Brian Beamish. Commissioner (Acting) Ontario Information and Privacy Commission. Cyber Risk National Conference February 9, 2015



Similar documents
What s New in Access, Privacy and Health Care. Brian Beamish Commissioner. Ontario Connections May 21, 2015

EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS. Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario

Ann Cavoukian, Ph.D.

Privacy Breach Protocol

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

FIPPA and MFIPPA: Bill 8 The Recordkeeping Amendments

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Ann Cavoukian, Ph.D.

Detecting and Deterring Unauthorized Access to Personal Health Information

Instant Messaging and Personal Accounts: Meeting Your Access and Privacy Obligations

Administrative Procedures Memorandum A1452

Privacy Update Recent Updates in Privacy Law

PERSONAL HEALTH INFORMATION PROTECTION ACT, 2004: AN OVERVIEW FOR HEALTH INFORMATION CUSTODIANS

HOT!! Privacy Issues:

Table of Contents. Acknowledgement

Access & Correction Policy

Personal Health Information Privacy Policy

How To Ensure Health Information Is Protected

PHIPA Potpourri. Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario. IPC Mediators April 21, 2015

Electronic Health Record Privacy Policies

Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011

Helpful Tips. Privacy Breach Guidelines. September 2010

Cyber Risk in Healthcare AOHC, 3 June 2015

Submission to the Standing Committee on Industry. Bill C-54, Personal Information Protection and Electronic Documents Act. Information and Privacy

A Guide to Ontario Legislation Covering the Release of Students

Strengthening Public Sector Transparency and Privacy

Responsibilities of Custodians and Health Information Act Administration Checklist

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

Privacy Incident and Breach Management Policy


Privacy Services in Ontario - What Are the Benefits of Copying Files?

Privacy Practices for Frontline Health Care Workers. RNN Workshop June 5, 2015 Erin McLean, RN, BNSc Staff Development Coordinator

PRIVACY BREACH POLICY

A Guide. Personal Health Information Protection Act. to the. December Ann Cavoukian, Ph.D Commissioner

Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance

The potential legal consequences of a personal data breach

Corporate Data Protection Policy

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

What is involved if you are asked to provide a Police Background Check?

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools

Electronic Health Record Sharing System Bill. Contents. Part 1. Preliminary. 1. Short title and commencement... C Interpretation...

SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION)

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES

Access and Privacy Manual

Central LHIN Governance Manual. Title: Whistleblower Policy Policy Number: GP-003

How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice

EHR Contributor Agreement

Issue #5 July 9, 2015

The office of the County Attorney Bill, 2014

Privacy Law in Canada

Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places

Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK

Senate Bill No. 48 Committee on Health and Human Services

Moving Information: Privacy & Security Guidelines

Data Security and Extranet

Texas House Bill 300 & HIPAA. A MainNerve Whitepaper

The Archives and Public Records Management Act

PLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts.

PHIA GENERAL INFORMATION

LEGAL UPDATE INFORMATION AND PRIVACY DECISION USE OF EMPLOYEE MONITORING SOFTWARE BY THE DISTRICT OF SAANICH

Student Visa - confidentiality and Reporting Requirements

Privacy Law in Canada

Newcastle University disciplinary procedure

INVESTIGATION REPORT

INVESTIGATION REPORT

By the end of this course you will demonstrate:

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual

ORDER MO-2114 Appeal MA York Regional Police Services Board

An Executive Overview of GAPP. Generally Accepted Privacy Principles

Protection for Persons in Care Act

Common Privacy Framework CCIM Assessment Projects

COLLECTION, MANAGEMENT, SECURITY OF AND ACCESS TO INFORMATION RECORDS

Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act. Ann Cavoukian, Ph.D. Commissioner October 2005

POLICIES AND REGULATIONS Policy #78

EXAMINATION OF BRITISH COLUMBIA HEALTH AUTHORITY PRIVACY BREACH MANAGEMENT. Elizabeth Denham Information and Privacy Commissioner

PERSONAL INFORMATION PROTECTION ACT

BUSINESS ASSOCIATE AGREEMENT

Procedure for Managing a Privacy Breach

Arizona Medical Information Exchange Proof Of Concept. Privacy & Security Policy Manual version 1.0

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

Personal Health Information Protection Act

The Licensed Practical Nurses Act, 2000

A Resource for Parents, Teachers, and Administrators

Cloudy With a Chance Of Risk Management

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

Insurance Journal. Defending Until the End When Does the Duty to. Volume 1, Issue 3 Editor Keoni Norgren. May 1, 2013

University of Limerick Data Protection Compliance Regulations June 2015

PLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts.

