A Tale of Snooping: Lessons Learned the Hard Way Nebraska Rural Health Association September 21, 2015 Vickie B. Ahlers Baird Holm LLP vahlers@bairdholm.com.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
Red Flag Rules: What they are? & What you need to do
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Accident Incident Policy Changes to Policy September 2007.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
Electronic Health Records Danielle P. Berthelot, RHIA Director, Health Information Management and Cancer Registry Privacy Officer Woman’s Hospital.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
AAMC Contact: Ivy Baer Accounting for Disclosures Under HIPAA Proposed Rule: 76 Federal Register 31426, May 31, 2011.
How to Survive a HIPAA Audit Compliance Counsel February 2014.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
AUDITS….. MEANINGFUL USE AND HIPAA COMPLIANCE (OCR) MARK NORRIS MEDICAL RECORDS SERVICES
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Privacy & Information Security Basics
Moving Health Information In An Emergency
HIPAA CONFIDENTIALITY
IRB reporting updates.
Overview Introduction Meaningful Use Objective for Security Key Security Areas and Measures Best Practices Security Risk Analysis (SRA) Action Plan Demonstration.
Paul T. Smith Davis Wright Tremaine LLP
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Lesson 1  7 Basic Components of an Effective Compliance Plan
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Enforcement and Policy Challenges in Health Information Privacy
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

A Tale of Snooping: Lessons Learned the Hard Way Nebraska Rural Health Association September 21, 2015 Vickie B. Ahlers Baird Holm LLP vahlers@bairdholm.com / 402.636.8230 Anna Turman, COO, CIO Chadron Community Hospital & Health Services coo@chadronhospital.com

From OCR “Wall of Shame”

Snooping Data Breaches

Quiz: Forms of Snooping It’s not snooping if it was “good intentioned”? It’s not snooping if it was family or a friend? It’s not snooping if it was “for educational purposes”? It’s not snooping if they used to be my patient

“It Won’t Happen Here” Many studies have found snooping still single most common occurrence of compromise to patient records If you think it isn’t happening, you aren’t looking hard enough Significant risk if you ignore the problem

Snooping and the Privacy Rule Responsibility to protect from access by employee without job related reason requirement of the Privacy Rule Privacy Rule, 45 CFR §164.530(c): Standard: “Covered entity must have in place appropriate administrative, technical, and physical safeguards to protect the privacy of PHI” Implementation Specification: “A covered entity must reasonably safeguard PHI from any intentional or unintentional use or disclosure”

Snooping and the Security Rule Requirement to look for snooping is part of Security Rule Security Rule, 45 CFR§164.308(a)(1)(ii)(D) &§164.312(b): “Information system activity review. Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.” “Audit Controls. Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI.”

Snooping and Auditing Access Why Audit? Detect inappropriate access, use or disclosure of PHI (ongoing monitoring of potential breaches) Hold individuals accountable Accreditation standards (Joint Commission) Pattern of noncompliance (by an individual workforce member, department, etc.) Detect issue before it becomes widespread

Snooping and Auditing Access Targeted Audits Did a patient complain? (Did a co-worker report?) High profile patient? User logged-on in more than one location? Is a user on vacation or sick leave? Accessing family or co-worker records? Physicians accessing outside of their specialty? Accessing records outside of department?

Lessons Learned at Chadron Community Hospital and Health Services CCH experienced a snooping incident by a CCH employee Investigation at time of incident was significant and time-intensive Notification to 482 patients

Lessons Learned at Chadron Community Hospital and Health Services Breach report to OCR was flagged for follow up investigation – even more time-intensive and expensive 25 page response letter to OCR 145 attachments based on OCR document request Based on thorough investigation and response by CCH, case closed by OCR without any further requirements What did we learn?

Anatomy of a Snooping Investigation and Response Detection of possible incident Interviews(s) Auditing extent of possible snooping Sanctions Training New or revised policies Notification Documentation

Detection: Lessons Learned Fellow employee complaint (could also be patient complaint) Take it seriously (but be mindful of ulterior motives by employees or patients) Make sure employees understand obligation to report Make sure employees have avenue to express complaints/concerns Can you explain to OCR – why was this inappropriate access not identified previously? (Have you been auditing?)

Interviews: Lessons Learned Should conduct thorough interviews with: Complaining employee (or patient if that is the case) Other employees with potential for knowledge Managers/supervisors of department knowledge of what access would be appropriate Suspected snooping employee May need to repeat interviews after more information is learned Document interviews very thoroughly

Auditing Extent of Snooping: Lessons Learned Two toughest questions: How far back do you run your audit? How do you know what access was appropriate?

Auditing Extent of Snooping: Lessons Learned How far back do you run your audit? Some factors to consider? When was employee hired? Any changes in job responsibilities? Any changes in EHR or electronic record system? Can you explain limitations in your system’s audit capabilities? And your timeline/plan to remedy any limitation?

