Latest Legal Developments In HIPAA and Release of Information
2016 AAHIM Annual Meeting
Jim Hoover • Partner Suite 3400 • 420 North 20th Street • Birmingham, Alabama 35203 direct 205-458-5111 • jhoover@burr.com • www.burr.com
Information 2016 AAHIM Annual Meeting Jim Hoover Partner Suite 3400 - - PowerPoint PPT Presentation
Latest Legal Developments In HIPAA and Release of Information 2016 AAHIM Annual Meeting Jim Hoover Partner Suite 3400 420 North 20th Street Birmingham, Alabama 35203 direct 205-458-5111 jhoover@burr.com www.burr.com Privacy
Jim Hoover • Partner Suite 3400 • 420 North 20th Street • Birmingham, Alabama 35203 direct 205-458-5111 • jhoover@burr.com • www.burr.com
intent remains simple: to define and limit the circumstances under which PHI may be used or disclosed by covered entities, in whatever format.
covered entity when dealing with PHI.
procedures that restrict access and use of PHI, both internally and externally.
its workforce members on proper handling of PHI.
safeguards to ensure confidentiality and security of electronic PHI (“ePHI”).
subset of the more encompassing PHI addressed by the Privacy Rule.
controls, integrity controls, and electronic transmission security measures - all designed to ensure that ePHI is not being improperly accessed or altered.
risk analysis of its EHR systems.
Officer) must be named.
may be harshly scrutinized anyway, and much more so where the entity's own routine assessment policies have been ignored.
Office of Civil Rights.
penalties of $100 to $50,000 per violation may be imposed, with a calendar year cap of $1.5M.
not the result of willful neglect, and was corrected after the entity knew or should have known about the failure, or if the Department of Justice, which is responsible for criminal prosecutions, has already imposed a penalty for knowing or willful violations.
imprisonment of up to 10 years depending on the nature of the violation.
the OCR was 1,516
complaints were "resolved" after intake and review (generally about 50%), or required corrective action (ranging between about 20% and 30%)
investigation are well in the minority (ranging from 4% in 2014 to a high of 17% in 2010)
generally (about 75% of the time) result in a finding that will require resolution or corrective action and a finding of "no violation" once an investigation ensues has been the historical exception, not the rule
headquartered in Manhasset, New York that is comprised of twenty one hospitals and
violations of HIPAA.
employee’s car. The ePHI stored in the laptop included the names of research participants, dates of birth, addresses, social security numbers, diagnoses, laboratory results, medications, and medical information relating to potential participation in a research study.
incomplete, and insufficient; it lacked policies and procedures for authorizing access to ePHI by its workforce members; it failed to implement safeguards to restrict access to unauthorized users, and lacked policies and procedures to govern the receipt and removal of laptops that contained ePHI into and out of its facilities.
Feinstein’s standard acquisition process, Feinstein failed to implement proper mechanisms for safeguarding ePHI as required by the Security Rule.
action plan.
from a business associate’s workforce member’s locked vehicle.
a business associate agreement so that its business associate could perform certain payment and health care operations activities on its behalf. North Memorial gave its business associate, Accretive Health, Inc., access to North Memorial’s hospital database, which stored the ePHI of 289,904 patients. Accretive also received access to non-electronic protected health information as it performed services on-site at North Memorial.
and vulnerabilities to the ePHI that it maintained, accessed, or transmitted across its entire IT infrastructure -- including but not limited to all applications, software, databases, servers, workstations, mobile devices and electronic media, network administration and security devices, and associated business processes.
area.
plan, and make annual reports of compliance efforts for a one year period.
had impermissibly disclosed numerous individuals’ PHI when it posted patient testimonials, including full names and full face photographic images, to its website without obtaining valid, HIPAA-compliant
– Failed to reasonably safeguard PHI; – Impermissibly disclosed PHI without an authorization; and – Failed to implement policies and procedures with respect to PHI that were designed to comply with HIPAA’s requirements with regard to authorization.
Interestingly, one of the affidavits was from Laurie Rinehart-Thomas, Director of HIMS at Ohio State University who is certified by the AHIMA as a registered health information administrator. She offered expert testimony.
suggesting that OCR’s evidence is unreliable and did not “even allege that it disputes the underlying facts established by these documents.”
admissible evidence showing a dispute of material fact and imposed the OCR’s suggested fine of $239,800.
Interesting Facts
services away from the company’s offices employees had to remove records containing PHI.
maintain copies of the procedures manuals “secured” in their vehicle so employees would have access to patient contact information if a center office were destroyed or not accessible.
though she knew her husband had the keys. She also admitted that when she left she didn’t know where the car was parked.
were missing until the ex-husband filed the complaint with OCR and reported them to Lincare.
known with the exercise of reasonable diligence
made it unreasonable for the CE to comply with the violated provisions, the violation was not caused by “willful neglect” and it was corrected within 30 days of when the CE knew or should have known about it.
“based on the nature and extent of the failure to comply
substantiate its defamatory allegations.”
had him arrested but the charges were dropped.”
Shaw, a Lincare workforce member, [1] removed her patient’s PHI from the company office, [2] left it in places to which her husband, an unauthorized person, had access, and [3] then abandoned it altogether. Neither she nor anyone else at Lincare even knew that the information was missing until months later.”
protecting PHI that was removed from the offices.”
respondent should be found liable.
to any: (i) Affirmative defenses;(ii) challenge to the amount of a proposed penalty pursuant, including any factors raised as mitigating factors; or (iii) claim that a proposed penalty should be reduced or waived; and(iv) compliance with the Notification in the Case of Breach of Unsecured PHI provisions.
respect to all other issues, including issues of liability other than with respect to the Notification in the Case of Breach of Unsecured PHI provisions, and the existence of any factors considered aggravating factors in determining the amount of the proposed penalty.
cause shown.
even if not previously exchanged.
"All too often we see covered entities with a limited risk analysis that focuses on a specific system such as the electronic medical record or that fails to provide appropriate oversight and accountability for all parts of the enterprise . . . . An effective risk analysis is one that is comprehensive in scope and is conducted across the organization to sufficiently address the risks and vulnerabilities to patient data.”
identify covered entities and business associates of various types and determine which are appropriate to be included in potential auditee pools.
audit.
automatically enabled, OCR expects you to check your junk or spam email folder for emails from OCR.
designed to gather data about the size, type, and operations of potential auditees will be sent to covered entities and business
OCR is asking that entities identify their business associates.
about their selection for a desk audit.
covered entities that are the subject of an audit to submit requested information via OCR’s secure portal within 10 business days of the date
the secure online portal.
information submitted and provide the auditee with draft findings.
comments, if any, to the auditor.
business days after the auditee’s response. OCR will share a copy of the final report with the audited entity.
Onsite Audits
audit
information about the onsite audit process and expectations for the audit.
depending on the size of the entity.
cover a wider range of requirements from the HIPAA Rules.
and provide written comments to the auditor.
within 30 business days after the auditee’s response.
types of technical assistance should be developed and what types of corrective action would be most helpful.
develop tools and guidance to assist the industry in compliance self-evaluation and in preventing breaches.
may initiate a compliance review to further investigate.
individual audit which clearly identifies the audited entity.
be required to release audit notification letters and other information about these audits upon request by the public. In the event OCR receives such a request, we will abide by the FOIA regulations.
the Privacy Rule that compromises the security or privacy
be a breach unless you can demonstrate that there is a low probability that the PHI has been compromised based on a risk assessment of at least the following factors:
– The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification; – The unauthorized person who used the PHI or to whom the disclosure was made; – Whether the PHI was actually acquired or viewed; and – The extent to which the risk to the PHI has been mitigated.
1. The unintentional acquisition, access, or use of PHI by a workforce member or person acting under the authority
in good faith and within the scope of authority. 2. The inadvertent disclosure of PHI by a person authorized to access PHI at a CE or BA to another person authorized to access PHI at the CE or BA, or organized health care arrangement in which the CE participates. 3. The final exception applies if the CE or BA has a good faith belief that the unauthorized person to whom the impermissible disclosure was made, would not have been able to retain the information.
further used or disclosed in a manner not permitted by the Privacy Rule.
PHI is rendered unusable, unreadable, or indecipherable to unauthorized individuals if one or more of the following applies: Encryption: has been encrypted as specified in the HIPAA Security Rule by “the use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key” The following encryption processes have been tested by the National Institute of Standards and Technology (NIST) and judged to meet this standard (i) valid encryption processes for data at rest are consistent with NIST Special Publication 800-111, Guide to Storage Encryption Technologies for End User Devices, (ii) valid encryption processes for data in motion are those which comply, as appropriate, with NIST Special Publications 800-52, Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations; 800-77, Guide to IPsec VPNs; or 800-113, Guide to SSL VPNs, or others which are Federal Information Processing Standards (FIPS) 140-2 validated.
PHI is rendered unusable, unreadable, or indecipherable to unauthorized individuals if one or more of the following applies: Destruction of Media Storage: The media on which the PHI is stored
destroyed such that the PHI cannot be read or otherwise cannot be reconstructed. Redaction is specifically excluded as a means of data destruction.
consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI cannot be retrieved
breach of unsecured PHI. All notifications must be submitted to the Secretary using the HHS.gov’s Web portal.
based on whether the breach affects 500 or more
breach is uncertain at the time of submission, the covered entity should provide an estimate, and, if it discovers additional information, submit updates in the manner specified below. If only one option is available in a particular submission category, the covered entity should pick the best option, and may provide additional details in the free text portion of the submission.
Less than 500 individuals
has agreed to receive such notices electronically.
must provide substitute individual notice by either posting the notice on the home page of its web site for at least 90 days or by providing the notice in major print or broadcast media where the affected individuals likely reside.
individuals can learn if their information was involved in the breach. If the covered entity has insufficient or out-of-date contact information for fewer than 10 individuals, the covered entity may provide substitute notice by an alternative form of written notice, by telephone,
later than 60 days following the discovery of a breach and must include: – a brief description of the breach, – a description of the types of information that were involved in the breach, – the steps affected individuals should take to protect themselves from potential harm, – a brief description of what the covered entity is doing to investigate the breach, mitigate the harm, and prevent further breaches, as well as contact information for the covered entity
Breaches Affecting 500 or More Individuals If the breach affects more than 500 residents of a State or jurisdiction are must:
jurisdiction typically in the form of a press release serving the affected area. The media notification must be provided without unreasonable delay and in no case later than 60 days following the discovery of a breach and must include the same information required for the individual notice.
case later than 60 calendar days from the discovery of the breach.
clicking on the link at HHS.gov and completing all of the required fields of the breach notification form.
– that all required notifications have been provided or – that a use or disclosure of unsecured protected health information did not constitute a breach.
should maintain documentation that all required notifications were made, or, alternatively, documentation to demonstrate that notification was not required:
– its risk assessment demonstrating a low probability that the protected health information has been compromised by the impermissible use or disclosure; or – the application of any other exceptions to the definition of “breach.”
requirements with respect to breach notification. For example, covered entities must have in place written policies and procedures regarding breach notification, must train employees on these policies and procedures, and must develop and apply appropriate sanctions against workforce members who do not comply with these policies and procedures.
A “designated record set” is defined at 45 CFR 164.501 as a group of records maintained by or for a covered entity that comprises the:
– Medical records and billing records about individuals maintained by or for a covered health care provider; – Enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or – Other records that are used, in whole or in part, by or for the covered entity to make decisions about individuals.
collected, used, or disseminated by or for a covered entity.
not used to make decisions about individuals. Typically includes:
– quality assessment or improvement records, – patient safety activity records, – business planning, development, and management records that are used for business decisions more generally rather than to make decisions about individuals and – a hospital’s peer review files or practitioner or provider performance evaluations,
service or formulary development records.
the right of access:
– Psychotherapy notes, which are the personal notes of a mental health care provider documenting or analyzing the contents of a counseling session, that are maintained separate from the rest of the patient’s medical record. – Information compiled in reasonable anticipation of, or for use in, a civil, criminal,
e.g., tribal or military law) to act on behalf of the individual in making health care related decisions is the individual’s “personal representative.”
particular health care decisions, the personal representative is to be treated as the individual only with respect to PHI that is relevant to the representation. For example, if the authority is limited to only a specific treatment, such as use of artificial life support, then the personal representative is limited to only PHI that relates to that health care decision.
