Telemedicine Privacy and Security: Safeguarding Protected Health Information and Minimizing Risks of Disclosure

Similar documents
Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features:

Telemedicine Credentialing and Privileging

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features:

Retail Clinics in Healthcare: Overcoming Complex Legal Challenges

AGENDA. 10:45 a.m. CT Attendees Sign On 11:00 a.m. CT Webinar 11:50 a.m. CT Questions and Answers

Catastrophic Burn Injury Cases: Assessing Claims, Litigating, Negotiating Settlements

Circular A-133 Audits for Non-Profits Receiving Grants Preparing for Audits and Protecting Grant Eligibility Given Current Government Priorities

Why Telehealth, Why Now?

Hospital Outpatient Services: New CMS Supervision Requirements Complying With the New Rules to Protect Medicare Reimbursement

19/09/2017. Telehealth Legal and Regulatory Issues in Colorado and Beyond. Nathaniel Lacktman, October 2017

Holly Jo Bohannan, Esq., Associate General Counsel - East Region, LifeCare Health Partners, Plano, Texas

Inpatient Hospital Services Billing, Denials and Reimbursement: Evolving Regulatory and Legal Landscape

Understanding the Privacy and Security Regulations

Telemedicine and mobile health innovations amid increasing regulatory oversight

HIPAA THE PRIVACY RULE

TELEHEALTH: THE FUTURE IS HERE!

Medical Staff Bylaws: Compliance Challenges Updating Bylaws to Comply with Joint Commission Standards

Healthcare Insolvencies: Navigating the Intersection of Medicare, ERISA, HIPAA, AKS, Stark and the Bankruptcy Code

Keeping Your Compliance Program in Pace with Rapidly Expanding TeleHealth Services

Cruising Through Key Legal Compliance Issues in Telemedicine

9/21/2017. Telemedicine vs. Telehealth. Telemedicine vs. Telehealth. Telemedicine vs. Telehealth. Time is Money. Disruptive Technology

Telehealth: An Introduction to Implementation and Policy Considerations. Angela Evatt, M.A., M.P.P

u Telemedicine The Virtual Experience

Notice of Privacy Practices

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

HITECH Act. Overview and Estimated Timeline

Medical Staff Credentialing: Minimizing Liability Arising From Negligent Credentialing and Physician Lawsuits

Telehealth Legal and Compliance Issues. Nathaniel Lacktman, Anna Whites, Esq.

HIPAA in DPH. HIPAA in the Division of Public Health. February 19, February 19, 2003 Division of Public Health 1

CHI Mercy Health. Definitions

2514 Stenson Dr Cedar Park TX Fax

Advanced HIPAA Communications and University Relations

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS

Patient Privacy Requirements Beyond HIPAA

Life Care Planning: Beyond Estate Plans and Living Wills

Part I of the HITECH Webinar Series

5/1/2017. Medicare Coverage Guidelines for DSMT and MNT Telehealth. Telehealth Defined

MCCP Online Orientation

HIPAA P12 CMS Data Use Agreements & Data Management Plans

Legal Issues You Should Know April 25, 2018 In-House Counsel Conference

Memorial Hermann Information Exchange. MHiE POLICIES & PROCEDURES MANUAL

TELEMEDICINE: Managing the Risks of Virtual Healthcare

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

Telehealth Policy Barriers Fact Sheet

Telehealth Webinar. Wyoming Medicaid Covered Services & Billing Requirements December 14, 2016

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

Nursing Home Litigation and Admissibility of Evidence: Proving or Challenging Authentication, Relevance and Hearsay

3/27/2017. Historical Perspective. Innovative Model of Healthcare Delivery Using Telemedicine

A Lawyer s Take on Meaningful Use. By Steven J. Fox & Vadim Schick

A general review of HIPAA standards and privacy practices 2016

Chapter 7 Section 22.1

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

Privacy and Consent Primer

Telehealth: Frequently Asked Questions

Chapter 7 Section 22.1

Forming Urgent Care Centers: Addressing Complex Legal Challenges

Telemedicine. Important Information. Telemedicine 5/6/2016. Lauren Prew

I. LIVE INTERACTIVE TELEDERMATOLOGY

Texas Medicaid. Provider Procedures Manual. Provider Handbooks. Telecommunication Services Handbook

AN ACT authorizing the provision of health care services through telemedicine and telehealth, and supplementing various parts of the statutory law.