Auditing Extent of Snooping: Lessons Learned How do you know what access was appropriate? Analysis of audit reports extremely time-intensive What level of “proof” is required? Proof to OCR that access was job-related? Proof that access was not job-related if firing? If no clear trail of job-related access, can you identify patterns or trends to suggest what access was business related and what was not?

Sanctions: Lessons Learned Do you have a sanctions policy? Does sanctions policy give management flexibility to terminate? Zero-tolerance is trend but not absolute requirement under HIPAA

Training: Lessons Learned Can you provide documentation of training dating back six years? Can you prove each individual employee has received training (sign in sheet for in-person training or computerized documentation)? Make sure training clearly addresses snooping – dispel any myths!

Policies: Lessons Learned Do policies adequately address all required HIPAA requirements? Keep policies updated and retain all versions in effect for prior six years Are new or revised policies needed after incident? Should review risk assessment and if snooping is not addressed as risk, include it Revise any current policies that need revision Implement new policies that could prevent the incident from being repeated Train and document training on new policies

Notification: Lessons Learned Letters to 482 patients Multiple versions: minors, deceased, guardians Maintain proof of date of mailing Focus by OCR on undeliverable letters If more than 10 are returned as undeliverable, requirement for media notice Preamble to Breach Notification Rule suggests all remailings must happen within 60 day timeline (very difficult standard)

Documentation: Lessons Learned Important to maintain thorough documentation of entire process Timeline of events Incident report at conclusion – make your case at time of incident as if you will be required to defend actions to OCR OCR Document Request Significant increase in documents requested from early days of enforcement

Documentation: Lessons Learned A written, detailed description of the incident(s) described on the first page of this letter to include the date and method of discovery. Please state whether you conducted an investigation concerning the incident(s) described on the first page of this letter. If so, please submit documents gathered during and related to the investigation as well as a copy of your findings. Documentation supporting any claims that your facility responded to the incident(s) and mitigated, to the extent practical, the harmful effects of the incident.

Documentation: Lessons Learned A copy of the letter sent out notifying the affected individuals of the breach of their PHI, to include the date of mailing. A copy of your log, or similar document, indicating the individual notifications that were returned as undeliverable. A copy of CCH's policies and procedures for uses and disclosures of PHI. Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related to its date of implementation.

Documentation: Lessons Learned A copy of CCH's policies and procedures related to the minimum necessary requirements. See 45 CFR 164.502(b) and 164.514(d). Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related to its date of implementation. 8. A copy of CCH's policies and procedures addressing how CCH administratively, technically, and physically safeguards patients' PHI.

Documentation: Lessons Learned A copy of CCH's policies and procedures addressing how CCH administratively, technically, and physically safeguards patients' electronic PHI (ePHI). Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related to its date of implementation. Copies of all CCH's risk analyses, with corresponding dates, in existence as of February 1, 2009, up to an including the present. If a risk analysis does not state the date on which it was prepared, please provide information as to the date or period during which the risk analysis was performed.

Documentation: Lessons Learned Documentation evidencing CCH's security measures implemented to reduce risk and vulnerabilities identified through the above-noted risk analyses. A copy of CCH's policies and procedures implemented to ensure the application of appropriate sanctions against HIPAA-noncompliant workforce members. Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related to its date of implementation.

Documentation: Lessons Learned Documentation evidencing that CCH's policies and procedures implemented to ensure application of appropriate sanctions against HIPAA-noncompliant workforce members are consistently applied. A copy of CCH's policies and procedures pertaining to review of records of information system activity. Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related toits date of implementation.

Documentation: Lessons Learned Documentation evidencing that CCH's policies and procedures pertaining to review of records of information system activity are consistently applied. A copy of CCH's policies and procedures implemented to ensure CCH's workforce has appropriate access to electronic protected health information (e-PHI) pursuant to §164.308(a)(3)(i), the Workforce Security Standard; e.g., Are the procedures used by your workforce consistent with your access policies (i.e., do people who should have access actually have that access? Are people who should not have access prevented from accessing the information?) Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related to its date of implementation.

Documentation: Lessons Learned Documentation evidencing CCH's HIPAA-related workforce training, to include presentation materials, sign-in sheet(s) or other document(s) confirming workforce attendance and/or completion of training. A copy of the March 7, 2014 patient complaint alleging that a member of the CCH's workforce impermissibly accessed the patient's PHI.

Documentation: Lessons Learned A copy of the CCH's policies and procedures related to audit controls, and evidence that these policies were implemented. Please submit all versions in effect from February 1, 2009, up to and including the present. If a document does not state the date of implementation, please provide information related to its date of implementation. 20. Submission of any other information that would be useful to OCR in this investigation.

Questions?

A Tale of Snooping: Lessons Learned the Hard Way Nebraska Rural Health Association September 21, 2015 Vickie B. Ahlers Baird Holm LLP vahlers@bairdholm.com / 402.636.8230 Anna Turman, COO, CIO Chadron Community Hospital & Health Services coo@chadronhospital.com