HIPAA and Beyond: The Evolving Landscape of Health Privacy
|
|
|
- Olivia Quinn
- 10 years ago
- Views:
Transcription
1 HIPAA and Beyond: The Evolving Landscape of Health Privacy Melissa Bianchi, Hogan Lovells US LLP Ann Tobin, UnitedHealth Group IAPP Global Privacy Summit, March 9, 2012
2 No Longer Just HIPAA New developments that are changing the regulatory landscape for healthcare companies regulated by HIPAA Changes to and expansion of HIPAA Activities by other agencies that could broaden regulation of healthcare companies 2 New technologies (e.g., mobile health, website use) that raise novel regulatory issues for healthcare companies
3 Expansion of HIPAA Expecting Final HIPAA rules first quarter of 2012? Beyond the Office for Civil Rights HHS is expanding privacy and security requirements for HIPAA covered information. Office of Human Subjects Research Protections An Advanced Notice of Proposed Rulemaking (ANPRM) issued in 2011 regarding human subjects research and secondary uses Office of the National Coordinator Meaningful Use Health Information Exchange Reconsideration of de-identification standards within HIPAA and beyond State Attorneys General 3
4 Rules on Human Subjects Research ANPRM published in July 2011 Contained proposed requirements for human subject research that, if adopted, would: Require research entities to apply HIPAA-like privacy and data security standards to all studies involving identifiable or potentially identifiable data 4 Restrict the ability to use information for future research purposes; change rules for biospecimens
5 EHRs Meaningful Use Proposed rules for Stage 2 of the Meaningful Use program will be released early this year Office of the National Coordinator for Health IT (ONC) is already working on Stage 3 Future stages of meaningful use may impose privacy and security requirements on EHRs Already additional security requirements for certified EHRs More changes possible as these programs move from merely storing health information toward HIEs 5
6 Health Information Exchange States have received funding and are creating their own HIEs Focus of ONC in 2012 ONC is preparing ANPRM on governance of the Nationwide Health Information Network (NWHIN) May include privacy and security guidance for health information exchange, including: Security requirements Rules on consent 6
7 New Concepts of De-identification HHS work on de-identification HHS de-identification guidance ANPRM on human subjects research 7 Consistent with changing approach to deidentification outside of HHS Expansive EU concept of personal data Preliminary FTC report foreshadows broader definition in US
8 Other Federal Activities Beyond HHS, other federal agency and legislative activities affect entities subject to HIPAA FTC activities Privacy legislation 8
9 FTC Enforcement in Healthcare Industry The final FTC report is expected to outline what the FTC expects companies to do as best practices when it comes to privacy. HIPAA covered entities will have HIPAA notice of privacy practices and website privacy policy FTC Enforcement: In 2009/2010 FTC brought two high-profile enforcement actions against CVS and RiteAid Violation of Section 5 of FTC Act for improper storage/disposal of PHI Settlements require establishment of comprehensive security programs Settlements require third-party security assessment every other year 9
10 Federal Legislation Congress considered dozens of bills in 2011, including: 10 Comprehensive privacy legislation Federal data breach Effect on entities already subject to HIPAA: Safe harbor for HIPAA covered entities? Business associates? Information covered by HIPAA?
11 Mobile Privacy 11 New landscape for HIPAA covered entities (disease management) Areas beyond HIPAA covered entities: employee data, pharmaceutical companies, federal government guidance re: texting, etc.
