Privacy and Security Work Group Draft Privacy & Security Policies & Recommendations.

Slides:



Advertisements
Similar presentations
Georgia Department of Community Health
Advertisements

How Will it Help Me Do My Job?
JCAHO –A HIPAA Business Associate National HIPAA Summit
National HIT Agenda and HIE John W. Loonsk, M.D. Director of Interoperability and Standards Office of the National Coordinator Department of Health.
Major Activities in JPNIC Since APNIC17 Izumi Okutani Japan Network Information Center NIR 18, Fiji 31 August – 3 September, 2004.
Module N° 4 – ICAO SSP framework
GEOSS Data Sharing Principles. GEOSS 10-Year Implementation Plan 5.4 Data Sharing The societal benefits of Earth observations cannot be achieved without.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
WHO Good Distribution Practices for Pharmaceutical Products
Legal Work Group Developing a Uniform EHR/HIE Patient Consent Form.
HISPC-Illinois II The Public-Private Partnership Moves Forward on Privacy and Security.
HIPAA AWARENESS TRAINING
Gaining Senior Leadership Support for Continuity of Operations
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
EMS Checklist (ISO model)
Subchapter M-Indian Self- Determination and Education Assistance Act Program Part 273-Education Contracts under Johnson-OMalley Act.
2009 Data Protection Seminar
Intro. Website Purposes  Provide templates and resources for developing early childhood interagency agreements and collaborative procedures among multiple.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Auditing, Assurance and Governance in Local Government
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
HIT Policy Committee Federal Health IT Strategic Plan April 13, 2011 Jodi Daniel, ONC Seth Pazinski, ONC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Davis Wright Tremaine LLP Non-HIPAA Governmental Regulation of Healthcare Privacy and Security Sixteenth HIPAA Summit/The Privacy Symposium August 21,
NCVHS: Privacy and Confidentiality Leslie P. Francis, Ph.D., J.D. Distinguished Professor of Law and Philosophy Alfred C. Emery Professor of Law University.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Session 3 – Information Security Policies
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
April 2, 2013 Longitudinal Data system Governance: Status Report Alan Phillips Deputy Director, Fiscal Affairs, Budgeting and IT Illinois Board of Higher.
Tackling the Policy Challenges of Health Information Exchange Carol Diamond, MD, MPH Managing Director, Markle Foundation.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Staff Structure Support HCCA Special Interest Group New Regulations: A Strategy for Implementation Sharon Schmid Vice President, Compliance and.
The Use of Health Information Technology in Physician Practices
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
1 Collaboration and Concept Exploration Nationwide Health Information Organization (NHIO) Gateway March 28, 2007.
State Alliance for e-Health Conference Meeting January 26, 2007.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
T.I.G.E.R. National HIT Collaborative Certification Commission for Healthcare Information Technology (CCHIT) Tutorial June 2008.
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Eliza de Guzman HTM 520 Health Information Exchange.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Privacy and Security Solutions For Interoperable Health Information Exchange Presented by Linda Dimitropoulos, PhD RTI International Presented at AHRQ.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
FORUM GUIDE TO SUPPORTING DATA ACCESS FOR RESEARCHERS A STATE EDUCATION AGENCY PERSPECTIVE Kathy Gosa, Kansas State Department of Education.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Health Management Information Systems Unit 3 Electronic Health Records Component 6/Unit31 Health IT Workforce Curriculum Version 1.0/Fall 2010.
Moving the National Health Information Technology Agenda Forward The Fourth Health Information Technology Summit March 28, 2007 Robert M. Kolodner, MD.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIMSS – Chicago – April, 2009 New Jersey - Health Information Technology – NJ HIT Act – Office for Health Information Technology Development - Recovery.
Health Information Exchange: Alaska’s Health Pipeline Alaska Bar Association Health Law Section February 2, 2012 Carolyn Heyman-Layne.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
Data Security and Privacy Overview: NJDOE’s Approach to Cybersecurity
Health Information Security and Privacy Collaborative (HISPC) Overview
Health Information Exchange: Alaska’s Health Pipeline
VERMONT INFORMATION TECHNOLOGY LEADERS
Model Contract for Health
PSO Overview for (name of organization’s) PSES Workgroup
American Health Information Management Association
Enforcement and Policy Challenges in Health Information Privacy
HIPAA Policy & Procedure Strategies
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
PSO Overview for (name of organization’s) PSES Workgroup
Non-HIPAA Governmental Regulation of Healthcare Privacy and Security
Presentation transcript:

