"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster.

Slides:



Advertisements
Similar presentations
Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
Advertisements

Privacy & Security After September 11 Professor Peter P. Swire Ohio State University University of Michigan Lecture December 4, 2001.
Privacy and National Security After September 11 Professor Peter P. Swire Ohio State University FLICC 2002 Forum Library of Congress March 19, 2002.
The Chief Privacy Officer for the U.S. Government Professor Peter P. Swire Ohio State University Visiting, George Washington University Privacy Officers.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Research and Privacy Under HIPAA Professor Peter P. Swire Moritz College of Law Ohio State University National Academy of Science Panel on Science, Technology.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Government Pattern Analysis: Securing Terrorists While Preserving Privacy? Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster.
Surviving Securely & Surviving Security -- Thoughts After 9/11 Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
Confidentiality and HIPAA
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
Health Insurance Portability and Accountability Act (HIPAA)
Information Sharing and Cross-System Collaboration John Petrila, J.D., LL.M. Professor, University of South Florida
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Medical Records in Court: Life after HIPAA North Carolina Conference of Superior Court Judges, October 2003 Presented by Jill Moore, UNC School of Government.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Federal Bureau of Investigation
The Patriot Act Protecting the US or Violating People’s Freedoms.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Michael R. Costa, Esq., M.P.H. Greenberg Traurig, LLP One International Place, 3 rd Floor Boston, MA (fax)
ICU and Forensics. 1.Describe information which should be consistently communicated by healthcare providers for those patients thought to be injured due.
Practicing In Harmony with HIPAA The views and opinions expressed in the presentation are those of the presenter, and not necessarily official positions.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Health Insurance portability and Accountability Act (HIPAA)‏
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
WHAT GUARDIANSHIP ATTORNEYS SHOULD KNOW BY RACHEL ANNE BROOKS MARCH 15, 2016 Health Care Privacy.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
HIPAA Training Workshop #2 Trainer: Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Health Insurance Portability and Accountability Act
Ruqayya Y Khan, Trinity University
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Health Insurance Portability and Accountability Act
"Security and Privacy After September 11: The Healthcare Example”
DO NOW.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Health Insurance Portability and Accountability Act
South Jordan City Fire Department
Presentation transcript:

"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster HIPAA Summit October 25, 2001

Overview n Introduction n Health care after September 11: – Public health – Can you report a terrorist/patient? n New anti-terrorism law & health care n Security and Privacy after September 11 – More emphasis on security – What implication for privacy?

I. Background n Clinton Administration Chief Counselor for Privacy n Unusual double major: – White House coordinator for HIPAA medical privacy rule, – Chair, White House task force on how to update wiretap and surveillance laws for the Internet age

Currently n Visiting Professor, GW Law School n Consultant, Morrison & Foerster, especially for medical privacy n Current writings on the anti-terrorism law and computer security n

II. Public Health n Sec. 512(b) fairly broad n PHI can be disclosed to a public health authority authorized by law to collect or receive such information n Permitted purposes include public health surveillance, investigations & interventions

Public health (cont.) n Disclosure also permitted, if authorized by law, to a person exposed to or at risk for a disease n Uses permitted by a covered entity that is a public health authority whenever it is permitted to disclose that PHI

Public Health -- Conclusions n The rule permits what needs to be disclosed, if it is authorized by law -- check that n Proper data handling needed by public health agencies: – Privacy -- good practices for patient data – Security -- make sure network is protected and data cannot be tampered with

III. Reporting Suspicious. Activity n Rule issued before Sept. 11. How well does it work today? n What if a suspected terrorist is in the hospital? Can you report that? n Example: patient exposed to anthrax, and you suspect person involved in making or distributing spores

When Can You Report? n National security exception n Avert serious threats to health or public safety n Law enforcement rules generally

National Security Exception n Section 512(k)(2) n May disclose PHI to authorized federal officials for the conduct of lawful intelligence, counter-intelligence, and other national security activities n Those activities as defined in law -- what you expect as intelligence

Averting Serious Threats n Section 512(j) permits voluntary disclosure by a covered entity n Must be consistent with applicable law and standards of ethical conduct

Averting Serious Threats n Option 1, can disclose where: – Is necessary to prevent or lessen a serious and imminent threat to the health or safety of a person or the public; and – Is to a person or persons reasonably able to prevent or lessen the threat

