Electronic Medical Records: Minimizing HIPAA, Stark and Anti-Kickback Legal Risks and Liabilities October 27, 2009 Copyright © 2009 Mintz, Levin, Cohn,

Slides:



Advertisements
Similar presentations
HIPAA Health Insurance Portability and Accountability Act of 1996
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Steps to Compliance: Managing Business Associates PRESENTED BY.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
Health Insurance Portability & Accountability Act (HIPAA)
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Lecture 14 Policy, Legal, and Regulatory Issues in HIS (Chapters 18,19,20)
The Use of Health Information Technology in Physician Practices
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
California :: Delaware :: Florida :: New Jersey :: New York :: Pennsylvania :: Virginia :: Washington, D.C. :: 1 NEW OBLIGATIONS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HITECH Act and HIPAA: Important Compliance Update Susan E. Ziel Gerald “Jud” DeLoss.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
The American Recovery and Reinvestment Act of 2009: Changes to HIPAA Privacy and Security Requirements And its Impact on Hospitals Presented By: Michele.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
 Health Insurance and Accountability Act Cornelius Villalon Jr.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Red Flags Rule An Introduction County College of Morris
Health Advocate HIPAA Privacy Information
HITECH’s Impact on Research
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Presentation transcript:

Electronic Medical Records: Minimizing HIPAA, Stark and Anti-Kickback Legal Risks and Liabilities October 27, 2009 Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. This presentation may be considered attorney advertising under the rules of some states. The information and materials contained herein have been provided as a service by the law firm of Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. ; however, the information and materials do not, and are not intended to, constitute legal advice. Neither transmission nor receipt of such information and materials will create an attorney-client relationship between the sender and receiver. The hiring of an attorney is an important decision that should not be based solely upon advertisements or solicitations. Users are advised not to take, or refrain from taking, any action based upon the information and materials contained herein without consulting legal counsel engaged for a particular matter. Furthermore, prior results do not guarantee a similar outcome.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 2 Mintz Levin Cohn Ferris Glovsky and Popeo LLP Dianne J. Bourque, Associate One Financial Center Boston, MA Phone Number: (617) Katina W. Lee, Associate 701 Pennsylvania Avenue, NW, 9 th Floor Washington, DC Phone Number: (202) Hope S. Foster, Member 701 Pennsylvania Avenue, NW, 9th Floor Washington, DC Phone Number: (202)

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 3 What to Expect Today General overview of the Health Information Technology for Economic and Clinical Health Act (“HITECH Act”) Federal and state laws on data breach notification Red flag rules Privacy and security risks and best practices to minimize liability under HIPAA, prevent the loss of electronic protected health information and reduce the risk of medical identify theft Potential regulatory barriers to electronic health record technology and best practices to minimize liability under Stark concerns and Anti-kickback concerns

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 4 Health IT - A Brave New World While the President, Congress, federal agencies and states grapple with the best way to reform and regulate healthcare, the world is moving forward into a technologically advanced age and dragging the healthcare industry with it. New technological advances creating more cost-effective mechanisms for prescribing, monitoring, and tracking prescription drugs and utilization. Keeping up with and meeting new regulatory requirements, as well as the challenges created by the new technology. The billions of dollars in grants and payments for health information technology that is available in ARRA should encourage the industry to step up to the plate and adopt and implement health information technology.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 5 Health IT - A Brave New World The Healthcare Industry’s Reluctant Adoption of Information Technology Healthcare providers have been quick to adopt breakthrough technology in medical procedures, but slow to accept innovations in networking and communications. Concern about breaches in security and patient privacy. Healthcare services traditionally performed locally and in person.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 6 Health IT - A Brave New World These technological advances will not happen overnight. There are many obstacles which need to be addressed. Likely differences in laws and regulations across borders may necessitate the need for international laws governing medical services. Possible differences in technical standards between different countries could create conflicts and call for global standards.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 7 Health IT - A Brave New World On February 17, 2009, President Obama signed into law the $787 billion American Recovery and Reinvestment Act of 2009 (ARRA) that contains new provisions applicable to the healthcare and information technology world: $19 billion to promote adoption of health information technology Additional privacy and security requirements

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 8 Health IT - A Brave New World Health Information Technology For Economic and Clinical Health Act (HITECH Act) $2 billion “start-up” funding to promote adoption of health information technology. $17 billion for Medicaid and Medicare incentives and payments to providers for adopting certified electronic health records. Establishes a timeframe for the use electronic health records by each person in the U.S. by 2014.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 9 Health IT - A Brave New World HITECH Act cont. Establishes Regional Extension Centers, which would provide technical assistance and disseminate best practices to support and accelerate efforts to adopt, implement, and effectively utilize health information technology. Strengthened privacy and security standards under HIPAA to encourage the adoption of EHRs Strengthened penalties for non-compliance Created new avenues of enforcement (state Attorneys General) Created new targets of enforcement (third parties who wrongfully acquire PHI)

