Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,

Slides:



Advertisements
Similar presentations
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
Advertisements

Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.
"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Anne Arundel County Fire Department
Confidentiality and HIPAA
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
RPI Ambulance Annual HIPAA Training Please sign the class roster.
Are you ready for HIPPO??? Welcome to HIPAA
Health Insurance Portability and Accountability Act (HIPAA)
Information Sharing and Cross-System Collaboration John Petrila, J.D., LL.M. Professor, University of South Florida
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
Medical Records in Court: Life after HIPAA North Carolina Conference of Superior Court Judges, October 2003 Presented by Jill Moore, UNC School of Government.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
ICU and Forensics. 1.Describe information which should be consistently communicated by healthcare providers for those patients thought to be injured due.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
HIPAAand Disaster Situations By LYNDA M. JOHNSON Friday, Eldredge & Clark.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
Practicing In Harmony with HIPAA The views and opinions expressed in the presentation are those of the presenter, and not necessarily official positions.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
S. Lee Woods, M.D., Ph.D. Director, Office of Surveillance and Quality Initiatives Maternal and Child Health Bureau Prevention and Health Promotion Administration.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
HIPAA Privacy: Those Nagging Issues That Don’t Seem to Go Away Rebecca L. Williams, RN, JD Partner; Co-Chair of HIT/HIPAA Practice Group Davis Wright.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Davis Wright Tremaine LLP The Seventh National HIPAA Summit HIPAA Privacy: Privacy Rule Compliance on Public Health Activities and Research Thomas E. Jeffry,
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
AAMC Contact: Ivy Baer Accounting for Disclosures Under HIPAA Proposed Rule: 76 Federal Register 31426, May 31, 2011.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
HIPAA Training Workshop #2 Trainer: Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Office of the Chief Privacy Officer Update June 23, 2016 Lucia Savage, JD, Chief Privacy Officer, ONC.
Health Insurance Portability and Accountability Act
Health Insurance Portability and Accountability Act of 1996
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
The HIPAA Privacy Rule: Implications for Medical Research
Health Insurance Portability and Accountability Act
HIPAA Pros - Disclosures
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
"Security and Privacy After September 11: The Healthcare Example”
Enforcement and Policy Challenges in Health Information Privacy
New School Violence Law; HIPAA Privacy Training
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
South Jordan City Fire Department
Presentation transcript:

Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant, Morrison & Foerster Chief Privacy Officer, University of Pennsylvania

Overview ŸRelationship between security and privacy ŸThe Healthcare Example §HIPAA in a world of changed priorities §Post 9/11 politics ŸThe USA Patriot Act Example ŸThe Homeland Security Example ŸObservations – Privacy and Security Today §More emphasis on security §Implications for privacy? ŸConcluding Thoughts

I. Relationship between Privacy and Security ŸPrivacy – providing individuals some level of info and control re: uses and disclosures of PII ŸSecurity – prevention of unauthorized access, use, and disclosure of PII ŸPrivacy vs. Security §Perspective of more information gathering and sharing ŸPrivacy and Security §Perspective of good security leading to good privacy and vice versa

II.A. The Healthcare Example – HIPAA in a World of New Priorities ŸRule issued before Sept. 11. How well does it work today? ŸConsider biological warfare – e.g. anthrax ŸConsider need to report suspicious, I.e, terrorist, activities

Public Health ŸSec. 512(b) fairly broad ŸPHI can be disclosed to a public health authority “authorized by law to collect or receive such information” ŸPermitted purposes include reporting disease, injury, vital events, and conduct of public health surveillance, investigations & interventions ŸDisclosure also permitted, if authorized by law, to a person exposed to or at risk for a disease

Public Health -- Conclusions ŸThe rule permits what needs to be disclosed, if it is “authorized by law” -- check that ŸProper data handling needed by public health agencies: §Privacy -- good practices for patient data §Security -- make sure network is protected and data cannot be tampered with

Reporting Suspicious Activity ŸWhat if a suspected terrorist is in the hospital? Can you report that? ŸExample: patient exposed to anthrax, and you suspect person involved in making or distributing spores

When Can You Report? ŸNational security exception ŸAvert serious threats to health or public safety ŸLaw enforcement rules generally

National Security Exception ŸSection 512(k)(2) ŸMay disclose PHI “to authorized federal officials for the conduct of lawful intelligence, counter-intelligence, and other national security activities” ŸThose activities as defined in law -- what you expect as “intelligence”

Averting Serious Threats ŸSection 512(j) permits voluntary disclosure by a covered entity ŸGeneral emergency circumstances: §“Is necessary to prevent or lessen a serious and imminent threat to the health or safety of a person or the public”; and §“Is to a person or persons reasonably able to prevent or lessen the threat” ŸConfessions to violent crimes §Can’t disclose where confession is made as part of therapy for propensity to commit violent conduct

Averting Serious Threats ŸConclusion: the rule allows disclosure to avert serious threats, including by terrorists

General Law Enforcement ŸSec. 512(f) generally requires “in response to law enforcement official’s request” ŸCovered entity can’t volunteer the information, except where required by a reporting law or requested by law enforcement

General Law Enforcement ŸCourt order, grand jury subpoena, administrative subpoena for full file ŸTo locate or identify a suspect, fugitive, material witness, or missing person: §Name, SSN, limited other information

Summary on Reporting Suspicious Activity ŸFor anthrax suspect: §Likely national security §May have evidence, in good faith, of imminent threat §Can respond to law enforcement requests more broadly ŸThe rule holds up better than you might have expected to this new challenge ŸBut, still limits on your disclosure to the police

II.B. Healthcare Politics After 9/11 ŸBush Administration preserved rules ŸRelated electronic data exchange rules were extended; privacy specifically not extended ŸMarch NPRM §Nothing changed in response to new anti- terrorism priorities §Modest changes to address paperwork burden resulted in significant front page criticism (largely unjustified)

III. USA PATRIOT Act ŸResponse to recognized need to update law enforcement authorities in light of Internet and other electronic communications ŸCompare: §Policy review prior to 9/11 §Law passage after 9/11

Policy Review Prior to 9/11 Ÿ2000 proposal had number of new law enforcement authorities, but also privacy safeguards § interceptions protected as phone interceptions §Trap & trace orders – judicial review instead of prosecutor certification ŸBipartisan approval in House Judiciary, though made more privacy protective

Law Passage After 9/11 ŸUSA PATRIOT Act §Proposed one week after 9/11 §Passed 10/25 §Little opportunity for public debate ŸMuch broader range of law enforcement authorities without any privacy protections (except sunset on some provisions)

IV. Homeland Security ŸHearings held to look at privacy implications ŸResults – House-passed bill includes: §Privacy Officer §Privacy Impact Assessments §No National ID §No “TIPS” Program

V. Security and Privacy Today ŸFocus on more information sharing for security reasons ŸAlso recognition of privacy and security working together towards national security goals §Protection against unauthorized access, use and disclosure §Audit trails §Tiered access – Need-to-know analysis ŸExample: ID theft

Concluding Thoughts ŸSecurity upgrades provide opportunities for building greater privacy protection in ŸRecognize the compatible applications of privacy and security §Privacy as a source of good security -- BNA Special Report (07/02) ŸWhere security and privacy seem at cross-purposes, one need not “win” over the other §Perform thoughtful analysis regarding accomplishing both objectives