HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.

Slides:



Advertisements
Similar presentations
Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
Advertisements

Privacy & Security After September 11 Professor Peter P. Swire Ohio State University University of Michigan Lecture December 4, 2001.
Privacy and National Security After September 11 Professor Peter P. Swire Ohio State University FLICC 2002 Forum Library of Congress March 19, 2002.
The Chief Privacy Officer for the U.S. Government Professor Peter P. Swire Ohio State University Visiting, George Washington University Privacy Officers.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Sharing of Medical Records Pursuant to an Authorization Professor Peter P. Swire Moritz College of Law, Ohio St. Univ. Consultant, Morrison & Foerster,
Research and Privacy Under HIPAA Professor Peter P. Swire Moritz College of Law Ohio State University National Academy of Science Panel on Science, Technology.
Data Breach as a Critical Infrastructure & Computer Security Issue Peter P. Swire Professor, The Ohio State University Senior Fellow, Center for American.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Surviving Securely & Surviving Security -- Thoughts After 9/11 Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Health Insurance Portability and Accountability Act (HIPAA)
Information Sharing and Cross-System Collaboration John Petrila, J.D., LL.M. Professor, University of South Florida
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Health Insurance Portability and Accountability Act (HIPAA)
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
ICU and Forensics. 1.Describe information which should be consistently communicated by healthcare providers for those patients thought to be injured due.
Practicing In Harmony with HIPAA The views and opinions expressed in the presentation are those of the presenter, and not necessarily official positions.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HIPAA Privacy: Those Nagging Issues That Don’t Seem to Go Away Rebecca L. Williams, RN, JD Partner; Co-Chair of HIT/HIPAA Practice Group Davis Wright.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
AAMC Contact: Ivy Baer Accounting for Disclosures Under HIPAA Proposed Rule: 76 Federal Register 31426, May 31, 2011.
1 The Mental Health Continuum of Care and Related Legal Issues in The State University System of Florida Vikki Shirley Dorothy J. Minear February 26, 2008.
WHAT GUARDIANSHIP ATTORNEYS SHOULD KNOW BY RACHEL ANNE BROOKS MARCH 15, 2016 Health Care Privacy.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
HIPAA Training Workshop #2 Trainer: Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Office of the Chief Privacy Officer Update June 23, 2016 Lucia Savage, JD, Chief Privacy Officer, ONC.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Health Insurance Portability and Accountability Act
Denise Chrysler, JD Director, Mid-States Region
HIPAA Administrative Simplification
Health Insurance Portability and Accountability Act
HIPAA Pros - Disclosures
Confidential Records and Protected Disclosures
Disability Services Agencies Briefing On HIPAA
"Security and Privacy After September 11: The Healthcare Example”
Health Insurance Portability and Accountability Act
Presentation transcript:

HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003

Overview n Introduction n HIPAA, National Security, and Domestic Security – Retail: The suspected anthrax terrorist n Security and Privacy in the War on Terrorism n Public Health & Bioterrorism – Wholesale: Surveillance of populations

I. Background n Clinton Administration Chief Counselor for Privacy n Unusual double major: – White House coordinator for HIPAA medical privacy rule, – Chair, White House task force on how to update wiretap and surveillance laws for the Internet age; other computer security work

Currently n Ohio State University College of Law – Director D.C. program n Consultant, Morrison & Foerster, with focus on medical and other privacy issues

II. Reporting Suspicious. Activity n Rule issued before Sept. 11 n How well does it work today? n What if a suspected terrorist is in the hospital? Can you report that? n Example: patient exposed to anthrax, and you suspect person involved in making or distributing spores

When Can You Report? n National security exception n Avert serious threats to health or public safety n Law enforcement rules generally n Public health exception (later)

National Security Exception n Section 512(k)(2) n May disclose PHI to authorized federal officials for the conduct of lawful intelligence, counter-intelligence, and other national security activities n Those activities as defined in law, under standard statutory definition of intelligence

National Security Exception n How it looked in 2000 – Retail -- individual requests for records when needed for a specific intelligence investigation – The anthrax incident, and likely permitted to disclose if the suspected terrorist is in the ER

National Security Exception n How it looks today – Wholesale -- Total Information Awareness and proposals to create huge intelligence databases, including many health records – TIA de-funded domestically by Congress – It may continue, and ongoing proposals to create bioterrorism databases n Covered entities may disclose but are not required to disclose under HIPAA

Averting Serious Threats n Section 512(j) permits voluntary disclosure by a covered entity n Must be consistent with applicable law and standards of ethical conduct

Averting Serious Threats n Option 1, can disclose where: – Is necessary to prevent or lessen a serious and imminent threat to the health or safety of a person or the public; and – Is to a person or persons reasonably able to prevent or lessen the threat

