The Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security



Similar documents
Data Breach, Electronic Health Records and Healthcare Reform

It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing?

Business Associate Considerations for the HIE Under the Omnibus Final Rule

Health Care - Meaningful Use of HITECH

December Federal Employees Health Benefits (FEHB) Program Report on Health Information Technology (HIT) and Transparency

Business Associates: HITECH Changes You Need to Know

Covered Entities and Business Associates: An Evolving Relationship

How To Prepare For A Patient Care System

Federal Employees Health Benefits Program Report on Health Information Technology (HIT) and Transparency. September 2007

Joe Dylewski President, ATMP Solutions

New HIPAA Rules and EHRs: ARRA & Breach Notification

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

Business Associates, HITECH & the Omnibus HIPAA Final Rule

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

Key HIPAA HITECH Changes. Gina Kastel, Partner, Health and Life Sciences

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS

Meaningful Use Crosswalk to the Security Rule

NATIONAL HEALTH POLICY FORUM. January 2010

LOOKING FORWARD TO STAGE 2 MEANINGFUL USE Louisiana HIPAA & EHR Conference Presenter: Kathleen Keeley

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Adopting an EHR & Meaningful Use

Issue House Bill (H.R.1) Senate Amendments to H.R.1 American Recovery and Reinvestment Act of 2009

1. Introduction - Nevada E-Health Survey

New HIPAA regulations require action. Are you in compliance?

Health Information Privacy Refresher Training. March 2013

Isaac Willett April 5, 2011

CMS-0033-P; Medicare & Medicaid Programs; Electronic Health Record Incentive Program Proposed Rule

Health Information Technology in Healthcare: Frequently Asked Questions (FAQ) 1

The basics of Health Information Technology

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

Patient-Generated Health Data and its Impact on Health Information Management

HIPAA: AN OVERVIEW September 2013

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Meaningful Use Stage 2 & HIPAA: The Relationship between HIPAA and Meaningful Use Privacy & Security Regulations View the Replay on YouTube

Turning Patient Portals into Major EHR Assets Edward Fotsch, M.D. Douglas Gentile, M.D.

Entities Covered by the HIPAA Privacy Rule

Southern Nevada Medical Industry Coalition

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013

Privacy and Security: Meaningful Use in Healthcare Organizations

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

Answering to HIPAA. Who Answers Your Phone? Prepared by Kenneth E. Rhea, MD, FASHRM. Brought to you by.

Health Information Technology: A Key Component of Health Reform

HealthTECH Workforce Forum Presents: Electronic Health Records Adoption: Driving to 2015 and Beyond

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

Role of Health Plans It s Time to Get out of the Sandbox Health Record Enablement

OCTOBER 2013 PART 1. Keeping Data in Motion: How HIPAA affects electronic transfer of protected health information

Privacy and Security Challenges of Meaningful Use

Understanding EHRs: Common Features and Strategic Approaches for Medicaid/SCHIP

HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals

How To Write A Community Based Care Coordination Program Agreement

HIPAA Compliance Issues and Mobile App Design

Impact of the Healthcare IT Stimulus Package. Session 2 of 4. Presented by. Mark R. Anderson, FHIMSS, CPHIMS CEO, AC Group, Inc.

Consumer Engagement with Health Information Technology Summary of NeHC Survey Results

Data Sharing Issues in Accountable Care Organizations

OCR UPDATE Breach Notification Rule & Business Associates (BA)

MAKING HEALTH INFORMATION ACCESSIBLE & SECURE. w w w. i m e d i c o r. c o m

Meaningful Use Rules Proposed for Electronic Health Record Incentives Under HITECH Act By: Cherilyn G. Murer, JD, CRA

HIPAA Privacy and Information Security Management Briefing

Medicaid and Medicare Meaningful Use of Electronic Health Records Program. May 15, 2013

Signed into law on February 17, 2009, the Stimulus Package known

Are you ready? Meaningful Use Stage 2 HIT Summit July 26, 2014

Empowering Nurses & Building Trust Through Health IT

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

HIT Audit Workshop. Jeffrey W. Short.

Opportunities for Medicaid to Invest in HIT. Shannah Koss, Principal Koss on Care LLC

Am I a Business Associate?

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Business Associate Agreement (BAA) Guidance

Gerry Hinkley Co-Chair, Health Care Industry Team Pillsbury Winthrop Shaw Pittman LLP

Stage 2 Meaningful Use What the Future Holds. Lindsey Wiley, MHA HIT Manager Oklahoma Foundation for Medical Quality

Overview of HITECH ACT Changes to HIPAA Privacy Rules

AHA Annual Survey Information Technology Supplement. Healthcare IT Database Download and Data Licensing

Agenda. Government s Role in Promoting EMR Technology. EMR Trends in Health Care. What We Hear as Reasons to Not Implement and EMR

Custom Report Data Elements: 2012 IT Database Fields. Source: American Hospital Association IT Survey

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Compliance Guide

Meaningful Use Stage 2. Meeting Meaningful Use Stage 2 with InstantPHR TM.

