Health Data Flows: Where PETs Can Help PORTIA Workshop on Sensitive Data July 8, 2004 Anna Slomovic, PhD Electronic Privacy Information Center.

Slides:



Advertisements
Similar presentations
H OGAN & H ARTSON, L.L.P.
Advertisements

Health Information Privacy and Confidentiality Lawrence O. Gostin, J.D., LL.D. (Hon.) Professor of Law, Georgetown University; Professor of Public Health,
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
P E N N S Y L V A N I A C O A L I T I O N A G A I N S T D O M E S T I C V I O L E N C E P E N N S Y L V A N I A C O A L I T I O N A G A I N S T RAPE HIPAA.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
North Carolina State University Health Information Privacy 4/16/03.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
Copyright 2006 Rubin Law Firm, LLC Drafting HIPAA Compliant Subpoenas & Discovery Presented by:RACHEL B. RUBIN Kansas Bar Association Annual Meeting June.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
NCVHS: Privacy and Confidentiality Leslie P. Francis, Ph.D., J.D. Distinguished Professor of Law and Philosophy Alfred C. Emery Professor of Law University.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
Health Insurance Portability and Accountability Act (HIPAA)
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
Your HIPAA rules Ben Burton, JD, MBA, RHIA, CHP, CHC Notice of Privacy Practices.
HIPAA Compliance Strategies for Employers, METs, MEWAs and Taft Hartley Union Trust Funds The HIPAA Colloquium at Harvard University Presented by: Melissa.
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
2 H. Westley Clark, M.D., J.D., M.P.H., CAS, FASAM Director Center for Substance Abuse Treatment Substance Abuse Mental Health Services Administration.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
The University of Kansas Medical Center Shadow Experience Training.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality and Drug Courts Carson Fox Esq. Steve Hanson M.S. Ed.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Established in 1996 to enforce standards for electronic health information & enhance the security and privacy of health information.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
BlueCross BlueShield of Tennessee, Inc., an Independent Licensee of the BlueCross BlueShield Association. This document has been classified as public Information.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Health Insurance Portability and Accountability Act
HIPAA Privacy Rule Training
Health Insurance Portability and Accountability Act of 1996
HIPAA THE PRIVACY RULE Reviewed December 2012.
10 Patient Confidentiality and HIPAA
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA Administrative Simplification
Permitted Uses & Disclosures of PHI
Health Insurance Portability and Accountability Act
HIPAA Pros - Disclosures
manatt | phelps | phillips
National Congress on Health Care Compliance
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
13 Managing Medical Records Lesson 3:
Health Insurance Portability and Accountability Act
Presentation transcript:

Health Data Flows: Where PETs Can Help PORTIA Workshop on Sensitive Data July 8, 2004 Anna Slomovic, PhD Electronic Privacy Information Center

EHRs Promise Great Things Improve quality of care Improve quality of care Reduce duplication Reduce duplication Reduce medical errors Reduce medical errors Provide the right care at the right time and place Provide the right care at the right time and place Increase access to care Increase access to care Reduce administrative burden Reduce administrative burden Improve research and public health Improve research and public health Implication: broader and more frequent access to PHI

EHRs Create New Privacy Concerns for Patients Reduced ability to shield sensitive information Reduced ability to shield sensitive information Inability to “leave the past behind” Inability to “leave the past behind” Inability to refuse participation in certain activities, e.g., research? Inability to refuse participation in certain activities, e.g., research? Linking between health information and other information, e.g., welfare Linking between health information and other information, e.g., welfare To maximize patient privacy, the best EHR is highly fragmented with fragments under patient control

EHRs Create New Privacy Concerns for Physicians Reduced autonomy in the practice of medicine Reduced autonomy in the practice of medicine Tracking of utilization and compliance with care guidelines Tracking of utilization and compliance with care guidelines “Pay for performance” “Pay for performance” Reduced ability to provide autonomy to patients Reduced ability to provide autonomy to patients To maximize physician privacy, the best EHR allows physicians role-based access

Outline Privacy concerns raised by EHRs Privacy concerns raised by EHRs The current data flows The current data flows How PETs can help How PETs can help

Existing Regulations Permit Data Flows Without Patient Consent Treatment Treatment Payment Payment Health care operations Health care operations Public health Public health “Required by law” “Required by law” Health system oversight Health system oversight Reporting victims of abuse and neglect Reporting victims of abuse and neglect Law enforcement, judicial and administrative proceedings, specialized government functions Law enforcement, judicial and administrative proceedings, specialized government functions Research (with some restrictions) Research (with some restrictions) Permitted disclosures without patient consent number in the dozens

