Advanced HIT Contracting Issues



Similar documents
Negotiating EHR Acquisition Contracts

The Art of the Deal: Negotiating a Winning EHR Contract

Indemnity Clauses. Just boilerplate, right?

How To Understand A Software License Agreement

How To Indemnify An Ehr Technology Developer

Cloud Agreements: Do s, Don ts, and Cautions

Contracting with Suppliers A Balanced Approach to Indemnities and Limitations of Liability!!"#$%&'(&)*+,"-&

ALM Works End-User License Agreement for Structure Plugin

How To Deal With Cloud Computing

Data Privacy, Security, and Risk Management in the Cloud

TEN TIPS FOR NEGOTIATING SOFTWARE LICENSE AGREEMENTS

Risk Management of Outsourced Technology Services. November 28, 2000

Columbia University Service Provider Agreement

How To Protect Your Data In The Cloud

Paychex Accounting Online Terms of Use

Cloud Computing Contracts Top Issues for Healthcare Providers

THE SUSTAINABLE ENERGY AUTHORITY OF IRELAND PURCHASE ORDER TERMS AND CONDITIONS OF PURCHASE

Schedule 14 CDS Data Center Hosting Agreement

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Indemnification in Clinical Trial Agreements

Schedule 15 CSA Web Hosting Agreement

ABA Section of Litigation Intellectual Property Litigation Committee Roundtable Discussion Outline

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002)

Software as a Service: Guiding Principles

INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT. and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to.

ENROLLMENT AGREEMENT FOR QUALIANCE

Minimizing Risk in Technology Agreements

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP)

CONSULTING SERVICES AGREEMENT

WEB SITE DEVELOPMENT AGREEMENT. This WEB SITE DEVELOPMENT AGREEMENT ("Agreement") is an agreement between 3WDirect

15 questions to ask before signing an electronic medical record or electronic health record agreement

Contracting Guidelines with EHR Vendors

How To Write A Prognosis Voip Monitor Contract

Technical Help Desk Terms of Service

THIS MASTER SUBSCRIPTION AGREEMENT AND THE ORDER FORM (DEFINED BELOW) GOVERN THE USAGE OF THE GSHIFT SUITE OF TOOLS.

Negotiating with Health Care IT Vendors

SOFTWARE HOSTING AND SERVICES AGREEMENT

Application Programming Interface (API) Application (app) - The API app is the connector between epages and the developers service.

Consulting Terms. 1. Consulting Services

SOFTWARE HOSTING AND SERVICES AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SERVICES OR WEBSITE. The SuiteCRM website (hereinafter

Master Software Purchase Agreement

PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE

Cayo Software Reseller Agreement

BUSINESS ASSOCIATE AGREEMENT

Sample and Revised General Indemnification Clauses

ADDENDUM NO. 1 TO RFP : Locum Tenens Referrals

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

END USER LICENSE AGREEMENT DATABASE MANAGEMENT TOOL LICENSE

ORACLE LINUX AND ORACLE VM SERVICES AGREEMENT

Web Site Development Agreement

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND

California Solar Initiative (CSI) Program 2007 Reservation Request Form and Program Contract [follows the second page Reservation Request form]

IT Contracting Tips and Considerations

BUSINESS ASSOCIATE AGREEMENT

Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records

Markley Cloud Services Hosting Agreement

3 rd Party Vendor Risk Management

Cheryl K. Bernstein RN, BSN, CCRC Director Bernstein Clinical Research Center, LLC Cincinnati, Ohio

DATA SECURITY AGREEMENT. Addendum # to Contract #

Website Development Agreement

This License Agreement applies to the Real Vision Software

CALIFORNIA Strict Indemnity Language. CALIFORNIA Intermediate Indemnity Language

SoJware as a Service Agreements

Contract Guide Course for Design Professionals: Part II

DATA USE AGREEMENT RECITALS

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited.

AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT

MAJOR EQUIPMENT PURCHASE CONTRACT

TEXTURA AUSTRALASIA PTY LTD ACN ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

Carriers support the independent life brokerage agency system. As stated by one major Carrier in its promotional materials for consumers:

Contracting Guidelines with EHR Vendors

TRIAL AGREEMENT FOR QUALIANCE

CO N T R A C T I N G P R I N C I P L E S Vendor Copy

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

IEEE COMPUTER SOCIETY ONLINE PRODUCTS AGREEMENT. Address. . Facsimile

Due Diligence Request List: IP and IT

Service Description: Dell Backup and Recovery Cloud Storage

Cloud Computing: Legal Risks and Best Practices

Covered California. Terms and Conditions of Use

Commercial Software Licensing

TUFIN SOFTWARE NORTH AMERICA, INC. GENERAL TERMS AND CONDITIONS FOR SUPPORT AND MAINTENANCE SERVICES [Last revised: May 11, 2014]

Terms of Service. Permitted uses You may use the Services for your own internal business purposes only in accordance with these Terms.

CITY OF SHERWOOD Independent Contractor Agreement (for Personal Services or for Public Works under $25,000)

Transcription:

Advanced HIT Contracting Issues AHLA: Current HIT Challenges Baltimore Steven J. Fox, Esq. Post & Schell, PC March 28, 2014 (rev d 3/31/14) SESSION DESCRIPTION This session will describe some of the advanced issues you will likely confront in HIT contract negotiations What to look for when reviewing and negotiating a contract 1

Preliminary Considerations RFP or RFI Importance of more than one vendor Danger of long term contracts Definitions Customer Affiliate Documentation Enhancement, Upgrade, Version First Productive Use ( FPU ) or Go-Live Software System Third Party Software 2

License Issues Use in connection with ACO & HIE Ability to process data for non-employed physicians and other healthcare providers who have staff privileges Expansion/contraction metrics Allow for organic growth License fee adjustments (up and down) License Issues (cont d.) Beware of unusual limitations or restrictions on licensing metrics, e.g., the number of CPUs or computers that the software may be used on vs. number of actual users May impact copyright infringement issues 3

Payment Provisions Tie payments to objective milestones, not dates or timelines. For example, 20% due upon contract execution; 25% due upon installation; 25% due upon First Productive Use; and the final 30% due upon acceptance Familiarize yourself with Revenue Recognition Rules Price increase limitations Require TCO (total cost of ownership) Acceptance Testing Testing should take place both pre-live and post-fpu If software fails acceptance tests, Vendor should have a designated period of time to remedy any problems. If Vendor is unable or unwilling to remedy the problems after X attempts, Customer should have right to terminate and receive a full refund of all fees and charges paid 4

Support & Maintenance Services Describe, in detail, scope of support/maintenance services to be provided Service Level Agreements (SLAs) Especially important for outsourcing, remote hosting, cloud contracts Also necessary for run-of-the-mill support/maintenance Include meaningful remedies, e.g., a credit against future support and maintenance fees Warranties Software, third-party software, hardware and custom programming will function together as a System in accordance with the Documentation (including the Vendor s response to an RFP or RFI, if any) Everything needed is included Vendor may not restrict or withhold Customer s ability to use or access its data under any circumstances (i.e., holding data hostage) 5

Warranties (cont d.) Compliance with applicable laws & regulations, including Meaningful Use Focus on the language regulations are not usually directed at HIT vendors, so contract must require Vendor to modify software if regulations impact the Customer s use of the software Restrict Vendor s use of and access to all of Customer s data (especially patient data) Warranties (cont d.) Interoperability/interfaces Sunset issues Warranty Period Minimum insurance requirements, e.g., workers compensation, commercial general liability, cyber insurance, errors and omissions (aka contractual or professional liability), product/completed operations & umbrella liability insurance 6

Special Considerations for Cloud Agreements Due diligence considerations include the following: How long has Vendor been in business? Is Vendor publicly traded or a wholly owned subsidiary? Does Vendor have financial wherewithal to step up to the plate for data or privacy breaches? Ask to see Vendor s disaster recovery plan (if it exists) Need to really check references (not just those supplied by Vendor) Talk to conference attendees Attend user-group meetings if possible Review Vendor s reputation in the industry (e.g., KLAS surveys or other reliable third party surveys or rankings) What is the turnover rate of Vendor s employees? Cloud Agreements (cont d.) How safe is your data? Where is it actually stored? In the United States or elsewhere? Does Vendor intend to use your data, even if deidentified? Ability to access & download data as needed Is data stored in proprietary format or readily readable and convertible to other systems? Has Vendor demonstrated ability to successfully create interfaces (if needed) to your particular system(s)? Ability to use system if no Internet access What happens if Vendor goes bankrupt or out of business? 7

Cloud Agreements (cont d.) Technical due diligence considerations include the following: Does Vendor have any third party certifications (e.g., FedRAMP or SSAE16 SOC 2)? Where is Vendor located? Where is the cloud provider located? Where is the data center located? Where are the disaster recovery sites located? What are Vendor s privacy and security policies and procedures? Cloud Agreements (cont d.) Technical due diligence (cont d): Ability to audit Vendor s activities How long does it take to restore information and where would you be in the queue, if there were a need to restore? When was the last time Vendor conducted a risk assessment and is the report available for review? Has Vendor had any breaches? Does Vendor use encryption for data at rest, in motion and archived? 8