THE 2009 HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT

Of EHRs and Meaningful Use. Pat Wise, RN, MA, MS FHIMSS COL (USA ret d) VP, Healthcare Information Systems, HIMSS

Privacy & Security The HHS Rule is Out What s New and What s Next. Mary Jo Carden, RPh, JD Director, Regulatory Affairs AMCP mcarden@amcp.

Electronic Health Records. Going Beyond Data Collection to Making the Data Usable

Health Homes Implementation Series: NYeC Privacy and Security Toolkit. 16 February 2012

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

Meaningful Use Stage 2:

Certification Guidance for EHR Technology Developers Serving Health Care Providers Ineligible for Medicare and Medicaid EHR Incentive Payments

Health Insurance Portability and Accountability Act HIPAA. Glossary of Common Terms

Enabling Patients Decision Making Power: A Meaningful Use Outcome. Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality

Meaningful Use: Stage 1 and 2 Hospitals (EH) and Providers (EP) Lindsey Mongold, MHA HIT Practice Advisor Oklahoma Foundation for Medical Quality

SURVEY QUESTIONNAIRE 2013 AHA ANNUAL SURVEY INFORMATION TECHNOLOGY SUPPLEMENT

Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

How to Achieve Meaningful Use with ICANotes

Meeting the HIPAA Training and Business Associate Requirements Questions and Answers, with HIPAA Security Expert Mike Semel

Kaiser Permanente Comments on Health Information Technology, by James A. Ferguson

Demonstrating Meaningful Use of EHRs: The top 10 compliance challenges for Stage 1 and what s new with 2

Transcription:

The Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security NCHICA 11th Academic Medical Center Security & Privacy Conference, June 22-24, 2015 Panel Leader: Panelists: Amy Leopard, JD (Bradley Arant Boult Cummings) Patricia Corn (Wake Forest Baptist Health) Becky Tate (MEDHOST) 1

Agenda Overview of uses of Portals and PHRs Review state and federal laws and regulations Consider practical issues providers must manage Email sharing among patients Allowing API for view, download, transmit Patient managed access Managing patient directed disclosures (third parties) Patients managing information from multiple vendors Authorization process Patients managing proxy access for others Amendment of PHI 2

Overview of Portals and PHRs 3

Consumer Driven Healthcare Movement Physicians Payer Consumer Hospitals HSA Rx 4

Patient empowerment and Consumerism 50 40 30 20 10 0 Overblown Trend Real, we're gearing up issues we need to pay attn to 2009 HDM Poll of 137 5

Goals of a PHR Patient Perspective Easily manage access Organize health information from disparate providers in a single location Tools that support wellness and self-management Manage data sharing with health care providers Desire ease of use Automation - Manual entry of information is errorprone and time consuming 6

Goals of a PHR - Provider Perspective Tools to better manage health Analytics to monitor treatment Continuity of care and accessibility of data for paper-based system Tools promoting patient engagement 7

Uses for PHRs: Store health information Health risk assessment profile Targeted educational modules Clinical decision support for patient self-management of health risks Provider interaction for appointment and Rx refills Patient monitoring from medical device interface 8

PHR Data Set PHR DATA SET Name, demographics Family History Immunizations Recent encounters Hospitalizations, surgeries, procedures Medication List Lab, Pharmacy, Ancillary Health risk assessment Medical Power of Attorney Claims data and benefit coverage Medical and wellness device results Progress Notes 9

Different PHR Models Provider Patient Portal Most common form of personal health record Health Plan Consumer Portal United, Shared Health, AHIP and BCBSA Health Information Trust Custodian ehealth Trust Model Employer consortium for data repository on member employees Dossia Private label PHR for employers and health plans WebMD license 10

Patient Risks Risks of View Public computer, logoff Risks of Download Authentication, notice that patient has responsibility to protect Risks of transmitting health information Identity proofing and authentication of patients, personal representatives, other family, friends HIT Policy Committee Privacy and Security Workgroup 11

Regulatory Environment and PHRs 12

Which Federal Agency Should Enforce Privacy /Security Laws Against Vendors?... 13

HITECH and ARRA Drivers Meaningful Use HITECH e-copy Rights View online, download, transmit PHI Any provider or health plan digital format Forward to designate @ labor cost HIE Significantly expand access and PHI transmission to PHR Vendors Application Developers Competitors

Covered Entity under HIPAA? Providers filing claims electronically. Hospitals, physician groups, nursing homes, labs, pharmacies, doctors, nurses, dentists, psychotherapists Plans or Payors. MMO, Cigna, United Health Care, Anthem, Aetna Employer > 50 with self funding Clearinghouses standardizing PHI for others such as most billing services like WebMD Envoy. Business Associates Who create or receive PHI in order to perform function on behalf of Covered Entity now subject to certain HIPAA Privacy and Security provision under HITECH 15

