PRIVACY ACT OWCP Interagency Meeting November 4, 2014 Paul J. Klingenberg, Esq. Senior Attorney Office of the Solicitor, FEEWC Division.

Slides:



Advertisements
Similar presentations
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Advertisements

HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
FERPA - Sharing Student Information
Family Educational Rights and Privacy Act (FERPA) Basics For Faculty and Staff.
Overview of the Privacy Act
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health Insurance Portability and Accountability Act (HIPAA)
1 Office of the General Counsel FERPA  Family Educational Rights and Privacy Act (20 U.S.C § 1232g)
FAR P ART 24. This part prescribes policies and procedures that apply requirements of the Privacy Act of 1974 (5 U.S.C. 552a) (the Act) and OMB Circular.
FERPA: WHAT YOU SHOULD KNOW ILASFAA April 18, 2008 Amy Perrin Director of Financial Aid Elgin Community College.
ROLES & RESPONSIBILITIES PRIVACY ACT (PA) SYSTEMS OF RECORDS MANAGERS.
PA/FOIA INTERFACE OSD/JS Privacy Office (703)
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
FERPA: Family Educational Rights and Privacy Act.
2/16/2010 The Family Educational Records and Privacy Act.
1 FERPA and Student Privacy in Records of University Research ECURE March 1, 2005 Richard Rainsberger, Ph.D. Consultant, Education Records Law and Privacy.
PRIVACY ACT Federal Workers’ Compensation Conference 2014 Department of Labor.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Privacy Act 101 Orientation training for all Military Members, Civilian Employees, and Contractor Personnel.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
The Privacy Act of 1974: An Introduction The Privacy Act of 1974: An Introduction September 2010 For Official Use Only 0.
8/28/2015 The Family Educational Rights and Privacy Act (FERPA)  Also known as the Buckley Amendment.  Statute: 20 U.S.C. 1232g; Regulations: 34 CFR.
PRIVACY SAFEGUARDS ANNUAL TRAINING FY 2011 previous next Office of Management Privacy, Information and Records Management Services Privacy Safeguards Division.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
NERCOMP 2002 Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith University Registrar University of Connecticut.
Health Insurance Portability and Accountability Act (HIPAA)
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA (health insurance portability and accountability act)
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Final UNDERSTANDING CONFIDENTIALITY Training Overview by Jolynn Rogers.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
FAMIS CONFERENCE Mari M. Presley, Assistant General Counsel Florida Department of Education June 12, 2012.
Employees’ Compensation Operations and Management Portal (ECOMP)
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
CONFIDENTIALITY. Three Confidentiality Laws 1.FERPA-Family Education Rights and Privacy Act (State Policy 4350: Procedures for the Collection, Maintenance.
FERPA Family Educational Rights and Privacy Act of 1974 (also known as the Buckley Amendment)
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) What Faculty and Staff Should Know.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
Denise Chrysler, JD Director, Mid-States Region
HIPAA PRIVACY & SECURITY TRAINING
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Disability Services Agencies Briefing On HIPAA
Presentation transcript:

PRIVACY ACT OWCP Interagency Meeting November 4, 2014 Paul J. Klingenberg, Esq. Senior Attorney Office of the Solicitor, FEEWC Division

Disclaimers This is not a comprehensive Privacy Act presentation—it is specific to OWCP records maintained in DOL/GOVT-1, a government-wide System of Records (SOR) This is not a comprehensive Privacy Act presentation—it is specific to OWCP records maintained in DOL/GOVT-1, a government-wide System of Records (SOR) If you need Privacy Act advice regarding records maintained by your own agency under your own SOR, or under an OPM government-wide SOR, contact your General Counsel’s/Solicitor’s Office If you need Privacy Act advice regarding records maintained by your own agency under your own SOR, or under an OPM government-wide SOR, contact your General Counsel’s/Solicitor’s Office 7/2/20152

3 Structure of the Privacy Act  ESTABLISHES RIGHTS (INDIVIDUALS)  CREATES RESPONSIBILITIES (AGENCIES)  PROVIDES OVERSIGHT MECHANISMS  NOT JUST ACCESS AND DISCLOSURE— RECORDS MANAGEMENT IS KEY “No Disclosure Without Consent”

7/2/20154 TERM: RECORD INFORMATION ABOUT AN INDIVIDUAL INFORMATION ABOUT AN INDIVIDUAL –EDUCATION, FINANCIAL TRANSACTIONS, MEDICAL HISTORY, AND CRIMINAL AND EMPLOYMENT HISTORY INDIVIDUAL IDENTIFIER INDIVIDUAL IDENTIFIER –NAME, IDENTIFYING NUMBER, SYMBOL, OR OTHER IDENTIFYING PARTICULAR ASSIGNED TO INDIVIDUAL, SUCH AS FINGERPRINT, VOICE PRINT, BIOMETRIC OR PHOTOGRAPH PRIVACY ACT

