Advanced HIPAA Privacy Compliance Strategies: Those Nagging Issues That Don’t Seem to Go Away Rebecca L. Williams, RN, JD Partner; Co-Chair of HIT/HIPAA.

Slides:



Advertisements
Similar presentations
HIPAA for Governments & Municipalities Rebecca L. Williams, RN, JD Partner, Co-Chair of HIT/HIPAA Practice Davis Wright Tremaine LLP Seattle, WA
Advertisements

Davis Wright Tremaine LLP HIT Legal Issues: HIPAA Implications to a Regional Health Information Organization Becky Williams, R.N., J.D. Partner, Co-Chair,
H OGAN & H ARTSON, L.L.P.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Business Associate Contracts: Time Is Running Out... Rebecca L. Williams, RN, JD Partner Davis Wright Tremaine LLP Seattle, WA
August 10, 2001 NESNIP PRIVACY WORKGROUP HIPAA’s Minimum Necessary Standard Presented by: Mildred L. Johnson, J.D.
HIPAA Compliance Strategies for Employers, METs, MEWAs and Taft Hartley Union Trust Funds The HIPAA Colloquium at Harvard University Presented by: Melissa.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA The Privacy Rule Health Insurance Portability and Accountability Act of 1996 (HIPAA) The 104 th Congress passed the Act, Public Law ,
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Office of the Secretary Office for Civil Rights (OCR) Indian Health Service HIPAA Training Hosted by the Aberdeen Area Office July 24, 2012.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Advanced HIPAA Privacy Compliance Strategies: Those Nagging Issues That Don’t Seem to Go Away Rebecca L. Williams, RN, JD Partner; Co-Chair of HIT/HIPAA.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Practicing In Harmony with HIPAA The views and opinions expressed in the presentation are those of the presenter, and not necessarily official positions.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Advanced Issues in Privacy: Drafting and Negotiating Business Associate Contracts Thomas E. Jeffry, Jr. Partner Davis Wright Tremaine LLP Los Angeles,
Davis Wright Tremaine LLP Case Study: Small Group Health Plan HIPAA Privacy Compliance for Employers September 15, 2003 Speaker Jason Froggatt Becky Williams.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
OHCAs, ACEs and Hybrid Entities Paul Smith Davis Wright Tremaine LLP One Embarcadero Center Suite 600 San Francisco, CA (415)
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
A Professional Corporation Stinson, Mag & Fizzell (402) Business Associates 101 Jennifer Wolfe Jerram, B.S.N., J.D.
Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner.
HIPAA Privacy: Those Nagging Issues That Don’t Seem to Go Away Rebecca L. Williams, RN, JD Partner; Co-Chair of HIT/HIPAA Practice Group Davis Wright.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
HIPAA Privacy Rule Implementation Status Report Richard M. Campanelli, J.D. Director, Office for Civil Rights Before the The Tenth National HIPAA Summit.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
HIPAA Training Workshop #2 Trainer: Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
HIPAA Pros - Disclosures
Disability Services Agencies Briefing On HIPAA
Business Associate Contracts: Time Is Running Out . . .
National Congress on Health Care Compliance
The Health Insurance Portability and Accountability Act
Advanced Issues in Business Associate Contracting
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
The Health Insurance Portability and Accountability Act
Presentation transcript:

Advanced HIPAA Privacy Compliance Strategies: Those Nagging Issues That Don’t Seem to Go Away Rebecca L. Williams, RN, JD Partner; Co-Chair of HIT/HIPAA Practice Group Davis Wright Tremaine LLP Seattle, WA Davis Wright Tremaine LLP

2 HIPAA Privacy — A Timeline November 3, 1999: Proposed privacy regulations February 17, 2000: Comment period closes after extension. Record number of comments received December 28, 2000: Final privacy regulations published March 1-30, 2001: Second comment period April 14, 2001: Effective date of final privacy regulations July 2001: HHS Guidance issued March 27, 2002: Proposed amendments to final regulations published April 14, 2003: Compliance date (except small health plans) April 26, 2002: End of comment period for proposed amendment April 14, 2003: Compliance date for small plans 1996: HIPAA is enacted into law April 20, 2005: Security compliance date