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 10 Electronic Health Records HITECH Act cont. Funding is available for the “meaningful use” of “certified” electronic health records (EHRs) technology by Medicare and Medicaid physicians and hospitals Funding will start flowing in October 2010 HIT Policy and Standards Committees still hammering out the details CMS intends to issue regulations by the end of 2009 Important so that EHR users and developers can fund their health information technology implementation

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 11 Federal Breach Notification Under the original HIPAA regulatory scheme, “covered entities” were not required to notify individuals if their PHI was breached or lost. Under ARRA, 2009, covered entities must notify affected individuals, the federal government and in some cases, the media, in the event of “breaches” of “unsecured PHI.” “Business Associates” are required to notify covered entities of breaches so that covered entities may in turn fulfill their breach notification obligations.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 12 Federal Breach Notification “Breach” means “the unauthorized access, acquisition, use, or disclosure or protected health information which compromises the security or privacy of such information.” “Unsecured PHI” means “PHI that is not secured through use of a technology or methodology identified by the U.S. Department of Health and Human Services (“HHS”) as rendering the information unusable, unreadable or indecipherable to unauthorized persons.”

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 13 Federal Breach Notification No breach notification is required when: the recipient of the information would not reasonably have been able to retain the information the breach involved the unintentional acquisition, access, or use of information by employees or persons acting under the authority of a covered entity or business associate certain inadvertent disclosures among persons similarly authorized to access protected health information at a business associate or covered entity

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 14 Federal Breach Notification HHS has specified two methods for securing PHI. Encryption: For data at rest: NIST Special Publication , Guide to Storage Encryption Technologies for End User Devices. For data in motion: Federal Information Processing Standards (FIPS) These include, as appropriate, standards described in NIST Special Publications , Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations; , Guide to IPsec VPNs; or , Guide to SSL VPNs, and may include others which are FIPS validated.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 15 Federal Breach Notification HHS has specified two methods for securing PHI Destruction Paper, film, or other hard copy media have been shredded or destroyed such that the PHI cannot be read or otherwise cannot be reconstructed. Electronic media have been cleared, purged, or destroyed consistent with NIST Special Publication , Guidelines for Media Sanitation, such that PHI cannot be retrieved.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 16 Federal Breach Notification If PHI has been secured using one of the above- listed methods, its loss or wrongful disclosure does not trigger breach notification requirements. If “Unsecured PHI” is lost or impermissibly disclosed and one of the notification exceptions does not apply, affected individuals must be notified of the breach. Notice must include: (i) a brief description of what happened, including dates, (ii) a description of types of unsecured PHI involved, (iii) the steps the individual should take to protect against potential harm, (iv) a brief description of steps the covered entity or business associate has taken to investigate the incident, mitigate harm and protect against further breaches, and (v) contact information for questions.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 17 Federal Breach Notification Notice of the breach must also be provided to HHS Notice must be provided immediately for breaches involving 500 or more individuals Breaches involving fewer than 500 individuals may be logged and reported annually Breach notification form available at:

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 18 State Breach Notification Requirements At least 44 states have implemented data security and breach notification laws State laws typically apply to a broader class of personal data (social security numbers, financial account numbers and information) Notice to affected individuals and state authorities is typically required

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 19 Federal and State Breach Notification Covered entities must consider both state and federal law when implementing their security programs and providing breach notification State breach notification requirements may not be preempted by HIPAA, so care must be taken to comply with all state and federal requirements The analysis will be complicated when breaches impact individuals from more than one state

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 20 Red Flag Rules “Red Flag Rules” of the Federal Trade Commission (“FTC”) are an additional consideration for health care organizations planning their security programs The Red Flag Rules apply to financial institutions and creditors. The FTC has made clear that non profit and government entities that defer payment for good and services - including hospitals and other health care providers - are creditors and therefore must comply with the rules.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 21 Red Flag Rules The Red Flag Rules require financial institutions and creditors to establish a written program for identifying and detecting warning signs or “red flags” or identity theft, such as unusual account activity, suspicious enrollment documents or other suspicious patterns or activities that indicate the possibility of identity theft. Compliance Date: November 1, 2009

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 22 The Stakes Are Higher Increased federal enforcement State enforcement Reputational risks - due to public disclosures of breach Costs associated with enforcement and required notifications Risks associated with business associate breaches

