Managing Records: Retention, Destruction and Disposal



Similar documents
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures

HIPAA Training for Hospice Staff and Volunteers

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

Other terms are defined in the Providence Privacy and Security Glossary

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

HIPAA Training for Staff and Volunteers

University of Wisconsin-Madison Policy and Procedure

Record Custodian to Health Information Steward Best Practices in Record Retention, Storage, and Destruction

Electronic Data Retention and Preservation Policy 1

Discovery Technology Group

About this Tool Information Security for Residents...

Why Lawyers? Why Now?

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA & HITECH AND THE DISCOVERY PROCESS

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY

HIPAA Security Alert

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY

HIPAA: Bigger and More Annoying

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL Issue Date: 15 December 2014 Revised:

LSE PCI-DSS Cardholder Data Environments Information Security Policy

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

Approved By: Agency Name Management

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

E-Discovery Toolkit for Educational Institutions

RETENTION OF UNIVERSITY RECORDS

C.T. Hellmuth & Associates, Inc.

Student Guide.

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

The E-Discovery Process

CREDIT CARD NUMBER HANDLING PROCEDURES POLICY October

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Information Security. Annual Education Information Security Mission Health System, Inc.

Method 1 of 4: Understanding What Makes a Good Business Continuity Plan

PCI Data Security and Classification Standards Summary

into HIPAA Ian Campbell and The information a service to Short Act, HIPAA "Administrative use to host contract with an Documentation regulations.

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

7Seven Things You Need to Know About Long-Term Document Storage and Compliance

HIPAA Privacy: Refining Your Implementation. Presented by Rhys W. Jones HCCA Compliance Institute April 28, 2003

MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

HIPAA compliance audit: Lessons learned apply to dental practices

This article first appeared in the International Technology Law Association s ebulletin, Volume 2, Issue 3, summer 2008.

Policy Number. Administrative Signature:

Cyber Self Assessment

RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration

HIPAA Compliance: Are you prepared for the new regulatory changes?

CD ROM, Inc Commercial Catalog. Destruction and Recycling Services

M E M O R A N D U M. Definitions

Life Cycle of Records

OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR Court Reporters and HIPAA

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

plantemoran.com What School Personnel Administrators Need to know

United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Retention & Destruction of Medical Records

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA Security. assistance with implementation of the. security standards. This series aims to

TERMINAL CONTROL MEASURES

Guidelines for Congregations Internal Control Best Practices

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

SOUTH EASTERN SCHOOL DISTRICT

Meeting the HIPAA Training and Business Associate Requirements Questions and Answers, with HIPAA Security Expert Mike Semel

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

Information Security Plan effective March 1, 2010

Model Business Associate Agreement

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

b. USNH requires that all campus organizations and departments collecting credit card receipts:

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

HIPAA RISK ASSESSMENT

Congregation Identity Theft Education Program

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Montclair State University. HIPAA Security Policy

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI) Affordable ~ Clean ~ Safe ~ Simple ~ Flexible

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240

Document Imaging Services

HIPAA 101: Privacy and Security Basics

OFFICE OF COURT ADMINISTRATION VENDOR ACCESS POLICY

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

Information Security Policy

Management: A Guide For Harvard Administrators

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

Credit Card Security

HIPAA Risk Assessments for Physician Practices

Information Security Policy

Transcription:

Managing Records: Retention, Destruction and Disposal Presentation by Jennifer L. Cox, J.D. Cox & Osowiecki, LLC Hartford, CT April 10, 2014

Today s Program Identify the universe of records involved Distinguish patient care/client records from other records Discuss best practices versus minimum retention periods Discuss destruction holds Explain e-discovery and its impact on document planning and record retention Review HIPAA requirements Media re-use rules (and dangers) Identify appropriate destruction and disposal methods Outline best practices for documentation of disposal 2

Creating and Maintaining Policies Never have a policy with which you are unlikely to comply Assign a committee or work group to do periodic review of the oversight Adjust practices (and update policies) as needed Who needs to be involved in the policy creation? 3

Team Process Needed Record retention and destruction planning is multi-purpose, interdisciplinary in nature Compliance Risk Effective Record Management HIM Governance, Finance 4

Document Management Planning Create a written retention schedule and policy Enterprise-wide approach is important Capture universe of records you need to maintain and track Recognize specific requirements for each type of record Clinical including billing records for care) Client (but non-hipaa) Business/financial 5

Is There A Template Policy For This? Unfortunately, no. This is not a one-size-fits-all situation While there are some core items to identify, the planning should be customized for each entity Start by: (1) preparing a list of the types of data involved (2) identifying your facility s approach 6

No Template, But Various Online Resources NACHC has a 2007 guide for both non-clinical and clinical records (good place to start) www.nachc.com/client/documents/publicationsresources/rm_18_07.pdf AHIMA has various guides HHS has HIPAA guides that discuss destruction: www.hhs.gov/ocr/privacy/hipaa/administrative/se curityrule/index.html 7

Retention Minimums: Not Even Half The Battle Do not concentrate only on regulatory retention minimums Not always clear from just regulation payer rules, exceptions, other standards can extend periods Use longest time it could be (not the shortest) Clinical record minimums vary (more than you think) 8

Clinical Patient Record Retention Minimums Connecticut law for clinic records: 5 years from last date of care Do not destroy as you go, entire cycle of record should be maintained Connecticut law for practitioner records 7 years from last date of care (or 3 from date of death) Do not destroy as you go, entire cycle of records Some records must be kept for 10 years!! Instead, focus on all uses, not just the DPH/HHS shortest timeframe 9

Clinical Records: Diverse Life Cycle Intake Destruction and disposal Care and billing Records Serve Many Purposes Program evaluation, investigation, litigation Audit and backup QI/QA, research, population management, analytics 10

Non-Patient/Client Records While we tend to focus on clinical and client records, you need a plan for non-clinical as well Business: corporate, governance, HR, grants, accreditation, program evaluation, policies and procedures Financial: CMS look back (4 year minimum, 10 years to be safe), tax records Some of these areas have their own minimums!! 10 years is the lowest common denominator for most Core corporate and governance materials should be retained in perpetuity 11

Contracts, Grants And Programs Retention obligations are often in the fine print of a contract, grant or program Important to have someone read for those issues when new contracts, grants, programs start Flagging or increasing retention of materials that may fall into more than one bucket is critical 12

Holds Although materials may have exceeded the timeframe in your policy, there are specific times you would hold off on destruction: Litigation or investigation Prolonged audit or billing issue Special request Pending requests 13

Implementing Hold Policy And Process Prior to actual destruction, consider whether anything is on hold how are holds communicated within the enterprise? 14

E-Discovery Federal and state court rules that prohibit you from destroying potential evidence in a claim, and require you to turn over relevant e-materials Applies in litigation or in anticipation of litigation More common in HR or contract claims than malpractice, but can apply in any litigation matter Hard to implement, and needs to be a priority in the event of (anticipated) litigation 15

E-Discovery (cont) Intersection of administrative document management and IT/IS Four key steps in planning for potential e- discovery situations: Determine where the data exist in the enterprise How is it identified (can it be located rapidly)? Do you have policies for BYOD? Will you need an outside vendor to retrieve the data? 16

E-Discovery: Needle In A Hay Haystack Communications are hard to find if you do not know where to look 17

E-Discovery (cont) Primary areas: email and documents (includes draft documents you retain) If you do not consider these issues until a litigation matters occurs, it will be too late When litigation or claim commences, ask counsel immediately about any e-discovery steps you need to take Have hold capability for the sources of data that might be affected 18

HIPAA Specific Requirements Records must be rendered unreadable, indecipherable, and not able to be reconstructed You can use a vendor but will need a business associate agreement, and clear understanding of what the vendor will do with the materials to destroy them 19

Acceptable Destruction Methods Paper Shredding, burning, chemical destruction (pulping) Electronic materials, depends on what they are, and what method makes them unreadable and indecipherable. Examples: Clearing Purging (degaussing or magnetic field disruption) Physical destruction (pulverization, melting, incineration, shredding) 20

Never Throw PHI In The Trash Using trash alone is a HIPAA Failure 21

HIPAA Rules For Destruction You can use a locked shred-it box, or opaque bags in a secure area, while awaiting disposition You are not required to insist on onsite destruction from a vendor (but if they ll do it that way, great) 22

Things That Are Not Always Obvious When PHI is involved Watch out for printers in remote areas or offices, train the users carefully Do not allow shared passwords or log-in Do not allow shared media storage devices If you allow BYOD, what is the plan for destruction? Back up and copies must be considered 23

HIPAA: Media Re-Use Electronically stored information is located in a variety of devices and media that could be reused Ensure that once data are not needed, or a workforce member s reason for access to the data has ended, you do not put a device or media back into use before purging the PHI on the device or media hardware and software. Consider anything with a memory, anything portable, anything that can store PHI: Ex: Flash drives, back-up tapes, copiers, laptops, hard drives, CD, dvd, laser discs, etc. 24

Documentation of Destruction Policies should reflect plan for documenting record destruction 25

Documenting Destruction Create a log of what types of data were destroyed For patient/client files, you may want to include a batched list of names with another identifier, preferably record or account number (not d/o/b or SSN) Ask vendors for proof of destruction and methods 26

Documentation of Destruction: Machines and Hard drives Be careful with machines that have memory that are being: reclaimed off lease used in another department donated Try to get in writing from leasing agent or vendor that the machine is clear of memory 27

Documentation of Destruction: Portable Storage Media Are you internally re-using flash drives, CDs, or DVDs? You will want a central processing point Plan for central collection of spent or no longer usable media to process for destruction For HIPAA, you need an inventory when media is taken out of service and or destroyed, update the inventory 28

Do Not Forget Virtual Records Cloud storage that contains copies of your data should be addressed in your policies and procedures for retention and destruction 29

Third Party Copies Business associates have obligations in your BAA to return or destroy PHI when it is no longer needed Other vendors copies should be planned for return or destruction You do not need a receipt or certificate if the contract (including BAA) says they will destroy it 30

Q&A Questions? 31