12 Mobile Privacy, cont. WSJ 12/10 article on mobile app privacy, reporting that of 101 popular smartphone apps, 45 didn t even have a privacy policy and others transmitted information without consumer consent 12 Almost immediately thereafter, multiple class action lawsuits were filed against Apple, Google, and mobile app developers and advertisers These lawsuits have foundered due to a failure of plaintiffs to prove financial harm Still, have been costly and highlights the focus on mobile privacy 2011 saw FTC bring first enforcement actions against mobile app developers FTC to hold mobile payments workshop in April, focusing on risks to privacy and security of mobile data
13 Mobile Privacy for Healthcare Companies BOTTOM LINE: From a privacy and security perspective, mobile devices should be treated the same as computers, and mobile apps should be treated the same as websites 13 Additional considerations: sensitivity of location data, unique device identifier, other information stored locally on smartphones (e.g., address book, contacts)
14 Website Data Practices Moving data to the cloud trusting vendors with your privacy and security compliance Continued focus on web tracking and third-party marketing Enforcement efforts look at language in privacy policies 14
15 Electronic Signatures Federal standard (ESIGN) In 2000 Congress enacted the Electronic Signatures in Global and National Commerce Act ( ESIGN ) Aimed at facilitating the use of electronic records and electronic signatures in interstate and foreign commerce 15
16 State Electronic Transactions Laws ESIGN expressly allows states to modify, limit, or supersede the federal statute if states adopt the Uniform Electronic Transactions Act (UETA) or adopt an electronic transactions law that is consistent with ESIGN The UETA provides that [a] record or signature may not be denied legal effect or enforceability solely because it is in electronic form - UETA 7(a) 47 states, the District of Columbia, Puerto Rico, and the Virgin Islands have adopted the UETA Illinois, New York, and Washington have not adopted the UETA, but do have laws pertaining to electronic transactions 16
17 General Requirements for Electronic Signatures Assent and Consent Both parties must agree to the use of electronic signatures Authentication There must be a mechanism to authenticate the parties to an electronic transaction 17 Record Retention Consumers must be provided a reasonable means to retain the relevant electronic agreement or notice
18 In Conclusion Watch for changes to and expansion of HIPAA by HHS, including OCR, OHRP, ONC Watch for continuing activity of other agencies affecting healthcare companies e.g., FTC Landscape will continue to change and develop with mobile health and other new technologies
19 Reference Materials ANPRM for Revisions to Common Rule FTC--CVS/Caremark Matter HHS CVS/Caremark Matter FTC Rite Aid Matter HHS Rite Aid Matter Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers (December 1, 2010) HHS mhealth Initiatives MN Attorney General Complaint against Accretive Health HHS Office of National Coordinator HIT
20 Questions & Contact Information Melissa Bianchi Partner Hogan Lovells US LLP Ann Tobin Senior Privacy Counsel UnitedHealth Group
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery
Digital Signatures The Law and Best Practices for Compliance. January 2014
Digital Signatures The Law and Best Practices for Compliance January 2014 Electronic/Digital Signature Legislation Disclaimer: ARX is not is not a law firm and does not provide legal advice. We make no
HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers
Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List
whitepaper THE ESIGN ACT Harnessing New Hiring Efficiencies with Electronic Signatures
Harnessing New Hiring Efficiencies with Electronic Signatures PURPOSE This white paper will explain how the passage of The Electronic Signatures in Global and National Commerce (ESIGN) Act, along with
By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN
Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the
Analysing the US HIPAA legacy and future changes on the horizon
Volume: 10 Issue: 2 Analysing the US HIPAA legacy and future changes on the horizon The US Department of Health and Human Services issued the long-awaited final omnibus rule under the Health Insurance
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP [email protected]
HIPAA Violations Incur Multi-Million Dollar Penalties
HIPAA Violations Incur Multi-Million Dollar Penalties Whitepaper HIPAA Violations Incur Multi-Million Dollar Penalties Have you noticed how many expensive Health Insurance Portability and Accountability
HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act
International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky
Use of Check Images By Customers of Financial Institutions. Version Dated: July 14, 2006