Davis Wright Tremaine LLP 3 HIPAA Roulette

Davis Wright Tremaine LLP 4 The Ex-Factor  Breaking Up is Hard to Do  When Good Employees Go Bad

Davis Wright Tremaine LLP 5 The Ex-Factor  Top risks for intentional misuse, improper disclosures and false accusations:  Ex-relationships: divorces, custody disputes, break- ups, new significant others, and so on and so on  Ex-employees  Also be attuned to:  VIPs  Fellow workforce members  Top risks for intentional misuse, improper disclosures and false accusations:  Ex-relationships: divorces, custody disputes, break- ups, new significant others, and so on and so on  Ex-employees  Also be attuned to:  VIPs  Fellow workforce members

Davis Wright Tremaine LLP 6 Response to Ex-Factor and Other Violations: Complaint Process  Must provide process to receive complaints  Must document all complaints and their disposition  Tip: Make it easy for a patient to complain  Written only vs. any medium  Tip: When there is “history,” dig a little deeper  Tip: Privacy Officer should be attuned to “gossip”  Tip: Be aware of direct complaints that may become OCR complaints  Must provide process to receive complaints  Must document all complaints and their disposition  Tip: Make it easy for a patient to complain  Written only vs. any medium  Tip: When there is “history,” dig a little deeper  Tip: Privacy Officer should be attuned to “gossip”  Tip: Be aware of direct complaints that may become OCR complaints

Davis Wright Tremaine LLP 7 Consumer Breach Notification  Increasing number of state laws  Possible federal law  Increasing number of state laws  Possible federal law

Davis Wright Tremaine LLP 8 Consumer Breach Notification  Many state laws mandate notification  A new wrinkle to mitigation  Covered entities have a duty to mitigate  Can be difficult once a breach has occurred  Does mitigation include notification?  Does a breach have to be included in accounting?  Incidental disclosure v. breach  Many state laws mandate notification  A new wrinkle to mitigation  Covered entities have a duty to mitigate  Can be difficult once a breach has occurred  Does mitigation include notification?  Does a breach have to be included in accounting?  Incidental disclosure v. breach

Davis Wright Tremaine LLP 9 Business Associates  Identifying business associates  Disagreements on BA status  Negotiation  Tracking contracts

Davis Wright Tremaine LLP 10 Who is a Business Associate?  A person who, on behalf of a covered entity or OHCA —  Performs or assists with a function or activity Involving PHI or Otherwise covered by HIPAA  Performs certain identified services  A person who, on behalf of a covered entity or OHCA —  Performs or assists with a function or activity Involving PHI or Otherwise covered by HIPAA  Performs certain identified services Auditors, Actuaries Billing Firms Lawyers ClearinghousesTPAs Covered Entity Management Companies Consultants, Vendors Accreditation Organizations

Davis Wright Tremaine LLP 11 Who Are Business Associates?  Medical device company... Probably not  Research sponsor... Usually not ─ Follow research rules  Record storage/destruction... Depends  Accreditation organizations... Yes  Software vendor... Maybe  Collection agencies... Yes  Lawyers... Definitely maybe  Medical device company... Probably not  Research sponsor... Usually not ─ Follow research rules  Record storage/destruction... Depends  Accreditation organizations... Yes  Software vendor... Maybe  Collection agencies... Yes  Lawyers... Definitely maybe

Davis Wright Tremaine LLP 12 What Must Be in a Business Associate Contract — Privacy Rule  Use and disclose information only as authorized in the contract  No further uses and disclosures  Not to exceed what the covered entity may do  Implement appropriate safeguards  Report unauthorized disclosures to covered entity  Facilitate covered entity’s access, amendment and accounting of disclosures obligations  Allow HHS access to determine CE’s compliance  Return/destroy protected health information upon termination of arrangement, if feasible  If not feasible, extend BAC protections  Ensure agents and subcontractors comply  Authorize termination by covered entity  Use and disclose information only as authorized in the contract  No further uses and disclosures  Not to exceed what the covered entity may do  Implement appropriate safeguards  Report unauthorized disclosures to covered entity  Facilitate covered entity’s access, amendment and accounting of disclosures obligations  Allow HHS access to determine CE’s compliance  Return/destroy protected health information upon termination of arrangement, if feasible  If not feasible, extend BAC protections  Ensure agents and subcontractors comply  Authorize termination by covered entity

Davis Wright Tremaine LLP 13 What Must Be in a Business Associate Contract — Security Rule  Implement administrative, physical and technical safeguards that reasonably and appropriately protect the  Confidentiality,  Integrity and  Availability  Of electronic protected health information  Ensure any agent implements reasonable and appropriate safeguards  Report any security incident  Authorize termination if the covered entity determines business associate has breached  Implement administrative, physical and technical safeguards that reasonably and appropriately protect the  Confidentiality,  Integrity and  Availability  Of electronic protected health information  Ensure any agent implements reasonable and appropriate safeguards  Report any security incident  Authorize termination if the covered entity determines business associate has breached

Davis Wright Tremaine LLP 14 Business Associate Contracts  Tip: Contract management system  Tip: Do not forget the security requirements  When ePHI is involved, the privacy version is not enough  Process to identify business associates  Revisit existing relationships and contracts  Address future relationships  Process to effectively deal with contracting  Templates  Rules of the road  Elevate issues as needed  Tip: Contract management system  Tip: Do not forget the security requirements  When ePHI is involved, the privacy version is not enough  Process to identify business associates  Revisit existing relationships and contracts  Address future relationships  Process to effectively deal with contracting  Templates  Rules of the road  Elevate issues as needed

Davis Wright Tremaine LLP 15 De-Identification  How  When to use

Davis Wright Tremaine LLP 16 De-Identification  Information is presumed de-identified if—  Qualified person determines that risk of re-identification is “very small” or  The following identifiers are removed: NameAddressRelativesEmployer DatesTelephoneFax SSNMR#Plan IDAccount # License #Vehicle IDURLIP address FingerprintsPhotographsOther unique identifier  And the CE does not have actual knowledge that the recipient is able to identify the individual  Information is presumed de-identified if—  Qualified person determines that risk of re-identification is “very small” or  The following identifiers are removed: NameAddressRelativesEmployer DatesTelephoneFax SSNMR#Plan IDAccount # License #Vehicle IDURLIP address FingerprintsPhotographsOther unique identifier  And the CE does not have actual knowledge that the recipient is able to identify the individual

Davis Wright Tremaine LLP 17 De-Identification  Beware the “other unique identifier” requirement  Especially difficult with large number of records  Beware small communities  Identify what workforce needs to know de-identification rules. For example,  Marketing  Medical staff who lecture or publish  Beware the “other unique identifier” requirement  Especially difficult with large number of records  Beware small communities  Identify what workforce needs to know de-identification rules. For example,  Marketing  Medical staff who lecture or publish

Davis Wright Tremaine LLP 18 Limited Data Sets  What are they  When to use limited data sets  How to disclose limited data sets

Davis Wright Tremaine LLP 19 Limited Data Set — Not Quite De-Identified  Limited Data Set = PHI that excludes direct identifiers except:  Full dates  Geographic detail of city, state and 5-digit zip code  Not completely de-identified  Special rules apply  Limited Data Set = PHI that excludes direct identifiers except:  Full dates  Geographic detail of city, state and 5-digit zip code  Not completely de-identified  Special rules apply

