The Age of Healthcare Consumerisation:



Similar documents
OCR UPDATE Breach Notification Rule & Business Associates (BA)

Overview of the HIPAA Security Rule

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

HIPAA initially went into effect April 14, HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

New HIPAA regulations require action. Are you in compliance?

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Patient Privacy and Security. Presented by, Jeffery Daigrepont

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

My Docs Online HIPAA Compliance

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

SaaS. Business Associate Agreement

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Oakland Family Services - Was Your Hacked?

Medical Privacy Version Standard. Business Associate Agreement. 1. Definitions

HIPAA Security Rule Compliance

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

787 Wye Road, Akron, Ohio P F

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

HIPAA Compliance Issues and Mobile App Design

Can Your Diocese Afford to Fail a HIPAA Audit?

HIPAA 101. March 18, 2015 Webinar

OCTOBER 2013 PART 1. Keeping Data in Motion: How HIPAA affects electronic transfer of protected health information

What s New with HIPAA? Policy and Enforcement Update

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Business Associates, HITECH & the Omnibus HIPAA Final Rule

what your business needs to do about the new HIPAA rules

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

BUSINESS ASSOCIATE AGREEMENT TERMS

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Compliance: Are you prepared for the new regulatory changes?

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

HIPAA and Mental Health Privacy:

Implementation Business Associates and Breach Notification

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Use & Disclosure of Protected Health Information by Business Associates

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Why Lawyers? Why Now?

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

BUSINESS ASSOCIATE AGREEMENT

plantemoran.com What School Personnel Administrators Need to know

FACT SHEET: Ransomware and HIPAA

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

HIPAA BUSINESS ASSOCIATE AGREEMENT

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Legislative & Regulatory Information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

University Healthcare Physicians Compliance and Privacy Policy

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA Update Focus on Breach Prevention

COMPLIANCE ALERT 10-12

Lessons Learned from HIPAA Audits

HIPAA Violations Incur Multi-Million Dollar Penalties

MaxMD 2200 Fletcher Ave. 5 th Floor Fort Lee, NJ (201) support@max.md Page 1of 10

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

ITECH Net Monitor. Standards Compliance

The Impact of HIPAA and HITECH

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Preparing for the HIPAA Security Rule

Isaac Willett April 5, 2011

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Healthcare Compliance Solutions

Cyber Security An Exercise in Predicting the Future

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information

Business Associate Management Methodology

Big Data in Health Care: Rewards and Risks. Daniel J. Weissburg, JD, CHC, Privacy Officer, UW Health Molly R. Berkery, JD, MPH, Godfrey & Kahn, S.C.

A s a covered entity or business associate, you have

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Covered Entities and Business Associates: An Evolving Relationship

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Preparing for the HIPAA Security Rule Again; now, with Teeth from the HITECH Act!

Business Associates Agreement

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Transcription:

IAPP Data Protection Intensive London 15 April 2015 The Age of Healthcare Consumerisation: Wearables, Health Apps, Remote Patient Monitoring and Health Data Presented By: Ryan P. Blaney, Esq. Washington, DC rblaney@cozen.com

Agenda Uberification of Healthcare The Healthcare Internet of Things (IoT) Regulatory Guidance and Trends Unique Privacy & Security Concerns in the Age of Healthcare Consumerisation Privacy Considerations for International Companies Investing and Doing Business with U.S. Healthcare Companies 3

Uberification of Healthcare Uber s Goal to make transportation of people easier and more efficient. On Demand Mobile Services (ODMS) Making getting care easier 1. Big Data and Personalized Medicine 2. Telemedicine 3. Remote Patient Monitoring 4. Healthcare Apps 4

Big Data and Personalized Medicine [Genome Science] will revolutionize the diagnosis, prevention and treatment of most, if not all, human diseases. Do you know when and who??? 5

June 26, 2000 First Survey of Human Genome 6

Predictive Analytics Figuring out how to get the right drug, to the right person, at the right dose, at the right time. Dr. Francis Collins National Institute of Health 7

What is Predictive Analytics? Predictive analytics is the process of learning from historical data in order to make predictions about the future (or any unknown) For healthcare, predictive analytics will enable the best decisions to be made, allowing for care to be personalized to each individual 8

Big Data in Healthcare Why Now? 30000 Source: American Informatics Association 25000 25000 20000 15000 10000 5000 0 500 2012 2020 Petabytes 9

Big Money $1.9 Billion into companies that purported to use predictive analytics. Source: Rock Health Funding Database 10

