1 HIPAA For Midwifery 101: Part 1 - The Basics by Brynne Potter, CPM The Basics: The biggest concerns we hear from midwives about their charts center around HIPAA. They wonder whether they need to comply, or more importantly how to do so in a way that retains the personal and flexible style of practice that is inherent to midwifery. As it s a 1,000 page law with numerous subsections and amendments, there is no such thing as a 10 Easy Steps to HIPAA Compliance article, but there is some basic information to help us all get a better understanding of what it is, why it matters, and how you can implement simple steps into your workflow to be more conscientious about HIPAA. HIPAA IN DEPTH For a comprehensive and technical definition of HIPAA, visit the government s Web site. You ll find everything you could possibly want to know and more. Just about any question you can think of can be answered in the FAQ section alone. The goal of this series of articles (yes, it s going to take more than one to cover HIPAA in the Midwives Workflow) is to give you the basics in a context that you can really relate to: what you do every day. What is HIPAA? HIPAA is an acronym for a federal law that pertains to the protection of personal health information. It stands for the Health Insurance Portability and Accountability Act. HIPAA is divided into two primary Rules or sections: Privacy and Security. Does every midwife have to comply? You might have noticed that the I in HIPAA stands for Insurance, not Information as most people assume. This is because HIPAA came about in response to the insurance industry moving toward modernization through electronic billing systems and the concern over intentional or accidental release of insurance related information. HIPAA calls providers who must comply covered entities and the definition of a covered entity relates almost entirely to providers and associates who deal with insurance billing. This effectively means that if you never bill insurance, don t have a lab account or an account with any other entity that bills insurance, then you can stop reading after you consider this: HIPAA has rapidly altered the standard of professional health care in this United States. Despite the loophole of insurance billing, all providers are assumed to be practicing in accordance with HIPAA. Though compliance may not be your favorite word, consider the word professional and know that these standards are only going to become more ingrained in our electronic culture.
2 The Rules: Privacy Privacy is the easy one to understand and, in many cases, is what you already do for ethical and professional reasons. You don t talk about your clients to others in the community and you remove all protected health information (PHI) when you have a case in peer review. What is PHI? PHI is defined by HIPAA as individually identifiable health information. If there is anything in the information that you store or send that can identify who that client is, it is PHI. The HIPAA Privacy Rule addresses issue of privacy in terms of both formal and informal situations. I could list various scenarios (and would be happy to try to answer your specific questions), but the simple thing to keep in mind is the first step you should take with your clients regarding privacy: Authorization Think of authorization as the Informed Disclosure of HIPAA. As you review your workflow and identify places where there is either a need (eg. insurance billing) or a routine (eg. group prenatal care, or a facebook page) that will expose personal health information, you need to put it in writing to your client and get their permission or authorization. Some examples of situations for which you should get prior authorization: Release of records to another provider (except for treatment purposes*) Release of records to an insurance company or billing service Birth announcements in print or Internet Birth data for research, education, or certification (that contains PHI) There are plenty more examples, but the point is that you need to be sure that you don t release any PHI without authorization in writing from your client. *There are exceptions for the authorization requirement. The primary exception that relates to midwives is when the release of records is for treatment purposes. The Privacy Rule allows health care providers to use or disclose protected health information for treatment purposes without the clients s authorization. This includes sharing the information to consult with other providers to treat or to refer the client. This means that you don t need to get a HIPAA release when you are transferring care in labor, or anytime, to share the chart with the receiving provider. If the client is no longer under your care and there is a records request, you do need a HIPAA release. It s under Privacy, but let s talk about Security Just so you don t embarrass yourself at any hip HIPAA parties, don t make the gaffe that I did of confusing the steps you need to take to protect your client s stored records as being part of the Security Rule. It s part of the Privacy Rule, silly! I ll mention the Security Rule later, but just so we re straight you need to take steps to ensure that all of your active and stored records are secure. This is the perfect moment for a lawyer joke, but I ll refrain for the sake of brevity (even the jokes go on and on ). Here s the simple truth: You need to have a policy that outlines your procedures for security. If you fail to follow your procedures or your procedures result in an unintentional failure to comply with your policies, then you need to tell on yourself via a disclosure. Got it? I ll try again, here s a basic summary of the security safeguards section of the Privacy Rule: Know where all of your charts are, keeping them locked up when you re not using them. If you have a practice that includes more than one person (yourself), write out some guidelines for how to keep