Davis Wright Tremaine LLP 20 Data Use Agreements  Limited Purposes:  Research,  Public health  Health care operations  Recipient must enter into a Data Use Agreement:  Permitted uses and disclosures by recipient  Who may use or receive limited data set  Recipient must: Not further use or disclose information Use appropriate safeguards Report impermissible use or disclosure Ensure agents comply Not identify the information or contact the individuals  Limited Purposes:  Research,  Public health  Health care operations  Recipient must enter into a Data Use Agreement:  Permitted uses and disclosures by recipient  Who may use or receive limited data set  Recipient must: Not further use or disclose information Use appropriate safeguards Report impermissible use or disclosure Ensure agents comply Not identify the information or contact the individuals

Davis Wright Tremaine LLP 21 Data Use Agreements  Likely uses  State hospital associations  Public health agencies (for non-mandatory reporting)  Research where identifiers are not necessary  Not included in an accounting of disclosures  Likely uses  State hospital associations  Public health agencies (for non-mandatory reporting)  Research where identifiers are not necessary  Not included in an accounting of disclosures

Davis Wright Tremaine LLP 22 Accounting of Disclosures  What is covered  What is the best way to track  Communications with patients

Davis Wright Tremaine LLP 23 Accounting of Disclosures  Patient has the right to receive an accounting of disclosures of the patient’s PHI  Accounting includes:  Date of disclosure  Recipient name and address  Description of information disclosed  Purpose of disclosure  Patient has the right to receive an accounting of disclosures of the patient’s PHI  Accounting includes:  Date of disclosure  Recipient name and address  Description of information disclosed  Purpose of disclosure

Davis Wright Tremaine LLP 24 Accounting of Disclosures  Exceptions:  Treatment, payment and operations  Individual access  Directories, persons involved in care  Pursuant to authorizations  National security or intelligence  Incidental disclosures  Limited date set  Prior to April 14, 2003  Exceptions:  Treatment, payment and operations  Individual access  Directories, persons involved in care  Pursuant to authorizations  National security or intelligence  Incidental disclosures  Limited date set  Prior to April 14, 2003

Davis Wright Tremaine LLP 25 Accounting of Disclosures – Problems  Cumbersome process with relatively few requests  Patients often want information that is excepted  Tricky issues  Date ranges acceptable (e.g., access to a universe of records during limited time)  For disclosures made routinely within set time: Intervals acceptable (e.g., “gunshot wound within 48 hours after treatment” plus date of treatment)  Dealing with Business Associates  Cumbersome process with relatively few requests  Patients often want information that is excepted  Tricky issues  Date ranges acceptable (e.g., access to a universe of records during limited time)  For disclosures made routinely within set time: Intervals acceptable (e.g., “gunshot wound within 48 hours after treatment” plus date of treatment)  Dealing with Business Associates

Davis Wright Tremaine LLP 26 Accounting of Disclosures ─ Approaches  Different potential approaches  Log all disclosures at time of the disclosure  Do analysis at time of any patient request  Abbreviated accounting  Tip: clarify the request before beginning (but do not discourage request)  Different potential approaches  Log all disclosures at time of the disclosure  Do analysis at time of any patient request  Abbreviated accounting  Tip: clarify the request before beginning (but do not discourage request)

Davis Wright Tremaine LLP 27 Disclosures to Law Enforcement

Davis Wright Tremaine LLP 28 Disclosures to Law Enforcement Required by law Court orders, subpoenas... Administrative request Request about a crime victim Child abuse or neglect Adult abuse, neglect or domestic violence (limited) Death in suspicious circumstances Criminal activity in off-site medical emergencies Required by law Court orders, subpoenas... Administrative request Request about a crime victim Child abuse or neglect Adult abuse, neglect or domestic violence (limited) Death in suspicious circumstances Criminal activity in off-site medical emergencies Crime on the premises Avoid serious and imminent threat Identification of suspect, fugitive, material witness or missing person (limited) Admission to a violent crime (limited) Specialized law enforcement