Use of Check Images By Customers of Financial Institutions Version Dated: July 14, 2006 This document provides an overview of the treatment of check images under the Check 21 Act and laws and regulations
Issues to Address: The Privacy Concerns of Individuals
July 21, 2009 The Honorable Michael J. Astrue Commissioner Social Security Administration 6401 Security Boulevard Baltimore, MD 21235-7703 Dear Mike: As you requested, the ABA explored the issues related
How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. 15 USC 7001 et. seq. (E-SIGN) and
W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE 15 USC 7001 et. seq. (E-SIGN) and Uniform Electronic Transactions Act (UETA) ALPHATRUST PRONTO ENTERPRISE
Business Associate Liability Under HIPAA/HITECH
Business Associate Liability Under HIPAA/HITECH Joseph R. McClure, JD, CHP Siemens Healthcare WEDI Security & Privacy SNIP Co-Chair Reece Hirsch, CIPP, Partner Morgan Lewis & Bockius LLP ` Fifth National
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States Introduction When it comes to Personally Identifiable Information (PII), privacy laws and regulations
Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use
Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI
REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,
How To Help Your Business With Data Security And Privacy
DATA SECURITY AND PRIVACY WORKING TOGETHER, OUR TEAM PROVIDES INSIGHTFUL COUNSEL AND A DEPTH OF SPECIALIZED EXPERIENCE. Overview: S ince well before companies entered the age of Big Data, Benesch attorneys
HIPAA Employee Compliance Program TRAINING MANUAL
HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our
Health Care Data Breach Discovery Strategies for Immediate Response
Health Care Data Breach Discovery Strategies for Immediate Response March 27, 2014 Pillsbury Winthrop Shaw Pittman LLP Faculty Gerry Hinkley Partner Pillsbury Winthrop Shaw Pittman LLP Sarah Flanagan Partner
ILHIE Authority Data Security and Privacy Committee. Briefing Summary: Policies # 1, 3 (Panel #1) -- Patient Choice, Opt-in/Opt-out
1. Patient Choice. Should patients be granted a choice with regard to the use of a health information exchange (HIE) by clinical treatment professionals and others for the exchange of a patient s health
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate
Data Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP
Security & Privacy Strategies for Expanded Communities Deven McGraw Partner Manatt, Phelps & Phillips LLP 1 Key Challenges in Community Data Sharing Patient-mediated data sharing Sharing data with companies
HIPAA and the HITECH Act Privacy and Security of Health Information in 2009
HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:
Adopting Electronic Medical Records: What Do the New Federal Incentives Mean to Your Individual Physician Practice?
Adopting Electronic Medical Records: What Do the New Federal Incentives Mean to Your Individual Physician Practice? U John M. Neclerio, Esq.,* Kathleen Cheney, Esq., C. Mitchell Goldman, Esq., and Lisa
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
White Paper. The E-Sign Act. Use and enforceability of identifiers, passwords and personal identification numbers as signatures
White Paper The E-Sign Act Use and enforceability of identifiers, passwords and personal identification numbers as signatures 1 Table of Contents Introduction 2 The Audit Confirmation Process 2 The Confirm
Health Information Exchange (HIE) in Minnesota
Health Information Exchange (HIE) in Minnesota Where have we been and where are we going Jennifer Fritz, MPH Anne Schloegel, MPH Minnesota Department of Health 1 Session Goals Learn about Minnesota s approach
Special Report The HITECH Act
Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known
Bill Moran and Betta Sherman
Compliance TODAY July 2013 a publication of the health care compliance association www.hcca-info.org How an eye doctor s son sees compliance an interview with Stephen Kiess Assistant General Counsel for
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
Effective Electronic Delivery and Execution of Documents Required under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA")
Nelson Mullins Nelson Mullins Riley & Scarborough LLP Attorneys and Counselors at Law Atlantic Station / 201 17th Street, NW / Suite 1700 / Atlanta, GA 30363 Tel: 404.322.6000 Fax: 404.322.6050 www.nelsonmullins.com
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").
Data Breach, Electronic Health Records and Healthcare Reform
Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA
UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS. ) IATRIC SYSTEMS, INC., ) ) ) Civil Action No. 1:14-cv-13121 ) v. ) ) FAIRWARNING, INC.
UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS IATRIC SYSTEMS, INC., Plaintiff, Civil Action No. 1:14-cv-13121 v. FAIRWARNING, INC., JURY TRIAL DEMANDED Defendant. COMPLAINT Iatric Systems, Inc.
ELECTRONIC HEALTH RECORDS
ELECTRONIC HEALTH RECORDS Understanding and Using Computerized Medical Records CHAPTER TEN LESSON ONE Privacy and Security of Health Records Understanding HIPAA HIPAA: acronym for Health Insurance Portability
Ifrah Law Internet Advertising Practice
IfrahLaw Hands-on Counsel, Gloves-off Litigation Ifrah Law Internet Advertising Practice About Ifrah Law Ifrah Law, headquartered a block from the White House in Washington, D.C., is a leading provider
What s New with HIPAA? Policy and Enforcement Update
What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final
CHAPTER 6. UNIFORM ELECTRONIC TRANSACTIONS ACT
Disclaimer This statutory database is current through the 2005 Regular Session of the South Carolina General Assembly. Changes to the statutes enacted by the 2006 General Assembly, which will convene in
HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply
HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply October 18, 2013 ACEDS Membership Benefits Training, Resources and Networking for the ediscovery Community Exclusive News and
E-SIGNATURES FY 2014. Movement Mortgage, LLC s e-signature Policy & Procedures Manual. This policy was last revised December 4, 2014.
E-SIGNATURES FY 2014 Movement Mortgage, LLC s e-signature Policy & Procedures Manual This policy was last revised December 4, 2014. Table of Contents Section 100 Introduction & Applicable Laws...3 Section
HIPAA. HIPAA and Group Health Plans
HIPAA HIPAA and Group Health Plans CareFirst BlueCross BlueShield is the business name of CareFirst of Maryland, Inc. and is an independent licensee of the Blue Cross and Blue Shield Association. Registered
HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality
HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.
HOUSE OF REPRESENTATIVES STAFF ANALYSIS SUMMARY ANALYSIS
BILL #: HB 291 Warranty Associations SPONSOR(S): Santiago TIED BILLS: None IDEN./SIM. BILLS: SB 496 HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR or BUDGET/POLICY CHIEF
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
Mastering Data Privacy, Social Media, & Cyber Law
Mastering Data Privacy, Social Media, & Cyber Law October 22, 2014 Data Breach Notification and Cybersecurity Developments in 2014 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy
BENCHMARK MEDICAL LLC, BUSINESS ASSOCIATE AGREEMENT
BENCHMARK MEDICAL LLC, BUSINESS ASSOCIATE AGREEMENT This BUSINESS ASSOCIATE AGREEMENT ( Agreement ) dated as of the signature below, (the Effective Date ), is entered into by and between the signing organization
The Internet of Things. Suzanne Bell (Wilson Sonsini Goodrich & Rosati) Tracy Shapiro (Wilson Sonsini Goodrich & Rosati) Vineet Shahani (Nest Labs)
The Internet of Things Suzanne Bell (Wilson Sonsini Goodrich & Rosati) Tracy Shapiro (Wilson Sonsini Goodrich & Rosati) Vineet Shahani (Nest Labs) 1 Defining the Internet of Things There have been prior
ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT
ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT LAWRENCE WALKER, ESQUIRE COZEN AND O CONNOR 1900 Market Street Philadelphia, PA 19103 (215) 665-2000 [email protected] Atlanta, GA Charlotte, NC
HIPAA Compliance: Efficient Tools to Follow the Rules
Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability
Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. [email protected]
Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker [email protected] November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute
Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)
Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Ricky Link, Coalfire ISACA North Texas and IIA Fort Worth Chapters The Petroleum Club of Fort Worth March 4, 2014 1 About Coalfire Coalfire
Isaac Willett April 5, 2011
Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act
APPENDIX 1: Frequently Asked Questions
APPENDIX 1: Frequently Asked Questions Practice Name Q: What is the HIPAA Privacy Rule? A: The HIPAA Privacy Rule controls the use and disclosure of what is known as Protected Health Information (PHI).
IAPP PRIVACY ACADEMY
IAPP PRIVACY ACADEMY KEEPING UP WITH EMERGING STANDARDS FOR MOBILE PRIVACY Joanne McNabb Julie Mayer Tim Tobin Director of Privacy Staff Attorney Partner Education & Policy Northwest Regional Office Hogan
