Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.

Slides:



Advertisements
Similar presentations
H OGAN & H ARTSON, L.L.P.
Advertisements

Overview of the Connecting for Health Common Framework Privacy and Confidentiality Workshop eHealth Initiative and Vanderbilt Center for Better Health.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Tackling the Policy Challenges of Health Information Exchange Carol Diamond, MD, MPH Managing Director, Markle Foundation.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
The PRISM Privacy Tool: A User’s Guide PHDSC Home Page  PRISM Web Page 
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Organizational and Legal Issues -- Developing organization and governance models for HIE Day 2 -Track 5 – SECOND SESSION – PRIVACY AND SECURITY CONNECTING.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
1 PARCC Data Privacy & Security Policy December 2013.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
HIPAA Security Final Rule Overview
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
Overview of the Connecting for Health Common Framework MIT HIT Symposium Carol Diamond MD, MPH Markle Foundation.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Office of the Secretary Office for Civil Rights (OCR) Enforcement and Policy Challenges in Health Information Privacy Linda Sanches HIPAA Summit Special.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
EHI Toolkit for Health Information Exchange Building and Maintaining Policies for Information Sharing Bill Braithwaite, MD, PhD eHealth Initiative
HIPAA Administrative Simplification
Paul T. Smith Davis Wright Tremaine LLP
MIT HIT Symposium How HIPAA Applies to HIT
SHARING CLINICAL DATA: Legal and Privacy Issues
Move this to online module slides 11-56
Overview of the Connecting for Health Common Framework Resources
Disability Services Agencies Briefing On HIPAA
American Health Information Management Association
Concerns of a Privacy Advocate – and How to Respond
Policies for Information Sharing
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Lesson 1  7 Basic Components of an Effective Compliance Plan
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
National Congress on Health Care Compliance
Enforcement and Policy Challenges in Health Information Privacy
HIPAA Policy & Procedure Strategies
The General Data Protection Regulation: Are You Ready?
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD

About 40 experts in –Law –Health privacy and ethics –Health care delivery –Administration –Technology –Local network development (RHIOs) Connecting for Health Policy Subcommittee

Work looked at HIE in the context of HIPAA and existing state laws Developed a list of significant topics from –Members’ experience with early information exchange networks –Members’ own expertise Connecting for Health Policy Subcommittee

Some of the most challenging aspects of electronic health information exchange are “policy” related. –Who has access to what, under what circumstances, and with what protections? –Who shares what and who bears the liability? –How can you control access to your information? Challenges

Develop a policy framework that enables information sharing to happen for high quality patient care while still protecting the privacy and security of personal health information. Identify what needs to be common for interoperability and what does not. Design and develop a working guide for the use of communities on issues such as access, control, privacy and security. Connecting for Health Goals

A secure nationwide health information exchange network will be enabled by the general adoption of a set of specific, critical tools, including technical standards for exchanging clinical information, explicit policies for how information is handled, and uniform methods for linking information accurately and securely. What is the Common Framework?

7 In a networked environment: persistent and aggregated “data shadow” Increased risks of misuse and re-use; not dealt with through consent Privacy protective behavior: opt-out of the system Demands a systemic privacy protection architecture (fair information practices) to mitigate the risks and establish trust Privacy in Networked Environments

Openness Purpose Specification Collection Limitation Use Limitation Individual Participation and Control Remedies Accountability Security Data Integrity Connecting for Health Architecture for Privacy in a Networked Health Information Environment 8

Establish baseline privacy protections – participants can follow more protective practices Based on HIPAA, although some policies offer greater privacy protections Rooted in nine privacy principles To be used in conjunction with M2: A Model Contract for Health Information Exchange P2: Model Privacy Policies and Procedures

SNO Policy 100: Compliance with Law and Policy SNO Policy 200: Notice of Privacy Practices –Exceeds HIPAA requirements -- requires disclosure of information related to the SNO and RLS –Notice should inform individuals about what information may be available through SNO and RLS, who can access it, and to have information about them removed from the RLS

SNO Policy 300: Individual Participation and Control of Information Posted to the RLS –Exceeds HIPAA requirements by allowing individuals to decide whether or not to have information included in RLS –Coverage or care cannot be withheld on the basis of the individual’s choice P2: Model Privacy Policies and Procedures

SNO Policy 400: Uses and Disclosures of Health Information –Integrates HIPAA permissible purpose and minimization premises –Uses for TPO are permissible –Generally, uses for law enforcement, disaster relief, research, and public health are permissible –Marketing not permissible –Discrimination not permissible P2: Model Privacy Policies and Procedures

SNO Policy 500: Information Subject to Special Protection SNO Policy 600: Minimum Necessary SNO Policy 700: Workforce, Agents, and Contractors SNO Policy 800: Amendment of Data SNO Policy 900: Requests for Restrictions P2: Model Privacy Policies and Procedures

Addresses question: what should an institution participating in the RLS be required to do to inform patients and give them the ability to decide not to be listed in the RLS index? Recommendation more protective of privacy than HIPAA P3: Notification and Consent When Using a Record Locator Service

Information on patients of participating institutions included in RLS on day one (patient names, demographics, and institution names) Patient must be given notice that institution participates in RLS and provided with opportunity to opt-out of index Revision of HIPAA Notice of Privacy Practices Initial Inquiry Audit Patient access to RLS record P3: Notification and Consent When Using a Record Locator Service

SNO will comply with HIPAA Security Rule. SNO Participants will comply with applicable federal, state, and local laws Responsibility of Participants to train personnel and enforce institutional confidentiality policies and disciplinary procedures P8: Breaches of Confidential Health Information

SNO must report any breaches and/or security incidents. SNO Participants must inform SNO of serious breaches of confidentiality Participants and SNOs should work towards system that ensures affected patients are notified in the event of a breach P8: Breaches of Confidential Health Information

SNO contract could include provision allowing Participant withdrawal from SNO in case of serious breach of patient data SNO contract could include indemnification provisions pertaining to breach of confidentiality of protected health information P8: Breaches of Confidential Health Information

P6: Patients’ Access to Their Own Health Information HIPAA –Right to See, Copy, and Amend own health information –Accounting for Disclosures –Covered entities required to follow both Privacy Rule and related state laws –Allows stronger privacy safeguards at state level

Patient access to the information in the RLS –Each SNO should have a formal process through which information in the RLS can be requested by a patient or on a patient’s behalf –Participants and SNOs shall consider and work towards providing patients direct, secure access to the information about them in the RLS P6: Patients’ Access to Their Own Health Information