HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of...

37
HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016

description

HIPAA Privacy Rule Covered Entity is a health plan, a health care provider or a health care clearinghouse who electronically transmit any health information in connection with transactions for which HHS has adopted standards Protected Health Information (PHI):  Relates to past, present, or future physical or mental condition of an individual; provisions of healthcare to an individual; or for payment of care provided to an individual.  Is transmitted or maintained in any form (electronic, paper, or oral representation).  Identifies, or can be used to identify the individual.

Transcript of HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of...

Page 1: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

HIPAA Privacy and Security Rulesand the HITECH ActTraining for ResearchersBy: Office of University CounselFebruary 2016

Page 2: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

IntroductionThe HIPAA Privacy Rule establishes the conditions

under which Covered Entities can provide researchers access to and use of protected health information for research purposes.

The HIPAA Privacy Rule does not replace or act in lieu of other federal regulations such as HHS Protection of Human Subjects and the FDA Protection of Human Subjects

Research is defined under the HIPAA Privacy Rule as:“a systematic investigation, including research development, testing and evaluation, designed to develop or contribute to generalized knowledge”

Page 3: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

HIPAA Privacy Rule• Covered Entity is a health plan, a health care

provider or a health care clearinghouse who electronically transmit any health information in connection with transactions for which HHS has adopted standards

• Protected Health Information (PHI):Relates to past, present, or future physical or mental

condition of an individual; provisions of healthcare to an individual; or for payment of care provided to an individual.

Is transmitted or maintained in any form (electronic, paper, or oral representation).

Identifies, or can be used to identify the individual.

Page 4: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

HIPAA Security Rule

• The Security Rule defines the standards which require covered entities to implement basic safeguards to protect electronic Protected Health Information (e-PHI)• The rule requires safeguards for physical storage

of PHI, maintenance of PHI, transmission of PHI and access to PHI

Page 5: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

“e-PHI”• e-PHI (electronic Protected Health Information) is

computer-based patient health information that is used, created, stored, received or transmitted by a Covered Entity using any type of electronic information resource.

• Information in an electronic medical record, patient billing information transmitted to a payer, digital images and print outs, information when it is being sent by one provider to another provider, a payer or a researcher.

Page 6: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

How Can Covered Entities Use and Disclose PHI for Research and Comply with the HIPAA Privacy Rule?1. De-identified health information, as described in the

Privacy Rule, is not PHI, and thus not protected by the Privacy Rule

2. PHI may be used and disclosed for research WITH an individual’s written permission in the form of an Authorization

3. PHI may be used and disclosed for research WITHOUT an Authorization in limited circumstances: (a) under a waiver of the Authorization requirement; (b) for research on decedents’ information; (c) preparatory to research; and (d) as a limited data set with a data use agreement

Page 7: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

1. De-Identified Health Information• Health information that does not identify an

individual and with respect to which there is no reasonable basis to believe that the information can be used to identify an individual is not individually identifiable health information

• De-identified PHI has had all identifiers (listed in the HIPAA Privacy regulation) removed- The “Safe Harbor”- Consider re-identification issues

• An expert certifies that the risk is small that the information could be used to identify the individual- The “Scientific Method”

Page 8: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

What must be done to De-Identify PHI?To de-identify PHI, all of the following identifiers must

be removed• Name; • Geographic subdivisions smaller than a state (i.e.,

county, town, or city, street address, and zip code) (note: in some cases, the initial three digits of a zip code may be used);

• All elements of dates (except year) for dates directly related to an individual (including birth date, admission date, discharge date, date of death, all ages over 89 and dates indicative of age over 89) (note: ages and elements may be aggregated into a single category of age 90 or older);

• Phone numbers; • Fax numbers; • E-mail addresses; • Social security number; • Medical record number;

Page 9: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

De-Identifying PHI (cont.)• Health plan beneficiary number; • Account number; • Certificate/license number; • Vehicle identifiers and serial numbers; • Device identifiers and serial numbers; • URLs; • Internet protocol addresses; • Biometric identifiers (e.g., fingerprints); • Full face photographic and any comparable images; • Any other unique identifying number, characteristic,

or code; and • Any other information that could be used alone or in

combination with other information to identify the individual

Page 10: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Request for Information from a Covered EntityScenario #1: A sponsor has asked you for information to determine if Jefferson has a sufficient number of patients with a specific diagnosis to conduct a study at Jefferson. How do you proceed?

Why is the information needed?What type of information is needed to make this determination?Is PHI needed?Is de-identified information needed?Is an approved IRB study needed to request de-identified information?To whom and how is the request made?