Averting Serious Threats n Option 2, disclosure OK where: – Is necessary for law enforcement authorities to identify or apprehend an individual – Because of a statement by an individual admitting participation in a violent crime that the covered entity reasonably believes may have caused serious physical harm to the victim – That is, confessions to violent crimes

Averting Serious Threats n Cant disclose where confession is made as part of therapy for propensity to commit violent conduct n Conclusion: the rule allows disclosure to avert serious threats, including by terrorists

General Law Enforcement n Sec. 512(f) generally requires in response to law enforcement officials request n Covered entity cant volunteer the information, except where required by a reporting law or requested by law enforcement

General Law Enforcement n Court order, grand jury subpoena, administrative subpoena for full file n To locate or identify a suspect, fugitive, material witness, or missing person: – Name, SSN, limited other information

Summary on law enforcement n For anthrax suspect: – Likely national security – May have evidence, in good faith, of imminent threat – Can respond to law enforcement requests more broadly n The rule holds up better than you might have expected to this new challenge n But, still limits on your disclosure to the police

IV. New Anti-Terrorism Law n Uniting and Strengthening America Act by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism n USA PATRIOT Act n Barney Frank...

Some Relevant Provisions n In general, changes to wiretap laws, foreign intelligence, money laundering, new terrorism crimes, etc. n Some health care issues: – Biological weapons – Grand jury secrecy changed – Nationwide search orders – Computer trespasser exception

Biological weapons statute n Sec. 817 n 10 years jail for knowing possession of any biological agent, toxin, or delivery system of a type or in a quantity, that, under the circumstances, is not reasonably justified by a prophylactic, protective, bona fide research, or other peaceful purpose

Grand Jury Secrecy Changed n Current law: separation between law enforcement (grand jury, constitution applies) and foreign intelligence n New law: All the walls are down now between FBI, CIA, etc. n Example: you release PHI to grand jury, & records can go to foreign intelligence without notice to you or a judge

Nationwide search orders n Current law: you must respond to an order from judge in your local federal district n Section 220 USA-PATRIOT: – Electronic evidence: and web surfing records – Binding order from any federal judge in the country – What if the order seems overbroad? Must contest with that distant judge.

Computer Trespasser Exception n Current law: – Under ECPA, can monitor your own system for security – Can turn over evidence of past hacker attacks – Cant invite law enforcement to surf over your shoulder to investigate possible ongoing attacks -- that has been considered an open- ended wiretap

Computer Trespasser (cont.) n Sec. 217 USA Patriot n Now system owner can invite law enforcement to surf over the shoulder n Only for – Computer trespassers with no reasonable expectation of privacy – Relevant to an investigation – No communications other than those to/from the trespasser

Computer Trespasser (cont.) n Can covered entities authorize this surfing over the shoulder? n Will PHI be disclosed? What if hacker downloads PHI? n New & tricky issues under HIPAA n Never any hearing on the provision -- may need guidance

V. Security & Privacy Today n Greater focus on (cyber) security n Security vs. privacy n Security and privacy

Greater Focus on Security n Less tolerance for hackers and other unauthorized use n Cyber-security and the need to protect critical infrastructures n Back-up needed in case of cyber-attack, attack on electricity grid, telephone system, or other systems you need

Security vs. Privacy n Security sometimes means greater surveillance, information gathering, & information sharing n Computer trespasser exception n Report possible terrorists n Err on the side of public health reporting n In short, greater disclosures to foster security

Security and Privacy n Good data handling practices become more important -- good security protects PHI against unauthorized use n Audit trails, accounting become more obviously desirable -- helps some HIPAA compliance n Part of system upgrade for security will be system upgrade for other requirements, such as HIPAA privacy

Concluding Thoughts n Greater law enforcement & anti-terrorism urgency after September 11 n Medical privacy rule already has provisions to respond to September 11: – Public health – Report terrorists n Not clear so far that need changes here to HIPAA privacy rule

Concluding Thoughts n Biggest messages today: n Data handling will have to improve n Computer security will get more attention and budget n Critical systems will need to be robust against new threats n Better data handling, in general, will lead to better privacy compliance, too

Contact Information n Professor Peter Swire n Phone: (301) n n Web: n Presidential Privacy Archives: