b
play

B enjamin Franklin, the first post- master general appointed - PDF document

HIPAA and Mobile Health Wheres the App for That? by Barry Liss B enjamin Franklin, the first post- master general appointed under the Continental Con- gress, imposed what may have been the nations first privacy and security rules.


  1. HIPAA and Mobile Health Where’s the App for That? by Barry Liss B enjamin Franklin, the first post- master general appointed under the Continental Con- gress, imposed what may have been the nation’s first privacy and security rules. Concerned about unauthorized disclosures, loss of privacy, and lax security in the colonial mail system, he ordered local postmasters to segregate their post offices from their homes, only allow authorized individuals to handle the mail, seal mail in a bag, keep the bag sealed until the des- tination was reached, and require identifica- tion of the recipient before allowing someone to receive the posted letter. 1 Now, the nation has the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Eco- nomic and Clinical Health (HITECH), and other federal and state laws intended to address the same concerns ( i.e. , unauthorized disclosures, loss of privacy, and lax security). It bears noting that Franklin’s privacy and securi- ty rules fit the technology of the day (delivery by foot and horseback). ing, wandering monitors for Alzheimer’s patients, portable Today, there is a widening gap between privacy and securi- electrocardiogram systems, environmental sensors for asthma ty on one hand and society’s voracious appetite for cutting- patients, fetal heart rate monitoring, and more. Some of these edge technology on the other. The healthcare delivery system apps are designed for consumer use only and some are linked is front and center in this global, socially pervasive phenome- to information systems located within healthcare facilities non. The moniker ‘mHealth’ captures this entire phenome- and physician offices. They are used as early warning systems non in a single word. and for general patient management. Mobile health apps have been created to relay biomedical information wirelessly to What is mHealth? providers ( i.e. , remote patient monitoring, or RPM), allowing Mobile health apps run the gamut, from calorie counters timely, efficient, and effective care management that has been and medication reminders to sensor-based vital sign monitor- shown to reduce emergency room visits and hospital readmis- 20 N EW J ERSEY L AWYER | D ECEMBER 2016 NJSBA . COM

  2. sions. Hospitals that have been penal- Federal Trade Commission Act and ever, the transmission and storage of ized by the Centers for Medicare & Med- other federal and state laws governing that PHI, indeed a permitted disclosure, icaid Services (CMS) for readmissions certain circumstances may apply ( e.g. , is governed by a range of regulations. within 30 days of discharge are, not sur- records relating to substance abuse treat- The Security Rule prisingly, fertile ground for marketing ment, HIV status, genetic information, this technology—indeed, they are easy mental health, sexually transmitted dis- Even though the disclosure may be targets. eases, etc.). 3 permitted under the HIPAA Privacy Biomedical sensors predict falls in Not all patient information is gov- Rule, HIPAA also regulates how such Parkinson’s patients. Sensors placed on erned by HIPAA. If the transmission or information must be kept when at rest the skin in the form of tattoos sense storage of health information does not and when transmitted. The HIPAA Secu- abnormalities in body chemistries, and involve a ‘covered entity,’ the informa- rity Rule establishes legal requirements sensors placed on ingested pills transfer tion is not PHI, and HIPAA does not for securing electronic PHI (ePHI) and biological data in real time to the apply. Therefore, the threshold inquiry imposes highly specific (and burden- patients and their physicians. regarding HIPAA compliance involves some) obligations on covered entities The argument that mHealth can determining whether the entity that and their business associates to ensure the ePHI is secure. 6 Those sections of the reduce costs by improving medication possesses the patient information is a compliance, reducing hospital admis- covered entity ( i.e. , whether it is a health HIPAA Security Rule with which compli- sions, and reducing emergency room uti- plan, healthcare clearinghouse, or ance is perhaps most challenging are lization is difficult to dispute, and fuels healthcare provider that electronically found in Subpart C of 45 CFR Part 164, the dramatic growth of this industry. transmits health information in connec- and are organized into several general The global mHealth industry, which tion with transactions for which HHS areas: administrative safeguards; physi- by most accounts did not exist when has adopted standards, or whether the cal safeguards; technical safeguards; HIPAA was enacted in 1996, was valued entity is a ‘business associate’ (discussed organizational requirements; and poli- as an $85 million business in 2010 and a below). 4 cies and procedures requirements. $33 billion business in 2015. It is pro- The Privacy Rule The Fundamental HIPAA jected to grow at an estimated com- Compliance Issue pound annual growth rate of 33 percent The HIPAA Privacy Rule generally per year between 2015 and 2020, and is provides that PHI cannot be disclosed by As noted above, the HIPAA Security ultimately poised to become a $59 bil- covered entities without a valid patient Rule applies not only to covered entities lion industry by 2020. 2 consent, unless an exception applies. but to “business associates.” Business Whether, and to what extent, the One exception is when the disclosure associates include: “(i)...[a] person that mHealth juggernaut has outstripped the occurs for “treatment” purposes, defined provides data transmission services with vision underlying HIPAA’s and as: “the provision, coordination, or respect to protected health information HITECH’s privacy and security require- management of health care and related to a covered entity and that requires ments is the focus of this article. services by one or more health care access on a routine basis to such protect- providers, including the coordination or ed health information. (ii) A person that HIPAA and mHealth: Harmony management of health care by a health offers a personal health record to one or or Discord? care provider with a third party; consul- more individuals on behalf of a covered HIPAA, HITECH, and the rules prom- tation between health care providers entity. (iii) A subcontractor that creates, ulgated in connection with them, are relating to a patient; or the referral of a receives, maintains, or transmits pro- enforced by the Office of Civil Rights in patient for health care from one health tected health information on behalf of the business associate.” 7 This would the U.S. Department of Health and care provider to another.” 5 Human Services. The HIPAA Privacy Thus, disclosures of PHI from a cov- appear to fit most mHealth vendors. Rule and HIPAA Security Rule establish ered entity ( e.g. , a healthcare provider) Thus, an mHealth vendor that provides the fundamental legal parameters for to a server upon which a cloud-based services to a healthcare provider that disclosing, storing, and transmitting mHealth application resides and stores involves the disclosure of PHI would patient information ( i.e. , personally PHI for patient treatment purposes likely be a business associate. According- identifiable healthcare information, or would likely fit within the healthcare ly, it must enter into a business associate PHI). It should also be kept in mind treatment exception and, thus, would agreement with the healthcare provider, that, in addition to HIPAA, HITECH, the not require the patient’s consent. How- and the mHealth vendor itself must 21 N EW J ERSEY L AWYER | D ECEMBER 2016 NJSBA . COM

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend