760 likes | 892 Views
HIPAA, HITECH, Hi-jinks What are the Feds up to now?. Presented by: Jeniece Poole, CIPP, CIPP/G U of A Privacy Officer. August 15, 2011 College of Nursing RISE Program. HIPAA Privacy. Keeping It To Ourselves! Protecting Patient Confidentiality…. Topics of Discussion.
E N D
HIPAA, HITECH, Hi-jinksWhat are the Feds up to now? Presented by: Jeniece Poole, CIPP, CIPP/G U of A Privacy Officer August 15, 2011 College of Nursing RISE Program
HIPAA Privacy Keeping It To Ourselves! Protecting Patient Confidentiality…
Topics of Discussion • What’s in the News? • HIPAA Privacy and Security • What’s the HITECH Act? • New Responsibilities under HITECH • Research
Cignet Health & Massachusetts General Hospital • Since Health Insurance Portability and Accountability Act of 1996, violations resulted in few consequences • In 2009 HITECH strengthen provisions for civil monetary enforcement, was minimal until now
Cignet Fines • The Office for Civil Rights (OCR) exacted heavy financial obligations for the first time • $4.3 million against Cignet for violation of HIPAA Privacy Rule • $1 million by Mass General for potential violations of HIPAA • Mass General exhibited a spirit of cooperation with OCR and therefore settled for less that ¼ of the monetary penalty assessment imposed on Cignet
Cignet Reports case involved 41 patients • In a separate incident Mass reports 192 patients involved • OCR shows a list of hundreds of thousands, or even more than a million affected individuals
This case highlights that health care providers should carefully evaluate their: • Medical privacy • Patient access policies and procedures • Training programs • Also prompt and effective action necessary following any potential violation
Nurse Prosecuted Over HIPAA Breach An Arkansas woman who pled guilty to disclosing a patient’s health information was the first in her state to be convicted under the Health Insurance Portability and Accountability Act (HIPAA). Andrea Smith, a 25-year-old woman from Trumann, AR, admitted to wrongfully disclosing individually identifiable health information for personal gain, according to a statement from Jane W. Duke, United States Attorney for the Eastern District of Arkansas. Smith, a licensed practical nurse, accessed an unidentified patient’s medical record on November 28, 2006, while working at Northeast Arkansas Clinic (NEAC) in Jonesboro, AR. Andrea Smith then gave the private medical information to her husband, Justin Smith, who called the patient and said he intended to use the information against the patient in “an upcoming legal proceeding,” according to the statement. Upon discovery of the HIPAA breach, NEAC fired Andrea Smith.
In the News…. • Smith faces a maximum of 10 years in prison, a fine of no more than $250,000, or both, as well as a term of supervised release of not more than three years, the statement said. The Arkansas State Board of Nursing has opened a complaint against Smith after learning of the federal conviction, according to the Arkansas Democrat Gazette
Computer with patient data stolen from Jefferson A laptop computer with health and personal information on 21,000 patients was stolen from an office at Thomas Jefferson University Hospital in Philadelphia in June. The patients whose unencrypted records were on the password-protected laptop were notified last Friday of the theft in a letter from hospital president Thomas J Lewis, who offered identity-theft protection. Protected health information including Social Security numbers had been exposed. The breach at Jefferson is part of a national problem. A federal database has documented 121 such lapses nationwide since September, 2009.
Thousands of Personal Record Files Dumped in Recycling Bin Curious, they pulled out a couple and were stunned to see that they appeared to be medical records, Karen Keith said. The information inside the files included some that couldn’t be more personal – or dangerous: Social Security numbers, copies of drivers’ license numbers and even credit card numbers.
Prison for HIPAA Privacy Violator • oHuping Zhou, a cardiothoracic surgeon in China before immigrating to the United States, was employed at UCLA in 2003. On Oct. 23, 2003, he received a notice of intent to dismiss him for performance reasons that did not include illegal access of medical records. That evening, he accessed medical records of his superior and co-workers, and during three other periods during the next four weeks many of them involving celebrities, a total of 323 times, according to the FBI office in Los Angeles.
Charges were filed in 2009 and Zhou pleaded guilty in January 2010 to four misdemeanor counts of illegally reading private and confidential medical records. He faced up to four years in prison. A FBI spokesperson did not have information on why charges were not filed until six years after patient records were accessed. There is no evidence Zhou improperly used or attempted to sell the information he accessed, according to the FBI.
What is a Breach? A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual.
Privacy Breaches • Federal List of major health info breaches included 253 incidents • Affects more than 6.5 million individuals • 22% of all incidents involve business associates and more than 50% involve theft or loss of computer
The many types of breaches… • New York City Health and Hospitals Corp • 1.7 million people affected • Theft of back-up tapes from unlocked unattended truck • Largest single incident so far • St. Francis Health System in Oklahoma • 84,000 people affected • Breach from a stolen computer
Seacoast Radiology in New Hampshire • 231,000 people affected • Hackers using a server to gain bandwidth to play a video game • Ankle and Foot Center in Tampa, Fl • 156,000 people affected • Reported hacking incident after server containing practice management system was accessed
HSS Breach Website • http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html • 7 breaches have occurred in Arizona • 24,726 people have had information lost or stolen • 6 of the 7 involve loss or theft of an electronic portable device • 1 is loss of paper • University of Arkansas, UCSF, Yale University, Georgetown University Hospital, University of Louisville, University of Massachusetts, Johns Hopkins University, St Louis University, University of Nebraska, University of New Mexico
What is HIPAA? • HIPAA is the Health Insurance Portability and Accountability Act of 1996 (PL 104-191) • Also referred to as the Kennedy-Kassenbaum Act • HIPAA was enacted by the federal government on August 21, 1996 with the intent to: • Assure health insurance portability • Reduce healthcare fraud and abuse • Guarantee security and privacy of health information • Enforce standards for health information
Why was HIPAA Created? • To establish minimum federal standards for safeguarding the privacy of individually identifiable health information
The History of HIPAA • The regulation has 3 areas of focus • Portability of/and access to Health Benefits • Preventing Fraud and Abuse • Administrative Simplification
Fraud and Abuse • HIPAA expands the False Claims Act to include healthcare claims and • Intentional fraud is a criminal act • To be guilty of fraud, you need only to engage in a pattern or practice of presenting claims that you know will lead to greater payment
Feds probe alleged fraud at UT Southwestern, Parkland Sunday, May 30, 2010 Federal authorities are investigating whether UT Southwestern Medical Center and Parkland Memorial Hospital committed fraud by falsely billing Medicare and Medicaid for patient care, The Dallas Morning News has learned. The probe already has identified millions of dollars in potential fraud in the government health insurance programs for the elderly, disabled and poor, sources said.
Fraudulent Billing Investigators are focusing on whether UT Southwestern, one of the nation's leading medical schools, billed the government for services that faculty physicians did not actually provide while working at Parkland. A key question is whether faculty physicians properly supervised doctors in training, known as residents. Warnings that UT Southwestern's handling of government insurance claims could be fraudulent date back nearly two decades, court records and interviews show. Nevertheless, the taxpayer-supported medical school and hospital failed to effectively guard against abuses, according to audits and former employees.
Fraud and Abuse in Billing Practices is Serious Business • U of A Dermatology Clinic dismissed two physicians who were found in violation of the Medicare regulations • Medicare was billed for services where the resident examined the patient and treatment was billed as if the physician was providing the care • CMS has a settlement agreement that includes a three year payment schedule including repayment of overcharges and fines
Identity Theft • Arizona is #1 in the nation in cases of identity theft • Identity theft of health information is the fastest growing area of theft
Medical Identity Theft • Can be costly • Can cause loss of insurance coverage • Can cause physical harm
Medical Identity Theft Illegal and bogus treatment • Medical ID thieves bill your health plan for fake or inflated treatment claims • The crooks often are doctors and other medical personnel who know how the insurance billing system works • Organized theft rings also are involved • They buy stolen patient information on the black market, and set up fake clinics to make bogus claims against the health policies of honest consumers
Medical Identity Theft Obtain free treatment • Medical ID thieves who don’t have their own health coverage often receive free medical treatment, courtesy of your policy • They assume your identity at a hospital or clinic, and your insurer receives the bills
Medical Identity Theft Strikes American Children & Adults • Involves stolen insurance card information or costs related to medical care and equipment give to others using the victims name • 29% of surveyed victims discovered the problem a year after the incident • The average cost to resolve was $20,160 • 48% lost coverage due to medical ID theft
Why do we need Health Care Privacy? • Gives patients more control over their health information • Sets boundaries on the use and disclosure of health records • Establishes appropriate safeguards for all people who participate in or are associated with the provision of health care • Holds violators accountable through civil and criminal penalties
The term “HIPAA Privacy” refers to accessing and the sharing the patient’s Protected Health Information (PHI) ….This is DATA HIPAA Privacy is CONFIDENTIALITY Remember!
Confidentiality • Confidentiality refers to data, not to the person • Confidentiality limits who can access the data • Confidentiality defines how the data will be stored
Multiple Users May Access Health Information • Admitting Clerks • Caregivers from the ED to the morgue • Physical Therapists • Nutritionists • Lab Personnel • Pharmacists • Receptionists in physician offices • Transport Techs • Respiratory Therapist • Billing Clerks • Insurance processors • School personnel • Home Health Agencies • Medical Records Clerks • Researchers • Website Managers
Personal Identifiers This information can be in various forms and must be protected • Electronic - computer, video, audio • Paper - “hard-copy”, labels, films • Oral - verbal, sign-language
What are Personal Identifiers? • Names • Geographic subdivisions smaller than a state, including street address, city, county, precinct, zip code and equivalent geocodes, except for the initial five digits of a zip code to 000 • All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death, and all ages over 89 • Telephone numbers • Fax numbers • Electronic mail addresses • Social security numbers • Medical record numbers
More Personal Identifiers • Account numbers • Certificate/license numbers • Vehicle identifiers and serial numbers including license plate numbers • Device identifiers and serial numbers • Web Universal Resource Locator (URL) • Biometric identifiers, including finger or voice prints • Full face photographic images and any comparable images • Internet protocol address numbers • Any other unique identifying number characteristic or code
How can a Covered Entity Use and Disclose PHI? • REMEMBER, every time you look at, touch, share , disclose or do anything else with PHI, you must either have the patient’s authorization or meet a HIPAA exception • The exception you use will depend on the purpose for which you are looking at, touching ,sharing or disclosing the PHI • Exception • TPO • Other statutory exceptions
Use and Disclosure Without Patient’s Explicit Permission • Treatment, Payment & Health Care Operations • As Required by Law • Marketing & Fundraising (pursuant to strict limitations) • Examples: • A health care provider can discuss the patient’s case with colleagues to determine the best course of treatment • A health plan can share information with the nursing home regarding payment for services • A compliance office can obtain charts for compliance audits
Use and Disclosures that Do Not Require Authorization • Mandatory Disclosure: • HIPAA only Mandates disclosures in two instances: • To the patient • To the Secretary of DHHS to investigate an alleged privacy violation
Other Permitted Disclosures • Public Health Activities • Health Oversight • Law Enforcement • Organ & Tissue Donation • Avert Serious Threat • Workers Compensation • Report Abuse • Legal Proceedings • Information regarding decedents • Research • Specialized Government Functions
Report Abuse or Neglect • Report to authorities authorized by law to receive information about victims of abuse, neglect or domestic violence • Based on reasonable belief • CE must inform the individual of the disclosure unless • There is reasonable belief this would place the individual at risk for serious harm or it would mean informing a personal representative who is believed to be responsible for the abuse or neglect
Law Enforcement • Report Crime in an Emergency • Victims of a Crime • Crime on the Premises • Decedents- if suspicion that death was the result of criminal conduct • Identification & Location • Pursuant to a process required by law
Research • Waiver or alteration of authorization approved by IRB or Privacy Board • Reviews Preparatory to Research • Research on Decedent Information • De-Identified Data • Limited Data Set (with Data Use Agreement)
Patient’s Rights Under HIPAA • Access and copy information • Request restriction of use for TPO • Request confidential communication • Accounting of Disclosures • Receive a copy of the Notice of Privacy Practices • Request amendments to records
Request Restrictions • Only applies to PHI used or disclosed for TPO or to family, friends or others involved in the patient’s care. • A Covered Entity (CE) is not required to agree • If the CE agrees, it is bound by the restriction *Under HITECH – must agree to request if restriction meets certain criteria
Psychotherapy Restrictions • Psychotherapy notes are not kept in the medical record • Require an Authorization for uses and disclosures even for TPO • Verification Process Must verify that individuals to whom you are disclosing information are whothey say they are.
Administrative Requirements • Designate a Privacy Official • Departmental Liaison • Train members of the workforce on Privacy Requirements • Safeguard PHI • Develop Sanctions for Violations of the Privacy Policies and Procedures • Establish a means for individuals to complain about privacy violations
Remember the Minimum Necessary Rule • Role based access • Need to know • Patient authorization to use and disclose • De-identification