Page 11: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

2. Subject Authorization• Gives the individual the opportunity to agree to the

uses and disclosures of their PHI• Authorization must pertain to specific research• If an authorization is used, the actual uses and

disclosures made must be consistent with what is stated in the Authorization

• The signed authorization must be retained for at least 6 years

• Authorization differs from an informed consent• HIPAA Privacy Rule does not state who may draft,

therefore, researchers may draft• Authorization must be compliant with HIPAA Privacy

Rule: written in plain language, contain core elements and a signed copy provided to the individual

Page 12: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

HIPAA Authorization Core Elements• Description of the PHI to be used or disclosed• Person/Class of Persons who may make the

request• Person/Class of Persons to whom use/disclosure

may be made• Description of the purpose of the requested use or

disclosure• Expiration date (for research may state “at end of

study” or does not expire)• Signature of the individual and date• Statement of the right to revoke authorization• Statement of conditions to treatment/payment or

of refusing to sign• Statement of the possibility of re-disclosureSee OHR-8 form.

Page 13: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Request for Information from a Covered EntityScenario #3: The PI is conducting a clinical trial. Patient data needs to be obtained from the patients’ EMRs. How do you proceed?

Why is the information needed?What type of information is needed?Is IRB approval needed before study coordinators are permitted to access patients’ EMRs?Is a signed Research Informed Consent Form needed?Are copies of relevant sections of the patients EMRs permitted to be made?

Hint: See, Jefferson Policy No. 110.19 “Access to JUP Electronic Records by Research Coordinators for Research Purposes”

Page 14: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

3. Without Authorization—(a) Waivers• Without a subject authorization use information only if it

meets criteria (e.g. if an IRB permits and grants a waiver of individual authorization)

• IRB may waive Authorization upon the request of a researcher only if:1. The use or disclosure of PHI involves not more than a

minimal risk to the privacy of individuals, based on • An adequate plan to protect the identifiers• A plan to destroy identifiers as soon as possible• Adequate written assurances that the PHI will not

be reused or disclosed to any other person2. The research could not practically be conducted

without a waiver; and3. The research could not practically be conducted

without the PHISee OHR-3 form.

Page 15: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

3. Without Authorization--(b) Research on Decedents’ InformationPHI relating to decedents may be used or disclosed by a researcher if the researcher:• Represents that the use or disclosure is sought

solely for the research;• Provides documentation that PHI is necessary

for the research purposes; and• Provides documentation, at the Covered

Entities’ request, of the death of the individualsSee OHR-17 form.

Page 16: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

3. Without Authorization—(c) Activities Preparatory To Research

PHI may be used or disclosed by a researcher if the researcher represents that:• The use or disclosure is solely for review

of PHI necessary to prepare a research protocol• No PHI will be removed from the Covered

Entity• The PHI is necessary for the research

purposeSee OHR-29 form.

Page 17: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Request for Information from a Covered EntityScenario #2: The PI is considering conducting a study. The PI would like to review potential subjects’ PHI before submitting a protocol to the IRB. How do you proceed?

Why is the information needed?What type of information is needed?Is PHI needed?Is IRB approval needed before the review may be conducted?To whom and how is the request for PHI made?

Hint: See, OHR-29 Review Preparatory to Research Request Form

Page 18: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

3. Without Authorization—(d) LIMITED DATA SET and DATA USE AGREEMENT• PHI that is used in a limited data set is still PHI, but

may be used or disclosed for research without an authorization or waiver

• Limited Data Set does NOT include direct identifiers• The Data Use Agreement MUST:

- Establish the permitted uses and disclosures;- Limit who can receive the data; and- Require the recipient to agree not to use/disclose the information other than as permitted; use safeguards; agree not to contact the individual, etc.

See OHR Data Use Agreement.

Page 19: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Researchers’ Requests for PHI from Covered Entities• Researchers must comply with Covered

Entity procedures to secure PHI• Example: JUP IDX Request and EMR

Request Forms

Page 20: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Other Uses and Disclosures of PHI

• A Covered Entity may use or disclose PHI without an Authorization, as follows:- To the extent the use/disclosure is required by law, e.g. reporting to cancer registries

- To a public health authority (e.g. NIH)- To a health oversight agency (e.g. OHRP)

Page 21: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Minimum Necessary Restriction

• With some exceptions, the HIPAA Privacy Rule minimum necessary requirements apply• Researchers should only secure the

minimum information necessary to achieve the research purpose

Page 22: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Accounting of Disclosures of PHI• Researchers must keep a record of PHI

disclosures made in connection with:- Waived research protocols- Reviews preparatory to research- Decedents’ information

• Standard accounting includes for each disclosure (for disclosures of PHI for fewer than 50 individuals):- The date the disclosure was made- The name and address of the person receiving the PHI- A brief description of the PHI disclosed- A brief statement of the reason for the disclosure

Page 23: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Accounting of Disclosures

• For disclosures of PHI for 50+ individuals, researchers must provide:- The protocol and purpose- Criteria for selecting the particular records- The period over which the disclosures likely occurred and the last disclosure made; and

- The sponsor and researchers to whom PHI may have been made

Page 24: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Subject Recruitment

• Physicians can provide information about recruitment in research

• If the physician is NOT the researcher:- The recruiting physician must obtain authorization to refer the patient to the researcher (i.e. to contact the patient about recruitment)

- An additional Authorization will then be required to secure PHI and an informed consent needed for actual participation in the research

Page 25: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

How do we protect PHI when conducting Research?• Maintain the privacy/security of research documents• When you consent/talk about patients/subjects as part

of your research, try to prevent others from overhearing the conversation. Hold conversations in private areas. Do not discuss patients/subjects while in public areas.

• Do not leave PHI unattended• Remove patient/subject documents from faxes/copiers

as soon as you can. • When you throw away documents containing PHI,

properly dispose of documents, e.g. shredding. • Never remove the patient's official medical record from

a Covered Entity. • Do not leave PHI where your family members/others may

see it.

Page 26: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

How do we protect e-PHI when conducting Research?• Never use anyone else’s log-on, or a computer

someone else is logged-on to. Do not share passwords.

• Never download PHI on personal laptops and PDAs.

• Never leave PHI unattended.• Never “Blog” disclosing PHI.• Do use automatic locks on laptop computers

and PDAs.• Do log off after each time you use a computer. • Do purge PHI from devices as soon as possible.• Do use secure networks for e-mails with PHI

and add a confidentiality disclaimer to the footer of such e-mails.

• Do provide for confidential sending and receipt of faxes that contain PHI and other confidential information.

Page 27: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Mandatory Breach Notification The HITECH Act applies to breaches of “unsecured protected health information”Information must be encrypted or destroyed in order to be considered “secured”If you suspect a breach has occurred, promptly notify your immediate supervisor.If a breach has occurred, reporting requirements must be satisfied.

See, Jefferson Policy No. 122.37, “Mandatory Reporting, Investigation and Notification of Breaches of Health or Personal Information”.

Page 28: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

HITECH-What Constitutes a Breach?A “breach” is an impermissible acquisition, access, use or disclosure not permitted by the HIPAA Privacy or Security Rules. Examples include: • Laptop containing PHI is stolen• Researcher who is not authorized to access PHI

looks through patient files in order to learn of a person’s treatment

• Researcher misplaces research documents with study subject PHI

• Researcher sends wrong sponsor study subject information including PHI

• Researcher sends sponsor more PHI than necessary

• Research office theft results in stolen PHI

Page 29: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

HITECH-Breach Notification ObligationsIf a breach has occurred, a Covered Entity will be responsible for providing notice to:• The affected individuals (without

unreasonable delay and in no event later than 60 days from the date of discovery)• The Secretary of the U.S. Department of

Health and Human Services (timing will depend on number of individuals affected by the breach)• The media (only required if 500 or more

individuals of any one state are affected)The OHR must consider reporting obligations.

Page 30: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Penalties for Violations

• A violation of federal regulations can result in civil money penalties or criminal penalties. • Penalties can be imposed for underlying HIPAA Privacy Rule violation even if the breach is properly handled.

Page 31: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Civil Money Penalty Enhancement• Unknowing Violations: $100 to $50,000 per violation • Negligent Violations: $1,000 to $50,000 per

violation • Willful Neglect: “Conscious intentional failure or reckless indifference to the obligation to comply” –$10,000 to $50,000 per violation (if corrected within

30 days)–$50,000 per violation (if not corrected)

$1.5M cap per calendar year for all violations of the same type

Page 32: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Enforcement$150,000 settlement with Adult & Pediatric Dermatology, P.C. of Concord, Massachusetts for loss of unencrypted flash drive and not having policies to address breach notification provisions.

Page 33: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Enforcement$1,215,780 settlement with Affinity Health Plan for impermissibly disclosing PHI of 344,579 affected individuals when it returned multiple photocopiers to leasing agents without erasing the data on the copier hard drives.

Page 34: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Enforcement

$1,700,000 settlement with Well Point for security weaknesses in an online application database that left the e-PHI of 612,402 individuals accessible to unauthorized individuals over the Internet. The data included names, dates of birth, addresses, social security numbers, telephone numbers and health information.

Page 35: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Enforcement

• $1.5M settlement with BCBS of TN over the loss of 57 hard drives containing 1M patient records • $865,000 settlement with UCLA Medical Center

after hospital employees allegedly accessed the records of two celebrity patients without authority • $1M settlement with Mass General after

employee left 192 HIV patients’ records on subway

Page 36: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Enforcement

• $50,000 settlement with Hospice of Northern Idaho after theft of laptop containing unencrypted PHI of 441 patients • $1.5M settlement with Mass Eye & Ear after

theft of laptop containing unencrypted PHI of 3,621 patients • $1.7M settlement with Alaska DHHS after

theft from employee’s vehicle of USB hard drive possibly containing PHI • $100,000 settlement with Phoenix Cardiac

Surgery which posted clinical and surgical appointments in Internet-based calendar that was publicly available

Page 37: HIPAA Privacy and Security Rules and the HITECH Act Training for Researchers By: Office of University Counsel February 2016.

Conclusion

Thank you for taking the time to learn about the HIPAA Rules and the HITECH Rules as they relate to research.

If you have questions, please feel free to contact Doreen Kornrumpf, Privacy Officer/Legal Counsel.