Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City www.spencerfane.com www.UBAbenefits.com This Employer.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
An Overview for In-Home Service Providers Legal advice must be tailored to specific circumstances. Information provided in this presentation should not.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
Steps to Compliance: Managing Business Associates PRESENTED BY.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Navigating HIPAA & Recent Healthcare Reform: What You Need to Know.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
1 TECO ENERGY, INC. HIPAA PRIVACY AND SECURITY REQUIREMENTS April 29, 2014 Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
 July 10, 2013 Richard D. Sanders T HE S ANDERS L AW F IRM, P.C. 7 Piedmont Center, Suite Piedmont Road Atlanta, Georgia (404)
HIPAA Update: So what’s new with HIPAA?? And, what does it have to do with you? Ellen Cannon, WV DHHR HIPAA Privacy Officer WV Attorney General’s Office.
This Employer Webinar Series program is presented by Spencer Fane Britt & Browne LLP in conjunction with United Benefit Advisors Kansas City   Omaha.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Regulations What do you need to know?.
H IPAA PRIVACY WORK GROUP FOR EYE BANKS EBAA HIPAA PRIVACY WORK GROUP Christina W. Strong, Esq., Facilitator.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
What You Don’t Know Can Cost You HIPAA in a HITECH World Alaina N. Crislip, Esq. October 10, 2013.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Business Associate Contracts: Time Is Running Out... Rebecca L. Williams, RN, JD Partner Davis Wright Tremaine LLP Seattle, WA
Health Insurance Portability & Accountability Act (HIPAA)
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Security Breach Notification © 2009 Fox Rothschild A Webinar for the Medical Society of New Jersey October 28, 2009 Presented by Helen Oscislawski, Esq.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Implementing and Enforcing the HIPAA Privacy Rule.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
California :: Delaware :: Florida :: New Jersey :: New York :: Pennsylvania :: Virginia :: Washington, D.C. :: 1 NEW OBLIGATIONS.
HIPAA and HITECH The Latest Developments Presented By: Michele Madison Partner, Healthcare Practice Morris, Manning & Martin, LLP
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
HIPAA Omnibus Rule of 2013 POSA August 29, 2013 Renee H. Martin, JD, RN, MSN Tsoules, Sweeney, Martin & Orr, LLC 29 Dowlin Forge Road Exton, PA Tel.:
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Advanced Issues in Privacy: Drafting and Negotiating Business Associate Contracts Thomas E. Jeffry, Jr. Partner Davis Wright Tremaine LLP Los Angeles,
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
CAHF 2010 HIPAA II and HITECH “Your Plan” Rhonda Anderson, RHIA, President Lizeth Flores, RHIT, Consultant Anderson Health Information Systems, Inc. 940.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
A Professional Corporation Stinson, Mag & Fizzell (402) Business Associates 101 Jennifer Wolfe Jerram, B.S.N., J.D.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Finally, the Final HIPAA/HITECH Regulations are Here! By LYNDA M. JOHNSON Friday, Eldredge & Clark.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
This Employer Webinar Series program is presented by Spencer Fane Britt & Browne LLP in conjunction with United Benefit Advisors Kansas City   Omaha.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Enforcement, Business Associates and Breach Notification. Oh my!
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
HITECH’s Impact on Research
Business Associate Contracts: Time Is Running Out . . .
Presentation transcript:

Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City This Employer Webinar Series program is presented by Spencer Fane Britt & Browne LLP in conjunction with United Benefit Advisors

Copyright HIPAA Privacy and Security Update Robert A. Browning Julia M. Vander Weele

Copyright Presenters Robert A. Browning, JD Partner Julia M. Vander Weele, JD Partner

Copyright Overview  HITECH – Health Information Technology for Economic and Clinical Health Act  Enacted as part of economic stimulus bill on February 17, 2009  Federal funding for health information technology initiatives to improve administrative efficiencies

Copyright Summary of Changes  Notification of breach  Expanded right to request restrictions  Special rules for electronic health records  Prohibition on sale of PHI  Increased civil monetary penalties and enforcement  Direct application of security rule to business associates

Copyright Notification of Breach  New requirement (in addition to the existing obligation to mitigate)  Similar to state data breach notification laws  Applies to “unsecured” PHI that is “accessed, acquired, or disclosed” by or to an unauthorized person as a result of a “breach”  Must notify “affected individuals” and the Department of HHS in the event of breach

