Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)224-5344.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
“Reaching across Arizona to provide comprehensive quality health care for those in need” Our first care is your health care Arizona Health Care Cost Containment.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
NAU HIPAA Awareness Training
W W W. L E C L A I R R Y A N. C O M Revisiting the PHI Breach Under HIPAA and HITECH and Considerations for Ophthalmologists Neil H. Ekblom, Esq. 885 Third.
HIPAA Regulations What do you need to know?.
Importance of the Information Risk Assessment. Compliance Programs are intended to proactively audit and assess an organization’s operations to detect.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Health Insurance Portability & Accountability Act (HIPAA)
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
Health Information Technology for Economic and Clinical Health Act (HITECH)
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Established in 1996 to enforce standards for electronic health information & enhance the security and privacy of health information.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Finally, the Final HIPAA/HITECH Regulations are Here! By LYNDA M. JOHNSON Friday, Eldredge & Clark.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule.
©2002 by the National Committee for Quality Assurance NCQA and HIPAA “A match made in ?” The Fifth National HIPAA Summit Sharon King Donohue, JD General.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
 Health Insurance and Accountability Act Cornelius Villalon Jr.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule Melinda Hatton -- Oct. 31, 2002.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
Health Insurance Portability and Accountability Act
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Health Insurance Portability and Accountability Act
Enforcement and Policy Challenges in Health Information Privacy
Mayo Clinic Privacy Office
Presentation transcript:

Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)

Privacy / Data Security 2008 Actual implementation experience Breaches – both intentional and unintentional. ATM analogy Estimated 6.9 million affected in 2007 – 42 million in past 4 years Final privacy rule and consent Health professionals, payers, “health care operations” No penalties imposed despite complaints 67% of Americans “somewhat” or “very concerned” about the privacy of their records – higher in those with chronic conditions (health coverage issue) 52% of Americans concerned that insurance claims would be used to deny them employment 1 in 8 have engaged in behaviors placing their health at risk: avoiding treatment, seeing a different practitioner, paying cash. 600,000 Americans miss timely cancer diagnosis; 2 million avoid mental health treatment PHI Privacy Net National Consumer Health Privacy Survey 2005 HHS

HIMSS Security Report The actual number and extent of data breaches is higher than reported. Data forensics conducted after a breach usually reveal greater scope and severity than initially expected (Pg 23) Breaches typically involve disclosure of critical data including name, mailing address, diagnosis, and other clinical data (Pg 19). There is an absence of concern regarding electronic media such as media, laptops, and internet access (Pg 18). Paper records are not the greatest threat. Most reported breaches involved electronic records. This notable despite the fact that adoption of Health IT is still far from complete (Pg 21) Only 56 percent of breaches resulted in patient notification (Pg 4) and respondents indicated that only 10 percent intended to inform patients of such an event (Pg 17) Breach action plans were lacking in focus on proactive risk mitigation (Pg 16) 2008 HIMSS Analytics Report: Security of Patient Data – April 2008

Privacy Protection Models Data access Requires physical security Does not require complete knowledge of abuses Limits data use for other applications - issue of consent Prohibition of acts Requires knowledge of potential harms Legislative process and the time to navigate – GINA example Creative workarounds – surrogate data

Snowe Amendment Provisions Improve representation of patients’ interests by increasing the number of consumer representatives on the Policy Board from 1 to 3 (out of 18 members) Prohibit the use of “piggybacking” of consent on the HIPAA notice. See “Declaration of Helsinki” Provide a data breach notification

Data Breach Provision Provides one year for the HHS Secretary to conduct rule making on the trigger, methods and procedure for notification regarding data breaches. Ensures that when an unauthorized individual may reasonably be expected to have acquired representation of a patient’s protected health information, such must be considered a breach. Requires reporting of breaches of protected health information affecting 100 or more individuals to the HHS Secretary with 60 days of discovery. Provides summary reporting of the number and extent of such breaches on a publicly-accessible website. Provides for HHS approval of data security measures such as encryption. Requires that a covered entity which discovers a breach of protected health information – and which has not employed an HHS-approved technology to make data unreadable by unauthorized individuals – inform individuals affected by such a breach within 60 days. Provides for mandatory penalties for a covered entity which fails to provide required notification. Entities would be fined $500 per individual affected, with an aggregate limit of $250,000 per incident.