Overview of HIPAA Administrative Simplification and Privacy Regulations Darrel J. Grinstead, Partner Amy B. Kiesel, Associate Hogan & Hartson L.L.P.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
P E N N S Y L V A N I A C O A L I T I O N A G A I N S T D O M E S T I C V I O L E N C E P E N N S Y L V A N I A C O A L I T I O N A G A I N S T RAPE HIPAA.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA The Hidden Beast June Kissinger Director, Risk Management Support Services March 12, 2003.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Presented by the Office of the General Counsel An Overview of HIPAA.
NAU HIPAA Awareness Training
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
HIPAA Health Insurance Portability and Accountability Act.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Copyright Fleisher & Associates A HIPAA PRIMER FOR PUBLIC HEALTH PEOPLE CPHA-N Conference 2003 January 30, 2003 Presented by: Steven M. Fleisher,
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
HIPAAand Disaster Situations By LYNDA M. JOHNSON Friday, Eldredge & Clark.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
OHCAs, ACEs and Hybrid Entities Paul Smith Davis Wright Tremaine LLP One Embarcadero Center Suite 600 San Francisco, CA (415)
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HIPAA Privacy Rules: What Are Plan Sponsors Required to Do?
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
Privacy Notice - Requirements
Paul T. Smith Davis Wright Tremaine LLP
Health Insurance Portability and Accountability Act
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Health Insurance Portability and Accountability Act
National Congress on Health Care Compliance
Presentation transcript:

Overview of HIPAA Administrative Simplification and Privacy Regulations Darrel J. Grinstead, Partner Amy B. Kiesel, Associate Hogan & Hartson L.L.P.

Outline of Presentation HIPAA Overview HIPAA Overview Transactions and Code Set Rule Transactions and Code Set Rule Security Rule Security Rule Privacy Rule Privacy Rule

HIPAA Overview “Health Insurance Portability and Accountability Act of 1996” “Health Insurance Portability and Accountability Act of 1996” Regulations Regulations  Facilitate electronic exchange of health information  Protect the privacy and security of health information

HIPAA Regulations Final Form Final Form  Transactions and Code Set Rule  Security Rule  Privacy Rule  National Standard Employer Identifier Rule Remaining are unpublished or in proposed form. Remaining are unpublished or in proposed form.

Applicability The regulations apply to “covered entities:” The regulations apply to “covered entities:”  Health care providers that electronically bill for services (e.g., most ambulance suppliers, physicians, hospitals),  Health plans, and  Health care clearinghouses.

TRANSACTIONS AND CODE SET RULE

Transactions and Code Set Rule Purpose Purpose  To encourage the use of electronic exchanges  To reduce the administrative burden associated with using different formats Specifies the content and format standards for eight common types of health information transactions. Specifies the content and format standards for eight common types of health information transactions.

Standard Transactions Transactions are composed of: Transactions are composed of:  Format data – define and control the structure of the transaction (e.g., the data element is a dollar amount)  Data content – all data elements and code sets inherent to a transaction and not related to the format of the transaction (e.g., the actual dollar amount)

Transactions The eight standard transactions include: The eight standard transactions include:  Health care claims or equivalent encounter information,  Health care payment and remittance advice,  Coordination of benefits,  Health care claim status,  Enrollment and disenrollment in a health plan,  Referral certification and authorization,  Eligibility for a health plan, and  Health plan premium payments. No standards promulgated for first report of injury and health claims attachments. No standards promulgated for first report of injury and health claims attachments.

Compliance Compliance required by Oct. 16, 2002, unless a compliance plan was submitted to CMS by Oct. 15, 2002, where upon the compliance deadline was extended to Oct. 16, Compliance required by Oct. 16, 2002, unless a compliance plan was submitted to CMS by Oct. 15, 2002, where upon the compliance deadline was extended to Oct. 16, 2003.

