HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives



Similar documents
OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

New HIPAA Rules and EHRs: ARRA & Breach Notification

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

What do you need to know?

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

HIPAA in an Omnibus World. Presented by

COMPLIANCE ALERT 10-12

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA Security Rule Compliance

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Why Lawyers? Why Now?

HIPAA 101. March 18, 2015 Webinar

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

STANDARD ADMINISTRATIVE PROCEDURE

Business Associate Agreement

Raymond: Beyond Basic HIPAA - GSHA Convention HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA and HITECH Compliance for Cloud Applications

Overview of the HIPAA Security Rule

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HIPAA Security Risk Analysis for Meaningful Use

HIPAA WEBINAR HANDOUT

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

HIPAA BUSINESS ASSOCIATE AGREEMENT

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HIPAA/HITECH: A Guide for IT Service Providers

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES

HIPAA and Mental Health Privacy:

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

Business Associates Agreement

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

University Healthcare Physicians Compliance and Privacy Policy

Understanding HIPAA Regulations and How They Impact Your Organization!

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Privacy and Security

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

HIPAA Security Overview of the Regulations

What s New with HIPAA? Policy and Enforcement Update

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc.

Community First Health Plans Breach Notification for Unsecured PHI

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Chris Bennington, Esq., INCompliance Consulting Shannon DeBra, Esq., Bricker & Eckler LLP Victoria Norton, R.N., J.D., M.B.A.

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

HIPAA and HITECH Compliance Under the New HIPAA Final Rule. HIPAA Final Omnibus Rule ( Final Rule )

BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT

Tulane University. Tulane University Business Associates Agreement SCOPE OF POLICY STATEMENT OF POLICY IMPLEMENTATION OF POLICY

HIPAA Update Focus on Breach Prevention

Business Associates and Breach Reporting Under HITECH and the Omnibus Final HIPAA Rule

The Basics of HIPAA Privacy and Security and HITECH

BUSINESS ASSOCIATE AGREEMENT

HIPAA & HITECH AND THE DISCOVERY PROCESS

Annual Report to Congress on HIPAA Privacy Rule and Security Rule Compliance. For Calendar Years 2009 and 2010

Health Information Privacy Refresher Training. March 2013

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

Security Is Everyone s Concern:

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

Please print the attached document, sign and return to or contact Erica Van Treese, Account Manager, Provider Relations &

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Document Imaging Solutions. The secure exchange of protected health information.

Network Security and Data Privacy Insurance for Physician Groups

Business Associate Agreement

Security Compliance, Vendor Questions, a Word on Encryption

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

BUSINESS ASSOCIATE AGREEMENT

Philip L. Gordon, Esq. Littler Mendelson, P.C.

Proofpoint HIPAA Breach Report:

Lessons Learned from HIPAA Audits

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

HIPAA Final Rule Changes

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

HIPAA BUSINESS ASSOCIATE AGREEMENT

Transcription:

HIPAA and New Technologies Using Social Media and Texting Within the Rules Jim Sheldon-Dean Director of Compliance Services Lewis Creek Systems, LLC www.lewiscreeksystems.com For Northern California Chapter Healthcare Financial Management Association October 28, 2014 jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 1 Today s Objectives Discuss how to handle patient communications Explain the issues involved with using Social Media and Texting Discuss how Social Media and Texting can work under HIPAA Identify guidance from HHS for patient communications Discuss new rights for electronic copies of electronic records Show the new process that must be used in the event of breach Learn about being prepared for enforcement and auditing Learn how to approach compliance Q&A session jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 2

My Background Disclaimer: I am an engineer, not a lawyer, and this is not legal advice I am only providing information and resources BSCE (Civil Engineering) from UVM, MST (Transportation) from MIT More than 32 years in consulting, information systems, software development, and information security Process, problem-solving oriented 8 years as Vermont EMT, crew chief 14 years in HIPAA and health information privacy and security regulatory compliance See www.lewiscreeksystems.com for more details, resources, information security compliance news, etc. jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 3 The Long Path of HITECH Health Information Technology for Economic and Clinical Health Act, or the HITECH Act, under consideration in 2008 Became Title XIII, Subtitle D-Privacy (all the sections 134xx) of the American Recovery and Reinvestment Act of 2009 Most of the proposed rules finalized in the big HIPAA Omnibus Update, enforceable as of September 23, 2013 Omnibus Update Rule, with Preamble, available at: http://www.gpo.gov/fdsys/pkg/fr-2013-01-25/pdf/2013-01073.pdf New Combined Rules published by HHS OCR, available at: http://www.hhs.gov/ocr/privacy/hipaa/administrative/combined/ index.html jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 4

HIPAA Privacy & Security Rules Privacy Rule 45 CFR 164.5xx, enforceable since 2003 Establishes Rights of Individuals Controls on Uses and Disclosures Baseline Privacy and Security Protections for PHI Security Rule 45 CFR 164.3xx, enforceable since 2005 Applies to all electronic PHI Flexible, customizable approach to health information security Uses Risk Analysis to identify and plan the mitigation of security risks Calls for numerous Policies and Procedures Now being enforced much more vigorously jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 5 HIPAA Breach Notification Rule CFR 45 Part 164 Subpart D; 45 CFR 164.4xx Enforceable since February 2010, Final Rule now in effect, with new changes in how to determine if a breach must be reported Works with Privacy and Security Rules Requires reporting of all PHI breaches to HHS and individuals; breaches affecting 500 or more individuals must be reported to individuals, HHS, and the Press, simultaneously Provides great examples of what not to do; HHS Wall of Shame: http://www.hhs.gov/ocr/privacy/hipaa/administrative/ breachnotificationrule/breachtool.html jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 6

Designated Record Set In 45 CFR 164.501: (1) A group of records maintained by or for a covered entity that is: (i) The medical records and billing records about individuals maintained by or for a covered health care provider; (ii) The enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or (iii) Used, in whole or in part, by or for the covered entity to make decisions about individuals. (2) For purposes of this paragraph, the term record means any item, collection, or grouping of information that includes protected health information and is maintained, collected, used, or disseminated by or for a covered entity. jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 7 Individual Access of PHI Must have a process for individual to request access, for reasonable cost-based fee Must provide the entire record in the Designated Record Set if requested: Medical and billing records used in whole or in part to make decisions related to health care Information kept electronically must be available electronically if requested Exceptions for Psychotherapy notes, proceedings, if harm may result, if it would expose provider of confidential information Changes to HIPAA and CLIA allow access of lab information Automatic 30-day extension to provide records held off-site no longer allowed Make sure your Notice of Privacy Practices is up-to-date jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 8

New Guidance on Access of PHI Guidance on Access of PHI, particularly concerning minors and mental health information: http://www.hhs.gov/ocr/privacy/hipaa/understanding/ special/mhguidance.html Guidance clarifying that same-sex spouses have the same HIPAA rights as other family members, no matter where services are provided: http://www.hhs.gov/ocr/privacy/hipaa/understanding/ special/samesexmarriage/index.html jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 9 Access and Individual Preferences 164.522(b)(1) Standard: Confidential Communications Requirements (i) A covered health care provider must permit individuals to request and must accommodate reasonable requests by individuals to receive communications of protected health information from the covered health care provider by alternative means or at alternative locations. 164.524(c) Provision of Access (2) Form of access requested. (i) The covered entity must provide the individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. New (c)(2)(ii): If PHI is electronic, individual may request electronic copy. jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 10

