HIPAA 101. March 18, 2015 Webinar



Similar documents
COMPLIANCE ALERT 10-12

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Community First Health Plans Breach Notification for Unsecured PHI

The ReHabilitation Center Buffalo Street. Olean. NY

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

HIPAA Compliance: Are you prepared for the new regulatory changes?

M E M O R A N D U M. Definitions

Data Breach, Electronic Health Records and Healthcare Reform

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

New HIPAA regulations require action. Are you in compliance?

Health Information Privacy Refresher Training. March 2013

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA initially went into effect April 14, HIPAA is a set of rules that is to be followed by doctors, hospitals and other health care providers.

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA Security Rule Compliance

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

HIPAA Compliance Manual

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA BREACH RESPONSE POLICY

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Overview of the HIPAA Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

what your business needs to do about the new HIPAA rules

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

University Healthcare Physicians Compliance and Privacy Policy

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

Table of Contents INTRODUCTION AND PURPOSE 1

HIPAA Privacy and Security Rules: A Refresher. Marilyn Freeman, RHIA California Area HIPAA Coordinator California Area HIM Consultant

POLICY AND PROCEDURE MANUAL

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Use & Disclosure of Protected Health Information by Business Associates

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

Business Associate Agreement Involving the Access to Protected Health Information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA Privacy Breach Notification Regulations

Business Associate Agreement

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240

The Basics of HIPAA Privacy and Security and HITECH

HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HIPAA PRIVACY AND SECURITY AWARENESS

Legislative & Regulatory Information

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

SaaS. Business Associate Agreement

Business Associates, HITECH & the Omnibus HIPAA Final Rule

HHS announces sweeping changes to the HIPAA Privacy and Security Rules in the final HIPAA Omnibus Rule

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

Model Business Associate Agreement

New HIPAA Rules and EHRs: ARRA & Breach Notification

HIPAA/HITECH: A Guide for IT Service Providers

My Docs Online HIPAA Compliance

SECURITY RISK ASSESSMENT SUMMARY

HIPAA Changes Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13

Chris Bennington, Esq., INCompliance Consulting Shannon DeBra, Esq., Bricker & Eckler LLP Victoria Norton, R.N., J.D., M.B.A.

HIPAA and HITECH Compliance for Cloud Applications

HIPAA Compliance Guide

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

NACHC Issue Brief Changes to the Health Insurance Portability and Accountability Act Included in ARRA. March 2010

District of Columbia Health Information Exchange Policy and Procedure Manual

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Why Lawyers? Why Now?

HIPAA In The Workplace. What Every Employee Should Know and Remember

Can Your Diocese Afford to Fail a HIPAA Audit?

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HITECH ACT UPDATE HIPAA BREACH NOTIFICATION RULE WEB CAST. David G. Schoolcraft Ogden Murphy Wallace, PLLC

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

STANDARD ADMINISTRATIVE PROCEDURE

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

Business Associates Agreement

Business Associate Management Methodology

HIPAA and Mental Health Privacy:

Understanding HIPAA Regulations and How They Impact Your Organization!

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

HIPAA Compliance Guide

HIPAA and Privacy Policy Training

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Implementation Business Associates and Breach Notification

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

Health Partners HIPAA Business Associate Agreement

Transcription:

HIPAA 101 March 18, 2015 Webinar

Agenda Acronyms to Know HIPAA Basics What is HIPAA and to whom does it apply? What is protected by HIPAA? Privacy Rule Security Rule HITECH Basics Breaches and Responses What is a breach? How should I respond to a breach? Enforcement Anthem Data Breach 2

Acronyms HIPAA Health Insurance Portability and Accountability Act HITECH Health Information Technology for Economic and Clinical Health Act BA Business Associate CE Covered Entity PHI Protected Health Information ephi Electronic PHI HHS U.S. Department of Health and Human Services OCR Office for Civil Rights 3

HIPAA: Who is covered? Enacted in 1996 and administered by the Department of Health and Human Services (HHS) Applies to covered entities Healthcare Providers Healthcare Clearinghouses Health Plans Health Plan: employee welfare benefit plan that provides medical care to employees or dependents Includes governmental health plans Does not include: disability plans, life insurance, or workers compensation plans Self-Funded Employers = Health Plans And to business associates of covered entities Performs services for or assists covered entities with functions that involve the use or disclosure of PHI Billing, claims processing, data analysis, benefit management, etc. Provides legal, actuarial, accounting, consulting, management, financial or other advice for a covered entity where PHI is involved 4

