HIPAA & The HITECH Act No Longer Simply A Binder of...

34
HIPAA & The HITECH Act No Longer Simply A Binder of Policies What's Changed and What Steps Your Company Should Be Taking

Transcript of HIPAA & The HITECH Act No Longer Simply A Binder of...

Page 1: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

HIPAA & The HITECH Act

No Longer Simply A Binder of Policies

What's Changed and What Steps Your

Company Should Be Taking

Page 2: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

Clark Hill Presents:

HIPAA & the HITECH Act

No Longer Simply a Binder of Policies

What’s Changed and What Steps Your Company

Should Be Taking

Michael W. Matthews

151 S. Old Woodward Ave., Ste. 200

Birmingham, MI 48009

248-988-5870

[email protected]

Page 3: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

3

The HITECH Act

The Health Information Technology for Economic and

Clinical Health Act (the “HITECH Act”) is part of the

American Recovery and Reinvestment Act of 2009

(“ARRA”).

The HITECH Act:

— Amends the HIPAA Privacy Rule & Security Rule; and

— Equally applies to Covered Entities (“CEs”) and Business

Associates (“BAs”)

Page 4: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

4

Key Amendments to HIPAA under the HITECH Act

Extends the reach of the HIPAA Privacy and Security Rules

to BAs;

Limits certain uses and disclosures of PHI;

Increases individuals’ rights with respect to PHI maintained

in electronic health records (“EHRs”);

Increases enforcement of and penalties for HIPAA

violations; and

Imposes breach notification requirements.

Page 5: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

5

Recent Guidelines/Interim Final Rules

HHS (applicable to CEs and BAs):

— Guidance regarding technologies and methodologies to

secure health information (See Federal Register, Vol. 74,

No. 79, April 27, 2009);

— Interim final rule regarding breach notification for

unsecured PHI (See Federal Register, Vol. 74, No. 162,

August 24, 2009, amending 45 CFR Parts 160 and 164)

Additional guidance and regulations are anticipated.

Page 6: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

6

Pre-HITECH Breach Notification Requirements

Prior to the HITECH Act, CEs were required to:

— Mitigate any harmful effect of a use or disclosure of PHI

in violation of its policies or HIPAA (Privacy Rule)

Applies to electronic and paper PHI

— Adopt security incident procedures (Security Rule)

Applies only to electronic PHI (“ePHI”)

No affirmative duty or obligation to notify individuals or

HHS concerning a breach.

Page 7: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

7

General Rule – HITECH Breach Notification Rule

If a “breach” of “unsecured” PHI occurs, then CE must

provide notice without unreasonable delay and within 60

days after “discovery” of such breach to affected individuals,

the media (in certain instances) and the Secretary of HHS.

Affected individuals are those whose “Unsecured PHI” has

been or is reasonably believed by CE to have been accessed,

acquired or disclosed as a result of a breach.

This rule creates a functional safe harbor - if the PHI is

“secured,” then there is no notice obligation.

Page 8: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

8

General Rule – HITECH Breach Notification Rule

Accordingly, in order to determine if notice is required under the Rule, HHS

identifies 3 steps for determining whether a breach has occurred.

The CE or BA should:

1. determine whether there has been an impermissible use or disclosure of PHI

under the Privacy Rule;

2. document whether the impermissible use or disclosure compromises the security

or privacy of the PHI in a manner that poses a significant risk of financial,

reputational or other harm to the individual; and

3. determine whether the incident falls under one of the exceptions to the definition

of breach.

Page 9: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

9

What is a Breach?

The unauthorized acquisition, access, use or disclosure

of unsecured PHI

— in a manner not permitted under the Privacy Rule

(unauthorized)

— which compromises the security or privacy of the

information

— except where unauthorized person “would not

reasonably have been able to retain” the information.

Page 10: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

10

What is a Breach?

Once it has been determined that a use or disclosure violates

the Privacy Rule, then determine whether the violation

compromises the security or privacy of the PHI.

PHI is “compromised” if the breach poses a significant risk of

financial, reputational or other harm to individual

To determine if PHI is “compromised,” CEs should:

— Conduct a fact specific risk assessment

— Risk assessment should be documented

— CE has burden of proof that no significant risk is posed

Page 11: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

11

Breach – Risk Assessment

HHS stated that a CE should consider the following factors:

Who impermissibly used the PHI or to whom was the PHI impermissibly

disclosed?

What immediate steps were taken to mitigate the impermissible use or

disclosure?

Was the PHI returned prior to being accessed for an improper use?

What type and amount of PHI was involved in the impermissible use or

disclosure?

Did the use or disclosure involve sensitive information such as information

regarding a sexually transmitted disease, mental health or substance abuse?

If the risk assessment indicates that a violation of the Privacy Rule does not

pose a significant risk of financial, reputational, or other harm to the

individual, then no notification is required.

Page 12: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

12

Was the PHI Unsecured?

“Unsecured PHI:”

PHI not secured through use of a technology or

methodology specified by HHS as rendering the

information unusable, unreadable or indecipherable to

unauthorized persons.

HHS has identified certain encryption and destruction

technologies and methodologies that must be

implemented to meet this standard.

Page 13: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

13

“Securing PHI”

HHS specifies technologies and methodologies concerning the security of

PHI for both ePHI and PHI:

Encryption of electronic data per National Institute Standards and

Technology (“NIST”) standards;

Destruction of electronic media per NIST standards; and

Shredding or destruction of paper, film or other hard copy media.

IMPORTANT: If PHI is secured by one of the methods or technologies listed

above, then notice is NOT required, even if the PHI was used or disclosed in

violation of the HIPAA Privacy Rule.

Page 14: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

14

Breach Exceptions

Exception #1:

Unintentional acquisition, access or use of PHI by a workforce member or other

person acting under authority of a CE or BA if:

Access made in good faith and within scope of employment or other professional

relationship

The information was not further acquired, accessed, used or disclosed (which

means not further used or disclosed in a way that is impermissible under Privacy

Rule)

Example: Office receptionist opens email sent by nurse by mistake. Receptionist

recognizes she is not proper recipient, she notifies the nurse, deletes the email

and does not further use or disclose the information (no breach)

Example: Office receptionist “snoops” in her friend’s medical records and

reports back to her friend’s husband (Breach)

Page 15: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

15

Breach Exceptions

Exception #2:

Inadvertent disclosure from an individual authorized by a CE

or BA to another authorized person at the same CE or BA, so

long as:

The sender and recipient are “similarly situated” (both

authorized to access PHI)

The information was not further acquired, accessed, used or

disclosed (which means not further used or disclosed in a way

that is impermissible under Privacy Rule)

Page 16: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

16

Breach Exceptions

Exception #3:

Where CE or BA has a good faith belief that an unauthorized

person to whom the PHI was disclosed would not have been

able to retain the PHI.

— Example: Plan sends EOB to wrong person, but the envelope

is returned to the Post Office unopened.

IMPORTANT: The CE has the burden of proving (and

documenting) that an exception applies.

Page 17: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

17

Summary Analysis of Breach

To analyze if a breach has occurred, ask whether:

1. There has been an impermissible use or disclosure of

unsecured PHI under the Privacy Rule;

2. The impermissible use or disclosure compromised the

security or privacy of the Unsecured PHI (i.e., Is there a

significant risk of financial, reputational or other harm to the

individual? Was the PHI secured or unsecured?); and

3. The incident satisfies one of the 3 exceptions to a breach.

IMPORTANT: Each step of the process should be documented.

Page 18: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

18

Notice to Affected Individuals

Let’s assume, based upon the risk assessment, that

notice is required.

Page 19: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

19

“Discovery” of Breach

A breach is “discovered” as of the first day that it is known (or

reasonably should have been known) to the CE or BA (not

when the “risk assessment” is completed).

The CE or BA has knowledge of the breach on the day that

any employee, workforce member, or other agent has such

knowledge (except for the individual who committed the

breach).

Discovery starts the time period for providing notice.

Page 20: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

20

Notice: Timing and Recipients

To affected individuals: Written notice must be provided to

individuals, without unreasonable delay and in no case later

than 60 days after the date of discovery, by first class mail to

last known address. Email notice is only permitted if the

individual agrees.

— Don’t assume that CEs have 60 days to notify (it’s a max.)

— CEs have burden of demonstrating timing was appropriate (and

justifying any delay)

— CEs may delay notification while they investigate the breach,

but investigation can’t take an unreasonable amount of time

— If information about the breach trickles in, CE can send multiple

notices

Page 21: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

21

Notice – Timing and Recipients

Special Delivery Rules:

— If CE lacks contact information for less than 10 individuals, it

can notify by phone, email or other means

— If CE lacks contact information for 10 or more people, it must

provide substitution notice:

By conspicuous posting on website for 90 days; or

By conspicuous notice to major print or broadcast media in

geographic area where individuals resides; and

In both instances, must provide toll free number for at least

90 days.

Page 22: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

22

Notice: Timing and Recipients

Special Delivery Rules (con’t):

— If there is urgency due to possible imminent misuse, CE may

provide notice via phone or other means. This notice is in addition

to (not in lieu of) regular written notice.

— For minors or individuals who lack legal capacity, notice may be

sent to parent, guardian or personal representative.

— For deceased persons, notice must be sent to personal

representative or next of kin (if known).

— If a law enforcement official determines that notification would

impede a criminal investigation or damage national security,

notification may be delayed.

Page 23: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

23

Notice: Timing and Recipients

To the Media: If breach involves more than 500 affected

individuals in state or jurisdiction, then notice must be

provided through prominent media outlets

— This is in addition to written notice to impacted

individuals

— This notice must be provided in same time frame, and

have same content as notice to impacted individuals

Page 25: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

25

BAs: Timing of Breach Notification

BAs must notify CEs of any breach of which they become

aware without unreasonable delay but no later than 60 days

— Notice must identify each affected individual (to extent possible)

— Notice must provide any other information CE may need to

include in its notice to individuals

— BA is not required to notify individuals

IMPORTANT: Notification duties and obligations may be shifted

to BAs through Business Associate Agreements; thus the CE

and BA have an opportunity to address which party will be

responsible for providing notice to affected individuals in a

event a breach occurs.

Page 26: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

26

BAs: Timing of Breach Notification

If a BA is acting as an agent of a CE, then the BA’s discovery of

the breach will be imputed to the CE

— 60 day timeframe for notification begins for CE

If the BA is acting as an independent contractor of the CE (i.e.,

not an agent), then the CE must notify within 60 days of

receiving notification of breach from the BA

Federal common law of agency will govern whether a BA is an

agent of a CE

CEs should clarify timing of notification by specifying time

frame in business associate agreement (but, that may not

change legal “agent” status)

Page 27: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

27

Content of Notice

Brief description of facts surrounding breach;

Type of unsecured PHI involved;

Steps individuals should take to protect themselves;

Brief description of what CE is doing to investigate and

mitigate the breach; and

Contact information for inquiries.

Also, notice must be in plain language

— At appropriate reading level

— No confusing, extraneous information

Page 28: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

28

Administrative Requirements

Regulations also impose administrative requirements on CEs

with respect to breach notification, including:

— Training for workforce members;

— Process for filing complaints;

— Sanctions for failure to comply with policies;

— Refrain from intimidating or retaliatory acts; and

— Implement and/or update policies and procedures.

Page 29: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

29

Increased Enforcement

HHS Random Compliance Audits

Enforcement by State Attorney Generals (Effective

Immediately)

Annual Report to Congress

HIPAA and HITECH: No private right of action

Page 30: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

30

Increased Enforcement

Tier 1: If person is not aware of the violation (and would not have

known with reasonable diligence), penalty is at least $100/violation,

not to exceed $25,000 for all violations of the same requirement in the

same calendar year.

Tier 2: If violation is due to “reasonable cause” (but not willful

neglect), penalty is at least $1,000/violation, not to exceed $100,000

for all violations of the same requirement in the same calendar year.

Tier 3: If violation is due to willful neglect and is corrected in 30 days,

penalty is at least $10,000/violation, not to exceed $250,000 for all

violations of the same requirement in the same calendar year.

Tier 4: If violation is due to willful neglect and is not corrected in 30

days, penalty is at least $50,000/violation, not to exceed $1.5 million

for all violations of the same requirement in the same calendar year.

Page 31: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

31

Increased Enforcement

Effective immediately, except the “willful neglect”

standard is not applicable until February 2011.

HITECH requires all civil money penalties collected to be

transferred to OCR for purposes of enforcing the

Privacy and Security Rules.

Page 32: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

32

Recommendations

To comply with current rules and regulations, CEs and BAs should

undertake the following steps:

1. Draft new or revise existing policies and procedures regarding identification and

response to privacy and security breaches;

2. Revise existing business associate agreements;

3. Identify types of PHI that may be “unsecured:”

4. Secure unsecured PHI through approved technologies and methodologies;

and

5. Create a process for breach response to ensure all breaches of unsecured PHI

are appropriately handled in a timely fashion.

Page 33: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

33

Questions?

Thank you for your time this morning.

If you have additional questions regarding the HITECH Act or

would like assistance with policies, procedures, or training,

please feel free to contact me directly at (248) 988-5870 or by

email at [email protected]

Page 34: HIPAA & The HITECH Act No Longer Simply A Binder of …digitalbenefits.typepad.com/HITECH/mike.pdf · Destruction of electronic media per NIST standards; ...

Thank you for attending