3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health



Similar documents
PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

HIPAA Security Rule Compliance

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Privacy & Security White Paper

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Compliance: Are you prepared for the new regulatory changes?

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

The HIPAA Audit Program

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

HIPAA Security Alert

HIPAA Compliance Guide

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Mobile Data Protection - The Call for Privacy and Security for Wireless PII

M E M O R A N D U M. Definitions

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

HIPAA Information Security Overview

Security Is Everyone s Concern:

VMware vcloud Air HIPAA Matrix

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

HIPAA and Mental Health Privacy:

Huseman Health Law Group 3733 University Blvd. West, Suite 305-A Jacksonville, Florida Telephone (904) Facsimile (904)

2/9/2012. The Third International Conference on Technical and Legal Aspects of the e-society CYBERLAWS 2012

HIPAA/HITECH: A Guide for IT Service Providers

HIPAA Requirements and Mobile Apps

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Healthcare Compliance Solutions

CHIS, Inc. Privacy General Guidelines

Montclair State University. HIPAA Security Policy

Datto Compliance 101 1

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Healthcare Compliance Solutions

HIPAA Security COMPLIANCE Checklist For Employers

Overview of the HIPAA Security Rule

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

HIPAA and HITECH Compliance for Cloud Applications

Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

Privacy Policy Version 1.0, 1 st of May 2016

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

Meaningful Use Crosswalk to the Security Rule

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

Richard Gadsden Information Security Office Office of the CIO Information Services

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

Privacy Risk Assessments

HIPAA Compliance Guide

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

HIPAA: In Plain English

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

How To Write A Health Care Security Rule For A University

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

HIPAA Security Series

State HIPAA Security Policy State of Connecticut

My Docs Online HIPAA Compliance

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA Security Matrix

Data, Privacy, Cookies and the FTC in Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Privacy by Design Setting a new standard for privacy certification

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

C.T. Hellmuth & Associates, Inc.

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

HIPAA Requirements for Data Security

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS

Understanding HIPAA Regulations and How They Impact Your Organization!

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Overview of Topics Covered

What s New with HIPAA? Policy and Enforcement Update

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

787 Wye Road, Akron, Ohio P F

OCR UPDATE Breach Notification Rule & Business Associates (BA)

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Meaningful Use Stage 2 & HIPAA: The Relationship between HIPAA and Meaningful Use Privacy & Security Regulations View the Replay on YouTube

Why Lawyers? Why Now?

HIPAA: Compliance Essentials

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

HIPAA Security Rule Compliance and Health Care Information Protection

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Security It s an ecosystem thing

HIPAA BUSINESS ASSOCIATE AGREEMENT

New Uses for ROCKET: HIPAA Compliant Workspaces and Other Developments. Tara Helmer Research Services Consultant July 12, 2013

Transcription:

PRIVACY & SECURITY Regulatory Patchwork: Mobile Health Anna Watterson, Davis Wright Tremaine, LLP Overview When HIPAA applies to mobile apps When FTC has jurisdiction over mobile apps Other considerations: FDA mobile device regulations and guidance, children's privacy laws, financial privacy laws, international data protection laws, and state privacy and data security laws Privacy practices and privacy policies Data security for mobile apps and devices HIPAA Who s Covered? Who s Not Covered? Covered Entities Consumers Business Associates Entities that do not fall within the HIPAA definition of covered entity or business associate 1

HIPAA Hot Potato Claims data held by a health plan (covered by downloaded to an individual s phone (not subject to uploaded to a health app (possibly subject to sent to the individual s health care provider (covered by HIPAA Hot Potato Claims data held by a health plan (covered by downloaded to an individual s phone (not subject to uploaded to a health app (possibly subject to sent to the individual s health care provider (covered by FTC Authority Section 5 of the FTC Act broadly prohibits unfair or deceptive acts or practices in or affecting commerce. Deception: a material representation or omission that is likely to mislead consumers acting reasonably under the circumstances Unfairness: a practice that causes or is likely to cause substantial injury to consumers that is not outweighed by countervailing benefits to consumers or competition and is not reasonably avoidable by consumers BUT: Limited jurisdiction 2

FTC Cautionary Tales Is your app collecting date of birth? If so, do you have an effective age-gate? Is your app collecting unique device identifiers and precise GPS location? Is your app employing an analytics services that tracks location info? Are you overselling or making promises that aren t 100% true (e.g., don t say something can be deleted forever if there are ways it could be retained without the user s consent)? Does the app validate SSL certificates and adhere to other applicable industry standards? Does the app obtain appropriate permissions to obtain certain data stored for the user s phone or access certain functionalities (e.g., access to camera functionality)? PaymentsMD PaymentsMD provided billing services to medical providers patients could pay bills through PaymentsMD website. PaymentsMD launched a free Patient Portal where consumers could view their billing history. PaymentsMD then launched Patient Health Report, where consumers could access, review, and manage their health records. According to the FTC, PaymentsMD tried to obtain the sensitive health information of consumers registering for the Patient Portal from health insurance plans, pharmacies, and a medical testing lab, without appropriate authorization from those consumers. [M]any consumers registering for the Patient Portal had no idea that respondent would seek to collect their sensitive health information from third parties. Required individual authorizations, BUT FTC alleged that the authorizations were hard to read and offering a single check box option for all four authorizations made the authorizations easy to skip over The Allegations: Deceptive Omission, Deceptive Representation The Result: Prohibited from engaging in the behavior at issue, required to delete or destroy data, notification to FTC required prior to certain corporate changes, FTC order is in effect for 20 years, among other things Personal Health Record (PHR) The FTC defines personal health record as an electronic record of identifiable health information on an individual that can be drawn from multiple sources and that is managed, shared, and controlled by or primarily for the individual. PHR Breach Notification Requirements ONC Model Notice of Privacy Practices 3

PHR Model Notice of Privacy Practices Voluntary standardized template Modeled after standard notices such as the FDA Nutrition labels and the financial industry model notice Goal is to provide[] a uniform and easy-to-understand approach for PHR companies to be transparent about certain key privacy and security issues Much like a soup can label, it requires transparency about the practices (or ingredients) but does not specify the practices that must be followed. http://www.healthit.gov/policy-researchersimplementers/personal-health-record-phr-model-privacy-notice Other Considerations State law (particularly California) International data protection laws FDA - Mobile Medical App guidance (updated issued Feb. 9, 2015) COPPA requirements Gram-Leach-Bliley New proposed legislation Consumer Bill of Privacy Rights Privacy Practices 4

FTC Report: Protecting Consumer Privacy in an Era of Rapid Change Calls on companies handling consumer data to implement recommendations for protecting privacy, including: Privacy by Design - Build in privacy protections at every stage of development. Simplified Choice for Businesses and Consumers -Give consumers control over what information is shared about them, and with whom. Greater Transparency - Disclose details about collection and use of consumers' information; provide consumers access to the data collected about them. Privacy by Design 7 Foundational Principles 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality Positive-Sum, not Zero- Sum 5. End-to-End Security Full Lifecycle Protection 6. Visibility and Transparency Keep it Open 7. Respect for User Privacy Keep it User- Centric Fair Information Practice Principles (FIPPs) Transparency Individual Participation Purpose Specification Data Minimization Use Limitation Data Quality and Integrity Security Accountability and Auditing 5

FTC Recommendations to Build Trust in Mobile Marketplace Provide timely, easy-to-understand disclosures Apps should have an easily accessible privacy policy Apps should provide just-in-time disclosures and obtain affirmative express consent before collecting and sharing sensitive information App developers should understand what data is collected by third parties (such as analytics or advertising companies) and how that data is used and shared App developers should consider participating in self-regulatory programs, trade associations, and industry organizations, which can provide guidance on how to make uniform, shortform privacy disclosures. [C]onsumers should have to actively consent before apps are allowed to access "sensitive" information such as geolocation, contacts, photos or media recordings. FTC Guidelines for Financial Privacy Notices: Does Your Financial Privacy Notice... use legal jargon? give new meaning to dense, indecipherable text? contain lengthy, unnecessarily complex sentences with convoluted clauses, multiple punctuation marks, and incomprehensible polysyllabic verbiage? Was Your Notice... "borrowed" from another company without regard for your privacy practices or your customers' concerns or needs? Security Requirements Does HIPAA apply? If so, implement the HIPAA Security Rule requirements Implement reasonable and appropriate security consider FTC data security related enforcement actions Consider State data security requirements 6

HIPAA Security Rule Ensure the confidentiality, integrity, and availability of all electronic protected health information (ephi) that the covered entity or business associate creates, receives, maintains, or transmits. Protect against any reasonably anticipated: (1) threats or hazards to the security or integrity of such information; and (2) uses or disclosures not permitted by the HIPAA Rules. 3 sets of safeguards implemented through standards and required and addressable implementation specifications Addressable Optional Physical Safeguards Administrative Safeguards Technical Safeguards Risk Analysis and Risk Management Risk Analysis: Assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of ephi Have you identified all ephi within your organization? What are the threats (human, natural, and environmental) to, and vulnerabilities (technical and nontechnical) of, information systems (devices, or media) that contain e-phi? Risk = Threat x Vulnerability x Likelihood x Impact Risk Management: Implementation of security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level Administrative Safeguards Security Management Process Risk Analysis Risk Management Sanctions Policy Information System Activity Review Assigned Security Responsibility Workforce Security Authorization, Supervision, Clearance, Termination Information Access Management Access Authorization, Access Establishment and Modification Security Awareness and Training Security Incident Procedures Response and Reporting Contingency Plan Backup, recovery, Emergency plans Periodic Evaluation Business Associate Agreements 7

Physical Safeguards Facility Access Controls Workstation Use Workstation Security Device and Media Controls Disposal Media Re-use Accountability Data Backup and Storage Technical Safeguards Access Control Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption Audit Controls Person or Entity Authentication Integrity Mechanism to Authenticate Electronic Protected Health Information Transmission Security Integrity Controls Encryption Mobile App Security Adopt and maintain reasonable data security practices. The FTC doesn t prescribe a one-size-fits- all approach. Consider the amount and type of data the app collects, and how such data will be used and shared to determine the appropriate security posture. Consider where the information collected is stored 8