New Data Streams Current data sets generally revolve around claims but that s going to be changing with lots of clinical data and transactional information with lifestyle becoming more readily accessible. Dr. Same Ho Chief Medical Officer, United Healthcare 11

Uberification: Telemedicine 12

Uberification: Remote Patient Monitoring RPM - is a technology to enable monitoring of patients outside of conventional clinical settings (e.g. in the home), which may increase access to care and decrease healthcare delivery costs. 13

Uberification: Healthcare APPs Pharmaceutical apps Provider Apps Payor Apps As mobile apps continue to grow in popularity, a question arises of how patients can be confident they re downloading safe, effective apps. 14

FDA Mobile Health Guidance FDA s Mission: Protecting the public health by assuring the safety, effectiveness and security of. Medical devices. Why the FDA is looking at digital health? 15

Scope of FDA Oversight 16

Definition of Medical Device An instrument, apparatus, implement, machine, contrivance, implant, or in vitro reagent that is intended for use in the diagnosis of disease or other conditions, or in the cure, mitigation, treatment, or prevention of disease in man, or intended to affect the structure or any function of the body. 17

Is this a Mobile Medical App? Key question: Is your app s intended use (alone or in concert with a device regulated or otherwise) to diagnose, treat, mitigate, cure, or prevent a specific disease or condition? 18

Uberification: Wearables Market is expected to grow over the next 10 years from $14 billion to $70 billion. We are taking a very light touch, an almost hands-off approach, FDA s associate director for digital health. The Apple Effect???? Partnerships with major health care providers Mayo Clinic Epic s Electronic Medical Records 19

20

Wearables: Healthcare Payors Company health plans: 94% of consumers currently enrolled in wellness programs familiar with Apple Watch Health Insurance company Oscar teamed up with wearable device maker, Misfit to offer free activity trackers for all uses and offer rewards for being active. 21

Wearables: Life Insurance Discovery - International life and disability policies Vitality based in South Africa According to a New York Times article published on April 8, 2015 John Hancock will become the first life insurance company to introduce a similar program for American consumers. 22

The Future of Wearables 23

US, EU and International Regulations 24

Who is the Enforcer in the US? 25

Mobile Health; Consumers 26

The Feds Training the AGs 27

State Attorney General Enforcement State Attorney Generals have started to exercise the authority granted by HITECH to bring civil actions on behalf of state residents for violations of HIPAA Connecticut, Vermont, Massachusetts, Minnesota AGs have brought actions under HIPAA Minnesota went against a BA 28

Andrew Paterson s Blog Entry https://iconewsblog.wordpress.com/201 4/06/26/wearable-technology-the-futureof-privacy/ Wearable technology must comply with UK data privacy laws 29

ICO Requirements Organizations collecting information through wearables must: 1. Inform people how their data is being collected and used 2. Only collect information that is relevant, adequate and not excessive 3. Comply with CCTV Code of Practice 4. Keep the Information Secure 5. Delete it once it is no longer required 30

Australian Privacy Commissioner Encouraged organizations to develop policies for the use of wearable technologies at work. 31

Office of the Privacy Commissioner of Canada (OPC) Published research report, Wearable Computing: challenges and opportunities Personal Information Protection and Electronic Documents Act (PIPEDA) wearable devices can amplify privacy risks 32

Unique Privacy & Security Concerns in the Age of Healthcare Consumerisation 33

Privacy Concerns for Wearables 1. Can your data be shared with or sold to third parties? 2. What measures will the company or third party vendors take to ensure that PHI and non covered PHI is safe and secure? 3. What are the default privacy settings? Are they set to public or private? 4. Health Data is not necessarily protected by HIPAA 5. Who Owns the Data? 34

Privacy Issues for Wearables Company bring your own device (BYOD) issues Voice recordings and labor and employment issues Need to update company privacy policies for wearable technologies Technology is coming very fast the law needs to keep up 35

Non-Healthcare International Companies Privacy Considerations for Companies Investing and Doing Business with U.S. Healthcare Companies 36

What is HIPAA? The Health Insurance Portability And Accountability Act of 1996 (HIPAA) Administrative Simplification Standards for health care electronic transactions and code sets Security of electronically stored and transmitted health information. Privacy of individually identifiable health information 37

What is HIPAA? Privacy Rule sets the standards for who may have access to PHI applies to all forms of PHI whether electronic, written or oral Security Rule sets the standards for ensuring that only those who should have access to electronic PHI (EPHI) will actually have access Only applies to PHI that is in electronic form 38