7/2/20155 TERM: ROUTINE USE ALLOWS FOR THE DISCLOSURE OF A RECORD OUTSIDE OF THE AGENCY WITHOUT CONSENT (BECAUSE OF NOTIFICATION TO THE INDIVIDUAL AT THE TIME OF COLLECTION) ALLOWS FOR THE DISCLOSURE OF A RECORD OUTSIDE OF THE AGENCY WITHOUT CONSENT (BECAUSE OF NOTIFICATION TO THE INDIVIDUAL AT THE TIME OF COLLECTION) DISCLOSURE MUST BE “FOR A PURPOSE WHICH IS COMPATIBLE WITH THE PURPOSE FOR WHICH [THE INFORMATION] WAS COLLECTED” DISCLOSURE MUST BE “FOR A PURPOSE WHICH IS COMPATIBLE WITH THE PURPOSE FOR WHICH [THE INFORMATION] WAS COLLECTED” PRIVACY ACT

7/2/20156 PURPOSE of the PRIVACY ACT: BALANCE GOVERNMENT’S NEED TO MAINTAIN INFORMATION WITH THE RIGHTS OF INDIVIDUALS TO BE PROTECTED AGAINST THE UNWARRANTED INVASION OF THEIR PRIVACY No Disclosure Without Consent

7/2/ RESTRICT DISCLOSURE (No Disclosure Without Consent) 2. GRANT INDIVIDUALS INCREASED RIGHTS OF ACCESS 3. GRANT INDIVIDUALS RIGHT TO SEEK AMENDMENT OF AGENCY RECORDS 4. ESTABLISH A CODE OF “FAIR INFORMATION PRACTICES” FOUR BASIC POLICY OBJECTIVES

7/2/20158 REMEMBER--A DISCLOSURE MAY BE WRITTEN (MOST DISCLOSURES ARE) BUT THERE ARE ORAL DISCLOSURES AS WELL AND ALL DISCLOSURES (INCLUDING DISCLOSURES FROM AQS & iFECS) ARE COVERED BY PRIVACY ACT PRINCIPLES PRIVACY ACT SYSTEM OF RECORDS OFFICIAL NAME:DOL/GOVT-1 Office of Workers’ Compensation Programs, Federal Employees’ Compensation Act File

7/2/ FEDERAL EMPLOYEE DISCLOSURE OF INFORMATION PROHIBITED FROM DISCLOSURE --(all three)--MISDEMEANOR, FINE NOT > $5,000 PRIVACY ACT—CRIMINAL PENALTIES (INDIVIDUALS) 3. ANYONE, INCLUDING A FEDERAL EMPLOYEE, REQUESTS OR OBTAINS ANY RECORD UNDER FALSE PRETENSES 2. FEDERAL EMPLOYEE WILLFULLY MAINTAINS A SYSTEM OF RECORDS WITHOUT MEETING NOTICE REQUIREMENTS

7/2/  These provisions are solely criminal, and create no private right of action against a federal employee individually  In other words, if you violate an individual’s privacy, the individual can only sue the government BUT THE GOVERNMENT CAN PROSECUTE YOU PRIVACY ACT

7/2/ CIVIL REMEDIES—AMENDMENT, ACCESS, ACCURACY, & OTHER DAMAGES SUIT IS AGAINST FEDERAL AGENCY ONLY— INDIVIDUAL FEDERAL EMPLOYEE IS NOT ABLE TO BE SUED FOR MONEY DAMAGES UNDER THE PRIVACY ACT PRIVACY ACT—CIVIL REMEDIES

7/2/ SYSTEMS OF RECORDS WORKERS’ COMPENSATION RECORDS BELONG TO DOL, AND DOL ONLY ANY RECORDS THE EMPLOYING AGENCY HAS, INCLUDING COPIES, BELONG TO DOL

7/2/ PRIVACY ACT WHAT DOES THAT MEAN? ANY RECORDS THE AGENCY HAS BELONG TO DOL, AND CAN ONLY BE RELEASED IN ACCORDANCE WITH DOL’S PUBLISHED ROUTINE USES, AND WITH DOL’S INTERPRETATION

