HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist



Similar documents
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

Legislative & Regulatory Information

HIPAA Compliance: Are you prepared for the new regulatory changes?

Dissecting New HIPAA Rules and What Compliance Means For You

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

COMPLIANCE ALERT 10-12

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

This form may not be modified without prior approval from the Department of Justice.

SAMPLE BUSINESS ASSOCIATE AGREEMENT

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Business Associate Agreement

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

The ReHabilitation Center Buffalo Street. Olean. NY

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016

BUSINESS ASSOCIATE AGREEMENT Tribal Contract

University Healthcare Physicians Compliance and Privacy Policy

Use & Disclosure of Protected Health Information by Business Associates

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

BUSINESS ASSOCIATE AGREEMENT

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Business Associate Agreement Involving the Access to Protected Health Information

SaaS. Business Associate Agreement

M E M O R A N D U M. Definitions

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HIPAA Business Associate Agreement

FirstCarolinaCare Insurance Company Business Associate Agreement

New HIPAA regulations require action. Are you in compliance?

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Security Is Everyone s Concern:

BUSINESS ASSOCIATE AGREEMENT

Data Breach, Electronic Health Records and Healthcare Reform

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA Compliance Guide

Disclaimer: Template Business Associate Agreement (45 C.F.R )

HIPAA BUSINESS ASSOCIATE AGREEMENT

Business Associate Agreement (BAA) Guidance

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

HIPAA/HITECH: A Guide for IT Service Providers

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

My Docs Online HIPAA Compliance

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Business Associate Management Methodology

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

NACHC Issue Brief Changes to the Health Insurance Portability and Accountability Act Included in ARRA. March 2010

Breach Notification Policy

What do you need to know?

HIPAA in an Omnibus World. Presented by

Table of Contents INTRODUCTION AND PURPOSE 1

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240

SAMPLE BUSINESS ASSOCIATE AGREEMENT

POLICY AND PROCEDURE MANUAL

BUSINESS ASSOCIATE AGREEMENT. Recitals

Health Information Privacy Refresher Training. March 2013

The Basics of HIPAA Privacy and Security and HITECH

HIPAA Compliance Guide

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

HIPAA/HITECH and Texas Privacy Laws Comparison Tool Updated 2013

Enclosure. Dear Vendor,

Transcription:

HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1

HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various parts? Why is this important? What are the major modifications? PHI Breaches + Notifications Audits, Consequences + Penalties HIPAA Security Rule Analysis MicroMD HIPAA Compliance + Support 2

History of the Omnibus Rule Health Insurance Portability and Accountability Act (HIPAA) of 1996 Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Omnibus Rule 2013 Before HITECH, Business Associates (BAs) regulated through Business Associate Agreements (BAAs) After HITECH, BAs and subcontractors regulated directly by HIPAA Therefore, must comply with Security Rules and some Privacy Rules and provisions of BAA 3

What is the HIPAA Omnibus Rule? The HIPAA Omnibus Rule is a set of final regulations that modifies the existing HIPAA rules and implements a variety of provisions of the Health Information Technology for Economic and Clinical Health (HITECH) Act. There are three main parts to the HIPAA Omnibus Rule: HIPAA Privacy Rule HIPAA Security Rule HIPAA Enforcement Rule 4

What is the HIPAA Privacy Rule? The HIPAA Privacy Rule establishes national standards to protect individuals medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The Rule also gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections. Source: HHS.gov 5

What is the HIPAA Security Rule? The HIPAA Security Rule establishes national standards to protect individuals electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity and security of electronic protected health information. Source: HHS.gov 6

What is the HIPAA Enforcement Rule? The HIPAA Enforcement Rule contains provisions relating to compliance and investigations, the imposition of civil money penalties for violations of the HIPAA Administrative Simplification Rules, and procedures for hearings. Source: HHS.gov 7

Why is this important? 804 PHI breaches between 2009 and 2013 These breaches involved 29.3 million patient health records 138% rise in the number of health records breached in 2013 83.2% of breaches were due to theft 22% of breaches were due to unauthorized access 35% of breaches involved an unencrypted laptop or other electronic device Source: HealthITOutcomes.com 8

What are the major modifications? Use of Personal Health Information (PHI) Patient access to electronic PHI New requirements for Business Associates and their Subcontractors Defines new Security Requirements Updated definition of PHI Breach, how to assess breach level and notification Outlines penalties 9

Use of Personal Health Information (PHI) Limitations on use of PHI for marketing + fundraising purposes Prohibits sales of PHI without individual authorization to do so Broadens patient ability to restrict disclosure of PHI to health insurance, for instance when a patient pays cash 10

Patient Access to Electronic Health Record Expands patient rights to request + receive electronic copies of their health record Ties into Meaningful Use (MU) Stage 2 Core Objective 7a: More than 50 percent of all unique patients seen by the EP during the EHR reporting period are provided timely (within 4 business days after the information is available to the EP) online access to their health information. Stage 2 Core Objective 7b: More than 5 percent of all unique patients seen by the EP during the EHR reporting period (or their authorized representatives) are able to view, download or transmit to a third party their health information. 11

Business Associates (BAs): Definition Persons who, on behalf of a Covered Entity (other than the Covered Entity s workforce) perform or assist in performing a function or activity that involves the use or disclosure of individually identifiable health information, or that otherwise is regulated by HIPAA. IT equipment, support + software vendors Leasing firms Data centers Cloud computing providers Telephony + answering service vendors Shredding vendors Billing services Transcription services Collection services Temporary employment agencies 12

Business Associates (BAs): Omnibus Impact Extends requirements for privacy and security rules to physician BAs and their subcontractors HHS Secretary authorized to receive complaints and take action against BAs and subcontractors BAs and subcontractors required to maintain own records and provide HHS access to info BAs and subcontractors subject to civil money penalties for violations BAs and subcontractors liable under contract to Covered Entity (CE) and BA 13

Business Associates (BAs): Why the changes? Before HITECH, management of PHI was loosely defined; law required to use appropriate safeguards No established standards No way to validate standards were being followed Laptops don t always have encrypted discs Users often disable or don t update virus protection Covered Entities (CEs) with limited IT resources Increasing EMR adoption 14

Business Associates (BAs): Must Document Risk Analysis Continuity Plan Security Practices and Procedures Incident Response Plan (Breaches) Records Disposal Procedure for Electronic Media and Paper Records Employee Training Program Termination Procedures Audit Logs 15

Business Associates (BAs): Musts Protect data + uphold privacy and security measures Restrict access to PHI via password Secure servers; limit access Receive and forward data automatically 128-bit encryption for reports Restrict PHI to need to know Automatic password expiration Store archives and backup in fireproof safe Mandatory HIPAA training Monitored security system Automated, securely-stored data backups Automated virus checks Properly dispose of data Delete data from BA systems at end of BA Not retain paper copies 16

Business Associate Agreement (BAA): Elements Specifies Purpose for use of PHI Functions, activities or services doing for CE BAs agree to Not use PHI outside of requirements Use appropriate safeguards Mitigate disclosure that violates BAA Report disclosures to CE Document disclosures 17

Business Associate Agreement (BAA): Elements Designates BA may use PHI for data aggregation BA may use PHI to report violations of law Notification of BA changes in PHI disclosure procedures Notification of BA of PHI use or disclosure Term and termination provision Provision that BAA applies to subcontractor BA returns or destroys PHI; retain no copies (Or, if return not feasible, specify conditions) 18

Business Associates (BAs): Violations HITECH deems a BA to violate HIPAA if BA Knows of a pattern of activity of practice Breaches their Business Associate Agreement (BAA) BA fails to cure the breach, terminate the BAA or report the non-compliance 19

Security Rules BAs + Subcontractors should already have in place security practices that either comply with the HIPAA Security Rule, or that only require modest improvements to come into compliance CEs and BAs must review and modify security measures to ensure the continued provision of reasonable and appropriate protection of PHI Specifies that the BA secure assurances of adherence from Subcontractors, not the CE Subcontractor of a BA must report security incidents, including breaches, to its BA 20

PHI Breaches + Notification Defines that improper use or disclosure of PHI should be considered a breach that would trigger official notification requirements unless the organization in question carries out a risk assessment and determines otherwise Applies to unsecured PHI not rendered unusable, unreadable or indecipherable 21

PHI Breaches + Notification Changes definition for required notification of breaches 2009: Requirement was to notify of a breach if there was significant risk of harm to the individual 2013: Any acquisition, access, use or disclosure of PHI that is not permitted under HIPAA is deemed a breach, unless the covered entity or Business Associate can demonstrate, using a 4-factor assessment, that there is a low probability that PHI has been compromised Used to be the risk of harm was the threshold when determining a breach occurred Now the Office for Civil Rights (OCR) uses presumption of a breach as the threshold, making it more likely to be required to notify of a PHI breach 22