Privacy and Security Work Group Draft Privacy & Security Policies & Recommendations

HISPC The Health Information Security and Privacy Collaboration (HISPC) is a federal initiative to study privacy and security issues related to health information exchange (HIE) The Health Information Security and Privacy Collaboration (HISPC) is a federal initiative to study privacy and security issues related to health information exchange (HIE) HISPC's phase 1 goals were to: HISPC's phase 1 goals were to: identify both best practices and challenges identify both best practices and challenges develop consensus-based solutions that protect the privacy and security of health information, and develop consensus-based solutions that protect the privacy and security of health information, and develop implementation plans to implement solutions. develop implementation plans to implement solutions. 33 states and 1 territory participated in the collaboration 33 states and 1 territory participated in the collaboration

HISPC-Illinois Implementation Recommendations 1.Develop systematic, comprehensive approach to promoting HIE 2.Adopt universal standard for patient identification 3.Develop standards for consistent and available privacy and security expertise for organizations. 4.Establishment of core competencies for staff education and training in electronic health information, privacy and security. 5. Develop educational materials for consumers 6. Extend and promote, national Stark, e- prescribing and anti-kickback relief regulations. 7. Provide recommendations for use of multidisciplinary teams in the acquisition of new IT solutions. 8. Include in lead state agency/organization legal staff with expertise in privacy and security to guide integrated state efforts.

HISPC Phase II The purpose of phase 2 is to implement proposals produced during the initial phase of the project.

HISPC-Illinois II Project Proposal The priority for Illinois as HISPC enters phase 2 is to move the public-private partnership outlined in the Electronic Health Records (EHR) Taskforce report and supported in the HISPC-Illinois State Implementation Plan forward in the areas of privacy and security. Solution 8, of the State Implementation Plan – Illinois provides for the lead state agency/organization to have expertise in privacy and security to guide state activities. The priority for Illinois as HISPC enters phase 2 is to move the public-private partnership outlined in the Electronic Health Records (EHR) Taskforce report and supported in the HISPC-Illinois State Implementation Plan forward in the areas of privacy and security. Solution 8, of the State Implementation Plan – Illinois provides for the lead state agency/organization to have expertise in privacy and security to guide state activities. Consistent with the spirit of that implementation solution, HISPC-Illinois II will set up an expert work group to prepare draft privacy and security policies and recommendations for consideration by the governance structure of a state-level health information exchange (HIE). Another work group will prepare a uniform patient EHR/HIE consent form for possible use by the state-level HIE, clinicians, health care facilities and other providers. Consistent with the spirit of that implementation solution, HISPC-Illinois II will set up an expert work group to prepare draft privacy and security policies and recommendations for consideration by the governance structure of a state-level health information exchange (HIE). Another work group will prepare a uniform patient EHR/HIE consent form for possible use by the state-level HIE, clinicians, health care facilities and other providers.

HISPC-Illinois II Structure Steering Committee Privacy and Security Work Group Legal Work Group

Privacy & Security Work Group Develop an outline of privacy and security issues to be included in the Draft Policies and Recommendations document. Prepare a draft of the Draft Policies and Recommendations document for review by stakeholders. Finalize the Draft Policies and Recommendations document. Develop draft privacy and security policies and recommendations for consideration by the ILHIN Board of Directors.

Definitions of Privacy, Confidentiality and Security Privacy – an individual's right to control the acquisition, uses, or disclosures of his or her identifiable health data. Privacy – an individual's right to control the acquisition, uses, or disclosures of his or her identifiable health data. Confidentiality – refers to the obligations of those who receive information to respect the privacy interests of those to whom the data relate. Confidentiality – refers to the obligations of those who receive information to respect the privacy interests of those to whom the data relate. Security – refers to physical, technological, or administrative safeguards or tools used to protect identifiable health data from unwarranted access or disclosure. [1] Security – refers to physical, technological, or administrative safeguards or tools used to protect identifiable health data from unwarranted access or disclosure. [1] [1] [1] Extracted from "Privacy and Confidentiality in the Nationwide Health Information Network," National Committee on Vital and Health Statistics, June 2006, [1]

