RYAN MEADE, JD, CHRC, CHC-F DIRECTOR, REGULATORY COMPLIANCE STUDIES LOYOLA UNIVERSITY CHICAGO SCHOOL OF LAW LESSONS LEARNED FROM FEDERAL.

Slides:



Advertisements
Similar presentations
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
Advertisements

Hipaa privacy and Security
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health information security & compliance
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
MU and HIPAA Compliance 101 Robert Morris VP Business Services Ion IT Group, Inc
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Flowers Hospital General Compliance Training-Students 2013.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
The Health Insurance Portability and Accountability Act 
Protecting PHI & PII 12/30/2017 6:45 AM
Privacy & Information Security Basics
Enforcement, Business Associates and Breach Notification. Oh my!
By: Eamon Callahan and Wilston Johnston
HIPAA.
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
COMPANY NAME  PRIVACY & DATA SECURITY NEWSLETTER  FEBRUARY 2013
County HIPAA Review All Rights Reserved 2002.
HIPAA Privacy & Security- The OCR, Audits, and Sanctions 2018
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Overview.
Move this to online module slides 11-56
The Health Insurance Portability and Accountability Act
Presentation transcript:

RYAN MEADE, JD, CHRC, CHC-F DIRECTOR, REGULATORY COMPLIANCE STUDIES LOYOLA UNIVERSITY CHICAGO SCHOOL OF LAW LESSONS LEARNED FROM FEDERAL HIPAA PRIVACY ENFORCEMENT

Topics/Agenda Privacy Protection Enforcement 2

The Landscape Business is highly data driven today There is less human contact in commerce Data is everywhere! Computers, phones, tablets, chips, innumerable devices And don’t forget the old fashioned way to keep data: paper 3

The Landscape Data is valuable It even has a “street value” SSN: $30 Health insurance #: $11 Credit card credentials $4-8 Bank account number: $300 4

FTC Takes the Lead FTC Consumer Sentinel Network is significant coordinator of privacy and identity theft enforcement FTC received over 480,000 complaints about suspected identity theft in

States with the highest identify theft incidents Missouri Connecticut Florida Maryland Illinois (WSJ May 18, 2016) 6

Enforcement Agencies The principal enforcement agencies FTC DOJ/FBI HHS-OCR State Attorneys General 7

Examples: Software Vendor The FTC recently announced a settlement with Henry Schein Practice Solutions Inc. (Henry Schein), a dental practice software provider, concluding an investigation into claims that Henry Schein misled customers about the encryption capabilities of its software. The software provider is required to pay $250,000 to settle the FTC charges that it falsely advertised the level of encryption it provided to protect patient data. 8

Software Vendors Henry Schein marketed Dentrix software to dentists/dental practices. The software enables dentists to perform common office tasks, such as entering patient data, sending appointment reminders, processing patient payments, submitting patient insurance claims, documenting treatment planning, entering progress notes, and recording diagnostic information. Henry Schein’s Dentrix G5 software incorporated a “database engine” provided by a third-party vendor, which included a form of data protection that Henry Schein advertised as “encryption.” 9

Software Vendors The FTC alleged that for a period of two years after it had been informed by its third-party vendor that the software’s data protection was less secure and more vulnerable than the widely used, industry-standard encryption algorithms, Henry Schein advertised Dentrix G5 as having the ability to encrypt patient data and help dentists meet their regulatory obligations under HIPAA. The FTC alleged that in light of what Henry Schein knew about its product, Henry Schein violated Section 5 of the FTC Act by making deceptive claims that its Dentrix G5 met industry encryption standards despite being aware that the software used a proprietary data masking technique that fell short of the NIST encryption standard. 10

Software Vendors Under the terms of the proposed consent order, Henry Schein must pay $250,000 to the FTC. In addition, the company will be prohibited from misleading customers about the extent to which its products use industry-standard encryption, help ensure regulatory compliance, or protect consumers’ personal information. Henry Schein also must notify each customer who purchased Dentrix G5 during the period when the company made the misleading statements, and provide the FTC with ongoing reports on the notification program. df df 11

Pharmacy OCR opened a compliance review and investigation after receiving notification from a local Denver news outlet regarding the disposal of unsecured documents containing the PHI of 1,610 patients in an unlocked, open container on Cornell’s premises. The documents were not shredded and contained identifiable information regarding specific patients. Evidence obtained by OCR during its investigation revealed Cornell’s failure to implement any written policies and procedures as required by the HIPAA Privacy Rule. Cornell also failed to provide training on policies and procedures to its workforce as required by the Privacy Rule 12

Hospital $850,000 settlement with OCR on November 25, 2015 Not-for-profit teaching hospital (Lahey Hospital and Medical Center) (affiliated with Tufts Medical School) in Burlington, Massachusetts Self-disclosure by Lahey on October 11, 2011: Laptop stolen from an unlocked treatment room during overnight hours on August 11, 2011 Laptop was on a stand associated with a portable CT scanner Hard-drive contained PHI of 599 individuals OCR attributed the need for corrective action based on its findings of widespread noncompliance with the HIPAA Security Rule. 13

