Practical Steps to Minimize Privacy Risks: Understanding The Intersection Between Information Management and Privacy Law Presented by Alexandria McCombs.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA Basics November 1, 2014.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Privacy Rule Training
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Regulations What do you need to know?.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
OCR HITECH Enforcement Tips: Prevent, Detect and Quickly Correct HIPAA COW 2010 Spring Conference Privacy/Security Session 1 HIPAA Privacy Best Practices:
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
1 U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Diana S. Hare Associate General Counsel Drexel University.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
1 Identity Theft Prevention and the Red Flag Rules.
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
HIPAA Privacy Rule Training
UNDERSTANDING WHAT HIPAA IS AND IS NOT
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA Administrative Simplification
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Practical Steps to Minimize Privacy Risks: Understanding The Intersection Between Information Management and Privacy Law Presented by Alexandria McCombs Vice President & General Counsel Pinnacle Partners In Medicine Dallas, TX

Disclaimer This presentation is intended to be an informative overview of statutes and regulations related to the protection of personal and corporate data. This should not be considered a comprehensive review of every law, rule and regulation applying to privacy and security. 2

Privacy and Security Risk Areas Identity Theft (an identity is stolen every 3 seconds) Data Breach Damage to Information Systems Credibility/Public Relations problems Class Action Federal Law violations State Law Violations 3

Commonly Applicable Laws Federal Privacy Act of 1974 – 5 U.S.C. §552a FTC Consumer Online Privacy Principles 1998; Online Behavioral Advertising Principles 2009 FTC COPPA – Children’s Online Privacy Protection Rule – 16 C.F.R. 312 HIPAA – Health Insurance Portability and Accountability Act of 1996 and Privacy and Security Rules, 45 CFR §§ 160, 162 and 164, as Amended by HITECH Act (see below) GLB – Gramm-Leach Bliley Act (Financial Modernization Act of 1999) 15 U.S.C. §6801 et seq. and Financial Privacy Rule 16 C.F.R. 313 and Financial Safeguards Rule 16 C.F.R. 314 Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99) 4

Commonly Applicable Laws (cont’d) FCRA – Fair Credit Reporting Act (15 U.S.C et seq.); amended by FACT Act – Fair and Accurate Credit Transactions Act of 2003 ▫Section 114 – Identity Theft Prevention – Red Flags Rules – 16 C.F.R. 681 enforced by the Federal Trade Commission FDA – Research Data – Electronic Records and Signatures – “Part 11” – 21 C.F.R. 11 ARRA – American Recovery and Reinvestment Act of 2009 (“Stimulus Bill”) February 17, 2009 ( ≥ ▫HITECH Act – Health Information Technology for Economic and Clinical Health Act – Division A, Title XIII of ARRA  Subtitle D – Privacy - §§ – Amends HIPAA, substantially increases penalties (now) and new Federal Data Breach Notification as to Protected Health Information 5

State Law In Texas, there are instances where state law is more stringent than the corresponding Federal laws. For instance, HIPAA requires that a covered entity provide an individual access to their own health records within 60 days of the written request with provision for a 30 day extension if the records are held offsite. Texas requires access in 15 days regardless of where the records are stored. 6

Regulatory Update FACTA – Fair & Accurate Credit Transactions Act (Red Flag Rules) ▫Originally was to be enforced November 1, 2008 but was delayed six months primarily due to objections by the health care industry. Many felt that physicians and hospitals were not creditors. FTC determined that these rules indeed did apply to health care organizations and the enforcement date was set for May 1, On April 30, 2009 an additional 3 months delay was announced to allow more entities to complete the requirements. 7

Regulatory Update The Red Flag Rules require “creditors” to have a written customer protection identity theft prevention plan for “covered accounts” What is a “Creditor”? The FTC applied the definition of “creditor” that is found in the Equal Credit Opportunity Act (ECOA) of  An entity “who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit”.  This has been interpreted within the Red Flag rules as any organization that does not collect full payment at the time of service. 8

Regulatory Update Red Flag Rules (cont’d) The FTC had defined a “covered account” in the Final Rule as: ▫an account used mostly for personal, family, or household purposes, and that involves multiple payments or transactions. Covered accounts include credit card accounts, mortgage loans, automobile loans, margin accounts, cell phone accounts, utility accounts, checking accounts, and savings accounts. A covered account is also an account for which there is a foreseeable risk of identity theft – for example, small business or sole proprietorship accounts. The customer protection program must include policies and procedures for: ▫(i) detecting warning signs or “Red Flags” of identify theft, ▫(ii) responding to any such Red Flags in a manner that will prevent or mitigate the identify theft, and ▫(iii) updating the Program. The customer protection program must be managed by the Board of Directors or senior employees of the company if there is no Board of Directors. 9

Examples of Red Flags Photo doesn’t match person seeking service i.e. Different race, age, gender No home address, just P.O. Box or mail drop or pager/answering service Patient or customer complains he/she isn’t getting statements Complaints of getting bill for another person Customer or patient receiving these services Records do not appear to be accurate Recent change of address not corroborated 10

Regulatory Update Changes to HIPAA from ARRA American Recovery & Reinvestment Act of 2009 (Stimulus Bill) Some significant changes affect “covered entities” and “business associates”. Covered entities under HIPAA are: ▫a health care provider that conducts certain transactions in electronic form (called here a “covered health care provider”). ▫a health care clearinghouse. ▫a health plan. (all self insured groups have a portion of their organization that falls under this definition. Normally it is the department or subsection of employees that deal with employee health insurance.) Business Associates are: ▫an individual or corporate “person” that:  performs on behalf of the covered entity any function or activity involving the use or disclosure of protected health information and  is not a member of the covered entity's workforce. 11

Regulatory Update 12 Changes to HIPAA from ARRA (cont’d) Security Rule Provisions now apply to Business Associates ▫Business Associates will be treated in a similar manner as covered entities such as physicians and hospitals under this provision. Generally, business associates will now have to: ▫Establish administrative safeguards to protect electronic Protected Health Information (ePHI); ▫Implement technical safeguards for electronic information systems that control access to; and ▫Implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of the HIPAA Security Rule and maintain proper documentation Notification Requirement for Covered Entities and Business Associates ▫Covered entities and business associates that hold, use, or disclose “unsecured PHI” now have a legal duty to notify certain parties in the event of a breach. Currently, a covered entity is not required to notify individuals of privacy or security breaches unless the covered entity determines that such notification is necessary to mitigate damage to the individual immediately and HHS will post information relating to the breach on its website.

Regulatory Update Changes to HIPAA from ARRA (cont’d) New Minimum Necessary Standard Coming in Fall 2009 ▫ Under HIPAA, the general rule is that if covered entities are using PHI for any other purpose besides treatment purposes, then covered entities must provide only the “minimum necessary” information to accomplish the purpose of the disclosure. The new law requires HHS to issue guidance on what constitutes “minimum necessary” within 18 months Significant Overhaul of Civil Monetary Penalties ▫The civil monetary penalties are significantly increased for violations. Currently, the amount of the penalty is generally $100 for each violation. This $100 amount (and its related cap of $25,000 for multiple violations) increases to $1,000 per violation for a violation due to “reasonable cause and not to willful neglect” (with a maximum penalty of $100,000); $10,000 for each violation that was due to willful neglect and is corrected (subject to a $250,000 maximum penalty); and $50,000 for each violation if the violation is not corrected properly (subject to a maximum penalty of $1,500,000 during a calendar year). These changes are immediately effective (i.e., they are in effect today) and represent a dramatic increase in the penalties under HIPAA 13

Looking ahead In this environment of increased regulation and scrutiny, it will benefit organizations to pay close attention to the evolving laws and to train and prepare dedicated staff to address the multiple regulatory compliance issues. 14

Questions or Comments 15