Definition of Privacy and Security Policies Policies describe how the organization plans to protect the [organizations] tangible and intangible information assets. Policies include generalized requirements approved at the [organizations] executive level that indicate a course of action to personnel who must make decisions. [2] [2] [2] Extracted from Managing Information Privacy & Security in Healthcare: A Primer on Health Information Security, By Greer Stevenson, part of the HIMSS Privacy and Security Toolkit, Healthcare Information and Management Systems Society, April 2007, page 5,

Work Plan First Meeting First Meeting Review the work group task. Review the work group task. Discuss approach to achieve the work group task. Discuss approach to achieve the work group task. Discuss and adopt a consensus outline of the privacy and security issues to be included in the Draft Policies and Recommendations document. Discuss and adopt a consensus outline of the privacy and security issues to be included in the Draft Policies and Recommendations document. Discuss work assignments for next meeting – select author(s) to prepare draft policy paper for each outline dot point. Discuss work assignments for next meeting – select author(s) to prepare draft policy paper for each outline dot point. Set meeting schedule Set meeting schedule Second Meeting Second Meeting Review draft policy papers. Review draft policy papers. Discuss work assignments for next meeting – revising policy papers to address work group comments. Discuss work assignments for next meeting – revising policy papers to address work group comments.

Work Plan Continued Third Meeting Third Meeting Discuss and approve a draft of the Draft Policies and Recommendations document for review by stakeholders. Discuss and approve a draft of the Draft Policies and Recommendations document for review by stakeholders. Fourth Meeting Fourth Meeting Discuss stakeholder comments on the draft Draft Policies and Recommendations document Discuss stakeholder comments on the draft Draft Policies and Recommendations document Discuss work assignments to make revisions to address concerns or questions. Discuss work assignments to make revisions to address concerns or questions. Fifth and Final Meeting Fifth and Final Meeting Discuss and finalize the Draft Policies and Recommendations document. Discuss and finalize the Draft Policies and Recommendations document.

Policy Outline [3] 1. 1.Philosophy for the Protection of Information 2. 2.Patient Rights with Respect to Information Security 3. 3.Protection of Caregiver Information 4. 4.The Privileges and Obligations of Researchers 5. 5.The Rights of Society 6. 6.Collection of Information 7. 7.Retention and Destruction 8. 8.Information Security Program [3][3] Extracted from Developing Policies, Procedures, and Practices - Introduction, By Ted Cooper, MD, part of the HIMSS Privacy and Security Toolkit, Healthcare Information and Management Systems Society, January 2007, page 2,

Policy Outline Continued [3] 9. 9.Accountability and Responsibilities Access to Information Classification of Information Records of Access Disaster Recovery/Business Resumption Plans Information Security Awareness Training Monitoring and Auditing [3][3] Extracted from Developing Policies, Procedures, and Practices - Introduction, By Ted Cooper, MD, part of the HIMSS Privacy and Security Toolkit, Healthcare Information and Management Systems Society, January 2007, page 2,

Issues to Consider What should or should not be included in Illinois Privacy and Security Policies

Policies to Reflect Functionality To participate in the NHIN, the state-level HIE will be required to adhere to adopted standards. Illinois policies will have to be developed to reflect or prevent a conflict with those standards. The state-level health HIE is to serve as the bridge between the Nationwide Health Information Network (NHIN) and Illinois regional health information organizations and health care providers.

NHIN Requirements [4] Secure operation in all activities related to the NHIN Protect the confidentiality of personally identifiable health information as it is used by those who participate in the NHIN Reconcile patient and provider identities without creating national indices of patients Provide local registries that may be used, when authorizations permit, to find health information about patients Support the transfer of information from one provider or care delivery organization in support of collaborative care Support secondary uses of data while protecting the identity of patients to the degree required by law and public policy [4][4] Extracted from Gartner, Summary of the NHIN Prototype Architecture Contracts - A Report for the Office of the National Coordinator for Health IT, May 31, 2007, page 25,

Policies to Address Public Trust Numerous organizations have developed recommendations on how best to protect health information Recommendations from some of those organizations follows The state-level HIE privacy and security policies need to provide assurances to the public that personal health information will not be misused or abused.

NCVHS NHIN Privacy & Security Selected Recommendations [5] The method by which personal health information is stored by health care providers should be left to the health care providers. (R-1) The method by which personal health information is stored by health care providers should be left to the health care providers. (R-1) Individuals should have the right to decide whether they want to have their personally identifiable electronic health records accessible via the NHIN. This recommendation is not intended to disturb traditional principles of public health reporting or other established legal requirements that might or might not be achieved via NHIN. (R-2) Individuals should have the right to decide whether they want to have their personally identifiable electronic health records accessible via the NHIN. This recommendation is not intended to disturb traditional principles of public health reporting or other established legal requirements that might or might not be achieved via NHIN. (R-2) Providers should not be able to condition treatment on an individual's agreement to have his or her health records accessible via the NHIN. (R-3) Providers should not be able to condition treatment on an individual's agreement to have his or her health records accessible via the NHIN. (R-3) If individuals are given the right to control access to the specific content of their health records via the NHIN, the right should be limited, such as by being based on the age of the information, the nature of the condition or treatment, or the type of provider. (R-7) If individuals are given the right to control access to the specific content of their health records via the NHIN, the right should be limited, such as by being based on the age of the information, the nature of the condition or treatment, or the type of provider. (R-7) Role-based access should be employed as a means to limit the personal health information accessible via the NHIN and its components. (R-8) Role-based access should be employed as a means to limit the personal health information accessible via the NHIN and its components. (R-8) [5][5] National Committee on Vital and Health Statistics, Recommendations regarding Privacy and Confidentiality in the Nationwide Health Information Network, June 22, 2006 Letter to the Secretary of the U.S. Department of Health and Human Services,

Connecting for Healths Common Framework Core Principles for a Networked Environment Connecting for Healths nine specific recommendations to ensure privacy 1. 1.Openness and Transparency 2. 2.Purpose Specification and Minimization 3. 3.Collection Limitation 4. 4.Use Limitation 5. 5.Individual Participation and Control 6. 6.Data Integrity and Quality 7. 7.Security Safeguards and Controls 8. 8.Accountability and Oversight 9. 9.Remedies For explanations of the core principles go to: ure.pdf [This link is included in the Resource page of the HISPC-IL Web site.] ure.pdf

Policies on Connecting with the State-level HIE The privacy and security policies need to provide the framework for these agreements or contracts. Among other elements, the policies need to address: Compliance with state and federal law Sanctions for breaching privacy and security provisions The state-level HIE serves as a link between entities with health information and entities who have a legitimate need for that information. This means the state- level HIE must address privacy and security concerns involving linking entities as well as those relating to its own systems. Formal agreements or contracts provide the mechanism to require connecting entities to adhere to privacy and security standards.

Summary of Connecting for Healths Model Contract for Health Information Exchange Key Provisions [6] [6] Each HIE participant must comply with healthcare privacy, confidentiality, security, and use standards. Each HIE participant must comply with state and local privacy, security, and use laws. Each HIE participant shall report to the other serious breaches of confidentiality. [6] [6] Rhodes, Harry B.. "Privacy and Security Challenges in HIEs: Unique Factors Add New Complexities to Familiar Issues." Journal of AHIMA 77, no.7 (July/August 2006): 70-71,74.

Summary of Connecting for Healths Model Contract for Health Information Exchange Key Provisions [6] [6] Established limitations will be placed on the use and disclosure of protected health information. Protected health information will be secured by appropriate administrative, physical, and technical safeguards. Each HIE participant shall report to the other any use of protected health information outside the established terms and conditions. [6] [6] Rhodes, Harry B.. "Privacy and Security Challenges in HIEs: Unique Factors Add New Complexities to Familiar Issues." Journal of AHIMA 77, no.7 (July/August 2006): 70-71,74.

Work Group Resources Copies of or a link to most of the reference documents referenced in work group materials can be found in the Resources page in the HISPC-Illinois II Web site: Copies of or a link to most of the reference documents referenced in work group materials can be found in the Resources page in the HISPC-Illinois II Web site: If you have any questions, please contact Jeff W. Johnson, HISPC-Illinois Project Director at or by at If you have any questions, please contact Jeff W. Johnson, HISPC-Illinois Project Director at or by at