HIPAA and Beyond: The Evolving Landscape of Health Privacy



Similar documents
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

Digital Signatures The Law and Best Practices for Compliance. January 2014

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

whitepaper THE ESIGN ACT Harnessing New Hiring Efficiencies with Electronic Signatures

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

Analysing the US HIPAA legacy and future changes on the horizon

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

Use of Check Images By Customers of Financial Institutions. Version Dated: July 14, 2006

Issues to Address: The Privacy Concerns of Individuals

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. 15 USC 7001 et. seq. (E-SIGN) and

Business Associate Liability Under HIPAA/HITECH

Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC

Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

How To Help Your Business With Data Security And Privacy

HIPAA Employee Compliance Program TRAINING MANUAL

Health Care Data Breach Discovery Strategies for Immediate Response

ILHIE Authority Data Security and Privacy Committee. Briefing Summary: Policies # 1, 3 (Panel #1) -- Patient Choice, Opt-in/Opt-out

University Healthcare Physicians Compliance and Privacy Policy

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Adopting Electronic Medical Records: What Do the New Federal Incentives Mean to Your Individual Physician Practice?

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

White Paper. The E-Sign Act. Use and enforceability of identifiers, passwords and personal identification numbers as signatures

Health Information Exchange (HIE) in Minnesota

Special Report The HITECH Act

Bill Moran and Betta Sherman

Security Is Everyone s Concern:

Data Breach and Senior Living Communities May 29, 2015

Effective Electronic Delivery and Execution of Documents Required under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA")

BUSINESS ASSOCIATE AGREEMENT

Data Breach, Electronic Health Records and Healthcare Reform

UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS. ) IATRIC SYSTEMS, INC., ) ) ) Civil Action No. 1:14-cv ) v. ) ) FAIRWARNING, INC.

ELECTRONIC HEALTH RECORDS

Ifrah Law Internet Advertising Practice

What s New with HIPAA? Policy and Enforcement Update

CHAPTER 6. UNIFORM ELECTRONIC TRANSACTIONS ACT

HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply

E-SIGNATURES FY Movement Mortgage, LLC s e-signature Policy & Procedures Manual. This policy was last revised December 4, 2014.

HIPAA. HIPAA and Group Health Plans

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HOUSE OF REPRESENTATIVES STAFF ANALYSIS SUMMARY ANALYSIS

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Mastering Data Privacy, Social Media, & Cyber Law

BENCHMARK MEDICAL LLC, BUSINESS ASSOCIATE AGREEMENT

The Internet of Things. Suzanne Bell (Wilson Sonsini Goodrich & Rosati) Tracy Shapiro (Wilson Sonsini Goodrich & Rosati) Vineet Shahani (Nest Labs)

ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT

HIPAA Compliance: Efficient Tools to Follow the Rules

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

Isaac Willett April 5, 2011

APPENDIX 1: Frequently Asked Questions

IAPP PRIVACY ACADEMY

Transcription:

HIPAA and Beyond: The Evolving Landscape of Health Privacy Melissa Bianchi, Hogan Lovells US LLP Ann Tobin, UnitedHealth Group IAPP Global Privacy Summit, March 9, 2012

No Longer Just HIPAA New developments that are changing the regulatory landscape for healthcare companies regulated by HIPAA Changes to and expansion of HIPAA Activities by other agencies that could broaden regulation of healthcare companies 2 New technologies (e.g., mobile health, website use) that raise novel regulatory issues for healthcare companies

Expansion of HIPAA Expecting Final HIPAA rules first quarter of 2012? Beyond the Office for Civil Rights HHS is expanding privacy and security requirements for HIPAA covered information. Office of Human Subjects Research Protections An Advanced Notice of Proposed Rulemaking (ANPRM) issued in 2011 regarding human subjects research and secondary uses Office of the National Coordinator Meaningful Use Health Information Exchange Reconsideration of de-identification standards within HIPAA and beyond State Attorneys General 3

Rules on Human Subjects Research ANPRM published in July 2011 Contained proposed requirements for human subject research that, if adopted, would: Require research entities to apply HIPAA-like privacy and data security standards to all studies involving identifiable or potentially identifiable data 4 Restrict the ability to use information for future research purposes; change rules for biospecimens

EHRs Meaningful Use Proposed rules for Stage 2 of the Meaningful Use program will be released early this year Office of the National Coordinator for Health IT (ONC) is already working on Stage 3 Future stages of meaningful use may impose privacy and security requirements on EHRs Already additional security requirements for certified EHRs More changes possible as these programs move from merely storing health information toward HIEs 5