3 information secure and make sure everyone follows them. Things like We will not leave pieces of paper with client s PHI lying around the office and Don t leave your charts in your car are good places to start. We ll talk more in a future post about security in your home or office and how to dispose of PHI. The Rules: Security The HIPAA Security Rule specifically relates to electronic transmission of PHI (ephi) for the purposes of transactions (ie. billing). If you contract with a billing service, then you are responsible for those electronic transactions that the billing service conducts on your behalf. There is not much else to say about this except to make sure your billing service is HIPAA compliant. So, that s the basic overview of HIPAA. If you know more now than you did before, that s great. Get ready to know more, because this was just the start of things to consider regarding HIPAA in your workflow HIPAA For Midwifery 101: Part 2 - Disclosures, Communication and Storage by Brynne Potter, CPM Imagine if in 1925 when Mary Breckinridge founded the Frontier Nurse Service, and pioneered nursemidwifery and rural healthcare in the US, she had to maintain HIPAA-compliance. Traveling on her horse caring for the women of Appalachia, obtaining written authorizations and informed disclosures would have been as foreign as the professionalized midwifery model she introduced. All reform brings challenges and contradictions. As any practicing midwife in the U.S. knows, we stand on the shoulders of those who came before us. As we work to move midwifery forward, we have to balance the need to modernize our profession without compromising the essential components of our model of care. One of the hallmarks of midwifery is the personal relationship we have with our clients. We are at times more than healthcare providers, we are mentors, connectors, and friends. Parity between the relationships and connections that come with being a community midwife and the rules and regulations that come along with professionalism doesn t have to hinder the inherent connections that we share with our clients and their families. The HIPAA Privacy and Security Rules are reforms that we as providers may find frustrating to integrate into our professional practices that are already constantly threatened by regulations that are not well suited to our model of care. If we try to keep in mind the good intentions (protection of the public) that are behind HIPAA, it makes it a little easier to take the effort to make these steps routine. Communication under HIPAA As I said in the first part of this 3 part series, HIPAA applies only to those providers and their business associates (or covered entities ) who engage in electronic transmission of protected health information (PHI). However, the actual law itself addresses rules for how ALL records are managed, including paper, fax, and oral transmission. HIPAA was not intended to hinder your ability to communicate with or about your clients. In fact, the intent is to encourage those necessary communications with clarity of purpose and awareness of boundaries. Think of HIPAA as a container for your communications and maybe it can help serve to organize your workflow.
4 Authorizations the fine print Anyone who has visited a health care provider in the last 5 years has probably signed a HIPAA authorization. There is not a single-use HIPAA authorization form that everyone has to use. That is because the idea is for you to actually write your own that tells your clients what you do with their PHI in your practice. There are some specific areas that need to be addressed in your general authorization at the onset of care, which HIPAA calls your Notice of Privacy Practices. This form can look like a bulleted list and here is what it should include: Situations that require no permission that are routine in your practice: Consultations or transfer of care Sharing a chart with a back up midwife Situations related to public benefit: reporting victims of abuse, neglect, domestic violence, legal procedings, national security, and law enforcement Situations where verbal or written consent is required: Disclose information to family or friends involved in client s care Public displays- bulletin boards, Web sites, Facebook Patient Rights (HIPAA requires that you inform your clients of their rights under the law) You clients have the right to: Request access and corrections to their record Request an accounting on how their information was used and who it was released to in the course of their care Request that all communications be confidential Complain about a perceived violation of privacy- to you, your practice s manager (if you have one), your licensing or certifying agency, or the government Now that you ve disclosed or gotten permission to communicate, there are some guidelines under HIPAA about how you communicate PHI in any situation. It s not about the messenger, it s about the message In our world of instant communication and rapidly changing technology, it is very difficult to create a standard for communication that is universal. The HIPAA rules are not intended to limit your use of speedy and convenient communication, the government primarily just wants you to think about what your are doing before you do it. This is highlighted by a phrase used in the law to describe the guidelines for disclosures: Covered entities also must implement reasonable minimum necessary policies and procedures that limit how much protected health information is used, disclosed, and requested for certain purposes. 45 CFR (a) (1)(iii) In legal terms, reasonable measure and minimum necessary are something that the law didn t really want to define because it was recognized that what would be reasonable for one provider wouldn t be reasonable for another. Once the law is in place for awhile things like case law and community standards start to define these subjective terms. As individualized as midwifery practices are, community standard is hard to define for everyone. The basic idea is to apply these concepts to everything that you do with PHI, including sending information or allowing access to information in your office or work place.
