HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)

Slides:



Advertisements
Similar presentations
SIMPLIFYING PRIVACY: HIPAA PRIVACY STANDARDS AND RESEARCH Angela M. Vieira General Counsel Childrens Hospital and Health Center June 5, 2004.
Advertisements

HIPAA Privacy Rule “Standards for Privacy of Individually Identifiable Health Information” 45 CFR 160 and 164* *
HIPAA Privacy Rule and Research
1 The HIPAA Privacy Rule and Research This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
NATIONAL FORUM ON YOUTH VIOLENCE PREVENTION: HIPAA PRIVACY RULE CONSIDERATIONS November 1, 2011 Iliana L. Peters, JD, LLM HHS Office for Civil Rights.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
National Cancer Institute Cancer Therapy Evaluation Program (CTEP) presents: How to Obtain Protected Health Information (PHI) from an Outside Healthcare.
1 HIPAA and Research and YOU. 2 INTRODUCTION Rule #1:Don’t Panic Rule #2:Bottom Line for Researchers: HIPAA is Manageable thru Education/Awareness and.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA Requirements for Patient Oriented Research
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Informed Consent.
Training In HIPAA Privacy Regulations for Researchers and Research Staff Adapted from a presentation prepared by Human Subjects Division, University of.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Implementation of Privacy Board Reviews at PCMC Mary Thomason, Intermountain Healthcare Privacy Board Chair.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
1 HIPAA, Researchers and the IRB: Part Two Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
HIPAA, Researchers and the IRB Alan Homans, IRB Chair and Nancy Stalnaker, IRB Administrator.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
1 Research & Accounting for Disclosures March 12, 2008 Leslie J. Pfeffer, BS, CHP Office of the Vice President for Research Administration Office of Compliance.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Revised February 4, Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research.
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
HIPAA Privacy and Research August 21, 2015
1 Defense Health Agency Privacy and Civil Liberties Office HIPAA Privacy Board Overview August 6, 2015.
Health Insurance Portability and Accountability Act (HIPAA)
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
PwC Tissue Banking and Repositories – Human Subject Protections Privacy Protections Medical Research Summit Tom Puglisi, Ph.D. Friday March 7 – 9:15 am.
HIPAA and Research Basics for IRB Tim Atkinson Director, Research and Sponsored Programs Director, Institutional Review Board Research Privacy Officer.
HIPAA – How Will the Regulations Impact Research?.
NE SNIP PRIVACY WORKGROUP Use and Disclosure of Protected Health Information Regarding a Deceased Individual.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
HIPAA SURVIVAL SKILLS: An Update University of Miami1 Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
University of Pennsylvania Health System 1 Session 3.02: Case Studies in Clinical Research Compliance Russell M. Opland, M.P.H., EMT-P Chief Privacy Officer.
Health Insurance portability and Accountability Act (HIPAA)‏
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
06/20/03- revised1 Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule: UCSF Education Module for Researchers, Research Administrators,
HIPAA The Health Insurance Portability and Accountability Act of 1996 (Public Law ) Impact on Pathologist Trina Shanks University Pathology Services,
PwC Issues in HIPAA Research Compliance William R. Braithwaite, MD, PhD “Dr. HIPAA” HIPAA Summit 6 Washington, DC 27 March 2003.
Human Subjects Update E. Wethington, Chair, UCHS.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA 2017 JHSPH IRB Clarifications and Changes
Institutional Review Board and Research Education
Winter 2008 HIPAA, Privacy & Confidentiality.
The HIPAA Privacy Rule: Implications for Medical Research
HIPAA Administrative Simplification
HOGAN & HARTSON, L.L.P. “Publications” “Health”
HIPAA Privacy Rule and Research
Disability Services Agencies Briefing On HIPAA
The HIPAA Privacy Rule and Research
Health Insurance Portability and Accountability Act
National Congress on Health Care Compliance
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA Privacy & Security: Medical Research Context
Issues in HIPAA Research Compliance
Analysis of Final HIPAA Privacy Modification Rule
Office of the Vice President for Research Human Subjects Protection Program IRB Submission Process Module 4 - Health Insurance Portability and Accountability.
The Health Insurance Portability and Accountability Act
Presentation transcript:

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT With regard to research use…. The effective date was April 14, 2003 The Act establishes the conditions under which Protected Health Information may be used or disclosed by covered entities for research purposes

COVERED ENTITY A health plan, a health care clearinghouse, or a health care provider who transmits health information in electronic form in connection with a transaction for which HHS has adopted a standard. (YU, MMC, HHC, & the offices of private physicians are all covered entities)

HEALTH INFORMATION Any information, whether oral or recorded, in any form or medium, that relates to past, present, or future physical or mental health or condition of an individual or to the provision of health care to an individual.

In the course of conducting research, researchers my obtain, create, use, and/or disclose individually identifiable health information. Under the Privacy Rule, covered entities are permitted to use and disclose protected health information for research with individual authorization, or without authorization under limited circumstances set forth in the Privacy Rule.

In providing authorization, individuals must be informed of the uses and disclosures of their health information (what information will be used, for what purpose, and by whom) and their rights, including their right to access information about them held by covered entities.

AUTHORIZATION FORM YU and MMC have agreed that, for the first year, a separate authorization form will be used. Consideration will be given in the future to combining the two documents. Generally, researchers will conduct the informed consent process and then explain the authorization form

CORE ELEMENTS OF AN INDIVIDUAL AUTHORIZATION A description of the information to be used or disclosed that identifies the information in a specific and meaningful fashion. The name or other specific identification of the person or class of persons authorized to make the requested use or disclosure An expiration date or an expiration event (such as “never” or “end of research study”) that relates to the individual or the purpose of the use or disclosure

A statement of the individual’s right to revoke the authorization in writing and the exceptions to the right to revoke, together with a description of how the individual may revoke the authorization If authorization is revoked, information that was already collected may still be used and disclosed to others, if the researchers have relied on it to complete and protect the validity of the research.

A statement that information used or disclosed pursuant to the authorization may be subject to redisclosure by the recipient and no longer be protected by the privacy rule The informed consent lists all entities to whom information may be sent. These entities are asked to maintain confidentiality. However, if information is sent to a non-covered entity, it is no longer protected by the privacy rule.

If the authorization is signed by a personal representative of the individual, a description of such representative’s authority to act for the individual Only a legally appointed representative can provide authorization. This must be documented in the research record.

The Authorization Form on the AECOM CCI home page contains all the required core elements, including ‘help text.’ Modification or use of another model requires IRB review prior to use. The signature of the person obtaining the authorization does not need to be included. The research participant must be given a copy of the signed authorization form.

ACCOUNTING FOR RESEARCH DISCLOSURES In general, the Privacy Rule gives individuals the right, on request, to receive an accounting of certain disclosures of protected health information made by a covered entity. This must include specified information regarding each disclosure. Researchers must be able to disclose what was sent, when it was sent, and to whom it was sent. A more general accounting is permitted for subsequent multiple disclosures to the same person or entity for a single purpose.

DELAYED ACCESS TO RESEARCH RECORDS The Privacy Rule permits suspension of the participant’s access rights while a clinical trial is in progress, provided that the participant agrees to this denial of access when consenting to participate. The participant must be informed that the right to access information will be reinstated at the conclusion of the trial.

TRANSITION PROVISIONS A covered entity may use and disclose protected health information that was created or received for research purposes, either before or after the compliance date, if the covered entity obtained any one of the following prior to the compliance date: An authorization or other express legal permission from an individual to use or disclose Protected Health Information for the research; The informed consent of the individual to participate in the research; or A waiver of informed consent by an IRB.

INDIVIDUALS ENROLLED IN RESEARCH BEFORE THE COMPLIANCE DATE AUTHORIZATION MUST BE OBTAINED IF… The patient is to be reconsented A waiver of informed consent was obtained prior to the compliance date, but informed consent subsequently is sought after the compliance date.