Averting Serious Threats n Option 2, disclosure OK where: – Is necessary for law enforcement authorities to identify or apprehend an individual – Because of a statement by an individual admitting participation in a violent crime that the covered entity reasonably believes may have caused serious physical harm to the victim – That is, confessions to violent crimes

Averting Serious Threats n Conclusion: the rule allows disclosure to avert serious threats, including by terrorists

General Law Enforcement n Sec. 512(f) generally requires in response to law enforcement officials request n Covered entity cant volunteer the information, except where required by a reporting law or requested by law enforcement

General Law Enforcement n Court order, grand jury subpoena, administrative subpoena for full file n To locate or identify a suspect, fugitive, material witness, or missing person: – Name, SSN, limited other information

Summary on Anthrax Suspect n For anthrax suspect: – Likely national security – May have evidence, in good faith, of imminent threat – Can respond to law enforcement requests more broadly n The rule holds up better than you might have expected to the post-9/11 world n But, still limits on your permitted disclosure to the authorities

III. Security & Privacy In the War on Terrorism n Greater focus on physical and cyber security n Security vs. privacy n Security and privacy n More on this in the law review article, in materials or at

Greater Focus on Security n Less tolerance for hackers and other unauthorized use n Physical and Cyber security and the need to protect critical infrastructures n Back-up needed in case of cyber-attack, such as attack on payments system, electricity grid, telephone system, or other systems you need

Security vs. Privacy n Security sometimes means greater surveillance, information gathering, & information sharing n TIA, Bioterrorism Centers, Patriot Act n Report possible terrorists n Err on the side of public health reporting n In short, greater disclosures to foster security

Security and Privacy n Good data handling practices become more important -- good security protects PHI against unauthorized use n Audit trails, accounting become more obviously desirable -- helps some HIPAA compliance n **Part of system upgrade for security should be system upgrade for other requirements, such as HIPAA privacy

One privacy innovation n E-Government Act of 2000 n Requires a privacy impact assessment for new federal computer systems n OMB guidance to be issued shortly n Note: the statute authorizes the PIA to be kept secret in cases of national security

IV. Public Health Uses and Disclosures n The basic rule under Sec. 512(b): – PHI can be disclosed to a public health authority authorized by law to collect or receive such information – This includes public health surveillance, public health investigations, and public health interventions n Sec. 512(a) -- can also disclose where required by law

Public Health Disclosures n Once PHI goes to an authorized public health agency, no further use or disclosure limits n Consistent with HIPAA, public health agency can disclose to: – Bioterrorism Centers – DOD and Total Information Awareness – Research – Private marketing uses, etc.

Why this Loophole? n Federalism -- HHS shouldnt control state public health agencies n Those agencies usually not covered entities n Too darn complicated to extend business associate contracts to all those agencies with their multiple missions n Not thinking about Total Information Awareness in 1999 and 2000

Bioterrorism Initiatives n Jan. 2002, $1.1 billion in block grants for bioterrorism preparedness n To receive, states must submit a comprehensive plan to HHS for public health and preparing for a bioterror attack n June 2002 additional $$ for vaccines and communications systems n Perhaps total of $3 billion so far

Bioterrorism and the Model Act n CDC supports Model State Emergency Health Powers Act n Rushed to completion after 9/11 n HHS pressure to adopt the Act as condition of receiving funding n Almost half the states have adopted it

The Model Act n Broad emergency powers n Must report all cases that may be potential causes of a public health emergency n Must report unusual prescription rates, types of prescriptions, or trends in pharmacy visits that may be … n Is this reporting required by law? – Likely yes

Critiques of Model Act n Emergency powers too broad n Almost no privacy or data security provisions – Disclosure to any person having a legitimate need n The Model Act for public health systems and privacy has not gone forward

Going Forward on Public Health n As state agencies get a once-in-a-generation infusion of bioterrorism funds, they should build in privacy and security at the same time n Federal funds should require compliance with privacy and security, not push the Model Act in ways that lack those n Otherwise, we may see these as feeder systems for TIA

Public Health and HIPAA n Undo much of what HIPAA tries to accomplish – Lack of transparency in what data is being shared with whom – HIV history and role of confidentiality in getting treatment and stopping public health emergency – Health professionals as spies for the government?

Concluding Thoughts n Overall, HIPAA was built with national security and domestic security in mind n The change now is TIA and related data mining initiatives n We need broader public debate on how to reconcile the public safety and privacy goals

Concluding Thoughts n These issues will continue for a long time – As long as terrorism is a major threat n As keepers of medical records, you are usually permitted to disclose under HIPAA but generally not required to disclose n You can enter the public debate in your state about how to fight terrorism and also keep surveillance within bounds n Good luck in this effort

Contact Information n Professor Peter Swire n Phone: (240) n n Web: