HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013



Similar documents
OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

HIPAA WEBINAR HANDOUT

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

What do you need to know?

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

SELECT HIPAA PRIVACY AND SECURITY ENFORCEMENT ACTIONS. Current as of December attorney advertisement

HIPAA Compliance: Efficient Tools to Follow the Rules

Raymond: Beyond Basic HIPAA - GSHA Convention HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Proofpoint HIPAA Breach Report:

Overview of the HIPAA Security Rule

You Probably Don t Even Know

Network Security and Data Privacy Insurance for Physician Groups

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Top HIPAA Hazards and How to Avoid Them

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Security Is Everyone s Concern:

What s New with HIPAA? Policy and Enforcement Update

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Q: How does a provider know if their system has encryption? Do big services (gmail, yahoo, hotmail, etc.) have built-in encryption?

Outline. Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, /10/2014

Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA in an Omnibus World. Presented by

Lessons Learned from HIPAA Audits

Philip L. Gordon, Esq. Littler Mendelson, P.C.

Why Lawyers? Why Now?

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

HIPAA Security Rule Compliance

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996

THE FINAL OMNIBUS HIPAA RULE: ARE YOU COMPLIANT?

COMPLIANCE ALERT 10-12

2010 HIPAA Security Environment

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Training for Staff and Volunteers

The MC Academy The Employee Benefits and Executive Compensation Series. HIPAA PRIVACY AND SECURITY The New Final Regulations

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives

CMA BUSINESS ASSOCIATE AGREEMENT WITH CMA MEMBERS

The Basics of HIPAA Privacy and Security and HITECH

HIPAA Privacy & Security Rules

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES

HIPAA Training for Hospice Staff and Volunteers

Montclair State University. HIPAA Security Policy

HIPAA and HITECH Compliance for Cloud Applications

HIPAA security rules of engagement

Recent Developments in U.S. Law: Privacy and Information Technology Health

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

RESOLUTION AGREEMENT. I. Recitals

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

The HIPAA Audit Program

Security Compliance, Vendor Questions, a Word on Encryption

RESOLUTION AGREEMENT I. RECITALS

Isaac Willett April 5, 2011

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Security Compliance Reviews

The ReHabilitation Center Buffalo Street. Olean. NY

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

HIPAA & HITECH AND THE DISCOVERY PROCESS

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

Five Rivers Medical Center, Inc Medical Center Drive Pocahontas, AR Notification of Security Breach Policy

OCR/HHS HIPAA/HITECH Audit Preparation

HIPAA and Mental Health Privacy:

Business Associate Management Methodology

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

M E M O R A N D U M. Definitions

Architecting Security to Address Compliance for Healthcare Providers

Transcription:

Office of the Secretary Office for Civil Rights () HIPAA Enforcement Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services December 18, 2013

Presentation Overview s investigative process Tips for working with during an investigation s recent enforcement activities 2

Investigative Process 3

Investigation Steps Notice letter is issued to Covered Entity Response is received from Covered Entity analyzes response to determine whether more data/information/interviews are needed makes a compliance determination 4

Resolutions by Year and Type April 14, 2003 December 31, 2012 5

Annual Enforcement Results January 1, 2012 December 31, 2012 6

Methods of Enforcement When determines from its investigation of the allegations raised in a Privacy Rule complaint or through a compliance review that a covered entity may well have violated the Privacy Rule and/or the Security Rule, has various means of enforcement at its command. If feasible, usually seeks voluntary compliance. Voluntary compliance often involves the covered entity changing its policies and procedures, retraining personnel, and sanctioning the members of its workforce who violated the Privacy or Security Rules. 7

Methods of Enforcement If determines that the conduct involved warrants some sort of penalty even if voluntary compliance is forthcoming, may seek to have the covered entity enter into a Resolution Agreement and Corrective Action Plan as well as pay a resolution amount. This method is often used when the problems identified by are systemic. If either determines that the conduct involved is so serious or if the covered entity is adamant in its refusal to cooperate in the investigation or resolution of the problem, will assess a Civil Money Penalty (CMP). 8

HIPAA Compliance/Enforcement (As of December 31, 2012) TOTAL (since 2003) Complaints Filed 77,200 Cases Investigated 27,500 Cases with Corrective Action 18,600 Civil Monetary Penalties & Resolution Agreements (since 2008) $14.9 million 8

What is a Resolution Agreement? A settlement agreement between HHS and covered entity It incorporates a Corrective Action Plan which: Generally lasts for one to three years; Requires the covered entity to prepare new policies and procedures, subject to HHS approval; Generally requires improved training; and Requires monitoring of implementation and compliance Includes payment of a resolution amount 10

What is a Resolution Agreement? A Resolution Agreement and Corrective Action Plan do not constitute: A formal finding of facts A formal finding of a violation An admission by the covered entity A Resolution Amount is not a civil monetary penalty, fine, or other formal penalty. Because a Resolution Agreement is an informal resolution into which the covered entity enters in lieu of administrative litigation: The covered entity has no right to formal process or an administrative hearing 11

How does RA/CAP Differ from Other Types of Informal Resolution? Usually investigations in which there are indications of noncompliance are concluded when: The covered entity completes certain voluntary compliance actions to the satisfaction of ; and notifies the complainant and the covered entity in writing of the resolution result. The Resolution Agreement/Corrective Action Plan approach is generally designed for cases with systemic issues where entity-wide change in policy and procedures and in the internal emphasis placed on the issue is needed to ensure compliance. 12

Recent Enforcement Actions

Recent Enforcement Actions HITECH has allowed the Secretary to impose significantly increased penalty amounts for violations of the HIPAA rules and encouraged prompt corrective action. Implementation of HITECH Act enforcement has strengthened the HIPAA protections and rights related to an individual s health information. This strengthened penalty scheme will encourage covered entities and business associates to comply with the HIPAA Privacy and Security and HITECH requirements.

Facts of Providence Health and Services Case Electronic protected health information ("ephi") left unattended overnight in the personal vehicle of an employee and was stolen. The employee took the disks and tapes pursuant to a practice followed at the time by the CE s Information Staff with the knowledge of some of the CE s managers. The ephi on the tapes and disks was not encrypted laptops containing ephi were left unattended and were stolen from workforce members on 4 separate occasions The e-phi on the stolen laptops was not encrypted. 15

Providence Investigation The investigation was triggered by 31 complaints submitted to and the Centers for Medicare and Medicaid Services (CMS). The complaints were merged into a joint compliance review by CMS and. It was determined that the practices of the Providence entities created systemic vulnerabilities that led to massive losses of e-phi. Providence was cooperative throughout the investigation. Providence executed a Resolution Agreement and Corrective Action Plan in July 2009. 16

Indications of Noncompliance in the Providence Resolution Agreement cited the following indications of noncompliance in the Resolution Agreement: Electronic PHI was not encrypted or otherwise properly safeguarded by Providence. Backup tapes, optical disks, and laptops, all containing unencrypted e-phi, were removed from the Providence premises by members of the Providence workforce and left unattended in vehicles. Portable media and laptops were lost or stolen, compromising the e-phi of over 386,000 patients. Providence management knew of such practices, but allowed them to continue. 17

Actions to Settle Providence Case Providence paid a $100,000 resolution amount. Providence s Corrective Action Plan provided: 1. Providence would revise its policies and procedures, subject to approval, by: Adopting new risk assessment and risk management tools Improving physical and technical safeguards (e.g., encryption) for off-site transport and storage of electronic media containing PHI 2. Providence would train its workforce members on electronic and other safeguards for PHI. 3. Providence would conduct internal audits and site visits of facilities to determine compliance with the Corrective Action Plan. 4. Providence would Submit implementation report and annual reports to HHS for period of three years. 18

Lessons Learned Effective compliance means more than just written policies and procedures. Corporate management of covered entities need to continuously monitor implementation of privacy and security policies and practices. HHS is willing to work with cooperative entities to implement effective changes to ensure that consumers are protected. Covered entities need to ensure that these efforts include: Effective privacy and security staffing Adequate employee training on privacy and security issues Physical and technical implementation in an effective manner 19

Cignet Health Care Over a two-year period, 41 individuals complained to that Cignet had ignored their requests for access to their health records Cignet failed to respond to s investigation or provide copies of the patients records

CMP of $4.3 Million Levied Civil Money Penalty of $1.3 million attributable to failure to provide individuals access to their health records Penalty of $3 million for failure to respond to demands to produce records and failure to cooperate with s investigation

Massachusetts General Hospital Employee, who had taken patient files home, left the folders on the subway train and they were never recovered Investigation initiated after media reports of incident and a complaint from an individual whose PHI was lost Settled with through Resolution Agreement and corrective action plan $1 million resolution amount MGH required to actively monitor its compliance with the Corrective Action Plan through use of an internal monitor

Management Services Organization of Washington MSO disclosed ephi to an affiliated company without a valid authorization, so that the affiliate could market Medicare Advantage plans to those individuals MSO had not developed or implemented appropriate and reasonable administrative, technical, and physical safeguards to protect ephi Separate agreements with DOJ and OIG to settle allegations under the Federal False Claims Act

Actions to Settle Case $35,000 resolution amount to Corrective Action Plan Develop and implement policies & procedures to demonstrate compliance with the Privacy and Security Rules Train workforce members Conduct internal monitoring Submit compliance reports to HHS for a period of two years

Rite Aid Corporation Series of media reports about personnel disposing of PHI, including labeled pill bottles and prescriptions, in unsecured garbage containers outside of several Rite Aid pharmacy stores $1 million resolution amount Corrective Action Plan 1. Revising, distributing policies & procedures regarding PHI disposal 2. Sanctioning workers who do not follow them 3. Training workforce members 4. Conducting internal monitoring 5. Engaging a third-party assessor to render reports to HHS 6. New internal reporting procedures requiring workers to report all violations of these new privacy policies and procedures 7. Submitting compliance reports to HHS for a period of three years

Indications of Non-Compliance in Rite Aid Resolution Agreement Rite Aid policies and procedures for disposal did not reasonably and appropriately safeguard PHI Rite Aid did not maintain sanctions policy for workforce members who failed to safeguard PHI in disposal process Rite Aid did not provide necessary and appropriate training for its workforce regarding disposal of PHI

Major 2012 Enforcement Actions BCBS Tennessee ($1.5 M) e-phi stored on servers stolen from deactivated data center after construction/relocation to new facility Reevaluate threats/vulnerabilities to e-phi caused by changing operational environment and manage risk Phoenix Cardiac Surgery ($100K) e-phi disclosed through Internet when provider used third party application hosted in the cloud Business associate agreements required when sharing data with cloud computing service providers Alaska DHSS ($1.7M) Portable storage device stolen from personal vehicle symptomatic of widespread failure to implement program-wide information security safeguards Risk analysis to identify location and safeguards for PHI, training and controls for portable devices

Major 2012 Enforcement Actions Massachusetts Eye and Ear Institute ($1.5M) Stolen personal laptop of physician using device as desktop substitute Covered entity had not implemented a program to mitigate identified risks to e-phi Encrypt data stored on end-user devices Hospice of Northern Idaho ($50K) Breach affecting 400 individuals when laptop stolen Provider had not conducted a risk assessment or taken other measures to safeguard e-phi as required by Security Rule Implement security measures to safeguard e-phi 33

Major 2013 Enforcement Actions Affinity Health Plan ($1.2 Million) Breach report after CBS news notified Affinity that it had purchased a photocopier previously leased to Affinity which contained ephi on the hard drive - estimated 344,579 individuals affected Affinity failed to delete ephi when it returned multiple leased copiers and failed to incorporate the ephi contained on copier hard drives into its risk analysis Best efforts to retrieve hard drives and implement safeguards WellPoint ($1.7 Million) Breach report that the ephi of 612,402 individuals was accessible to unauthorized persons over the internet WellPoint did not implement administrative and technical safeguards 29

Major 2013 Enforcement Actions Shasta Regional Medical Center ($275,000) Compliance review following an LA Times article indication an impermissible disclosure of PHI to the media Senior management impermissibly shared a patient s PHI with the entire staff via an email and failed to sanction the workforce members that disclosed that PHI to the media Update policies on safeguarding PHI and training staff; 15 other hospitals under same ownership attest to their understanding of permissible uses and disclosures of PHI Idaho State University ($400,000) Breach reported after the ephi of 17,500 patients was unsecured for 10 months due to disabled firewall protections affecting 29 outpatient clinics. ISU did not apply proper security measures and policies to address risks to ephi and did not have procedures for routine review of IT systems Corrective action plan pertaining to risk management and information system activity review to detect problems sooner 30

A Culture of Compliance In light of 's clearly articulated intention to aggressively enforce the HIPAA Privacy and Security Rules, covered entities and business associates should review their current HIPAA compliance programs. A robust compliance program includes employee training, vigilant implementation of policies and procedures, regular internal audits, and a prompt action plan to respond to incidents.

Want More Information? The website, http://www.hhs.gov/ocr/privacy/ offers a wide range of helpful information about health information privacy including educational information, FAQ s, and rule text and guidance for the Privacy, Security, and Breach Notification Rules. 32

Region VIII Contact Information U.S. Department of Health and Human Services Office for Civil Rights, Region VIII 999 18 th Street, South Terrace, Suite 417 Denver, Colorado 80202 303-844-7915 Emily Prehm Equal Opportunity Specialist 303-844-7893 Emily.Prehm@hhs.gov 33