RESEARCH USE/DISCLOSURE WITHOUT AUTHORIZATION

ALTERATION OR WAIVER OF RESEARCH PARTICIPANTS’ AUTHORIZATION Documentation is required that the use or disclosure of information for research purposes has been approved by an IRB under normal or expedited review, with Identification of the IRB Statement by IRB that the alteration or waiver satisfies the three criteria in the Rule A brief description of the protected health information Signature of the IRB Chair or designee

ALTERATION OR WAIVER OF AUTHORIZATION THE IRB MUST AGREE THAT THE FOLLOWING THREE CRITERIA HAVE BEEN MET: (1) The use or disclosure of protected health information involves no more than a minimal risk to the privacy of individuals, based on, at least, the presence of the following elements:

An adequate plan to protect the identifiers from improper use and disclosure; An adequate plan to destroy the identifiers at the earliest opportunity consistent with conduct of the research, unless there is a health or research justification for retaining the identifiers or such retention is otherwise required by law; and

Adequate written assurances that the protected health information will not be reused or disclosed to any other person or entity, except as required by law, for authorized oversight of the research project, or for other research for which the use or disclosure of protected health information would be permitted by this subpart;

(2) The research could not practicably be conducted without the waiver or alteration; and (3) The research could not practicably be conducted without access to and use of the protected health information.

USE OF DE-IDENTIFIED DATA De-identified health information is not protected health information, and thus is not protected by the Privacy Rule A covered entity may always use or disclose for research purposes health information that has been de-identified, either by statistical verification or by removing certain pieces of information

ELEMENTS THAT MUST BE DELETED TO QUALIFY AS DE-IDENTIFIED DATA Name Address Employer Relative’s names All elements of dates (year OK*) Telephone and fax numbers E-mail addresses Social Security Number Member or Account Number Certificate/license number Voice/fingerprints, photos, or other number, code, or characteristics *All ages over 89 must be recorded as “age 90 or older”

EXEMPTIONS FROM HIPAA AUTHORIZATION Use of PHI preparatory to research Research on protected health information of decedents Use of a limited data set

USE OF PROTECTED HEALTH INFORMATION PREPARATORY TO RESEARCH The use or disclosure is solely to review PHI as necessary to prepare a research protocol or for similar purposes preparatory to research (such as to aid study recruitment). The PHI cannot be removed from the covered entity. The PHI for which use or access is requested is necessary for the research.

RESEARCH ON PROTECTED HEALTH INFORMATION OF DECEDENTS The use of disclosure is sought solely for research on the PHI of decedents. The use or disclosure is necessary for the research purposes. Documentation will be obtained, at the request of the covered entity, of the death of the individuals whose PHI is sought by the researchers.

LIMITED DATA SET A Limited data set is the same as a de-identified data set except that the following data elements ARE allowed: Zip code City, State Date of Birth, and other dates. A Data Use Agreement is required. It is the means by which covered entities obtain assurances that the recipient of the limited data set will use or disclose the PHI in the data set only for specified purposes.

DATA USE AGREEMENT Must contain the following provisions: Include specific permitted uses and disclosures of the limited data set by the recipient consistent with the purpose for which it was disclosed (a data use agreement cannot authorize the recipient to use or further disclose the information in a way that, if done by the covered entity, would violate the Privacy Rule). Identify who is permitted to use or receive the limited data set.

DATA USE AGREEMENT Stipulates that the recipient will - Not use or disclose the information other than permitted by the agreement or otherwise required by law. Use appropriate safeguards to prevent the use or disclosure of the information, except as provided for in the agreement, and require the recipient to report to the covered entity any uses or disclosures in violation of the agreement of which the recipient becomes aware. Hold any agent of the recipient (including subcontractors) to the standards, restrictions and conditions stated in the data use agreement with respect to the information. Not identify the information or contact the individuals.