– When the state law does not require the consent of a parent before a minor can obtain a particular health care service, and the minor consents to the health care service (age of consent laws); – When someone other than the parent is authorized by law to consent to the provision of a particular health service to a minor and provides such consent – When a parent agrees to a confidential relationship between the minor and a health care provider
Requests for Paper Copies: Where an individual requests a paper copy of PHI, OCR expects that the covered entity will be able to provide the individual with the paper copy requested. Requests for Electronic Copies:
– If an individual requests an electronic copy of PHI but the covered entity only maintains paper records, the covered entity is required to provide the individual with an electronic copy if it is readily producible electronically (e.g., the covered entity can readily scan the paper record into an electronic format) and in the electronic format requested if readily producible in that format, or if not, in a readable alternative electronic format or hard copy format as agreed to by the covered entity and the individual. – If an individual requests an electronic copy of PHI and the covered entity maintains it electronically, the covered entity must provide the individual with access to the information in the requested electronic form and format, if it is readily producible in the form and format requested. – When the PHI is not readily producible in the electronic form and format requested, then the covered entity must provide access to an agreed upon alternative readable electronic format. – Thus, while a covered entity is not required to purchase new software or equipment in
the capability to provide some form of electronic copy of PHI maintained electronically. It is only if the individual declines to accept any of the electronic formats readily producible by the covered entity that the covered entity may satisfy the request for access by providing the individual with a readable hard copy of the PHI.
The Privacy Rule permits a covered entity to impose a reasonable, cost- based fee if the individual requests a copy of the PHI. The fee may include
drive) if the individual requests that the electronic copy be provided on portable media;
explanation, be mailed; and
individual.
documentation; searching for and retrieving the PHI; maintaining systems; recouping capital for data access, storage, or infrastructure; or
law.
Labor (cont’d): labor for copying does not include labor costs associated with:
– Reviewing the request for access. – Searching for, retrieving, and otherwise preparing the responsive information for copying. This includes labor to locate the appropriate designated record sets about the individual, to review the records to identify the PHI that is responsive to the request and to ensure the information relates to the correct individual, and to segregate, collect, compile, and otherwise prepare the responsive information for copying. – Comment from the OCR – “While we allow labor costs for these limited activities, we note that as technology evolves and processes for converting and transferring files and formats become more automated, we expect labor costs to disappear or at least diminish in many cases.”
HIPAA Authorization Right of Access Permits, but does not require, a covered entity to disclose PHI Requires a covered entity to disclose PHI, except where an exception applies Requires a number of elements and statements, which include a description of who is authorized to make the disclosure and receive the PHI, a specific and meaningful description of the PHI, a description of the purpose of the disclosure, an expiration date or event, signature of the individual authorizing the use or disclosure of her own PHI and the date, information concerning the individual’s right to revoke the authorization, and information about the ability
enrollment or eligibility for benefits on the authorization. Must be in writing, signed by the individual, and clearly identify the designated person and where to the send the PHI No timeliness requirement for disclosing the PHI Reasonable safeguards apply (e.g., PHI must be sent securely) Covered entity must act on request no later than 30 days after the request is received Reasonable safeguards apply (e.g., PHI must be sent securely) Reasonable safeguards apply, including a requirement to send securely; however, individual can request transmission by unsecure medium No limitations on fees that may be charged to the person requesting the PHI; however, if the disclosure constitutes a sale of PHI, the authorization must disclose the fact of remuneration Fees limited as provided in 45 CFR 164.524(c)(4)