Electronic Medical Records: Legal and Ethical Implications for Patients



Similar documents
HIPAA PRIVACY AND SECURITY AWARENESS

ELECTRONIC HEALTH RECORDS

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

This questionnaire is designed for the consumer to test their knowledge of electronic health records.

HIPAA Compliance Guide

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA Privacy Overview

HIPAA Security Rule Compliance

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

Huseman Health Law Group 3733 University Blvd. West, Suite 305-A Jacksonville, Florida Telephone (904) Facsimile (904)

HIPAA Compliance Guide

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

HIPAA Information Security Overview

Joseph Suchocki HIPAA Compliance 2015

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

Datto Compliance 101 1

HIPAA and Mental Health Privacy:

Compliance HIPAA Training. Steve M. McCarty, Esq. General Counsel Sound Physicians

Data Security Incident Response Plan. [Insert Organization Name]

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Why Lawyers? Why Now?

APPENDIX 1: Frequently Asked Questions

Health Information Privacy Refresher Training. March 2013

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

What Virginia s Free Clinics Need to Know About HIPAA and HITECH

Oregon Prescription Drug Monitoring Program. Terms & Conditions of Account Use Agreement. Statutory Authority:

HIPAA: Bigger and More Annoying

Jeff M. Bauman, Psy.D. P.A. and Associates FLORIDA-HIPAA PRIVACY NOTICE FORM

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA Orientation. Health Insurance Portability and Accountability Act

Nursing Home Facility Implementation Overview

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

The Basics of HIPAA Privacy and Security and HITECH

Data Management & Protection: Common Definitions

HIPAA Security Alert

NOTICE OF PRIVACY PRACTICES

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

ACKNOWLEDGMENT OF RECEIPT OF NOTICE OF PRIVACY PRACTICES

HIPAA Privacy Keys to Success Updated January 2010

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

Introduction to The Privacy Act

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

MYTHS AND FACTS ABOUT THE HIPAA PRIVACY RULE PART 1

HIPAA Refresher. HIPAA Health Insurance Portability & Accountability Act

HIPAA and Privacy Policy Training

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Health Insurance Portability and Accountability Act (HIPAA) Overview

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

Guadalupe Regional Medical Center

TABLE OF CONTENTS. University of Northern Colorado

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

APPLETREE PEDIATRICS, PA NOTICE OF PRIVACY PRACTICES

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association

White Paper #6. Privacy and Security

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

HIPAA TRAINING. A training course for Shiawassee County Community Mental Health Authority Employees

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

Getting Hip to the HIPAA and HITECH Act Compliance

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

California State University, Sacramento INFORMATION SECURITY PROGRAM

9/11 Heroes Stamp Act of 2001 File System

Reason(s) For Referral: Current medications:

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

EHRs and Information Availability: Are You At Risk?

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

HIPAA COMPLIANCE AND

Standard: Information Security Incident Management

Releasing Information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

HIPAA Compliance Annual Mandatory Education

Somansa Data Security and Regulatory Compliance for Healthcare

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

HIPAA Privacy. September 21, 2013

Clinical Solutions. 2 Hour CEU

NORTHSTAR DERMATOLOGY, PA NOTICE OF PRIVACY PRACTICES

HIGHMARK BLUE CROSS BLUE SHIELD DELAWARE NOTICE OF PRIVACY PRACTICES PART I NOTICE OF PRIVACY PRACTICES (HIPAA)

Patient Privacy and HIPAA/HITECH

Privacy for Beginners: What Every Healthcare Worker Needs to Know About HIPAA and Privacy

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

An Overview of Disaster Recovery Planning Under HIPPA Security Rules

Introduction to HIPAA Privacy

POLICIES Supersedes Series No:

USES AND DISCLOSURES OF HEALTH INFORMATION

NOTICE OF HEALTH INFORMATION PRIVACY PRACTICES (HIPAA)

Transcription:

Electronic Medical Records: Legal and Ethical Implications for Patients Linda A. Simunek, RN, PhD, JD Executive Director, Doctoral Success Grant and Adjunct Professor in Law in Healthcare Education, Fischler School of Education, Nova Southeastern University 2-11-2013

