the industry but to provide … benefits to the general public.”

Vendor Agreements l Agreements between the Exchange Entity and IT and other vendors l Detail operational and performance specifications for both vendor and entity l Performance measurements and rewards and penalties l Specify key staff l Audit rights and protocols l Compliance with HIPAA and other regulations l Compensation l Intellectual property issues

HIPAA Relationships in a “Hub and Spokes” Health Information Consortium l Members of the Consortium are covered entities under HIPAA l The hub organization is not a covered entity unless it converts standard transactions and functions as a health care clearinghouse l The hub organization is a business associate of each member of the Consortium – business associate provisions should be included in each user agreement between members and the hub organization l The members are not business associates of one another -- the members are not providing services to or on behalf of one another

Oversight of Hub Organization and its Vendor by Consortium Members l HIPAA does not technically require affirmative oversight by covered entities of their business associates – representations in business associate agreements are legally sufficient l Covered entities are liable for privacy breaches of business associates only if they know of an improper pattern of activity or practice and fail to take appropriate action l But higher level of oversight may be imposed in practice given the amount of data concentrated in a single location and the highly structured nature of the enterprise l There may be opportunities for Consortium members to jointly perform privacy and security oversight of the hub organization or its vendor through a mutually selected agent

Key Privacy Screens for Data Access Requests l Is patient authorization required for access? l If so, did the patient provide sufficient authorization? l If not, is the party requesting the “minimum necessary” information for the intended purpose? l Has the data holder agreed to a restriction on uses? l Does the party requesting the data have a treatment or coverage relationship with the patient? l Is the party requesting the data who they say they are?

Is Patient Authorization Required for Access? l HIPAA has liberal rule that permits disclosure without authorization for treatment, payment and health care operations – this will cover almost all disclosures among Consortium members l Consider whether patient consent may be appropriate from risk management standpoint before sharing the patient’s data electronically through the Consortium n However, patient consent can be a major operational stumbling block

Health Care Operations l If health information exchange is generating various outcomes and utilization reports for participants, may qualify as “health care operations” under HIPAA, which include: n Quality assessment and improvement, outcomes evaluation, case management and care coordination, evaluating provider or health plan performance and population-based activities relating to improving health or reducing health care costs

Is Patient Authorization Required for Access? l State confidentiality laws may also require authorization and are likely to pose the greatest challenge: n often more stringent consent requirements than HIPAA n requirements vary with the type of information (e.g., HIV/AIDS, mental health, Medicaid) n separate laws may have differing consent requirements (oral vs. written, required elements, etc.) n laws may be applicable only to a subset of Consortium members (e.g., insurers, hospitals, mental health facilities, public agencies) l Federal regulations governing substance abuse treatment records are also more stringent than HIPAA

State Law Challenges l In working with a California data exchanges, particular challenges were posed by participants that were: n “Agencies” subject to Cal. Information Practices Act of 1977 n “State and local agencies” subject to California Public Records Act n An agency engaged in administration of the Medi-Cal program (Section of Cal. Welfare & Institutions Code)

Veteran’s Administration l If a VA hospital or clinic participates in the exchange, issues under the federal Privacy Act of 1974 may apply l When a VA agency provides by contract for the operation of a system of records to accomplish an agency function, Privacy Act applies to the system l Health information exchange may not be a VA “system of records” because if it is not “under the control” of the VA

Is the Party Requesting the Minimum Necessary Information? l HIPAA requires covered entities to request the minimum necessary information for the intended purpose l If Consortium consists exclusively of covered entities, each party disclosing data may rely on the requesting party’s minimum necessary determination if reliance “is reasonable under the circumstances” l Other minimum necessary exceptions may also apply: n Disclosures to providers for treatment n Disclosures to the patient or pursuant to the patient’s authorization l Minimum necessary rules can also be embedded in system

Has the Data Holder Agreed to Restrict Uses? l HIPAA allows patients to request restrictions on uses of data for treatment, payment or health care operations l Covered entities do not have to agree to all restriction requests l Data holders must have the capacity to override otherwise permissible access requests based on agreed upon restrictions n Or data holders must all agree that it is not their practice to agree to restrictions

Does the Requesting Party Have a Relationship with the Patient? l Health care providers and health plans are not entitled to data on any person without regard to whether there is a treatment or coverage relationship l Centralized system enabling each provider and plan to verify and register their relationships with patients can avoid case-by-case verification l May elect “break the glass” capability for emergency situations, subject to back-end audit

Is the Requesting Party Who They Say They Are? l HIPAA requires covered entities to verify identity of parties receiving protected health information l Assignment of unique user ID and password by hub organization will be required l Use of digital certificates may be warranted

Consortium Must Perform Security Risk Analysis l Great importance placed on risk analysis in HIPAA Security Rule n Underlies decisions regarding all “addressable” specifications n Basis for selecting competing security options n Integral to making scalability decisions related to compliance l Sophisticated risk analysis would be expected for this type of venture l Each Consortium member may rely on the risk analysis performed centrally by the Consortium or its vendor – but internal review of the analysis by a member may be appropriate, depending on its size and resources

Hub Organization Responsible for Network Security Issues l Encryption – this is an “addressable” standard but a risk analysis is likely to identify this as a necessary measure for any internet-based transmission (encryption of stored data may be deemed appropriate as well) l Audit trail – required for privacy and security monitoring and could assist in meeting accounting of disclosures mandate l Authentication – issuance of unique user IDs and passwords, and digital certificates if utilized l Physical safeguards in data center (access control, environmental control, emergency power, disaster recovery plan, etc.)

Consortium Members Not Relieved of Own Security Responsibilities l Workforce clearance and termination procedures l Role-based access controls l Virus protection l Data back-up l Device and media controls l Physical safeguards

Consortium May Set Minimum Security Standards for Each Member l Standards may be scalable based on size and resources of members l Minimum standards may be included in user agreements l Consortium may audit compliance by each member

Security Training May be Shared Responsibility l Hub organization may develop curriculum l Hub organization may use “train the trainer” model or conduct training of all users l Division of training responsibility may depend on size and sophistication of individual members l Evidence of training should be maintained by each member

For further information contact: Reece Hirsch Sonnenschein Nath & Rosenthal