5 Sending information: The first reasonable measure to consider when sending info is make sure you are sending the message to the right person. Confirm the address, phone or fax number For written information (mail, , fax), include a cover letter or signature with a instructions for the recipient to contact you and destroy the contents if they are not the intended recipient The second reasonable measure is to send the minimum information necessary to achieve the goal of the communication. A great example would be that when you need to leave a voice mail for your client about their recent lab report, you can just ask them to call you back rather than leaving the details about the report on a machine that others might overhear. Storage and Access to information in your office In large practices, there is usually a privacy/security officer who is in charge of drafting policies and training everyone else. If it s just you and some students, you are your own privacy officer! Most of the reasonable safeguards HIPAA requires that you take in your workplace have to do with basic professional conduct and common sense -for instance: Speak quietly when discussing a client in public areas of your office so that you aren t overheard by family members or people in the waiting room Don t have incidental conversations among your colleagues that are not necessary for treatment keep it on a need-to-know basis Isolate or lock file cabinets or records rooms The basic idea is to take a look around your practice and notice the places where you are already taking care to ensure confidentiality and get a little more formal about it. The process will likely show you areas or habits that you hadn t thought about before that could probably improve your practice while also increasing your HIPAA-compliance. HIPAA For Midwifery 101: Part 3 - The Security Rule- Keeping Electronic Info Safe by Brynne Potter, CPM This last article in our 3 part series on HIPAA Privacy and Security is going to focus on the Security Rule and how it relates to a typical midwife workflow. As we said in our article on The Basics of the HIPAA Rules, most of the safeguards midwives need to take are based on common sense and professional practice standards. Most HIPAA blunders occur when we start using electronic tools like for health care and communication, which most of our typical young and tech-savvy clients seem to embrace. HIPAA Security Rule defined: The rule establishes national standards to protect individuals electronic personal health information (ephi) that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. Health Information Privacy, US Dept. Health and Human Services
6 Paper Charting? You still might have ephi to keep secure Even if you are charting on paper, if you keep any amount of PHI (protected health information, or any information that could identify a client) in an electronic format, like files or on your computer or contacts in your phone, the HIPAA requirements for protection of that information fall under the Security Rule. The Rule outlines specific safeguards that everyone needs to take in their practice, whether large or small, to ensure the security of your client s PHI. Number 1 HIPAA Security Breach: Theft of Your Laptop I recently attended a workshop on HIPAA privacy and security issues, held at the HIMSS11 conference, by Adam Greene, JD, MPH, senior health IT and privacy specialist with the Office for Civil Rights at the Department of Health and Human Services. As a representative of the government entity charged with processing complaints regarding HIPAA breach incidents and enforcement, Greene presented some interesting data about common HIPAA mistakes. Over 65% of HIPAA Security breaches are due to theft or loss of a laptop or other computer. The best way to avoid having your laptop stolen is to NEVER leave it in your car. For homebirth midwives who often need to drive around with their birth bags at the ready, keep your laptop and your charts (whether paper or electronic) with you or in your office under lock and key. Since the penalties for not ensuring this simple safeguard range from $100 minimun -$50,000 maximun per incident, it certainly pays to be cautious with PHI. Securing Devices in your Home or Office Now that you are making sure that you are keeping your valuable electronic devices secure from theft or loss, you should also consider the HIPAA guidelines created by the Center for Medicaid Services on Security for the Small Provider. The following is a quick summary of the areas that are most relevant to a midwife workflow. Some of the guidelines are required [R] and some are addressable [A], which means that you aren t required to implement the standard unless you have the reasonable and appropriate means to do it. Reasonable and appropriate are terms that are intended to allow you to take into