2 Objectives 1. Describe the duty of care owed to patients in maintaining privacy, confidentiality, and security of health care information in electronic medical records (EMR) 2. Describe the parameters for EMR patient information data sharing in a reformed health care delivery system 3. Describe the elements and penalties in criminal and civil prosecution cases for breach of health information privacy, confidentiality and security

What are Electronic Medical Records? Electronic Medical Records (EMR) or Electronic Health Records (EHR) are electronic, machine readable versions of much of the data found in paper-based records, comprising both structured and unstructured patient data from disparate, computerized ancillary systems and document imaging systems. Clinical documentation may originate in either paper records or computerized data; however, the data are not comprehensively coded. (Dick, R.S. Steen E.B, and Detmer, D.E. (1997), The computer based patient record: an essential technology for health care. Institute of Medicine, Washington: D.C)

Definition of Electronic Health Record System An EHR system includes: 1. Longitudinal collection of electronic health information for and about persons, where health information is defined as information pertaining to the health of an individual or a health care provider to an individual 2. Immediate electronic access to person and population-level information by authorized, and only authorized users. (cont d).

Definition of Electronic Health Record System 3. Provision of knowledge and decisionsupport that enhances the quality, safety, and efficiency of patient care, and, 4. Support for efficient processes for health care delivery (Institute of Medicine (2003). Key capabilities of an HER system. Washington, D.C.)

6 Computer-based Documentation: Past, Present, and Future

7 Glossary of EMR Patients Rights-The Right to Information Privacy Specific right of an individual to control the collection, use, and disclosure of personal information (Center for Technology and Democracy), (CT&D) A state or condition of controlled access to personal information; the ability of an individual to control the use and dissemination of information that relates to self, the individual s ability to control what information is available to various users and to limit re-disclosures of information (ASTM)

8 The Right to Information Privacy The right of individuals to keep information about themselves from being disclosed to anyone. (Computer-Based Patient Record Institute, CPRI (1994)

9 The Right to Confidentiality Tool for protecting privacy (CT&D) Status accorded to data or information indicating that they are sensitive for some reason and therefore need to be protected against theft, disclosure and improper use (ASTM) The act of limiting disclosure of private matters (CPRI)

10 The Right to Information Security Encompasses all the safeguards in an information system (CT&D) Totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness and oversight of these components (ASTM) Means to control access and protect information form accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss (CPRI)

11 Typical Users of Health Information Patient Primary care physician Health insurance company Clinical laboratory Local retail pharmacy Pharmacy benefits manager Consulting physician

12 Typical Users of Health Information Local hospital State bureau of vital statistics Accrediting organization Employer Life insurance company Medical Information Bureau Managed care company Attorney State public health and family physician State agency collecting hospital discharge data Medical researcher

13 Common Threats to Healthcare Information Security Insider accidental disclosure Insider abuse of access privileges Insider unauthorized access Outsider intruders

14 Common Threats to Information Integrity Insider accidental errors Insider malicious attack Intruder accidental or malicious attack Equipment failure Software failure Strategic attack (e.g. virus)

15 Common Threats to Information Reliability Natural hazards, earthquakes, tornadoes, ice storms, fires, floods, electrical storms, other natural disasters Equipment and software failures-hardware breakdowns and software failures that cause unexpected systems suspension or shutdown Human error-any human error that would cause hardware or software to improperly function, causing unexpected system disruption or shutdown Theft, malice or strategic attack, purposeful theft or attack on any component of the information system with the intent of causing system disruption or shutdown

16 Guiding Principles Behind HIPAA Privacy Protection Setting boundaries for the use of health information and imposing a legal duty of confidentiality on those who provide and pay for health care and on other entities that receive health information form them Requiring measures for protection of health information Providing consumer control over individual information Establishing sanctions for the misuse of information Balancing individual rights with the public good

17 Privacy Rule and Covered Entities A major goal of the Privacy Rule is to ensure that the individual s health information is properly protected while allowing the flow of information needed to provide and promote high quality health care and to protect the public s health and well being.

18 Individually Identifiable Health Information Individually identifiable health information is information, including demographic, data that relates to: The past, present, or future physical or mental health or condition of an individual The provision of health care to the individual The past, present, or future payment for the provision of health care to the individual

19 Privacy Rule and Covered Entities Health plans Health care providers Healthcare clearinghouse Business associates

Signed authorization form for use and disclosure of protected health information (PHI) Description of the information to be used or disclosed Name of other specific identification of the person(s) or class of persons authorized to make the requested use or disclosure An expiration date or event that relates to the individual or the purpose of the use or disclosure 20

21 Signed authorization form for use and disclosure of PHI A statement of the individual s right to revoke the authorization in writing and the exceptions to the right to revoke, together with a description of how the individual may revoke it A statement that information used or disclosed pursuant to the authorization may be subject to redisclosure by the recipient and no longer protected by the privacy Rule Signature of the individual and date of authorization

22 Signed authorization form for use and disclosure of PHI When the authorization is signed by a personal representative of the individual, there must be a description of the representative s authority to act for the individual

23 Typical functions of the Chief Security Officer Security strategic planning Development of enterprise wide security policy for safeguarding the access, integrity and availability of information and information systems Development of enterprise-wide procedures for security policy implementation Coordinate the administration of security software

Typical functions of the Chief Security Officer Manage confidentiality agreements for employees and contractors Coordinate security procedures Coordinate employee security training Monitor audit trails to identify security violations Conduct the assessment of enterprise information systems Develop business continuity plan 24

25 Health Information Security Controls Administrative controls Physical controls Technical Controls Dynamic passwords Encryption Detection and intrusion systems Other security services

26 Health Information Security Checklist u u Ø Ø Ø Ø Audit Trail Permits audit trail analysis Automatic Activation Passwords Text/Numeric Biometric Face Voice Fingerprint

27 Health Information Security Checklist Electronic Signatures Role-based access Data validation Back-up Process Encryption

28 Health Information Risk Analysis and Assessment Identifying threat or risks to security, e.g., human error such as data entry mistake, unauthorized physical access to data, sabotage, power failures, and malfunction of software or hardware Determining how likely it is that any given threat may occur Estimation of the impact of an untoward event

29 Policies and procedures and documentation requirements Covered entities must have security policies and procedures documents in written format. Documentation must be retained for six years from the date of the creation or the date when it was last in effect, whichever is later.

30 Criminal Prosecution and Case Law Examples and Analysis Breach of Privacy Breach of Confidentiality Breach of Security

31 Handout-Using the Electronic Health Record Evaluation Checklist (HER) Product Name Company Evaluation Date Chart Features-Present/Absent; Esential? Point Value Medication Features Laboratory X-ray Pathology Features Telephone Call Features

32 Handout-Using the Electronic Health Record Evaluation Checklist (HER) Diagnosis Features Referral Features Preventive Medicine Features Clinical Encounter Patient Education Features Population Health Management Communication and Infrastructure

33 Handout-Using the Electronic Health Record Evaluation Checklist (HER) Communications Decision Support Data Storage and File Formats Standards Supported Interface Options Operating Systems Technology

34 Contact Information for Linda Simunek Linda Agustin Simunek 19355 SW 25 Court Miramar, Florida 33029 Monaco Cove, Gate Code 7488 954-830-2516 (Cell) 954-262-8660 (NSU Office) simunek@nova.edu lindasimunek7@gmail.com

35 References Carter, J.H. (2008). Electronic health records, American College of Physicians: Pa. Department of Health and Human Services. 2003.45 CFR Parts 160, 162, and 164. Federal Register. Vol 68, Now. 34. February 20, 2003 Horine, G. (2005) Absolute beginner s guide to Project management ISBN23: 9780789731975 Johns, M.L. (2003). HIPAA security: Computer based training modules. Chicago Holistic Training Solutions

36 Websites www.healthprivacy.org/usr_doc/ 34775.pdf www.privacyrights.org/ar/ PharmComplaint.htm www.fbi.gov/page2july05/ cyber072505.htm http://health-care-it.advanceweb.com www.healthmanagement.com www.healthcare-informatics.com www.ansi.org/hhitsp