Cloud Agreements (cont d.) Technical due diligence (cont d): Does Vendor use differential, incremental and whole backups? Are the backups verified to ensure their integrity? Is the media rotated and refreshed? What, if any, third party vendors or subcontractors does the cloud provider use? Other considerations: review the HIMSS Privacy and Security Toolkit, HIMSS Cloud Security Toolkit, HIMSS Risk Assessment Toolkit & others freely available Cloud Agreements (cont d.) Technical due diligence (cont d): Is Vendor s supply chain secure? Who is the actual developer of the software? Vendor may be a licensee of the actual software developer This result in intellectual property issues 9

Cloud Contract Review Issues What kinds of remedies make sense if Vendor does not perform? Is termination a practical alternative? Service Level Agreements (SLAs) What are service level (uptime/downtime) guarantees for power availability, network availability, hardware availability and (if applicable) application availability? Is the availability sufficient for your organization s needs (e.g., is 99.9% or 99.999% available)? What are the remedies if Vendor fails to meet the guarantee? Are there service credits? Include response times. Can you terminate underlying agreement if Vendor fails to perform after a specified number of occurrences? Limitation of Liability/Damages Cap on direct damages how computed Make it mutual Consequential damages Carve-outs Vendor s indemnification and confidentiality obligations (including HIPAA); and Damages due to personal injury or death, including claims arising from Vendor s negligence or misconduct 10

Indemnification & Hold Harmless Provisions Intellectual Property Infringement Usually included in some form More important than ever due to increase in patent trolls & I. P. infringement-related claims Insist that Vendor pay all costs, not just those awarded by a court Indemnification (cont d.) Typically requires Customer to assume liability for third party claims brought against HIT vendor Increasingly demanded by vendors Intended to shift liability and remedial burdens to physicians, nurses & hospitals, even when HIT users are strictly following Vendor instructions 11

Indemnification (cont d.) Often paired with disclamatory practice of medicine language Relies on legal doctrine of learned intermediaries HIT vendors claim they are not responsible for errors their systems cause in patient treatment, because clinicians should be able to identify and correct such errors generated by software faults Vendor is simply providing a software tool Indemnification (cont d.) Ignores reality that medicine is moving to clinical decision-support systems Clinicians encouraged to rely more and more upon software and hardware to practice medicine Consider scope of indemnity provision Who is covered (e.g., employees, agents, officers, directors, affiliates) What types of claims are covered (e.g., negligence, breach of contract) Is hold harmless language included? 12

Sample Indemnity Provision As a result of the complexities and uncertainties inherent in the patient care process, You agree to defend, indemnify and hold Vendor harmless from any claim by or on behalf of any patient of You or your personnel, or by or on behalf of any other third party or person claiming damage by virtue of a familial or financial relationship with such a patient, which is brought against Vendor, regardless of the cause if such claim arises for any reason whatsoever, (including without limitation Vendor s negligence, except as provided below) out of the operation of the Software licensed to You under this Agreement. To the extent applicable, You will obtain Vendor s prior written consent to any settlement or judgment in which You agree to any finding of fault of Vendor or defect in the Software or Vendor s services. The indemnification under this Section will not apply if the proximate and direct cause of the event giving rise to the claim for indemnification is Vendor s sole negligence with respect to an error in the Software and You and your personnel have, in connection with this claim, operated the Software accurately, used the Software only in accordance with the Documentation, and satisfied each of the customer responsibilities. Vendor will promptly notify You in writing of any claim subject to this indemnification, promptly provide You with the information reasonably required for the defense of the same, and grant to You exclusive control over its defense and settlement. Note: this is from an actual vendor agreement. Indemnification (cont d.) Note that this clause requires Customer s indemnification even for Vendor s own negligence Exception if claim directly caused by Vendor s sole negligence regarding a Software error, and Customer has been perfect in every way Unlikely that Customer would ever meet that unrealistically high standard 13

Indemnification (cont d.) Huge disparity in bargaining power Idea of not-for-profit hospitals indemnifying large, for-profit HIT vendors is offensive Although probably not against public policy Vendors profit hugely from HIT marketplace; need to step up to the plate & assume liability for themselves Indemnification (cont d.) Healthcare providers who unwittingly assume vendors liability thinking it will be covered by their own liability or malpractice insurance may be in for rude awakening Most insurance policies exclude assumed contractual liability Ironically, vendors could easily solve the problem by obtaining their own insurance policies 14