consideration things like the size of your practice, capabilities of your existing systems, and the cost of implementing new ones. Secret Passwords [R] The best way to restrict access to PHI on your computer or portable device is through a unique password or other authentication process to access your , files, and contacts. This is done on a computer or laptop by setting up a user account. On a cellphone there is generally only one account and you just need to set up a password that is required in order to do anything but answer incoming calls. These unique passwords also add a layer of security if these devices are lost or stolen because the entire device would need to be wiped clean in order for someone to use it again if they don t know your password. Automatic Shutoff [A] This is a feature that you probably already have on your computer. It is what makes your computer go to sleep or turn itself off after a specified amount of time and then requires a password in order to wake it back up. Many of us turn this feature off on our personal computers because it is cumbersome. However, if you have any PHI stored on your computer, you need to turn it back on. Adam Greene defined addressable this way if you have the feature available in your system, but choose not to use it, then it would be a violation of the guidelines under HIPAA. Back up of Data [A] We ve all experienced the dreaded hard drive meltdown. Losing your own information to a system failure is bad enough, but what if you had client records stored on a computer that cannot be recovered? While it is a very good practice to keep your electronic files stored on a back up hard drive, those hard
8 You can t just toss PHI into the landfill or recycle it. You first need to shred or otherwise alter it to a point where no information is retrievable. The simplest way to incorporate this into your workflow is to buy a quality shredder and shred-as-you-go. Don t let the paper pile up. Not only is it then vulnerable to loss or theft, but you are just causing a quick task to build up to a burdensome one. That shredded paper can now be recycled or used in your garden as extra mulch! Making Security Part of Your Workflow We ve talked a lot in this series about the importance of analyzing your workflow. As I outlined last month in All midwives have a workflow, what s yours?, workflow is how you do things in your practice. Ideally, your workflow makes sense and can be articulated to others. If you have a workflow written out or as you take the time to write it out now that you know about it, you can use the opportunity to really look at how you do things in your practice and decide if things might need some tweaking. During the process you can meet two more HIPAA Security Rule requirements. A Risk Analysis [R] Doing a risk analysis is required by all covered entities. Though the frequency is not specified, if you ve never done one at all then the frequency is as soon as possible. The process involves reviewing your workflow and then adding some special thought to the places where you might be at risk of exposing PHI. A Risk Management Plan is something like your practice guidelines or protocols for routine midwifery care. Risk Management Plan [R] After conducting the risk analysis, you then need to draft a plan that includes the steps you are taking to maximize security in your practice. This is something like your practice guidelines or protocols for routine midwifery care. The plan should include how your practice addresses everything that we have talked about here as well as a Facility Security Plan [A], which includes who has keys to the office files and other access to PHI, and a Sanction Policy [R] which refers to how you will handle violations of the plan by any of your staff. We never said this was easy, but hopefully this series has made it a little bit clearer how to maintain HIPAA compliance in your practice. While you don t need new software to be HIPAA compliant, considering options for workflow support that is also helping you to achieve HIPAA compliance is what Private Practice hopes to achieve. ABOUT THE AUTHOR Brynne Potter is a Certified Professional Midwife (CPM) who has worked in the field of midwifery since She is a member of the North American Registry of Midwives (NARM) Board of Directors and a founding partner of Mountain View Midwives, a midwifery practice in Charlottesville, VA. Brynne is also one of the founders of Private Practice, makers of practice management software for midwives. Disclosure: These articles are an attempt to provide information about HIPAA to midwives and related parties who are struggling to understand and integrate HIPAA-compliance. They are meant to support, not supplant, any previous understanding that you may have about HIPAA and should not be considered the first or the last word on HIPAA-compliance.