HIPAA: Business Associates Covered entities may disclose PHI to business associates if they obtain satisfactory assurances that the PHI will be appropriately safeguarded BA Agreement must be in writing and contain magic language Describe permitted and required uses of PHI by BA Forbid BA from further disclosing PHI absent permission or legal requirement Require BA to use appropriate safeguards to protect PHI BA Agreement may also shift burden of providing breach notices Sample provided on HHS website 5

HIPAA: What does it do? 2 main components of HIPAA: Privacy Security Regulates the disclosure, sharing and storage of PHI, which is information relating to: An individual s past, present or future physical or mental health or condition; The provision of health care to the individual; or The past, present or future payment for the provision of health care. PHI either identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual. 6

PHI: What is it? Names Addresses Zip codes Dates (except year) DOB Admission date Discharge date Treatment date Telephone #s Fax #s Email addresses SSNs IP addresses Fingerprints Full face photos Medical record #s Health plan Beneficiary #s Account #s Certificate / license #s Vehicle IDs (plates, VINs) Device identifiers / SSNs 7

PHI: What isn t? Employment records In what capacity did you receive the record? When submitting doctor s note or return to work certification to employer, information becomes part of the employment record, and, as such, is no longer protected health information. Distinguish between role as employer and role as plan administrator (if self-funded) Certain education records covered by the Family Educational Rights and Privacy Act College student s medical records 8

HIPAA: Privacy Rule Purpose: define and limit circumstances in which PHI may be used or disclosed All uses or disclosures must either: 1) comport with privacy rule or 2) authorized by individual in writing Privacy rule required disclosures: To individual upon request To HHS as part of investigation or enforcement action 9

HIPAA: Privacy Rule Permitted uses and disclosures (no authorization needed): To the individual For purposes of Treatment, Payment or health care Operation T: provision of care, including consultation between providers P: obtaining premiums, determining coverage, providing benefits, reimbursement O: quality assessment, peer reviews, legal / accounting services, insurance underwriting, business planning, business management Individual given opportunity to agree or object (informal permission) Facility directories, notification to families, picking up spouse s prescriptions, etc. Incidental use (sign in sheets, doctor/patient convos in waiting rooms) Public Interest (reporting abuse, controlling diseases, court proceedings, criminal investigations, research, decedents) Limited Data Set (direct identifiers removed for research or health care operation purposes) 10

HIPAA: Privacy Rule Minimum Necessary Rule component of the privacy rule Must make reasonable efforts to use, disclose, and request only the minimum amount of PHI needed Must develop and implement policies to reasonably limit uses and disclosures to minimum necessary Do I need this information to do my job? Exceptions: Disclosure to health care provider for treatment Disclosure to an individual of his or her own PHI Use or disclosure pursuant to an authorization Disclosure to HHS for investigation, review or enforcement Disclosure required by law 11

HIPAA: Security Rule Purpose: create standard protocol for transmitting and storing ephi Ensure Confidentiality, Integrity and Security of ephi ephi: data stored in electronic form: Computers, laptops, phones, Blackberries, CD/ DVD, thumb drive, networks, clouds, etc. 5 categories of safeguards in regs: Administrative Physical Technical Organizational Documentation CE: must comply with all safeguards. BA: must comply with Administrative, Technical and Physical Key to compliance with Security Rule: document processes and procedures 12

HIPAA: Security Rule Some best administrative, organizational and documentation requirements to consider: Risk Analysis conduct assessment of potential risks. Risk Management implement security measures to reduce risks. Sanctions Policy set penalties for employees who fail to comply. Security Officer identify a person responsible for implementing policies and ensuring security of ephi. System Review regularly review records of system activity and access. Response and Reporting develop procedures for responding to suspected or known security incidents. Data Backup establish and implement backup copies of ephi. Disaster Recovery establish procedures to restore loss of data. Emergency Mode establish procedures for ensuring security during an emergency. Business Associate Agreements create and use compliant BAA. 13

HIPAA Amendment: HITECH Enacted in 2009. Expanded HIPAA to cover business associates Heightened Enforcement HHS investigates complaints Increased penalties up to $1.5 million per year Expanded definition of breach Revised breach notification procedures 14

