290 likes | 530 Views
HIPAA Security Rule. Delegation of Authority July 27, 2009Streamline, unify, simplify investigation and resolution of casesAddress growing overlap of security/privacy in HT environmentSupport and cooperation of CMS to effectuate transfer of cases, system support, technical expertsOCR investiga
E N D
2. HIPAA Security Rule Delegation of Authority – July 27, 2009
Streamline, unify, simplify investigation and resolution of cases
Address growing overlap of security/privacy in HT environment
Support and cooperation of CMS to effectuate transfer of cases, system support, technical experts
OCR investigative staff in Regional Offices allows expansion of compliance review and on-site investigatory methods
Security Rule addresses only ephi
This is a big deal.
Bigger than HITECH or at least more immediate.
Will be bigger than Privacy
Applies to ephi that a CE Creates, Receives, Maintains, Transmits
Guiding principles -Ensure the confidentiality, availability and integrity of data
CE must have and implement policies and procedures addressing Physical, Technical and Administrative safeguards
More and more ephi
Privacy and Security are 2 side of the same coin. Computer security and privacy officer must work together.
Initially effective May 2005, at that time enforced by CMS. CMS’s approach “educational” OCR’s approach is to obtain compliance.
CE must conduct a “risk analysis” 45cfr164.308(1)(ii)(A)
Foundation document
SR interrelated
CE must address and/or meet standards
standards are required or addressable
addressable does not mean optional
The SR does not have a provision regarding the disclosure of ephi. That is a PR rule concern.
Overlap between SR and PR (530 Safeguards) OCR was looking at ephi under the PR prior to the issuance of the SR. Complaint about disclosure may well also be an SR issue Security Rule addresses only ephi
This is a big deal.
Bigger than HITECH or at least more immediate.
Will be bigger than Privacy
Applies to ephi that a CE Creates, Receives, Maintains, Transmits
Guiding principles -Ensure the confidentiality, availability and integrity of data
CE must have and implement policies and procedures addressing Physical, Technical and Administrative safeguards
More and more ephi
Privacy and Security are 2 side of the same coin. Computer security and privacy officer must work together.
Initially effective May 2005, at that time enforced by CMS. CMS’s approach “educational” OCR’s approach is to obtain compliance.
CE must conduct a “risk analysis” 45cfr164.308(1)(ii)(A)
Foundation document
SR interrelated
CE must address and/or meet standards
standards are required or addressable
addressable does not mean optional
The SR does not have a provision regarding the disclosure of ephi. That is a PR rule concern.
Overlap between SR and PR (530 Safeguards) OCR was looking at ephi under the PR prior to the issuance of the SR. Complaint about disclosure may well also be an SR issue
3. American Recovery and Reinvestment Act of 2009 Title 13: Health Information Technology for Economic and Clinical Health Act (HITECH Act)
Subtitle A: Promotion of HIT through the Office of the National Coordinator for HIT (ONC)
Subtitle B: Testing of HIT through the National Institute of Standards and Technology (NIST)
Subtitle C: Grants and Loan Funding for Incentives for the Use of HIT
Subtitle D: Privacy (Privacy Rule and Security Rule)
Nomenclature issue
ARRA contains a number of “Titles” among them Title 13 HITECH
Subpart D is where the action isNomenclature issue
ARRA contains a number of “Titles” among them Title 13 HITECH
Subpart D is where the action is
4. Some of the changes are a direct result of HITECH other changes due to other legislative mandatesSome of the changes are a direct result of HITECH other changes due to other legislative mandates
5. HIPAA Privacy Rule Updates Regulatory Actions 2009
Breach Notification Guidance 4/2009
Breach Notification IFR 8/2009
Enforcement IFR 10/2009
GINA NPRM 10/2009
Regulatory Actions Scheduled for 2010
HITECH Privacy & Security Rule, including more Enforcement Rule changes, NPRM/Final
Breach Notification Final
Breach Guidance Annual Update
Accounting for Disclosures from EHRs NPRM
GINA Final
6. Breach Notification45 CFR 164 Subpart D HHS Issues RFI – April 2009
Guidance on Technologies/Methodologies for unusable, unreadable, indecipherable PHI
(RFI) Request for information
Secured v unsecured data
Secured
encrypted pursuant to standards put forth by NIST (National Inst for Standards and Technology) formerly Bureau of Standards
destroyed
Unsecured is not necessarily “bad”
Note – Subpart D “Notification in the Case of Breach of Unsecured Protected Health Information if the data/information is secured and is lost/stolen/disclosed it is not a breach.(RFI) Request for information
Secured v unsecured data
Secured
encrypted pursuant to standards put forth by NIST (National Inst for Standards and Technology) formerly Bureau of Standards
destroyed
Unsecured is not necessarily “bad”
Note – Subpart D “Notification in the Case of Breach of Unsecured Protected Health Information if the data/information is secured and is lost/stolen/disclosed it is not a breach.
7. Breach Notification IFR Covered entities must notify each affected individual of breach of “unsecured protected health information.”
HHS Breach Notification Guidance: PHI is “unsecured” if it is NOT
Encrypted
Destroyed
“Breach” defined as:
Impermissible use/disclosure
“Compromises privacy/security”
Poses a significant risk of harm to the individual
Exceptions for inadvertent, harmless mistakes
IFR Interim Final Rule
Unsecured sound like a bad thing, is not in and of itself a problem
No requirement that phi must be “secured”
Not all impermissible disclosures are breaches, but all breaches are impermissible disclosures
Very important – breach and disclosure not the same. In Common parlance they are the same. But not legally.
Inadvertent/harmless
unintentional acquisition, use or access made in good faith acting under authority no further use or disclosure.
ex. Billing clerk looks at a wrong file. Not a breach, but is an impermissible use
Inadvertent disclosure by an individual who is authorized to another person who is authorized no further disclosure
ex. Misdirected fax. Again an impermissible disclosure not a breach
CE must perform a risk assessment to determine if disclosure is a breach…harm standard
Risk assessment – breach
Risk analysis- Security Rule
IFR Interim Final Rule
Unsecured sound like a bad thing, is not in and of itself a problem
No requirement that phi must be “secured”
Not all impermissible disclosures are breaches, but all breaches are impermissible disclosures
Very important – breach and disclosure not the same. In Common parlance they are the same. But not legally.
Inadvertent/harmless
unintentional acquisition, use or access made in good faith acting under authority no further use or disclosure.
ex. Billing clerk looks at a wrong file. Not a breach, but is an impermissible use
Inadvertent disclosure by an individual who is authorized to another person who is authorized no further disclosure
ex. Misdirected fax. Again an impermissible disclosure not a breach
CE must perform a risk assessment to determine if disclosure is a breach…harm standard
Risk assessment – breach
Risk analysis- Security Rule
8. Section 13402: Breach Notification
Section 13402 of the HITECH Act
45 cfr Part 164, subpart D 164.400 et seq
Over 500/under 500
Major media (“prominent”)
Notice to HHS/OCR must be done using the breach notification form found on OCR’s web site. Notice provided by any other means does not fulfill the requirements of the regulation
Law enforcement delay
Law enforcement states to CE that notice or posting would impede a criminal investigator or harm national security a CE/BA may delay reporting or posting notice consistent with representation of law enforcement
Post on OCR’s web site after initial verification of factsSection 13402 of the HITECH Act
45 cfr Part 164, subpart D 164.400 et seq
Over 500/under 500
Major media (“prominent”)
Notice to HHS/OCR must be done using the breach notification form found on OCR’s web site. Notice provided by any other means does not fulfill the requirements of the regulation
Law enforcement delay
Law enforcement states to CE that notice or posting would impede a criminal investigator or harm national security a CE/BA may delay reporting or posting notice consistent with representation of law enforcement
Post on OCR’s web site after initial verification of facts
9. Breach Reports Notifications to the Secretary required by web portal
As of March 31, 2010, 62 reports of breaches affecting 500+ individuals reported, resulting in approx. 750,000 notices
Mostly ePHI that is contained in lost or stolen unencrypted media or portable device
Also received over 5000 reports of smaller breaches
Mostly paper records sent to wrong fax number, wrong address, wrong individual
OCR processing
500+ verify and investigate
<500 regional discretion
500+ posting on OCR website
investigating underlying disclosure/security rule
OCR verifies before putting on web site
Some CEs indicate that the report was made in error, not a breach etc must proveOCR processing
500+ verify and investigate
<500 regional discretion
500+ posting on OCR website
investigating underlying disclosure/security rule
OCR verifies before putting on web site
Some CEs indicate that the report was made in error, not a breach etc must prove
10. 10 FTC Breach Notification for PHRs FTC to regulate similar notice requirements for PHR vendors not subject to HIPAA
FTC Notice of Proposed Rulemaking Published April 2009; Request for Public Comment due June 1, 2009
FTC Final Rule published August 2009
HHS and FTC to study and recommend to Congress privacy and security requirements for non-HIPAA PHR vendors and best oversight
PHR Personal Health Record google, etc
As opposed to EHR
PHR Personal Health Record google, etc
As opposed to EHR
11. 11 Improved Enforcement HITECH Act, Sections 13410 and 13411:
Noncompliance Due to Willful Neglect
Distribution of Certain Civil Monetary Penalties
Transfer to OCR for Enforcement
Percentages to Harmed Individuals
Tiered Increases in Civil Monetary Penalties
Enforcement by State Attorneys General
Periodic Audits
Criminal Penalties for Individuals (Employees)
Other: Secretary’s Delegation of Security Rule Enforcement to OCR – July 27, 2009
12. Enforcement Framework in Complaint Investigation The Enforcement Rule
71 FR 32, P.8390 (Feb. 16, 2006)
Revised 74 FR, P.56123 (October 30, 2009)
Enforcement Rule modified to implement changes mandated by HITECH Act
The Enforcement Rule applies to both the Privacy & Security Rules
Civil Monetary Penalties can be imposed by OCR
13. Enforcement Rule IFR Section 13410(d) of the HITECH Act
Effective February 18, 2009
Strengthened HIPAA’s CMP Scheme by:
Creating tiers of increasing penalty amounts that are associated with categories of culpability
The changes made in the Enforcement Rule are made so that the language in the Rule matches the language in the statute. The statute has not be “interpreted” rather The changes made in the Enforcement Rule are made so that the language in the Rule matches the language in the statute. The statute has not be “interpreted” rather
14. CMPs Increased 45 CFR 160.404 - Amount of a Civil Money Penalty What HITECH did was to harmonize the civil and criminal CMP schemesWhat HITECH did was to harmonize the civil and criminal CMP schemes
15. Modifications to the Enforcement Rule
Lost/stolen data of 675 individuals – how many violations 1?? 675??
CE doesn’t have a policy/procedure – a violation for each day the CE didn’t have the policy/procedure??
Rule (either SR or Pr) has been effective for some number of years – failure to have policies/procedures seen as willful neglect
Lost/stolen data of 675 individuals – how many violations 1?? 675??
CE doesn’t have a policy/procedure – a violation for each day the CE didn’t have the policy/procedure??
Rule (either SR or Pr) has been effective for some number of years – failure to have policies/procedures seen as willful neglect
16. 16 CMP Categories If “person did not know” or “by exercising reasonable diligence would not have known.”
If the violation was “due to reasonable cause and not to willful neglect.”
If the violation is due to willful neglect, and is corrected during 30-day time period.
If the violation is due to willful neglect, and is not corrected during 30-day time period.
The category determination is part of OCR’s investigation and is driven by facts and circumstances of a particular incident.The category determination is part of OCR’s investigation and is driven by facts and circumstances of a particular incident.
17. Amount of a Civil Money Penalty45 C.F.R. § 160.404(b)
18. More Information Enforcement Interim Final Rule (74 FR 56123)
http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html
19. HITECT Act Section 13410(e): State Attorneys General Jurisdiction State Attorney General (AG) may bring an action in federal court on behalf of state residents to:
enjoin defendant from further violation; or
obtain damages (of $100 per violation).
State must serve prior written notice upon HHS.
HHS may intervene in the state action.
If HHS has already instituted an action against defendant, State AG may not bring action while HHS action ongoing.
20. State Attorney General First complaint filed by CT SAG under HITECH authority
Injunctive relief, statutory penalties sought
Combination of HIPAA and state law
Security Rule violations alleged in loss/theft of portable media
Privacy Rule violations alleged in access
State law breach notification claims Now 2 such cases both in Conn.
If OCR starts first SAG must wait
Must notify OCR
OCR may interveneNow 2 such cases both in Conn.
If OCR starts first SAG must wait
Must notify OCR
OCR may intervene
21. HIT HIPAA Privacy Changes Business Associates: Liable for compliance with Security Rule and uses and disclosures under Privacy Rule; HIEs, certain PHR and others transmitting data are business associates Effective 2/2010
Right to Electronic Access: If covered entity uses an EHR, individual has a right to a copy of his PHI in electronic format. Effective 2/2010
Accounting for TPO Disclosures: If covered entity maintains an electronic health record (EHR), covered entity must include in an accounting disclosures through the EHR for treatment, payment, and health care operations for the three years prior to the request. Effective Date: Depends on CE’s adoption of EHR
BA over due, going through the regulatory process
sec 13404 about 25 lines
BA that obtains or creates PHI
uses and disclosures must be consistent with BA agreement and reg
Electronic access
Accounting – paper 6 yearsBA over due, going through the regulatory process
sec 13404 about 25 lines
BA that obtains or creates PHI
uses and disclosures must be consistent with BA agreement and reg
Electronic access
Accounting – paper 6 years
22. Other HIPAA Privacy Changes Right to Restriction: Covered entity must comply with individual’s request for restriction if disclosure: (1) is to health plan for payment or health care operations and (2) pertains to item/service for which provider was paid in full “out-of-pocket.” Effective 2/2010
Marketing: Places additional restrictions on covered entity making certain communications about products or services, where entity receives payment in exchange for communication. Effective 2/2010
Fundraising: Covered entity’s fundraising communications must provide clear opportunity for individual to opt out of future communications. Effective 2/2010 Right to restriction IMPORTANT now CE Must honor request if request for restriction is to plan for payment hco and provider was paid. Previously the PR provided the individual with the right to request a restriction, CE had the right to refuse the restriction. No longer the case.
Marketing 13406 not considered hco if CE is paid to make the communication the definition of marketing excludes a number of communications from the category of marketing. That is no longer the case if the CE is paid to make such a communication In general a CE may communicate about a product or service it offers, however if the CE is paid by a 3rd party to make such a communication the communication is considered marketing
13406 Fundraising – opt out provisionsRight to restriction IMPORTANT now CE Must honor request if request for restriction is to plan for payment hco and provider was paid. Previously the PR provided the individual with the right to request a restriction, CE had the right to refuse the restriction. No longer the case.
Marketing 13406 not considered hco if CE is paid to make the communication the definition of marketing excludes a number of communications from the category of marketing. That is no longer the case if the CE is paid to make such a communication In general a CE may communicate about a product or service it offers, however if the CE is paid by a 3rd party to make such a communication the communication is considered marketing
13406 Fundraising – opt out provisions
23. Other HIPAA Privacy Changes Minimum Necessary: Covered entity must limit PHI, to extent practicable, to limited data set, or, if necessary, to minimum necessary. HHS to issue guidance on what constitutes minimum necessary.
Sale of PHI: No direct or indirect remuneration in exchange for PHI, unless the individual signed an authorization; exceptions for public health, research, treatment, sale of business, business associate activities, individual access, and others as determined by Secretary. Effective Date: Regulations required within 18 months after enactment; provisions apply 6 months later. Min Necessary section 13405 no guidance as of yet statutory deadline for guidance due 8/2010
Sale of PHI
Min Necessary section 13405 no guidance as of yet statutory deadline for guidance due 8/2010
Sale of PHI
24. Section 13411: Audits Secretary must provide for periodic audits of covered entities and business associates to ensure that they are in compliance with the Privacy Rule and the Security Rule requirements.
25. Education on Health Information Privacy Regional Office Privacy Advisors for education and guidance to covered entities, their business associates and individuals on privacy and security of PHI
Multi-faceted National Education Initiative on health information privacy to enhance public transparency regarding uses of PHI, including programs to educate individuals about potential uses of their PHI, the effects of such uses, and their privacy rights with respect to such uses
26. Genetic Information Genetic Information Non-Discrimination Act
Signed into law May 21, 2008
To protect individuals from discrimination in health insurance and employment on the basis of genetic information
Mandates modification of the Privacy Rule to incorporate provisions specific to genetic information
Genetic information is protected health information;
Prohibit the use or disclosure of genetic information for underwriting
27. GINA NPRM NPRM issued 10/01/2009
Together with IFR for GINA protections from health plan discrimination issued by HHS/CMS, DOL, and Treasury (IRS)
EEOC Final Rule for GINA protections from employer discrimination in clearance
28. Status of All Complaints
29. Total Investigated Resolutions
30. 30 Want More Information? The OCR website: http://www.hhs.gov/ocr/privacy/