HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
1 TECO ENERGY, INC. HIPAA PRIVACY AND SECURITY REQUIREMENTS April 29, 2014 Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City This Employer.
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
OCR HITECH Enforcement Tips: Prevent, Detect and Quickly Correct HIPAA COW 2010 Spring Conference Privacy/Security Session 1 HIPAA Privacy Best Practices:
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA PRIVACY AND SECURITY AWARENESS.
California :: Delaware :: Florida :: New Jersey :: New York :: Pennsylvania :: Virginia :: Washington, D.C. :: 1 NEW OBLIGATIONS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Health Insurance Portability and Accountability Act (HIPAA)
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
HIPAA Privacy Overview January 2011 Stacy H. Barrow January 2011 © Proskauer1.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Finally, the Final HIPAA/HITECH Regulations are Here! By LYNDA M. JOHNSON Friday, Eldredge & Clark.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
 Health Insurance and Accountability Act Cornelius Villalon Jr.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
HIPAA Privacy Rule Training
Patient Privacy for the Life Sciences Industry: 2012 Update Drew Gantt and David Sclar Cooley LLP 1.
Health Information Privacy & Security
HIPAA CONFIDENTIALITY
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Presentation transcript:

HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.

Overview: The Privacy and Security Rules  HIPAA Privacy Regulations effective April 14, 2003(4) (“Privacy Rule”)  HIPAA Security Regulations effective April 20, 2005(6) (“Security Rule”)  Rules apply to Health Plans, Health Care providers and Health Care Clearinghouses – HIPAA “Covered Entities”  Self-funded health plans (including HRAs, health flexible spending plans) required to fully comply with Privacy and Security Rules; fully-insured plans (group medical, dental vision policies) have limited compliance obligations because of limited PHI access.

HIPAA’s Privacy and Security Rules Apply to “PHI” Under the Privacy Rule, any unauthorized uses and disclosures of participants’ “PHI” by the Plan are prohibited  PHI Defined: information about past, present, or future physical or mental health condition, or payment for medical treatment, if the information identifies or could be used to identify the participant. Includes electronic information (“ePHI”) as well as any other form.  Does not include employment/FMLA records, disability insurance records, ADA information, drug screen results, or fitness for duty tests maintained by an employer outside of its role as Plan sponsor.

Certain Uses and Disclosures of PHI Permitted  Uses and Disclosures between Covered Entities  Uses and Disclosures for Treatment, Payment, and Health Care Operations (“TPO”)  Uses and Disclosures to a Business Associate (organization providing administrative, consulting or other services to the Plan) if BA agreement in place  Uses and Disclosures pursuant to a valid HIPAA authorization

Individual Rights Created; Compliance Steps Required  Individual rights include right to notice of privacy practices, right to request restrictions on PHI uses and disclosures, right to confidential communications, right to access and amend PHI, and right to accounting of disclosures.  Plan required to appoint Privacy Officer and Security Officer  Plan amendments required so Plan sponsor could access PHI  Standards related to scope of permitted disclosures (“minimum necessary standard”), marketing, sale and other uses of PHI implemented

Privacy and Security Policies and Procedures Plan must adopt privacy and security policies and procedures to address its compliance with all aspects of HIPAA Privacy Rule and Security Rule, including: How and to whom PHI will be used and disclosed, including a policy for identifying and entering into Business Associate agreements; Which Plan employees will be authorized to access PHI; How workforce training will be addressed; How participant rights will be protected;

Privacy and Security Policies and Procedures  How internal safeguards will be established (e.g. access controls, firewalls, encryption, password protection);  What policy and process will apply for complaints and sanctions related to HIPAA violations;  How administrative, technical and physical safeguards required by Security Rule will be addressed and implemented.

Other Key HIPAA Concepts Prior to HITECH Act  Business Associates (BAs) of Plans only obligated to comply with HIPAA as required in Business Associate agreements.  Informal Compliance Assistance provided by CMS and OCR; enforcement was not aggressive and health plan HIPAA audits were uncommon.  No Private Right of Action.

HIPAA Changes in ARRA  HIPAA Privacy and Security Rules unchanged until the American Recovery and Reinvestment Act of 2009 (ARRA) was signed into law on February 17,  The Health Information Technology for Economic and Clinical Health Act (“HITECH Act”) amended HIPAA relating to electronic health records, breach notification, increased penalties and enforcement  Generally effective beginning February 17, 2010

Key Change #1: Applicability of HIPAA Privacy & Security Rules to Business Associates  Business Associates (BAs) are now required to directly comply with the HIPAA Privacy and Security Rules similar to Covered Entities.  BAs directly subject to HIPAA’s civil and criminal penalties for HIPAA Privacy and Security Rule violations.  BAs previously bound only by terms of business associate agreements; breach of contract action by Plan only avenue to address violations.

Key Change #2: The Breach Notification Regulations  Prior to HITECH, no legal requirement to affirmatively notify participants of incident involving the unauthorized use or disclosure of PHI; only required to inform participants if they asked.  New regulations make breach notification requirements effective as of September 23, 2009, and subject to sanctions for violations any time on or after February 22, 2010.