Hospital OCR conducted an investigation and identified non-compliance prior to the breach, including: Failure to conduct a thorough risk analysis of all of its ePHI Failure to physically safeguard a workstation that accessed ePHI Failure to implement and maintain policies and procedures regarding the safeguarding of ePHI maintained on workstations utilized in connection with diagnostic/laboratory equipment Lack of a unique user name for identifying and tracking user identity with respect to the workstation at issue in this incident Failure to implement procedures that recorded and examined activity in the workstation at issue in this incident 14

OCR stated in a press release: “Because these workstations often contain ePHI and are highly portable, such ePHI must be considered during an entity’s risk analysis, and entities must ensure that necessary safeguards that conform to HIPAA’s standards are in place.”.” Resolution Agreement: OCR sets out a list of 6 violations of the Privacy and Security Rules The principal violations are associated with the Security Rule which leads up to a Privacy Rule violation (“impermissibly disclosed the ePHI of 599 individuals for a purpose not permitted by the Privacy Rule”). 15 Hospital

Resolution Agreement: Lahey agreed to a Corrective Action Plan very similar to Cancer Care, but with the following difference: Term lasts 2 years Conduct risk analysis “The risk analysis shall include all ePHI maintained by Lahey, and include but not be limited to, ePHI stored on and accessed by workstations utilized in connection with diagnostic/laboratory equipment.” Risk Analysis methodology must be approved by HHS before conducting the Risk Analysis 16

Hospital Resolution Agreement: Policies and Procedures Revision 1.“maintaining a record of receipt, removal, and disposition of hardware and electronic media that maintain ePHI into and out of Lahey’s facility, and the movement of these items within its facility” 2.“ensuring workstations that maintain ePHI utilized in connection with diagnostic/laboratory equipment are registered with Lahey’s Information Services Department (“ISD”) and under the control of ISD” 3.“implementing hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use workstations that maintain ePHI utilized in connection with diagnostic/laboratory equipment.” 17

Insurance Triple-S Management Corporation $3.5 million settlement with OCR on September 2, 2015 Insurance company in Puerto Rico with multiple holdings providing a variety of health insurance offerings through subsidiaries OCR investigated after several breach notifications. 5 notices in excess of 500 individuals between November 2010 and March 2015 and another two breaches affecting under 500 individuals in February and August

Insurance OCR claimed to find: 1.Failure to implement appropriate administrative, physical, and technical safeguards to protect the privacy of its beneficiaries’ PHI; 2.Impermissible disclosure of its beneficiaries’ PHI to an outside vendor with which it did not have an appropriate business associate agreement; 3.Use or Disclosure of more PHI than was necessary to carry out mailings; 4.Failure to conduct an accurate and thorough risk analysis that incorporates all IT equipment, applications, and data systems utilizing ePHI; and 5.Failure to implement security measures sufficient to reduce the risks and vulnerabilities to its ePHI to a reasonable and appropriate level. 19

Insurance Resolution Agreement: Triple-S agreed to: Risk analysis and a risk management plan; A process to evaluate and address any environmental or operational changes that affect the security of the ePHI it holds; Policies and procedures to facilitate compliance with requirements of the HIPAA Rules; and A training program covering the requirements of the Privacy, Security, and Breach Notification Rules, intended to be used for all members of the workforce and business associates providing services on TRIPLE-S premises. 20

Ransomware Prevalence of ransomware attacks Is ransomware attack a breach? Law is unsettled Disaster plan essential 21

Lessons Learned Privacy Compliance Programs Needed Elements: 1.Privacy Officer (Security Officer) 2.Policies and Procedures 3.Training 4.Hotline 5.Auditing and Monitoring 6.Demonstrated Response to Suspected Non-compliance 7.Discipline ….and a Risk Assessment 22

Lessons Learned (Routine) Risk Assessment Essential to do one. Fundamental to compliance with the HIPAA Security Rule and OCR almost always requests documentation of the security risk analysis in its investigations. Needs to cover both privacy and security risks Document the Risk Analysis Develop a remediation plan Remediation plan should include, as appropriate: Policies Training Auditing Emphasis on “movement” and storage of e-data Revisit the Risk Analysis periodically Note: A Risk Analysis that shows a risk is not a problem as long as the risk is remediated or a plan is put together to manage it 23

Content: Learning from resolutions 1.Uses and Disclosures of Data 2.Only Disclose Minimum Necessary 3.Disclosures to Vendors 4.Training 5.Identification of Safeguards 6.Changes to Policies and Procedures 7.Device and Media Controls 8.Encryption 9.Audit the Controls 24

Questions? 25