20 C.F.R Who maintains custody and control of FECA records? All records relating to claims for benefits filed under the FECA, including any copies of such records maintained by an employing agency, are covered by the government-wide Privacy Act system of records entitled DOL/GOVT-1 (Office of Workers’ Compensation Programs, Federal Employees’ Compensation Act File). This system of records is maintained by and under the control of OWCP, and, as such, all records covered by DOL/GOVT-1 are official records of OWCP. All records relating to claims for benefits filed under the FECA, including any copies of such records maintained by an employing agency, are covered by the government-wide Privacy Act system of records entitled DOL/GOVT-1 (Office of Workers’ Compensation Programs, Federal Employees’ Compensation Act File). This system of records is maintained by and under the control of OWCP, and, as such, all records covered by DOL/GOVT-1 are official records of OWCP. 7/2/201514

7/2/ SYSTEMS OF RECORDS WHAT ARE DOL’S PUBLISHED ROUTINE USES? In addition to the 12 universal routine uses that apply to all DOL systems of records, there are 17 of them in DOL/GOVT-1 Examples: - third party in a third party action - employing agency at time of injury to verify billing, check status of claim, consider rehire, etc. - potential employers for return to work consideration

7/2/ SYSTEMS OF RECORDS - Rehab agencies for evaluation - Physicians for use in treatment - Health insurance or medical/welfare plans for clarification of billing responsibility - Labor union acting on behalf of the employee - dual benefits issues

7/2/ Distinguish Between “Right of Access” Disclosures and “Routine Use” Disclosures Disclosure to the subject of the record (the FECA claimant), while appropriate, authorized, and required by 5 U.S.C. § 552a(d)(1) (individual’s right of access), is not a disclosure pursuant to a routine use Disclosure to the subject of the record (the FECA claimant), while appropriate, authorized, and required by 5 U.S.C. § 552a(d)(1) (individual’s right of access), is not a disclosure pursuant to a routine use Examples of routine use disclosures: Examples of routine use disclosures: –Example—routine use e of DOL/GOVT-1 authorizes release of FECA file information to physicians treating or examining a FECA claimant –Another example—routine use o allows release of FECA file information to a Member of Congress in response to a request for assistance to a claimant

7/2/ SYSTEMS OF RECORDS SO…WHAT DOES THIS MEAN? Think It Through … WORKERS’ COMP DATA CAN BE RELEASED ONLY FOR THE ROUTINE USES ESTABLISHED BY DOL

7/2/ WHEN YOU RELEASE DATA, YOU CAN RELEASE ONLY THAT PART OF THE RECORD THAT IS NECESSARY TO MEET THE ROUTINE USE IT IS A VIOLATION OF THE PRIVACY ACT IF YOU GIVE ANY INFORMATION NOT COVERED BY THE ROUTINE USES TO ANYONE WHEN IN DOUBT, CALL OWCP

7/2/ Personally Identifiable Information (PII) The department defines PII as information “whose disclosure could result in harm to the individual whose name or identity is linked to that information. Examples include, but are not limited to, social security number; credit card number; bank account number; residential address; residential or personal telephone; biometric identifier (image, fingerprint, iris, etc.); date of birth; mother’s maiden name; criminal records; medical records; and financial records. The conjunction of one data element with one or more additional elements increases the level of sensitivity and/or propensity to cause harm in the event of compromise.”

7/2/ DISCLOSURE YES/NO?? EMPLOYING AGENCY EMPLOYING AGENCY –OIG—YES (IF INVESTIGATING FECA FRAUD) –INJURY COMP—YES –SECURITY OFFICE—YES, with limitations –SUPERVISOR—YES, IF RTW, and with limitations –EEO INVESTIGATOR—NO (with PA WAIVER, YES) –PERSONNEL ACTION—NO –AGENCY ATTORNEY—NO (if assisting agency with FECA case itself, YES) –BUDGET OFFICE—YES, summary information only –SAFETY AND HEALTH—YES, with limitations –UNION REPRESENTATIVE—YES, but only if representing claimant before OWCP

7/2/ “YES” DOES NOT MEAN UNQUALIFIED YES It is important to remember that, unless you have a Privacy Act waiver signed by the FECA claimant, or are responding to a first person request by the claimant, It is important to remember that, unless you have a Privacy Act waiver signed by the FECA claimant, or are responding to a first person request by the claimant, you always must confirm that the expected use of the information is compatible with the routine use, and you always must confirm that the expected use of the information is compatible with the routine use, and you disclose the least amount of information necessary for the recipient’s anticipated use. you disclose the least amount of information necessary for the recipient’s anticipated use.

7/2/ Privacy Act/FECA References Main DOL Privacy Act Systems Page Main DOL Privacy Act Systems Page DOL/GOVT-1 Systems Notice DOL/GOVT-1 Systems Notice DOL Universal Routine Uses DOL Universal Routine Uses DOL’s assertion of control DOL’s assertion of control