HIPAA Applicability Covered Entities Health plans - including, for example: Group Health Plans (medical, dental and LTC plans) Health insurance issuers Issuers of Flexible spending accounts Health care providers that transmit electronic information in connection with health claims transactions Health care clearinghouses 39

HIPAA Applicability Business Associates a person or organization, other than a member of a covered entity's workforce, that performs certain functions or activities on behalf of, or provides certain services to, a covered entity that involve the use or disclosure of individually identifiable health information Examples include billing companies, attorneys, accountants, consultants, etc. 40

HIPAA General Rule PHI may not be disclosed without patient authorization unless the disclosure is otherwise permitted by HIPAA or required by law. Failure to comply = breach Breach notification if unsecured PHI 41

Top HIPAA Issues - Breach Revised Definition of Breach: Breach presumed unless: LoProCo: The CE or BA can demonstrate that there is a low probability that the PHI has been compromised based on: Nature and extent of the PHI involved (including the types of identifiers and the likelihood of re-identification; The unauthorized person who used the PHI or to whom the disclosure was made; Whether the PHI was actually acquired or viewed; and The extent to which the risk to the PHI has been mitigated. Focus on the risk to the data, instead of risk of harm to the individual 42

43

500+ Breaches by Type (%) Breaches 60 51 50 40 30 20 10 0 9 18 8 4 9 1 Breaches Breaches 44

500+ Breach by Location of PHI (%) 6 4 12 11 11 22 13 Laptop Desktop Paper Other EMR Email Network Server Portable Device 21 45

Lessons Learned Appropriate Safeguards can prevent breaches: Evaluate the risk to e-phi when at rest on removable media, mobile devices and computer hard drives Take reasonable and appropriate measures to safeguard e-phi Encrypt data stored on portable/moveable devices & media Consider appropriate data backup Train workforce members on how to effectively safeguard data and report security incidents. 46

Lessons Learned from Enforcement HIPAA CEs and BAs are required to undertake a careful risk analysis understand the threats and vulnerabilities to individuals data have appropriate safeguards in place to protect this information. Take caution when implementing changes to information systems. Create a Culture of Compliance CMPs 47

48

Employ Strong, Unique Passwords Passwords are like underwear: You shouldn t leave them out where people can see them You should change them regularly You shouldn t loan them out to others Strong passwords: 8+ characters long with upper/lower characters, numbers, and symbols that don t contain your user name, real name, or company name Unique passwords: No two passwords are exactly the same use a password convention

Use Two-factor Authentication Two Factors: Something you know Something you possess Use with: Personal email accounts Device accounts (e.g, Apple and Microsoft) Financial intermediaries (where available) Banks Investment accounts Credit cards

Hacking Defenses

Learn to Spot Phishing Messages 1. Is the email coming from the address you would expect? 2. Is there anything unusual about the message itself? 3. Is the message missing something you would normally expect to see? 4. Do the links point to what seem to be legitimate web pages? PS - Did the message come to you as a surprise? PPS - Do the message headers and IP addresses check out? (Ask IS.) Use your smartphone to click a link if you absolutely must

Protect Your Home Computer Anti-virus/antimalware Current, real-time protection Firewall: Turn it on! Home router WPA2 Change default passwords Clean-up (CCleaner) Backup/Restore capabilities Online (Carbonite, CrashPlan) External drive ($65 for 1TB) Recovery USB flash drive

Recognize Signs of Common Scams A cold-call representative of a (non-us) company wants your help settling a litigation debt with a US business, needs local counsel, etc. BUT: The caller doesn t want to talk on the phone The caller s email address doesn t match the companies domain (e.g, www.rbs.com v. mharris@rbsbank.com) The email domain was registered recently (IS can make that determination) Messages seem odd or unprofessional (capitalization, spelling, usage, signature lines) The caller doesn t show up in LinkedIn or public records searches

Watch Over Your Financial Accounts Set up email or text alerts for: Credit card purchases Debit card transactions Bank account withdrawals or transfers Investment account trades or transfers Check your credit report several times per year: Equifax, Experian, TransUnion Consider credit monitoring (despite mixed reviews?) Set up fraud alerts: http://www.consumer.ftc.gov/articles/0275-place-fraud-alert Set up credit freezes if you re high risk, divorcing, or need little to no credit http://www.consumer.ftc.gov/articles/0279-extended-fraud-alerts-and-creditfreezes

Thank You Presented By: Ryan P. Blaney, Esq. Washington, DC rblaney@cozen.com Blog Co-Editor: Healthlaw Informer at: http://www.healthlawinformer.com/ 56