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 23 Best Practices to Minimize Risk Comprehensive privacy and security policies Implemented and enforced Good Training Reminders and updates If possible: implement security measures necessary to avoid breach notification If NOT possible: be prepared to provide timely notice in the event of breach

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 24 Best Practices to Minimize Risk Implement a breach response plan Be sure that employees/agents promptly report all actual and suspected breaches Take steps to mitigate harm Assign responsibility for risk assessment and analysis of reporting obligations under state and federal law Be careful when selecting business associates Use good contractual provisions to minimize damages from a business associate’s breach

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 25 One More Risk to Think About Federal dream vs. state law reality One goal of EHR adoption is to facilitate the sharing of PHI among covered entities. There is a big push at the federal level to achieve this goal BUT Even though HIPAA may provide mechanisms for the merging and sharing of EHRs, state law may not. Especially with respect to sensitive and specially protected categories of health information (infectious disease, drug and alcohol treatment, mental health counseling, etc.)

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 26 Personal Health Records Currently, we live in a world of decentralized record keeping where records are maintained by multiple entities and in multiple locations – makes the system duplicative and sometimes creates conflicting information. As people move from state to state, they leave a trail of fragmented or partial medical records behind.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 27 Personal Health Records Impact of ARRA of 2009 ARRA of 2009 defines a personal health record as “an electronic record of PHR identifiable health information on an individual that can be drawn from multiple sources and that is managed, shared, and controlled by or primarily for the individual” "PHR identifiable health information" is “individually identifiable health information that is provided by or on behalf of the individual and that identifies the individual or with respect to which there is a reasonable basis to believe that the information can be used to identify the individual.” A “Vendor of Personal Health Records” is “an entity, other than a covered entity, that offers or maintains a personal health record.”

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 28 Personal Health Records Impact of ARRA of 2009 In the event of a breach of security, ARRA imposes notification obligations on: Vendors of PHRs; Entities that offer products or services through websites of PHR vendors; Entities that offer products or services through the websites of covered entities that offer PHRs; Entities that are not covered entities and that access information in a PHR or send information to a PHR.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 29 Personal Health Records Risks of PHRs May not be complete PHR owner/patient may remove objectionable, but clinically relevant information Another provider may rely on a partial record mistakenly believing that it is complete PHR owner/patient may rely on a provider to review a PHR to which he or she has been given access, and withhold certain information in discussions with the provider

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 30 Fraud and Abuse Safe Harbors Exceptions to the physician self-referral prohibition and a safe harbor under the anti-kickback statute for arrangements involving donation of interoperable EHR technology to physicians and other healthcare practitioners or entities from businesses with whom they work. Physicians must contribute 15% of the costs.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 31 Fraud and Abuse Safe Harbors Entities furnishing designated health services (and certain other entities under the safe harbor) may donate to physicians (and certain other recipients under the safe harbor) interoperable electronic health records software, information technology and training services. Hospitals and certain other entities may provide physicians (and certain other recipients under the safe harbor) with hardware, software, or information technology and training services necessary and used solely for electronic prescribing.

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 32 Fraud and Abuse Safe Harbors Impact of ARRA funding for EHR implementation Windfall for hospitals and physicians? Donations inconsistent with promotion of transparency in the relationship between healthcare entities and physicians? Funding available to those entities that donate to physicians under safe harbors? Past donations reimbursable? Incentive to implement EHRs faster?

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 33 PENALTIES Non-meaningful EHR users subject to reimbursement reductions beginning in 2015 Penalties for HIPAA violations increased under ARRA Civil violations: penalties range from $100 - $50,000 per violation, capped at $25,000 - $1.5 million per year for multiple violations of the same standard Criminal penalties range from one year in jail and a $50,000 fine, to ten years in jail and a $250,000 fine New State enforcement authority

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 34 Key Takeaways New enforcement mandates from Congress mean that enforcement will be on the rise Understand the new requirements, or face the consequences Avoid risk Marketplace is shifting from paper to electronic Implement appropriate infrastructures

Copyright © 2009 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. 35 QUESTIONS AND FOLLOW-UP Mintz Levin Cohn Ferris Glovsky and Popeo LLP Dianne J. Bourque, Associate One Financial Center Boston, MA Phone Number: (617) Katina W. Lee, Associate 701 Pennsylvania Avenue, NW, 9 th Floor Washington, DC Phone Number: (202) Hope S. Foster, Member 701 Pennsylvania Avenue, NW, 9th Floor Washington, DC Phone Number: (202)