Common Breaches Impermissible use and disclosure of PHI Lack of safeguards of PHI Lack of patient access to PHI Complaints about the CE to HHS 23

Breach Notification: Assessment 4 factors must be assessed 1. Nature and extent of the PHI involved, including types of identifiers and the likelihood of re-identification 2. The unauthorized person who used the PHI or to whom the disclosure was made 3. Whether the PHI was actually acquired or viewed 4. Extent to which the risk to the PHI has been mitigated If assessment of factors fails to show a low probability that the PHI has been compromised, breach notification is required 24

Breach Notification: Examples Example 1: A laptop computer was stolen and recovered, and analysis shows the PHI on the computer was never accessed, viewed, transferred, acquired or compromised in any way Example 2: Credit card numbers and social security numbers were included on the laptop, and analysis shows the data was transferred 25

Breach Notifications: Obligations Notify impacted individuals written in plain language by written notice by first class mail (or e-mail if agreed by individual) to include: Description of how breach occurred Date of breach + breach discovery Description of compromised PHI (Data fields) Steps individuals can take to protect themselves from resulting harm Steps CE is taking to resolve and protect against further breaches Contact info of the Privacy Officer Also notify by phone or other means for urgent situations Minors: Notify parent or designated guardian Deceased: Notify next of kin Disclosure of SSN: Check with state 26

Breach Notifications: Obligations Notify Secretary of HHS Breaches involving more than 500 individuals - Submit notification online: http://ocrnotifcations.hhs.gov/ - No later than 60 days after discovery Breaches involving less than 500 individuals - Should be documented and submitted annually to HHS - Documentation of breaches should be maintained for 6 years from the last breach Notify media If involves more than 500 residents of state or jurisdiction Must be prominent media outlet No later than 60 days after discovery 27

Audits, Consequences + Penalties 28

Avoiding HIPAA Consequences Read the full rule Modify and redistribute your individual Notice of Privacy Practices Amend BAAs to add security and privacy provisions and reissue for signature Do a test run before ever encountering a breach Complete a Security Risk Assessment Identify gaps + fix Document policies + procedures Create an action plan for breaches Conduct regular internal audits Have your BAAs handy; alert your BAs Establish audit reports, schedule + print Train staff 29

Surviving a HIPAA Audit Audits have been rare; tend to occur with breach notification Initial document request period: 10 days Audits process entails: Site visit: Interview stakeholders and exam of health information systems Site audit report: Physical safeguards, daily operations, adherence to policies and HIPAA compliance Remediation: Identify gaps and prioritize fixes; CEs should start immediate good faith effort If you ve prepared + documented it, you ll show a good faith effort 30

HIPAA Security Rule Risk Analysis 5 components of the Security Risk Analysis Security Component Physical Safeguards Administrative Safeguards MicroMD Security Measures to Help N/A: These are practice safeguards Use your MicroMD software to: Control information access Review user activities Technical Safeguards MicroMD EMR Audit Controls Practice-controlled User Access Designation Login Management and Password Protection Controls Direct Secure E-mail Secure and Timely Data Sharing with Patients MicroMD ebackup Cloud-based MicroMD Policies + Procedures Organizational Requirements N/A: These are practice safeguards Business Associate Agreement with MicroMD 31

MicroMD HIPAA Compliance + Support BAAs Secure signed BAAs from each client Provide you with a signed BAA from MicroMD Secure signed BAAs from each MicroMD vendor + subcontractor HIPAA Compliance Officer: Linda Spinelli: linda.spinelli@henryschein.com Maintain HIPAA-compliant Policies Procedures Training Security Encrypted HIPAA-compliant data security for MicroMD Cloud data center Offer HIPAA-compliant ebackup service for non-cloud data back up Auditing Audit logs to track and document HIPAA-related items Client Support for questions regarding audit documentation 32

HIPAA Resources Federal Register HIPAA Final Rule, Jan 2013: http://www.gpo.gov/fdsys/pkg/fr-2013-01-25/pdf/2013-01073.pdf (138 Pages) HIPAA Survival Guide: http://www.hipaasurvivalguide.com/hipaa-omnibusrule.php AMA Summary: http://download.amaassn.org/resources/doc/washington/x-pub/hipaaomnibus-final-rule-summar.pdf 33

HIPAA Omnibus Rule Overview For additional questions, please email me at crystal.stanton@henryschein.com 34