Indemnification (cont d.) If hospital agrees to indemnify, it should be written very narrowly and limited only to the hospital s own fault Not agreeing to indemnify does not mean hospital is attempting to avoid liability Vendor may still sue or file a cross claim if it believes the hospital is cause of the problem Bankruptcy / Source Code If no escrow agreement, need ability to obtain access to the source code under 365 of the Bankruptcy Code for the software to continue Customer s permitted uses under the license. The escrow account should be updated on a regular basis to include the current version of the source code. Carefully review pertinent source code escrow agreements 15

Confidentiality / Privacy Include comprehensive provisions to protect confidential information, including financial records & patient information Incorporate Customer s Business Associate Agreement by reference into a confidentiality section or attach as an exhibit to the agreement Termination Require transition assistance from Vendor at agreed upon price for a specified period preand post-termination Assure that Customer has the ability to continue to use the software during that period 16

Miscellaneous Business Associate Agreements an earlier session discussed this Include a force majeure clause with right to terminate the agreement if Vendor s force majeure event lasts more than 60 to 90 days, with full or prorata refund of all fees paid Provide for survival of specified terms after termination, e.g., confidentiality and indemnification provisions Discussion/Questions 17

Contact Info Steven J. Fox, Principal Post & Schell, P.C. Healthcare Information Technology 607 14th Street, N.W. Suite 600 Washington, DC 20005 202-661-6940 (phone) sjfox@postschell.com www.postschell.com References EHR Developer Code of Conduct, adopted June 11, 2013: http://ehra.org/docs/ehr%20developer%20code%20of%20cond uct%20final.pdf ONC s "EHR Contracts: Key Contract Terms for Users to Understand (July 29, 2013): http://www.healthit.gov/sites/default/files/ehr_contracting_terms_fin al_508_compliant.pdf 18

References HIMSS Privacy & Security Toolkit: http://www.himss.org/library/healthcare-privacysecurity/toolkit?navitemnumber=21184 HIMSS Cloud Security Toolkit: http://www.himss.org/library/healthcare-privacy-security/cloudsecurity/toolkit?navitemnumber=21185 HIMSS Mobile Security Toolkit: http://www.himss.org/library/healthcare-privacy-security/mobilesecurity-toolkit?navitemnumber=21186 NIST Guidelines for Managing the Security of Mobile Devices in the Enterprise: http://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-124r1.pdf NIST Guidelines on Hardware-Rooted Security in Mobile Devices (Draft): http://csrc.nist.gov/publications/drafts/800-164/sp800_164_draft.pdf References NIST Guidelines on Mobile Device Forensics (Draft): http://csrc.nist.gov/publications/drafts/800-101- rev1/draft_sp800_101_r1.pdf NIST Guidelines on Active Content and Mobile Code: http://csrc.nist.gov/publications/nistpubs/800-28-ver2/sp800-28v2.pdf NIST Mobile Agent Security: http://csrc.nist.gov/publications/nistpubs/800-19/sp800-19.pdf NIST Managing Information Security Risk: http://csrc.nist.gov/publications/nistpubs/800-39/sp800-39-final.pdf NIST Computer Security Incident Handling Guide: http://csrc.nist.gov/publications/nistpubs/800-61rev2/sp800-61rev2.pdf NIST Performance Measurement Guide for Information Security: http://csrc.nist.gov/publications/nistpubs/800-55-rev1/sp800-55- rev1.pdf 19

References NIST Recommended Security Controls for Federal Information Systems and Organizations: http://csrc.nist.gov/publications/nistpubs/800-53-rev3/sp800-53- rev3-final_updated-errata_05-01-2010.pdf NIST Cybersecurity Framework: http://www.nist.gov/itl/cyberframework.cfm ISO 14971 (Medical devices Application of risk management to medical devices): http://www.iso.org/iso/catalogue_detail?csnumber=38193 ISO/IEC 27001 -- Information technology -- Security techniques -- Information security management systems: http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_i cs.htm?csnumber=54534 IEC 80001-1 Application of risk management for IT-networks incorporating medical devices: http://www.iso.org/iso/catalogue_detail.htm?csnumber=44863 References FDA Guidance on Medical Devices: http://www.fda.gov/medicaldevices/deviceregulationandguidance/ guidancedocuments/default.htm Multi-State Information Sharing and Analysis Center: http://msisac.cisecurity.org/ ICS-CERT: http://ics-cert.us-cert.gov/ US-CERT: http://www.us-cert.gov CERT Secure Coding Initiative: http://www.cert.org/secure-coding/ Cloud Security Alliance: https://cloudsecurityalliance.org/ FedRAMP: http://www.fedramp.gov NIST SP 800-145, The NIST Definition of Cloud Computing: http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf 20