Data Breaches: What are they? Before HITECH: significant risk of financial or reputational harm required. Now, a breach is acquisition, access or use or disclosure of PHI in an impermissible manner which compromises the Security or Privacy of PHI. Presumea breach unlessthere is a low probability that PHI has been compromised, based on: Nature of the PHI and likelihood of re-identification Unauthorized person who accessed PHI Whether PHI was actually acquired or viewed Extent to which risk to PHI has been mitigated 15

Data Breaches: Exceptions 3 Exceptions to the definition of breach : Unintentional, good-faith, access of PHI by employee of same entity Inadvertent disclosure of PHI to authorized person at same entity or BA Good-faith belief the unauthorized person would not be able to retain the information Burden of proving exception falls on person claiming it, so construe it narrowly. 16

Data Breaches: Encryption If ephiis unusable, unreadable and indecipherable to unauthorized individuals, then no notification required. Encryption must be consistent with National Institute of Standards and Technology (NIST) Encryption keys must be kept on a separate device from the data Destroying data: redaction is not enough! Clear, purge or destroy consistent with NIST guidelines for sanitizing media. 17

Data Breaches: Notification If risk analysis reveals breach occurred, covered entity must notify affected persons within 60 days after discovering it. If BA discovered = CE deemed to have discovered the same day Notification must include: A brief description of what occurred, including the date of breach and date of discovery A description of the type of PHI involved Steps affected individuals should take to protect themselves What the covered entity is doing to mitigate the harm Contact information for covered entity If BA has a breach = BA must notify the CE; CEultimately responsible BUT: CEs may delegate responsibility of providing notices to BAs 18

Data Breaches: Notification If fewer than 500 individuals effected: Notify individuals Record breach on annual breach log (report to HHS by March of following year) If more than 500 individuals effected: Notify individuals Notify HHS immediately Notify media 19

HIPAA Enforcement HHS Office of Civil Rights (OCR) OCR investigates complaints. 69,369 investigations since 2003. 23,366 resulted in corrective action. Since October 2009 689 investigations into Security Rule complaints. Penalties can be enforced by OCR or State Attorneys General $100 per violation ($25,000 cap per year) if violations unknown and offender would not have known by exercising reasonable diligence. $100 per violation ($100,000 cap per year) for reasonable violation not caused by deliberate neglect. Fine waived if corrected within 30 days. $10,000 per violation ($250,000 cap per year) for corrected violation caused by deliberate neglect. $50,000 per violation ($1.5 M cap per year) for uncorrected violations caused by deliberate neglect. 20

Best Practices Documented policies and procedures (that are followed!) Annual risk assessment Annual workforce training Evaluate possible encryption solution Pay particular attention to portable ephi(laptops, phones, jump drives, etc.) Investigate all suspicious activity (and document your efforts) Access control Who needs access to PHI to do their job? What PHI do they need to access? How can you restrict access? (by employee, by data point, etc.) User authentication? How do you monitor use and access? 21

Anthem Data Breach Anthem discovered breach on January 29, 2015 Suspicious activity began December 2014 Unauthorized disclosure of ephi Names, DOBs, SSNs, health IDs, home and email addresses No medical information Info back to 2004, possibly affecting 80 million individuals Affected fully insured and TPA or ASO clients What does it mean for employers? Depends on their relationship to Anthem 22

Anthem Data Breach Fully Insured Plans limited responsibility Anthem has primary responsibility for breach response Communicate with Anthem regarding their response and ensure employees are receiving communications from Anthem Supplement Anthem communications where necessary Identity theft protection, updates on status https://www.anthemfacts.com/ Self-Insured Plans primary responsibility as CE BUT: check BA / ASO / TPA agreement. Likely that Anthem assumed responsibility for breach notification Review Plan s HIPAA policies and procedures Communicate with employees and Anthem early and often What plan participants were effected, distribute notices regarding Anthem s efforts and breach notification responsibility (if appropriate) 23

Reform: Stay Connected Stay on top of changing landscape of health care reform and other employment laws through J.W. Terrill s Seminar Series and TerrillConnect. Subscribe to TerrillConnect for weekly email Updates. 24

Health Care Reform Update: Q&A Marcus Wilbers Senior Compliance Attorney Manager Compliance Consulting mwilbers@jwterrill.com (314) 594-2526 25