Copyright Notification of Breach  “Breach” does not include certain unintentional acquisition by a member of the workforce or where unauthorized person would not reasonably have been able to retain the information  “Breach” must compromise the security or privacy of the protected health information; regulations say that this means “poses a significant risk of financial, reputational, or other harm to the individual”

Copyright Notification of Breach  “Unsecured” means not secured by a technology standard that renders PHI unusable, unreadable, or indecipherable to unauthorized individuals  Guidance issued by Secretary of Health and Human Services on April 17 on approved technologies or methodologies to secure PHI  Encryption or destruction are only approved methods  Interim final regulations published August 24, 2009  Effective September 23, 2009, but HHS will use its enforcement discretion to not impose sanctions for breaches that are discovered before 180 days from the publication of regulations

Copyright Notification of Breach  Notice must include:  A brief description of the breach, including the date of breach and discovery  A description of the types of unsecured PHI disclosed or misappropriated during the breach  The steps individuals should take to protect themselves from potential harm  A description of the covered entity’s actions to investigate the breach and mitigate harm now and in the future  Contact procedures (including a toll-free telephone number, address, website, or postal address) for affected individuals to find additional information

Copyright Notification of Breach  Notice must be provided “without unreasonable delay” and in no event later than 60 days after discovery of breach  Notice must be provided to each individual, in writing, by first-class mail  If more than 500 affected individuals in same state or geographic area, must also provide notice to prominent media outlets  If 10 or more affected individuals cannot be located, must post notice in major print media or on home page of Company website

Copyright Notification of Breach  Burden of proof that notice requirements have been met rests with covered entity or business associate  Breach will be treated as “discovered” on first day on which breach is known or should reasonably have been known through exercise of reasonable diligence

Copyright Requests for Restrictions  Under HIPAA, individuals have the right to request restrictions on disclosure of PHI  Covered entity must comply with the requested restriction if the disclosure is to a health plan for a payment or health care operations purpose (but not for treatment purposes) if PHI relates to item or service for which individual paid in full out-of-pocket

Copyright Electronic Health Records  Right to request and receive information in an electronic format if it is maintained as an electronic health record (EHR)  Electronic health record defined as “an electronic record of health-related information on an individual that is created, gathered, managed, and consulted by authorized health care clinicians and staff”

Copyright Electronic Health Records  Right to an accounting of disclosures applies even to disclosures made for treatment, payment, or health care operations purposes  Applies only for past three years (vs. six years for other requests for accounting)

Copyright Prohibition on Sale of PHI  Neither covered entity nor business associate can directly or indirectly receive remuneration in exchange for PHI without authorization  Exception if purpose of the exchange is for remuneration that is provided by a covered entity to a business associate for activities that the business associate undertakes on behalf of and at the specific request of the covered entity pursuant to a BAA  Regulations due within 18 months; rule effective 6 months after final regs

Copyright Civil Monetary Penalties  Penalty for violations due to reasonable cause has increased from $100 per violation to $1,000 per violation  Violations due to willful neglect are subject to penalty of $10,000 per violation (if corrected) and $50,000 per violation (if not corrected)  Willful neglect to be defined by regulation within 18 months

Copyright Enforcement  Secretary of HHS required to conduct full investigation if preliminary investigation of complaint indicates possible willful neglect  State attorneys general can sue on behalf of individuals (injunction or damages of up to $25,000)  Future regulations (within 36 months) will allow aggrieved individuals to share in penalties

Copyright Business Associates  Business Associate Defined:  Person or organization, other than a member of covered entity workforce; who  Performs functions/activities on behalf of, or provides services to, a covered entity; which  Involves creation, use or disclosure of individually identifiable health information

Copyright Business Associates  Business associate “functions or activities” include, but are not limited to:  Claims processing  Data analysis  Utilization review  Billing

Copyright Business Associates  Business Associate “services” are limited to:  Legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation or financial services  Functions or services must involve use or disclosure of PHI (other than incidental or accidental use)

Copyright Business Associate Agreement  Covered entities (health care providers, group health plans) must include provisions to protect privacy and security of PHI in any agreement with a Business Associate  Must impose specified written safeguards on any individually identifiable health information used or disclosed by the business associate

Copyright B/A Agreement - Privacy  Specifically, a contract with a business associate (B/A) must:  Establish permitted/required uses and disclosures of PHI by B/A  Prohibit other uses/disclosures of PHI by B/A  Prohibit illegal use/disclosure of PHI by B/A  Require appropriate safeguards to prevent non- permitted use/disclosure of PHI by B/A  Authorize termination of contract by covered entity for breach by B/A of any material term

Copyright B/A Agreement - Privacy  B/A agreement must also provide that:  B/A will report any misuse or unauthorized disclosure of PHI  B/A will mitigate harmful effects of misuse or unauthorized disclosure  B/A will require its agents (subcontractors) to adhere to the same rules re: PHI  B/A will provide access to PHI to allow covered entity to meet its obligations  B/A will return or destroy PHI upon termination of agreement

Copyright B/A Agreement - Privacy  If B/A breaches the agreement, the covered entity must:  Take steps to cure the breach or end the violation; and  If breach cannot be cured, the covered entity must terminate the agreement; or  If termination is not feasible, the covered entity must report the breach/violation to Health and Human Services (HHS)

Copyright B/A Agreement - Security  B/As must implement administrative, physical and technical safeguards to protect the confidentiality, integrity and availability of electronic PHI created, received, maintained or transmitted on behalf of the covered entity  B/As must report any “security incident” that it becomes aware of

Copyright Business Associates  Liability of Business Associates prior to HITECH –  No direct application of HIPAA privacy or security rules – so no civil or criminal penalties could be assessed on B/As  Potential liability to covered entity (if B/A agreement included indemnification) but generally covered entity’s only recourse is right to terminate agreement upon B/A’s breach and failure to cure

Copyright Business Associates – New Law  Business Associates under HITECH:  Now directly subject to many of the HIPAA Security Rules in the same manner as covered entities  Now subject to civil and criminal penalties for violating those Security Rules in the same manner as covered entities  Also subject to civil and criminal penalties for failure to adhere to the Privacy provisions in the Business Associate agreement

Copyright Business Associates – New Law  Security Provisions Now Applicable:  Administrative Safeguards – 9 standards, 23 implementation specifications  Physical Safeguards – 4 standards, 10 implementation specifications  Technical Safeguards – 5 standards, 9 implementation specifications  Policies and Procedures/Documentation – 3 implementation specifications

Copyright Business Associates – New Law  Security Provisions Now Applicable:  Appoint a security official  Train workforce in the Security Rule  Perform a risk assessment  Develop specific Security policies and procedures  Adopt physical safeguards  Adopt technical safeguards  Notify covered entity of security breach

Copyright Business Associates – New Law  Business Associates must now “monitor” the covered entity, and if covered entity is violating the privacy or security rules, the B/A must:  Ask covered entity to stop violation; and  Terminate agreement if violations are not stopped; or  Report violations to HHS if termination of the agreement is not feasible

Copyright Business Associates – New Law  Still not directly subject to Privacy Rule, but now subject to civil and criminal penalties for failure to comply with privacy provisions in Business Associate agreements  New requirement to provide individuals with accounting of disclosures (in last 3 years) of information in “electronic health record”

Copyright Business Associates – New Law  May need to amend existing business associate agreements to:  Address new breach notification requirements that are effective September 23, 2009  Reflect direct application of security rules effective February 17, 2010  Reconsider remedies for breach and indemnification provisions (now that business associates are directly liable for violations of the security rule and breach of the privacy provisions in the agreement)  Provide for termination by B/A if covered entity violates privacy/security rules

Copyright Other Changes  Companies that provide data transmission of PHI to covered entities or business associates, such as:  Health information exchange organizations; and  Vendors of personal health records  Will be subject to the same requirements as business associates

Copyright Effective Dates  Increase in civil penalties effective immediately  Notification of breach provisions effective September 23, 2009  General effective date for most other provisions (including business associate requirements) is February 17, 2010  EHR accounting requirements effective 2011 or 2014

Copyright Next Steps  Review and update notice of privacy practices  Review and update privacy and security policies and procedures  Review plan document  Amend business associate agreements  Provide updated training to workforce

Thank You For Your Participation Kansas City   Omaha  Overland Park St. Louis  Jefferson City Thank you for your participation in the Employer Webinar Series. To obtain a recording of this presentation and qualify for HRCI credits, or to register for future presentations, contact your local UBA Member Firm.