Patients May Not Know What the Terms of “Notice” Mean Health Care Operations Health Care Operations Legal, accounting, auditing services Legal, accounting, auditing services General administration General administration Also Health Care Operations Also Health Care Operations Outcomes evaluation and guidelines development Outcomes evaluation and guidelines development Accreditation of professionals Accreditation of professionals Training of health care and non-health care workers Training of health care and non-health care workers Fundraising for the health care entity Fundraising for the health care entity Data analysis for plan sponsors or customers Data analysis for plan sponsors or customers Detection of “fraud, waste and abuse” Detection of “fraud, waste and abuse”

Who Performs “Health Care Operations”? Consultants Consultants Lawyers Lawyers Accountants Accountants Medical transcription companies Medical transcription companies Software development and maintenance contractors Software development and maintenance contractors Medical equipment manufacturers and service companies Medical equipment manufacturers and service companies Pharmacy benefits managers Pharmacy benefits managers Document scanning or data input companies Document scanning or data input companies Offsite records storage companies Document destruction companies Credentialing organizations Accreditation agencies Licensing agencies Medical schools Training companies Banks External fundraising agents Collection agencies Secondary users not regulated by HHS

“ Consumers who examine the audit trails of access to their data may be surprised by how many different people and entities access their data. These are not security violations, but routine clinical and business uses of identified clinical data. … [C]onsumers will have to be educated about the realities of how their personal health information is used.” D. J. Brailer et al., Moving Toward Electronic Health Information Exchange: Interim Report on the Santa Barbara County Data Exchange, prepared for the California HealthCare Foundation, July 2003 “[T]he very benefit of regional information exchange arises from physician adoption, and if physicians are reticent to participate in something that might be used against them (or simply fear that it could be used against them), then this benefit of physician practice evaluation may have to be foregone for the foreseeable future.”

Outline Privacy concerns raised by EHRs Privacy concerns raised by EHRs The current data flows The current data flows How PETs can help How PETs can help

We Need to Return to Basic Questions Should all health care providers have access to all PHI? Should all health care providers have access to all PHI? Should secondary users have access to PHI without patient or physician consent? Should secondary users have access to PHI without patient or physician consent? How can EHR systems be built to provide greater control to patients and physicians? How can EHR systems be built to provide greater control to patients and physicians?

PETs As Part of the Answer Fully identified records provided only for whose who need identity to do the job Fully identified records provided only for whose who need identity to do the job Pseudonymity (protecting patients from curiosity, e.g., in labs or pharmacies) Pseudonymity (protecting patients from curiosity, e.g., in labs or pharmacies) Group signatures (protecting physician identity in patient interactions; protecting patient identity in some interactions) Group signatures (protecting physician identity in patient interactions; protecting patient identity in some interactions) Complete records only when needed Complete records only when needed Secret sharing (record fragmented until necessary, e.g., in emergency, with patient consent) Secret sharing (record fragmented until necessary, e.g., in emergency, with patient consent) Selective disclosure (disclosing medications without disclosing diagnosis or physician name) Selective disclosure (disclosing medications without disclosing diagnosis or physician name)

PETs As Part of the Answer, Cont’d Secondary users work with de-identified information Secondary users work with de-identified information Private information retrieval (looking for types of cases without disclosing links between identity and case) Private information retrieval (looking for types of cases without disclosing links between identity and case) Research Research Disease and bioterrorism surveillance Disease and bioterrorism surveillance Clinical guidelines development and improvement Clinical guidelines development and improvement Privacy-preserving datamining (looking for patterns without sharing information) Privacy-preserving datamining (looking for patterns without sharing information) Research Research Quality of care analysis Quality of care analysis Fraud detection Fraud detection

System Can Be Built With More Control for Data Subjects Menu of pre-set choices in EHR Menu of pre-set choices in EHR Who and when can access records without further consent Who and when can access records without further consent Contact information to obtain consent outside pre-set parameters Contact information to obtain consent outside pre-set parameters “Expiration” of one-time past episodes of care “Expiration” of one-time past episodes of care

“ Most interviewees were willing to allow the use of their information for research purposes, although the majority preferred that consent was sought first. The seeking of consent was considered an important element of respect for the individual. Most interviewees made little distinction between identifiable and anonymised data.” Willison, Donald J; Keshavjee, et. al, “Patients' consent preferences for research uses of information in electronic medical records: Interview and survey data,” British Medical Journal (International Edition), February 15, 2003.