Reference Check: Is Your Boss Watching?

Applying the legislation

HIPAA Orientation. Health Insurance Portability and Accountability Act

Privacy Toolkit for the. Quality Improvement Decision Support Program. in Family Health Teams. Written by: Kate Dewhirst

HIPAA Privacy & Security Rules

Health Care Provider Guide

Ownership, Storage, Security and Destruction of Records of Personal Health Information STANDARD OF PRACTICE S-022 INTENT DESCRIPTION OF STANDARD

PACIFIC EXPLORATION & PRODUCTION CORPORATION INSIDER TRADING POLICY

Transcription:

Preventing Privacy Breaches and Building Confidence in Electronic Health Records Brian Beamish Commissioner (Acting) Ontario Information and Privacy Commission Cyber Risk National Conference February 9, 2015

Mandate and Role The Office of the Information and Privacy Commissioner of Ontario (IPC) provides an independent review of government decisions and practices concerning access and privacy. The Commissioner is appointed by and reports to the Legislative Assembly while remaining independent of the government of the day to ensure impartiality.

Oversees Three Acts Freedom of Information and Protection of Privacy Act (FIPPA); and the Municipal Freedom of Information and Protection of Privacy Act (MFIPPA): Provides right of access to information and appeals to the IPC. Privacy complaints may be filed with IPC investigations may result in recommendations or orders. Personal Health Information Protection Act (PHIPA): Provides comprehensive privacy protections for personal health information; right of access to personal health information, and a right to complain to the IPC.

Importance of Protecting Personal Health Information

Unique Characteristics of Personal Health Information Highly sensitive and personal in nature. Must be shared immediately and accurately among a range of health care providers. Widely used and disclosed for secondary purposes seen to be in the public interest (e.g., research, operational planning). Dual nature is reflected in PHIPA.

Consequences of Inadequate Attention to Privacy

Consequences for Individuals Discrimination, stigmatization, psychological harm. Deterred from seeking testing or treatment. Withhold or falsify information. Loss of trust or confidence in the health care provider. Loss of confidence in electronic health records

Consequences for Health Information Custodians and their Agents Suspension or termination. Disciplinary action. Damage to reputation. Lost time and expenditure of resources. Legal liabilities and ensuing proceedings.

Common Causes of Breaches Related to Electronic Records

Health Orders concerning Mobile and Portable Devices Order HO-004: Theft of a laptop containing the unencrypted personal health information of 2,900 individuals. Order HO-007: Loss of a USB memory stick containing the unencrypted personal health information of 83,524 individuals. Order HO-008: Theft of a laptop containing the unencrypted personal health information of 20,000 individuals.

How to Prevent This Type of Breach STOP and ask, Do I really need to store personal health information on this device? THINK about alternatives: De-identify or code information. Use remote access through a secure connection. PROTECT the information on mobile devices: Encrypt and protect with strong passwords. Carry the least amount of identifying information. Have policies and procedures, training and audits.

Unauthorized Access to Electronic Records

The Meaning of Unauthorized Access There have consistently been cases of unauthorized access in Ontario where health records have been accessed without consent and for purposes not permitted by PHIPA. Unauthorized access includes viewing PHI. This problem becomes more acute with the growth of electronic health records.

Order HO-002 The Story A patient told a hospital that her estranged husband and his girlfriend were employees and she did not want them to know she was a patient. The girlfriend, a nurse who was not involved in the health care of the patient, viewed the patient s record on numerous occasions.

The hospital was ordered to: Order HO-002 The Outcome Review and revise its practices and procedures relating to personal health information and privacy. Implement a protocol to cease unauthorized access upon notification of a breach. Ensure that staff and agents are informed of their duties under PHIPA, and any revised information practices. Issue an apology to the patient.