A Breach Involving PHI A “Breach” occurs if: An unauthorized access, use or disclosure of PHI occurs, and The access, use or disclosure compromises the security or privacy of the PHI. Security or privacy is compromised if the use or disclosure “poses a significant risk of financial, reputational or other harm to the individual.” If an unauthorized use or disclosure is discovered, the Plan must perform a risk assessment to determine if the use or disclosure poses a significant risk of harm, thereby requiring notification.

Exemptions from Breach Notification Requirements  “Secured” PHI  Encrypted (if electronic PHI)  Destroyed (if paper PHI)  A “Limited Data Set” with zip codes and birth dates removed  Certain disclosures between HIPAA covered entities and workforce members who have a duty to protect the information

Required Action Steps in the Event of a Breach Discovery of the Breach  Breach is considered discovered as of the 1 st day of the breach being known by the Plan (or its agent), or when, by exercising reasonable diligence, it would have been discovered.  Knowledge of a breach by a workforce member or agent (BA) is attributed to the Plan  Time period begins to run upon knowledge of event occurring, even before risk assessment completed to determine if harm could result from incident.

Notification of Breach to Individuals  Once privacy or security incident is discovered, Plan must complete a risk assessment to determine if harm to individuals could result from incident.  Factors to consider – who, what, why, when, how? Subjective analysis.  If harm possible, notification by Plan directly to individuals affected by breach is required no later than 60 calendar days after discovery of the breach.

Notification to Media Outlets and Secretary of HHS  If Plan does not have contact information for 10 or more affected individuals, then Plan must post a conspicuous notice in major print or broadcast media in geographic areas where the individuals affected by the breach likely reside.  If more than 500 residents of a state, Plan must notify prominent media outlets of the breach. (This is in addition to the individual notices mentioned above).  If more than 500 individuals’ PHI involved, then the Plan must immediately notify the Secretary of HHS of the breach; if less than 500 individuals’ PHI involved, Plan still must notify HHS, but may wait until 60 days after the end of the calendar year.

Key Change #3: Heightened Civil Enforcement  Under HITECH, civil penalties for HIPAA violations have increased, and HHS is required to investigate complaints of privacy and security breaches.  HHS has announced HIPAA audit initiative  Penalty Regulations effective on November 30, 2009, and apply to violations after February 17, 2010

New Penalty Structure under Interim Final Regulations  Plan Unaware of Violation: minimum civil penalty is $100 per violation  Violation Due to Reasonable Cause: minimum is $1,000 per violation  Violation Due to Willful Neglect; Corrected Within 30 Days: minimum is $10,000 per violation  Violation Due to Willful Neglect; Not Corrected: minimum is $50,000 per violation Each level of penalty carries with it a maximum of $50,000 per violation, and an overall limit of $1,500,000 for identical violations in a calendar year.

Criminal Liability Also Possible  Plan employees (as well as business associates) who obtain or disclose PHI without authorization may also be criminally liable.  Criminal liability generally extends to intentional harmful conduct for profit or personal gain.

Key Change #4: Additional Legal Remedies for Breaches  In addition to criminal and civil penalties, the new law creates additional remedies:  State Attorney General may bring action for injunctive relief or damages on behalf of state residents adversely affected by HIPAA violation  Connecticut AG recently announced legal action for injunction/civil penalties against Health Net based on missing computer disk drive, and failure to take prompt action to mitigate/notify  Individuals may be awarded a percentage of civil monetary penalties collected for violations

Key Change #5: Increased Restrictions and Individual Rights  “Minimum Necessary” disclosures restricted to “Limited Data Set unless impracticable; regulations expected  “Health Care Operations” definition will be modified to further restrict disclosures for TPO; regulations expected  Increased restrictions on marketing and sale of PHI  Changes made to individual rights –  Additional restrictions on provider disclosures to health plans (cash payments)  Changes related to Electronic Health Records (“EHRs”)  If EHRs used, Plan must account for all uses and disclosures  Requires Plans to provide PHI electronically if EHRs used

Task List: Steps for HIPAA/HITECH Compliance  Revisit plan documents to ensure HIPAA required amendments are in place, and reissue Privacy Notice if necessary (required every 3 years).  Revise HIPAA policies to incorporate HITECH provisions, risk assessment and breach notification requirements, OR implement up-to-date HIPAA policies for all group health plans if not previously adopted.  Revisit Security Rule requirements to ensure administrative, technical, and physical safeguards in place, OR implement Security Rule requirements for ePHI if not previously completed.

Task List: Steps for HIPAA/HITECH Compliance Encrypt or password protect ePHI wherever practicable; review company policies for laptop computers and PDAs. Identify and conduct training of workforce members handling PHI, provide additional training for new HITECH Act provisions. Review workforce sanction policy (or implement if needed).  Ensure that Business Associate agreements are in place with all service providers handling PHI for the Plan, and that those agreements are updated for HITECH.

QUESTIONS??? CONTACT INFORMATION  Katy Stowers (317) (317)  Kristen Gentry (317)