Health Information Exchange States have received funding and are creating their own HIEs Focus of ONC in 2012 ONC is preparing ANPRM on governance of the Nationwide Health Information Network (NWHIN) May include privacy and security guidance for health information exchange, including: Security requirements Rules on consent 6

New Concepts of De-identification HHS work on de-identification HHS de-identification guidance ANPRM on human subjects research 7 Consistent with changing approach to deidentification outside of HHS Expansive EU concept of personal data Preliminary FTC report foreshadows broader definition in US

Other Federal Activities Beyond HHS, other federal agency and legislative activities affect entities subject to HIPAA FTC activities Privacy legislation 8

FTC Enforcement in Healthcare Industry The final FTC report is expected to outline what the FTC expects companies to do as best practices when it comes to privacy. HIPAA covered entities will have HIPAA notice of privacy practices and website privacy policy FTC Enforcement: In 2009/2010 FTC brought two high-profile enforcement actions against CVS and RiteAid Violation of Section 5 of FTC Act for improper storage/disposal of PHI Settlements require establishment of comprehensive security programs Settlements require third-party security assessment every other year 9

Federal Legislation Congress considered dozens of bills in 2011, including: 10 Comprehensive privacy legislation Federal data breach Effect on entities already subject to HIPAA: Safe harbor for HIPAA covered entities? Business associates? Information covered by HIPAA?

Mobile Privacy 11 New landscape for HIPAA covered entities (disease management) Areas beyond HIPAA covered entities: employee data, pharmaceutical companies, federal government guidance re: texting, etc.

Mobile Privacy, cont. WSJ 12/10 article on mobile app privacy, reporting that of 101 popular smartphone apps, 45 didn t even have a privacy policy and others transmitted information without consumer consent 12 Almost immediately thereafter, multiple class action lawsuits were filed against Apple, Google, and mobile app developers and advertisers These lawsuits have foundered due to a failure of plaintiffs to prove financial harm Still, have been costly and highlights the focus on mobile privacy 2011 saw FTC bring first enforcement actions against mobile app developers FTC to hold mobile payments workshop in April, focusing on risks to privacy and security of mobile data

Mobile Privacy for Healthcare Companies BOTTOM LINE: From a privacy and security perspective, mobile devices should be treated the same as computers, and mobile apps should be treated the same as websites 13 Additional considerations: sensitivity of location data, unique device identifier, other information stored locally on smartphones (e.g., address book, contacts)

Website Data Practices Moving data to the cloud trusting vendors with your privacy and security compliance Continued focus on web tracking and third-party marketing Enforcement efforts look at language in privacy policies 14

Electronic Signatures Federal standard (ESIGN) In 2000 Congress enacted the Electronic Signatures in Global and National Commerce Act ( ESIGN ) Aimed at facilitating the use of electronic records and electronic signatures in interstate and foreign commerce 15

State Electronic Transactions Laws ESIGN expressly allows states to modify, limit, or supersede the federal statute if states adopt the Uniform Electronic Transactions Act (UETA) or adopt an electronic transactions law that is consistent with ESIGN The UETA provides that [a] record or signature may not be denied legal effect or enforceability solely because it is in electronic form - UETA 7(a) 47 states, the District of Columbia, Puerto Rico, and the Virgin Islands have adopted the UETA Illinois, New York, and Washington have not adopted the UETA, but do have laws pertaining to electronic transactions 16

General Requirements for Electronic Signatures Assent and Consent Both parties must agree to the use of electronic signatures Authentication There must be a mechanism to authenticate the parties to an electronic transaction 17 Record Retention Consumers must be provided a reasonable means to retain the relevant electronic agreement or notice

In Conclusion Watch for changes to and expansion of HIPAA by HHS, including OCR, OHRP, ONC Watch for continuing activity of other agencies affecting healthcare companies e.g., FTC Landscape will continue to change and develop with mobile health and other new technologies

Reference Materials ANPRM for Revisions to Common Rule FTC--CVS/Caremark Matter HHS CVS/Caremark Matter FTC Rite Aid Matter HHS Rite Aid Matter Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers (December 1, 2010) HHS mhealth Initiatives MN Attorney General Complaint against Accretive Health HHS Office of National Coordinator HIT

Questions & Contact Information Melissa Bianchi Partner Hogan Lovells US LLP melissa.bianchi@hoganlovells.com 202-637-3653 Ann Tobin Senior Privacy Counsel UnitedHealth Group ann_e_tobin@uhc.com 952-936-7236