Davis Wright Tremaine LLP 29 Disclosure to Law Enforcement  Preemption considerations  State law plays a critical role in analysis  Develop detailed policies and procedures  Tip: Identify go-to people  Tip: Two tier approach Basic approach for majority of workforce Detailed approach for those making the decisions  Tip: Consider a community meeting with providers and law enforcement to agree on ground rules  Preemption considerations  State law plays a critical role in analysis  Develop detailed policies and procedures  Tip: Identify go-to people  Tip: Two tier approach Basic approach for majority of workforce Detailed approach for those making the decisions  Tip: Consider a community meeting with providers and law enforcement to agree on ground rules

Davis Wright Tremaine LLP 30 Legal Proceedings

Davis Wright Tremaine LLP 31 Disclosures for Legal Proceedings  If a party to litigation/proceeding  May use and disclose PHI for own health care operations (as well as other exceptions)  “Operations” include conducting or arranging for legal services to the extent related to health care functions Defendant in malpractice suit Plaintiff in collection matter (also payment)  Minimum necessary De-identification Qualified protective order  Business associate contract for outside counsel needed  If a party to litigation/proceeding  May use and disclose PHI for own health care operations (as well as other exceptions)  “Operations” include conducting or arranging for legal services to the extent related to health care functions Defendant in malpractice suit Plaintiff in collection matter (also payment)  Minimum necessary De-identification Qualified protective order  Business associate contract for outside counsel needed

Davis Wright Tremaine LLP 32 Disclosures for Legal Proceedings  If covered entity is not a party, find an exception  Required by law (e.g., court order)  Health care oversight (e.g., licensure hearing)  Authorization  Response to subpoena or other lawful process Satisfactory assurances that requestor made reasonable efforts either to notify relevant patients or secure a qualified protective order Covered entity may do the same Specific requirements for each  If covered entity is not a party, find an exception  Required by law (e.g., court order)  Health care oversight (e.g., licensure hearing)  Authorization  Response to subpoena or other lawful process Satisfactory assurances that requestor made reasonable efforts either to notify relevant patients or secure a qualified protective order Covered entity may do the same Specific requirements for each

Davis Wright Tremaine LLP 33 Disclosure for Legal Proceedings  Preemption Considerations: Beware state law  Accounting of Disclosures  Depends on exception  No: health care operations, payment, authorization  Yes: subpoena, health care oversight  Tip: Don’t assume a lawyer knows the law (with HIPAA at least)  Preemption Considerations: Beware state law  Accounting of Disclosures  Depends on exception  No: health care operations, payment, authorization  Yes: subpoena, health care oversight  Tip: Don’t assume a lawyer knows the law (with HIPAA at least)

Davis Wright Tremaine LLP 34 Misunderstandings and Unrealistic Expectations  HIPAA does not always live up to expectations

Davis Wright Tremaine LLP 35 Misunderstandings and Unrealistic Expectations  Must train workforce  Biggest threat  Greatest resource  Training needs to be relevant and tailored  Assess levels of awareness (you cannot manage what you cannot measure)  Abuse of legitimate access  Difficult to detect on audit  Encourage workforce awareness  Facilitate workforce reporting of suspicions and making suggestions  Must train workforce  Biggest threat  Greatest resource  Training needs to be relevant and tailored  Assess levels of awareness (you cannot manage what you cannot measure)  Abuse of legitimate access  Difficult to detect on audit  Encourage workforce awareness  Facilitate workforce reporting of suspicions and making suggestions

Davis Wright Tremaine LLP 36 Misunderstandings and Unrealistic Expectations  Should train/educate patients  Areas of confusion  Opting out of facility directory Foster understanding of consequences  Requests for additional privacy protections Patient has right to ask Covered entity has right to say “No” Covered entity is bound by a “Yes” Promote consistency  Accounting of disclosure  Not all disclosures without authorization are improper  Should train/educate patients  Areas of confusion  Opting out of facility directory Foster understanding of consequences  Requests for additional privacy protections Patient has right to ask Covered entity has right to say “No” Covered entity is bound by a “Yes” Promote consistency  Accounting of disclosure  Not all disclosures without authorization are improper

Davis Wright Tremaine LLP 37 Questions