Implementation HIPAA Awareness – understand the rule and educate workforce. HIPAA Awareness – understand the rule and educate workforce. Operational Assessment – assess and identify internal implementation issues and develop a work plan to address issues. Operational Assessment – assess and identify internal implementation issues and develop a work plan to address issues. Development and Testing - finalize development of, install, and train staff on, applicable software and perform all software and systems testing. Development and Testing - finalize development of, install, and train staff on, applicable software and perform all software and systems testing.

SECURITY RULE

Security Rule Final rule published Feb. 20, Final rule published Feb. 20, Compliance required by April 21, Compliance required by April 21, Requires covered entities to: Requires covered entities to:  Assess risks and vulnerabilities,  Maintain appropriate security measures, and  Document these methods.

Security Rule Requires covered ambulance suppliers to: Requires covered ambulance suppliers to:  Apply administrative, physical, and technical safeguards  That reasonably and appropriately protect the confidentiality, integrity and availability of electronic protected health information  That they create, receive, maintain or transmit.

Examples – Required Safeguards Administrative Administrative  Sanction policy  Business associate contracts Physical Physical  Disposal of device and media controls  Workstation security Technical Technical  Person or entity authentication  Unique user identification

PRIVACY RULE

Privacy Rule Applicability Applicability Uses and Disclosures Uses and Disclosures Patient Rights Patient Rights Administrative Requirements Administrative Requirements Penalties Penalties Interaction with State Law Interaction with State Law

Compliance Date Covered ambulance suppliers must be in compliance with the Privacy Rule by April 14, Covered ambulance suppliers must be in compliance with the Privacy Rule by April 14, 2003.

Applicability of the Privacy Rule Applies directly to covered entities. Applies directly to covered entities. Regulates protected health information maintained by covered entities. Regulates protected health information maintained by covered entities.

Protected Health Information Protected health information (“PHI”) is information in any form that: Protected health information (“PHI”) is information in any form that:  Identifies or reasonably could be used to identify the patient,  Relates to the past, present, or future health or condition of a patient, payment for care, or provision of care, and  Is created or received by a covered entity, provider or employer.

Protected Health Information It includes: It includes:  Medical information  Billing information  Patient demographic information  Information stored electronically  Information you convey on the phone  Information maintained on paper

Business Associates Requires covered entities to contractually bind their business associates to some of the requirements of the Privacy Rule. Requires covered entities to contractually bind their business associates to some of the requirements of the Privacy Rule.

Definition A business associate is an entity that A business associate is an entity that 1. creates or receives PHI 2. to provide a service or function for or on behalf of a covered entity.

Examples - Business Associates Disclosures of PHI to: Disclosures of PHI to:  An accreditation organization perform accreditation services.  A billing and collection service to assist with reimbursement.  A transcription service to transcribe notes.

Examples - No Business Associate Disclosure of PHI: Disclosure of PHI:  To a provider for treatment of a patient.  Inadvertently to a janitorial agency that provides cleaning services.  To researchers for research purposes. No business associate relationship with your employees. No business associate relationship with your employees.

Business Associate Agreements You must enter into written agreements with your business associates to: You must enter into written agreements with your business associates to:  Limit use and disclosure of PHI,  Safeguard PHI, and  Ensure certain patient rights (e.g., providing a patient with access to PHI).

USES AND DISCLOSURES

Overview of Uses and Disclosures Covered ambulance suppliers may use or disclose PHI only: Covered ambulance suppliers may use or disclose PHI only:  For purposes expressly required or permitted by the rule, or  With patient authorization.

Examples When Authorization Required To provide a list of names of patients involved in automobile accidents to a company that offers automobile insurance. To provide a list of names of patients involved in automobile accidents to a company that offers automobile insurance. To provide a list of patient names to a national association for the association’s fundraising purposes. To provide a list of patient names to a national association for the association’s fundraising purposes.

Examples When Authorization Not Required To use and disclose PHI for your own treatment, payment and health care operations (TPO). To use and disclose PHI for your own treatment, payment and health care operations (TPO). To disclose PHI for the treatment or payment activities of another covered entity. To disclose PHI for the treatment or payment activities of another covered entity. In limited situations, to disclose PHI for the health care operations of another covered entity. In limited situations, to disclose PHI for the health care operations of another covered entity.

Health Care Operations Generally, no authorization required if the disclosure is: Generally, no authorization required if the disclosure is:  To a covered entity that also has a relationship with the patient and  For quality assessment and improvement activities, case management and coordination, fraud and abuse detection or compliance, and other similar activities.

Disclosures to Family Members May disclose PHI to family members or others involved in the patient’s care or payment for care if: May disclose PHI to family members or others involved in the patient’s care or payment for care if:  The patient agrees (or agreement is inferred), or  The patient is not present or is incapacitated and you believe that it is in the patient’s best interest. Also may notify of the patient’s location, general condition, or death. Also may notify of the patient’s location, general condition, or death.

Other Purposes May use and/or disclose PHI without authorization if certain criteria are met: May use and/or disclose PHI without authorization if certain criteria are met:  To avert a serious threat to health or safety  As required by law  For limited marketing activities  For public health activities  For health oversight activities  For research

Other Uses and Disclosures – Avert Serious Threat May use or disclose PHI based on your good faith belief that the use or disclosure is necessary: May use or disclose PHI based on your good faith belief that the use or disclosure is necessary:  To prevent/lessen a serious and imminent threat to the health or safety of a person or the public; or  Under limited circumstances, for law enforcement authorities to identify or apprehend an individual.

Written Authorization – The Default Category May use and disclose PHI for any reason with the written authorization of the patient. May use and disclose PHI for any reason with the written authorization of the patient. Must be in writing and contain certain statements and information that ensures patient knows how his or her information will be used and disclosed. Must be in writing and contain certain statements and information that ensures patient knows how his or her information will be used and disclosed.

MINIMUM NECESSARY STANDARD

Minimum Necessary Standard Covered entities may use, disclose and request only the minimum amount of PHI necessary to accomplish the purpose of the use, disclosure or request. Covered entities may use, disclose and request only the minimum amount of PHI necessary to accomplish the purpose of the use, disclosure or request.

Minimum Necessary Exceptions Disclosures to and requests by providers for treatment (but it does apply to uses) Disclosures to and requests by providers for treatment (but it does apply to uses) Disclosures to the patient who is the subject of the PHI Disclosures to the patient who is the subject of the PHI Uses and disclosures pursuant to authorization Uses and disclosures pursuant to authorization

INCIDENTAL USES AND DISCLOSURES

Incidental Uses and Disclosures An incidental use or disclosure is that which occurs as a result of another use or disclosure that is permitted (e.g., a conversation between EMTs treating a patient overheard by another patient). An incidental use or disclosure is that which occurs as a result of another use or disclosure that is permitted (e.g., a conversation between EMTs treating a patient overheard by another patient).

Incidental Uses and Disclosures Incidental uses and disclosures are permitted as long as a covered entity has: Incidental uses and disclosures are permitted as long as a covered entity has:  Applied reasonable safeguards, and  Implemented the minimum necessary standard, where applicable, with respect to the primary use or disclosure.

PATIENT RIGHTS

Patient Rights Receive a notice of privacy practices Receive a notice of privacy practices Receive an accounting of certain disclosures of PHI Receive an accounting of certain disclosures of PHI Access their information Access their information Amend their information Amend their information Request a restriction on the use or disclosure of information Request a restriction on the use or disclosure of information Request confidential communications Request confidential communications

Content of Notice A header indicating the purpose of the notice A header indicating the purpose of the notice A description the uses and disclosures that you may make A description the uses and disclosures that you may make A statement of patient rights and how to exercise them A statement of patient rights and how to exercise them A statement of your duties A statement of your duties Instructions for filing complaints Instructions for filing complaints Contact information Contact information

Provision of Notice - First Service Delivery General Rule: General Rule:  Provide the patient with your notice no later than the first service delivery on or after April 14, 2003; and  Make a good faith effort to obtain a written acknowledgment of receipt of notice.  If not obtained, document good faith efforts and reason why not obtained.

Obtaining Acknowledgment Sign a separate sheet, list, log book, or initial a cover sheet of the notice to be retained by the ambulance supplier Sign a separate sheet, list, log book, or initial a cover sheet of the notice to be retained by the ambulance supplier Tear off sheet to mail back to the ambulance supplier Tear off sheet to mail back to the ambulance supplier Combine an acknowledgment with consent Combine an acknowledgment with consent

Good Faith Effort – Reason Not Obtained Patient refused Patient refused Patient failed to mail back acknowledgment Patient failed to mail back acknowledgment Patient unconscious or agitated Patient unconscious or agitated

Provision of Notice - First Service Delivery EXCEPTION - Emergency Treatment Situations: EXCEPTION - Emergency Treatment Situations:  Notice: Provide the notice as soon as reasonably practicable after the emergency situation.  Acknowledgment: NOT required to make a good faith effort to obtain the acknowledgment.

Provision of Notice You also must make the notice available by April 14, 2003: You also must make the notice available by April 14, 2003:  Upon request;  At the delivery site (notice must be posted and available for individuals to take with them); and  If you maintain a web site about your services or benefits, prominently on your web site and make the notice available electronically through the site.

Accounting Don’t need to track disclosures Don’t need to track disclosures  To carry out treatment, payment, or health care operations  To patients who are the subject of the PHI  Pursuant to an authorization

Accounting Must track disclosures Must track disclosures  For public health purposes  For research  For health oversight activities  For administrative/judicial proceedings  For abuse/neglect reporting

ADMINISTRATIVE REQUIREMENTS

Administrative Requirements Designate a privacy official Designate a privacy official Designate a contact person or office for complaints and questions Designate a contact person or office for complaints and questions Establish and implement policies and procedures Establish and implement policies and procedures Provide training to workforce members Provide training to workforce members Apply administrative, technical and physical safeguards Apply administrative, technical and physical safeguards Establish a process for individuals to make complaints Establish a process for individuals to make complaints

Administrative Requirement— Training Must train workforce on privacy policies and procedures necessary and appropriate to their jobs. Must train workforce on privacy policies and procedures necessary and appropriate to their jobs. Training must occur: Training must occur:  For current employees: no later than the compliance date,  For new employees after the compliance date: within a reasonable time after the person joins the workforce, and  For employees whose functions change due to a subsequent change in privacy policies or procedures: within a reasonable time after the change.

PENALTIES

Civil Penalties Any person who violates a provision is subject to: Any person who violates a provision is subject to:  A penalty of not more than $100 for each such violation and  Total amount imposed on a person for all violations of an identical requirement or prohibition during a calendar year may not exceed $25,000.

Criminal Penalties Criminal penalties vary depending on the offense. Criminal penalties vary depending on the offense. A person can be fined not more than $250,000, imprisoned not more than 10 years or both if: A person can be fined not more than $250,000, imprisoned not more than 10 years or both if:  the offense is committed with the intent to sell, transfer, or use PHI for commercial advantage, personal gain, or malicious harm.

INTERACTION WITH STATE LAW

Interaction with State Law Must comply with both the Privacy Rule and state laws. Must comply with both the Privacy Rule and state laws. If impossible (rare), comply with provision that provides the patient with: If impossible (rare), comply with provision that provides the patient with:  greater privacy rights,  access to greater amounts of information, or  greater privacy protections. State laws often have heightened protection for sensitive information (e.g., HIV/STDs). State laws often have heightened protection for sensitive information (e.g., HIV/STDs).

The End.