HIPAA Business Associates Definition HITECH definition of BA includes: Vendors contracting with CE to allow CE to offer patients PHR as part of its ehr Organizations transmitting PHI data to a CE or its BA and requiring access to the PHI on routine basis HIE Organization, RHIO, Eprescribing Gateway PHR Vendors are not regulated directly by HIPAA unless BA above: But could be regulated by HITECH... 16

Data Flow is a Critical Regulatory Issue PHR = electronic record of individual health information drawn from multiple sources and managed, shared, and controlled by or for individual Tethered? PHR Business Associate: Vendors contracting with CE to allow CE to offer patients a portal or a PHR as part of its EHR PHR Vendor Entity, other than a CE, that offers or maintains a PHR directly with individual Source: {text} 17

Personal Health Data Check Data Flow and Covered Entity Status!! Data from Individuals to Covered entities = PHI Permissible uses and disclosures or HIPAA authorization Marketing Rules Sale of PHI PHI may also be regulated by FTC

Consumer Directly Supplies Health Information to Non-Covered Entities HIPAA does not apply to PHRs offered by employers or by PHR vendors directly to consumers FTC regulates PHR Vendors as well as compliance with privacy policies of entity offering PHR (See ONC Model PHR Notice)

Medicare and Medicaid EHR Meaningful Use To be eligible for Medicare/Medicaid incentives, providers must demonstrate Certified EHR provides for electronic exchange of health information to improve quality of care EHR Measures and Objectives for Meaningful Use enable patients to view, download and transmit their health information ONC being urged to consider connection to PHR NCVHS health plan testimony: QI, disease mgt, and care coordination support portability of data in PHRs to aid transition to meaningful use of EHRs.. 20

Meaningful Use Stage 3 NPRM Allowing API for view, download, transmit HIT Policy Committee Privacy and Security Workgroup studying Privacy and Security Issues Related to Increasing Patient Access to Data through either VDT Technologies or open APIs Increasing number of APIs connecting EHR 21

HITECH digital rights... Right to Access PHI in Electronic Format patients may request copy of ehr in electronic format maintained by CE instruct CE to forward EHR to any designated person at entity s labor cost only. Significantly expand patient access to electronic formats and increase PHI transmission to others PHR vendors, health record data banks and HIE/RHIOs. Who owns data? More importantly who has right to access and control data? 22

FTC Regulation and Exercise of Enforcement Authority Under FTC Act 5 Section 5 of the FTC Act: Unfair and Deceptive Acts or Practices Deceptive: Not implementing stated privacy policies Misrepresenting the extent to which privacy and security of information collected I used, maintained, and protected Unfair: Alleged failure to implement reasonable and appropriate security measures (or to ensure service providers did so) BUT HIPAA MAY NOT BE THE STANDARD!!!!

FTC PHR Breach Notice Rule -- for Non-HIPAA CEs and BAs PHR Vendors (200) entity, other than HIPAA-CE or BA of HIPAA-CE that offers or maintains a PHR PHR Related Entities (500) Non-covered entities or BAs that: offer products or services via website of PHR vendor CEs offering PHRs access PHR information or send info o PHR 3rd Party Service Providers to PHR Entities (200) Provides services to above PHR Entities and as a result, Access, maintain, retain, modify, record, store, destroy or otherwise hold, use or disclose unsecured PHR IHI 24

Other Legal Considerations Contractual Obligations Contracts Ownership general governed by contract, but legal ownership may be secondary to concerns over uses and disclosures of copies of the data Documentation Consent Enrollment and verification Patient EULA s Terms and Conditions Privacy and Security Ownership of data Uses and disclosures Warnings re: urgent and emergent care Disclaimers and Limits of Liabilities

Other Legal Considerations State Laws State Law Issues Personal Data Sensitive information Consumer Protection Laws Consent issues Proxies Minors Malpractice Constitutional Right to Privacy

Other Legal Considerations: Secondary Uses Threshold issue: Provide transparency to consumers via disclosure of secondary uses and safeguards De-identified data Authorization from Individual Limited Data Sets for Research, public health or QI Population-based activities to improve health or reduce healthcare costs 27

Risks with De-identified Data 28

PHRs Practical Considerations 29

Practical Considerations Educating patients about their role in protecting their health information Patient managed access Patient education (staff support) Patient identity validation Shared Emails Proxy access management Release of information Sensitive info Minors and state consent laws 30

Practical Considerations Documentation Are existing notices and forms sufficient? (NOPP, Authorization Form, Terms of Use of Patient Portal/PHR) Managing sensitive information Using and managing consumer driven data 31

Practical Considerations Addressing amendment requests Encouraging patient use in order to decrease printing of PHI 32

QUESTIONS? Amy Leopard aleopard@babc.com Patricia Corn pcorn@wakehealth.edu Becky Tate becky.tate@medhost.com 33