Order HO-010 The Story A patient complained to a hospital that an employee inappropriately accessed their records. The employee was the former spouse of the patient s current spouse. An audit revealed that the records of the patient were accessed by the employee on six separate occasions.

Order HO-010 The Outcome The hospital was ordered to: Review the audit functionality on all systems and ensure that audit capability is turned on. Require agents who have contravened PHIPA to sign a confidentiality undertaking and non-disclosure agreement. Conduct privacy retraining programs. Review its policies, procedures and information practices. Implement a system that can display notice/warning when an agent accesses personal health information.

Order HO-013 The Story HO-013 was issued after two hospital employees used and disclosed information for the purpose of marketing RESPs. Hospital did not limit the search functionality of its electronic record system.

The hospital was ordered to: Order HO-013 The Outcome Implement measures to audit all instances when agents access personal health information. Develop a solution that will limit search capabilities so that agents are unable to perform open-ended searches. Review the Privacy Audits policy, the Pledge of Confidentiality policy and the Pledge of Confidentiality, and the Privacy Advisory. Develop a Privacy Training Program policy, a Privacy Awareness Program policy, and a Privacy Breach Management policy, as well as review privacy training tools and materials. Immediately conduct privacy training for all applicable staff and agents.

Educational Outreach: New Guidance Document Benefits and Risks of Electronic Records Impact of Unauthorized Access Preventing or Reducing the Risk of Unauthorized Access

Detect, Prevent and Reduce Comprehensive policies and procedures. Comprehensive training programs. Privacy notices and warning flags. Confidentiality agreements. End-user agreements regarding expectations and obligations. Physical, technical and administrative measures to limit access. All access is logged, audited and monitored. Comprehensive privacy breach management. Policies and procedures that set out the types of discipline and/or corrective action that may be imposed when unauthorized access occurs.

Is It Worth It? Campaign https://www.youtube.com/watch?v=tgb7yu7zxao

Prosecution for Offences PHIPA creates offences for contraventions. It is an offence to willfully collect, use or disclose PHI in contravention of PHIPA. The Attorney General is responsible for commencing prosecutions under PHIPA. On conviction, an individual may be liable for a fine of up to $50,000 and an organization up to $250,000.

Detecting, Deterring and Reducing the Risk of Unauthorized Access Everyone has a role to play: Health Information Custodians IPC Employees/Agents Regulatory Colleges MOHLTC/Attorney General

Lack of Clarity About Roles in Shared Electronic Systems

Need for A Governance Framework The custody and control of personal health information is not left to just one health information custodian. This can lead to a lack of clarity as to who is responsible for the various duties and obligations in PHIPA. Imperative that harmonized privacy policies and procedures be developed.

Harmonized Policies and Procedures: Why are They Essential? Harmonized privacy policies and procedures are essential to: Clarify roles and responsibilities of custodians. Ensure consistency of experience across the sector. Minimize burden on individuals wishing to exercise their rights. Foster trust with patients and among custodians.

Long-Term Legislative Framework We need a long-term legislative framework for the provincial electronic health record. While PHIPA has served as a model health privacy statute, it does not adequately address the rights of individuals and the duties of custodians in a shared provincial system.

Bill 78, Electronic Personal Health Information Protection Act The Bill would have required prescribed organizations to: Have in place and comply with privacy and security practices and procedures that are approved by the IPC every three years. Audit and monitor the EHR. Manage consent directives in the EHR. Respond or facilitate a response to access and correction requests. Maintain records of all accesses to the EHR. Maintain records of all instances where a consent directive is made, withdrawn, modified or overridden in the EHR.

Build A Culture of Privacy Start from the top down. Ensure your staff know how to apply privacy policies and procedures. Provide on-going privacy training. Use multiple means to communicate. Regularly assess the effectiveness of your privacy program.

How to Contact Us Brian Beamish Acting Information and Privacy Commissioner of Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario, Canada M4W 1A8 Phone: (416) 326-3948 / 1-800-387-0073 Web: www.ipc.on.ca E-mail: info@ipc.on.ca