E-mail, Texting, and Security E-mail and texting are inherently insecure Unless steps are taken, e-mail and texts may be retained or exposed by unknown parties Secure communications are essentially required as good practice for professional communications Yahoo mail, g-mail, texting, etc., are all insecure means of communication and their use may be considered a breach Technologies for securing communications are readily available today Security Rule 164.312 requires consideration of encryption of data at rest and data in motion Security rule does not explicitly require encryption Risk Analysis may indicate need to encrypt over the Internet Professional communications must be encrypted over the Internet Guidance says plain E-mail with patients is fine if they want it Evaluate the risks and discuss with the individual Guidance says nothing about Texting May apply the same logic to Texting jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 11 Patient Communications Guidance HHS Guidance and Preamble discussions in new rules say unencrypted e-mail between providers and patients is permitted if the patient requests it, per 164.522 See HHS Guidance, Question 3, page 3: http://www.hhs.gov/ocr/privacy/hipaa/understanding/ special/healthit/safeguards.pdf See Preamble to Omnibus Update, page 5634: http://www.gpo.gov/fdsys/pkg/fr-2013-01-25/pdf/ 2013-01073.pdf See Preamble to CLIA/HIPAA Modifications, page 7302: http://www.gpo.gov/fdsys/pkg/fr-2014-02-06/pdf/ 2014-02280.pdf jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 12

Texting is Very Useful Fast way to communicate short messages Useful for Updates, Schedule Changes Easy to communicate if running late, etc. Quick communication of results, comments More appropriate than an e-mail or phone call Can be more discreet and private than a phone conversation Can be quicker than a phone call for short messages Can provide accurate information not dependent on voice Many communications used to go by Pager Many paging operations moving to texting now Texting is more interactive than paging jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 13 Issue Number One with Texting It s a Privacy thing Patients may not appreciate the risks of loss of privacy through texting HIPAA does require you to do your best to meet patient preferences for communication method Use Risk Analysis to evaluate and explain risks Provide a secure solution for those who prefer it It s a new technology and people will not understand it fully for quite some time jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 14

Issue Number Two with Texting Documentation: It s a Medical Records thing Regular texting doesn t provide a paper trail of conversations and contacts If it s part of patient care, it needs to be documented properly, and that requires more than regular texting A secure, traceable texting technology is important when medical record information is texted jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 15 Secure Texting Solutions Cortext by Imprivata Comes in several versions Free app provides a secure channel Upgrades provide documentation, reporting, etc. http://www.imprivata.com/products-solutions/securecommunications/secure-texting-practices TigerText Free app provides a secure channel http://www.tigertext.com/messaging-for-healthcare/ DocHalo http://www.dochalo.com/index.html jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 16

Texting Education and Policies Staff can forget the rules with something new Educate the staff as to the risks and what MUST NOT be sent via plain e-mail or text message Establish secure, private e-mail and text messaging for private information (using Cortext by Imprivata, or TigerText, for instance, for texting) Define policies for use of e-mail and texting Require Risk Analysis for any uses of any e-mail or texting involving PHI Include process for approving and monitoring uses Include standards for allowable interactions via regular e-mail & texting Identify secure services to be used where secure e-mail and texting would be appropriate jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 17 Texting Policy Contents Be brief and to the point Separation of Personal and Business activity Separation of Business and Patient information Requirement to encrypt any communications with PHI Provide Examples of what to do and what not to do Defining exceptions based on risk and need Define Rules for using any new technology Provide for regular reviews of usage to stay within bounds of HIPAA privacy and security rules Training, training, training!! Documentation, documentation, documentation!! jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 18

Social Media is Here to Stay Social Media now entrenched in society Facebook, Linked-In, Twitter, Instagram, Issues of Privacy Issues of management of communications Must be considered in policy Define roles, limits, guidelines jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 19 Communication Issues Staff must distinguish between personal and entity use Staff may not represent entity unless authorized to Designate an authorized spokesperson for public contact Require tracking and retaining any data that may be treatment information as part of a medical record Establish use of private social networks for professional purposes carefully Don t forget, the usual HIPAA rules all still apply! jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 20

How Patients Want to Use Social Media Patients want to share experiences and treatments Patients want to share with providers and other patients There are significant benefits to sharing information as part of some treatment and healing processes Some younger patients (or clients) may be intensive users of social media and would prefer to communicate there, despite any privacy concerns jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 21 How Professionals Want to Use Social Media Professional Support Group Share treatments and experiences with other providers Providers want to reach out to: Patients for marketing The Community for marketing Providers want to interact with some patients/clients There are significant benefits to sharing information as part of some treatment and healing processes Providers have to do what they need to to achieve their health care goals jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 22

Roles for Social Media Marketing Who represents you within your organization for those media? Are policies clear and unambiguous? Is there a formal approval channel, just like for any other official communication? Any rogue staff members representing themselves officially? Treatment Staying in touch for group therapies Discussing treatments for classes of patients in a group Professional Support Finding solutions, treatments Sharing experiences Any staff members sharing on inappropriate social media? jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 23 The Number One Issue: Privacy Patients and clients may not appreciate the risks of loss of privacy through social media HIPAA does require you to do your best to meet patient preferences for communication method Use Risk Analysis to evaluate and explain risks Providers may not appreciate the risks of exposures and breaches under HIPAA Has the risk analysis considered social media? Is the organization prepared for breaches? Is the organization prepared for audits? It s a new technology and people will not understand it fully for quite some time jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 24

Issue Number Two: Documentation It s a Medical Records thing Regular Social Media do not provide a paper trail of conversations and contacts If it s part of patient care, it needs to be documented properly, and that requires more than Facebook or Twitter But Social Media can still be used for administrative or informative processes, so long as there is no PHI jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 25 Issue Number Three: The Organization s Reputation Social Media is just like any media: If you don t control what is provided in your name to the media, your reputation may be permanently damaged If you don t manage the interaction, it may work against you in the modern world You must decide who is responsible for the organization s presence on social media and dedicate the resources for it Who should manage the presence? How will breaking news be handled? Who should definitely NOT be representing themselves as the organization jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 26

Managing Social Media Communications Discover how it is being used now do some research you probably have social-media-savvy staff on hand Define the three roles of Marketing, Treatment, and Professional Support Define the responsibilities and adopt policy for marketing via social media make sure staff knows they re not allowed to unilaterally represent themselves for the organization Define how social media may or may not be used for treatment purposes, and how to get approval make sure staff knows they can t make these decisions on their own Define what social media may be appropriate for professional support purposes and what information is to be shared make sure staff knows not to share any Protected Health Information inappropriately jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 27 Preventing Social Media Issues Educate the staff as to the risks and what MUST NOT be posted on Facebook, Linked-In, Twitter, Instagram, etc. Establish private social media sites for private information (using Yammer, for instance) Define policies for use of social media for patient/client interactions Include process for approving and monitoring uses Include standards for allowable interactions on social media Identify secure social media services for appropriate group work Define policies for use of social media to address the public Include chain of command for communications Apply consistent resources to monitor and manage public interactions on social media Define policies for use of social media for professional support Define limits and allowable forums for various classes of data jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 28

Social Media Policies Be brief and to the point Cover Blogging, Collaborative Wikis, as well as Social Networks such as Facebook, Linked-In, Twitter, etc. Separation of Personal and Business activity Provide Examples of what to do and what not to do Say how you will manage any business presence Define Responsibilities for Official Representatives Define Rules for establishing any new presence on-line Provide for regular reviews of usage to stay within bounds of HIPAA privacy and security rules Training, training, training!! Documentation, documentation, documentation!! jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 29 Information Security Management Process Definition of Information Security Protecting: Confidentiality Integrity Availability Definition of a Management Process: Define and understand what you have See how well it performs Watch for problems Review activities and issues Make changes based on bang-for-buck jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 30

Information Security Management Process Information Inventory and Flow Analysis Access and Configuration Control Know who and whats been going on in your networks and systems Respond to and learn from Incidents Audit and review regularly, and when operations or environment change Make risk-based improvements Focus: Confidentiality, Integrity, Availability jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 31 What is a HIPAA Breach? 164.402 Breach is any acquisition, access, use, or disclosure in violation of the Privacy Rule Exceptions Not Reportable if: Secured or destroyed Unintentional internal use, in good faith, with no further use Inadvertent internal use, within job scope Info cannot be retained Harm Standard removed from regulation Not reportable if a low probability of compromise based on a risk assessment jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 32

Is It a Reportable Breach? All breaches of unsecured PHI not meeting an exception are reportable, unless there is a low probability of compromise of the data, based on a risk assessment including at least: what was the info, how well identified was it, and is its release adverse to the individual to whom it was disclosed was it actually acquired or viewed the extent of mitigation All breaches, large and small, reportable to the individuals promptly, within 60 days Breaches affecting 500 or more individuals must also be reported to HHS and the press within 60 days of discovery By March 1, every year: Report prior year s small breaches to HHS To file breaches with HHS: http://tinyurl.com/yemwev8 jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 33 HHS Report to Congress for 2009 and 2010 breaches For reported breaches of 500 or more individuals PHI in the first year of the reporting requirement: 76% of breaches involve loss (15%), theft (56%), or improper disposal (5%) Old-fashioned physical security of valuable data 17% are caused by unauthorized access or disclosure 6% are caused by hacking Portable data, laptops, smart phones, memory sticks the leaders for breaches of PHI, but servers not immune from physical or technical attack For smaller breaches, under 500 individuals: Largely single individuals affected Misdirected fax, e-mail, or hard copy communication http://www.hhs.gov/ocr/privacy/hipaa/administrative/ breachnotificationrule/breachreptmain.html jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 34

HHS Report to Congress for 2011 and 2012 breaches For large breaches, affecting 500 or more individuals: In 2011 and 2012, HHS received 458 reports, affecting 14.69 million people 0.97 percent of reports, but affected 97.89 percent of affected individuals For smaller breaches, affecting fewer than 500 individuals: In 2012, there were 21,194 reports, affecting a total of 165,135 individuals In 2012, 83% took place at healthcare providers and 17% at health plans How? The most common causes: theft: 53%, unauthorized access or disclosure: 18% The largest number of individuals affected: due to theft, at 36% of all affected Where was the data? Laptop computers (27%), paper (23%), network servers, (13%), desktop computers (12%), and portable electronic devices (9%) jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 35 Lessons Learned from PHI Breaches Encrypt whatever you reasonably can; honor wishes of the individuals for communication but explain the risks Check fax numbers and addresses regularly Use physical safeguards to restrict access to devices with PHI Reduce risk through network or enterprise storage as alternative to local devices Encrypt data at rest on any desktop or portable device/media storing ephi anything that isn t bolted down Have clear and well documented administrative and physical safeguards on the portable media which handle ephi Raise the security awareness of workforce members and managers to promote good data stewardship jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 36

New Enforcement Definitions Reasonable Cause: An act or omission in which a covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission violated an administrative simplification provision, but in which the covered entity or business associate did not act with willful neglect Reasonable Diligence: Business care and prudence expected from a person seeking to satisfy a legal requirement under similar circumstances Willful Neglect: Conscious, intentional failure or reckless indifference to the obligation to comply with the administrative simplification provision violated jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 37 Tiered Penalty Structure Tier 1: Did not know and, with reasonable diligence, would not have known $100 - $50,000 per violation Tier 2: Violation due to reasonable cause and not willful neglect $1000 - $50,000 per violation Tier 3: Violation due to willful neglect and corrected within 30 days of when known or should have been known with reasonable diligence $10,000 - $50,000 per violation Tier 4: Violation due to willful neglect and NOT corrected within 30 days of when known or should have been known with reasonable diligence $50,000 per violation Affirmative Defenses and Waivers may be available but not when willful neglect is involved Continued corrective action allowed, even if no penalty $1.5 million maximum for all violations of a similar type in a calendar year Can levy penalties on a daily basis! jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 38

HHS Is Serious About Enforcement $4.3 million fine for Cignet Health of Maryland for multiple HIPAA violations $1 million settlement with Mass General Hospital for records left on the subway $865K+ settlement with UCLA Medical Center for snooping in celebrity records Multiple multi-million dollar settlements with pharmacies for poor disposal of PHI $100K settlement with a physician s office for Security Rule violations $1.5 million settlement with BC/BS of Tennessee for lost hard drives $1.7 million settlement with Alaska Medicaid for lack of security process $1.5 million settlement with MEEI for lack of security for portable devices $50K settlement with Hospice of North Idaho for insecure laptop, no process $400K settlement with Idaho State University for insecure server, no process $275K settlement with Shasta Regional Med Center for inappropriate disclosure of PHI and lack of sanctions for violations $1.7 million settlement with WellPoint for insecure server, no process $1.2 million settlement with Affinity Health for improper disposal of copiers $150K settlement with APDerm for lost insecure USB drive and no Breach policies $215K settlement with Skagit County, WA for insecure server, no process $2 million in settlements with 2 entities for unsecured stolen laptops $4.8 million in settlements with Columbia/Presbyterian for poor server management $800K settlement with Parkview Health System for mishandled paper records jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 39 What is a HIPAA Audit? Initial program conducted in 2012, being revised for 2014-2015 New program already getting started initial survey of 1200 entities Will focus on identified problem areas from 2012: laptops, encryption, internal reviews and audits, risk analysis, and access of records Show you have in place all the policies and procedures required by the HIPAA Privacy and Security Rules Show you have been using them e.g., Show training policy, training materials, and training rosters e.g., Show security incident policy and security incident reports 2 week notice! You must be prepared in advance or it s too late! http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/index.html jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 40

2012 HIPAA Audit Program Overall Small covered entities (30% of the sample) had 66% of the deficiencies Health care providers (50% of the sample) had 81% of the deficiencies Security findings were 2/3 of the issues. Security issues User activity monitoring Contingency planning Authentication/integrity Media reuse and destruction Risk assessment Granting and modifying user access Privacy Issues Review process for denials of patient access to records Failure to provide appropriate patient access to records Lack of policies and procedures Uses and disclosures of decedent information Disclosures to personal representatives Business associate contracts jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 41 Method for New Audits Find audit targets through survey of 1200 entities Approximately 200 Desk audits of specific issues All communication, submissions electronic, via portal NO CHANCE to provide additional information you must provide what is needed the first time Approximately 200 Field audits as necessary, depending on budget Get list of Business Associates from audit targets Audit Covered Entities in 2014-2015, BAs in 2015 jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 42

How to Prepare for an Audit 1. Do it NOW, before they call 2. Be ready to answer the questions asked in prior audits 3. Document any policies and procedures, and any action, activity, or assessment performed pursuant to compliance with the rules 4. Make sure your documentation is complete and up-to-date use tools to evaluate and document your compliance history HIPAA Audit Protocol downloaded to a spreadsheet, to link all your policies and procedures and documentation to the regulations so they re easy to find for daily use and in the event of an audit http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol.html NIST HIPAA Security Rule Toolkit: http://scap.nist.gov/hipaa/ New ONCHIT/OCR/OGC Security Risk Assessment Tool, with versions for ipad and Windows 7 http://www.healthit.gov/providers-professionals/security-risk-assessment jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 43 Your To-Do List Find out what people are doing already Consider professional communications & patient communications separately Document your processes for proper methods of communications Find ways to secure professional communications Accommodate new individual rights Find ways to offer secure patient communications Develop and document the process for adopting and using insecure communications (plain e-mail, social media, and texting) if patients desire Establish your processes for Risk Analysis and Documentation Document your communications policies and procedures Update your Notice of Privacy Practices Train staff in new policies and procedures Document, document, document! Always have a plan for moving forward, and follow it! jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 44

Thank you! Any Questions? For additional information, please contact: Jim Sheldon-Dean Lewis Creek Systems, LLC 5675 Spear Street, Charlotte, VT 05445 jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 jim@lewiscreeksystems.com www.lewiscreeksystems.com 802-425-3839 45