HIPAA Security Risk Analysis Toolkit In January of 2013, the Department of Health and Human Services Office for Civil Rights (OCR) released a final rule implementing a wide range of HIPAA privacy and security
On the Record A Practical Guide to Information Privacy 3 rd Edition On the Record 3rd edition Published by the Office of the Privacy Commissioner 2011 1st Edition 1999 2nd Edition 2000 PO Box 10094 Level
Data Breach Response Guide By Experian Data Breach Resolution 2013-2014 Edition Trust the Power of Experience. 2013 ConsumerInfo.com, Inc. Table of Contents Introduction 3... Data Breach Preparedness 4...
VA Privacy and Information Security Awareness and Rules of Behavior FY14 Text-Only Course Transcript Table of Contents Table of Contents... 0 Purpose of this Document... 3 Using this Document... 3 Module
V 1.0 November, 2010 CYBERSECURITY The protection of data and systems in networks that connect to the Internet 10 Best Practices For The Small Healthcare Environment Your Regional Extension Center Contact
A Cooperative Agreement Program of the Federal Maternal and Child Health Bureau and the American Academy of Pediatrics Acknowledgments The American Academy of Pediatrics (AAP) would like to thank the Maternal
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
9 Common Mistakes That Can Destroy Your Workers Compensation Claim And How to Avoid Making Them By Frank M. Eidson Copyright 2013 by PILMMA Publishing All rights reserved. No part of this book may be used
ABOUT THE AUTHOR Florida Attorney Frank M. Eidson has practiced law since 1998 in Central Florida. Since that time he has represented thousands of injured clients who have been injured in motorcycle accidents,
Succession Planning: Managing The Transition From Start To Finish Mark Bassingthwaighte, Esq. Mark Bassingthwaighte, Esq. is a Risk Manager for ALPS. He is available to answer risk management questions
responsibility CODE OF CONDUCT Our reputation and integrity depend upon each of us assuming a personal responsibility for our business conduct. 02 Letter from Our CEO Dear ConocoPhillips Employees, Our
Electronic Records Handbook Table of contents Key points to consider 3 Introduction 5 Selecting an appropriate system 7 Regulation of electronic records (erecords) 10 Patient consent and rights to access
Climate Surveys: Useful Tools to Help Colleges and Universities in Their Efforts to Reduce and Prevent Sexual Assault Why are we releasing information about climate surveys? Sexual assault is a significant
Welcome to the HIPAA, Privacy & Security Training Module THIS TRAINING MODULE IS APPROVED FOR NON-COMMERCIAL USE ONLY. Copyright protected by the University of North Carolina at Chapel Hill, 2013-15 During
Data protection Subject access code of practice Dealing with requests from individuals for personal information Contents 3 Contents 1. About this code of practice 4 Purpose of the code 4 Who should use
Substance Abuse Services for Youth in Florida: A Guide for Families March 2009 Florida Certification Board/Southern Coast ATTC Monograph Series #4 Substance Abuse Services for Youth in Florida: A Guide
Summary of Responses to an Industry RFI Regarding a Role for CMS with Personal Health Records Table of Contents EXECUTIVE SUMMARY... 4 1. INTRODUCTON... 7 2. CMS ROLE WITH PHRs... 9 What PHR functionalities
The Department of Health and Human Services Information Systems Security Awareness Training Fiscal Year 2015 Information Systems Security Awareness Introduction Information Security Overview Information
Challenges in Managing Records in the 21 st Century Prepared by the NECCC Analysis of State Records Laws Work Group NATIONAL ELECTRONIC COMMERCE COORDINATING COUNCIL Copyright 2004 by The National Electronic