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

FCSRMC 2017 HIPAA PRESENTATION

FOUR TIPS: THE INVISIBLE IMPACT OF CREDENTIALING

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office

Welcome to the Kentucky Health Information Exchange Newsletter!

Telepharmacy: How One Wyoming Pharmacy Makes it Work

Oklahoma Health Care Authority. Telemedicine

MassHealth Provider Billing and Services Updates & Upcoming Initiatives. Massachusetts Health Care Training Forum July 2011

Funding Opportunities with USDA

The HIPAA privacy rule and long-term care : a quick guide for researchers

Forward-thinking healthcare solutions It s what we do. Healthcare Law

Chapter 9 Legal Aspects of Health Information Management

TELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL

Health Information Data Sharing: HIPAA Facts and Fallacies

Compliance Program Updated August 2017

Structuring Comprehensive Care for Joint Replacements Collaborator Agreements

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

2018 Employee HIPAA Orientation (EHO) Handbook

What is Telemedicine and How is It Being Used?

Telemedicine and Telehealth Services

Faculty Profile. PART I Privacy Training for Health Professionals. Disclaimer. Always Be Prepared 7/11/2013. Why should you care about Privacy?

HIPAA Education Program

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

The Privacy & Security of Protected Health Information

Telemedicine Guidance

VHA Privacy Policy Training FY VHA Privacy Office

STATE TELEHEALTH POLICY TRENDS. Legislative Summit 2016 Kate Blackman, Policy Specialist, NCSL

Chapter 19 Section 3. Privacy And Security Of Protected Health Information (PHI)

HIPAA and HITECH: Privacy and Security of Protected Health Information

Protecting Health Information: Health Data Security Training

Information Privacy and Security

OVERVIEW OF THE USES AND DISCLOSURES OF PHI

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

Office of the Chief Privacy Officer. Privacy & Security in an App Enabled World HIMSS, Tuesday March 1, 2016, Las Vegas, NV

West Virginia Trading Partner Account Patient Roster User Guide. Date of Publication: 01/19/2016 Document Version: 1.0

HIPAA PRIVACY TRAINING

Telehealth in Alaska. Cindy Roleff, MS, BSN, RN-BC Telehealth Program Development Manager AFHCAN / ANTHC

Privacy & Security: What You Need to Know

Transcription:

Presenting a live 90-minute webinar with interactive Q&A Telemedicine Privacy and Security: Safeguarding Protected Health Information and Minimizing Risks of Disclosure THURSDAY, AUGUST 13, 2015 1pm Eastern 12pm Central 11am Mountain 10am Pacific Today s faculty features: Claire Marblestone, Esq., Foley & Lardner, Los Angeles Rebekah A. Z. Monson, Esq., Pepper Hamilton, Philadelphia Dayna C. Nicholson, Esq., Pepper Hamilton, Los Angeles The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.

Tips for Optimal Quality FOR LIVE EVENT ONLY Sound Quality If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection. If the sound quality is not satisfactory, you may listen via the phone: dial 1-866-927-5568 and enter your PIN when prompted. Otherwise, please send us a chat or e-mail sound@straffordpub.com immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.

Continuing Education Credits FOR LIVE EVENT ONLY In order for us to process your continuing education credit, you must confirm your participation in this webinar by completing and submitting the Attendance Affirmation/Evaluation after the webinar. A link to the Attendance Affirmation/Evaluation will be in the thank you email that you will receive immediately following the program. For additional information about CLE credit processing call us at 1-800-926-7926 ext. 35.

Program Materials FOR LIVE EVENT ONLY If you have not printed the conference materials for this program, please complete the following steps: Click on the ^ symbol next to Conference Materials in the middle of the lefthand column on your screen. Click on the tab labeled Handouts that appears, and there you will see a PDF of the slides for today's program. Double click on the PDF and a separate page will open. Print the slides by clicking on the printer icon.

Telemedicine Privacy & Security Safeguarding Protected Health Information and Minimizing Risks of Disclosure Claire Marblestone, Esq. Rebekah Monson, Esq. Dayna Nicholson, Esq. August 13, 2015

Agenda Basic Principles of Telemedicine Privacy and Security Considerations Telemedicine in Action Best Practices Questions? 6

Basic Principles Key Definitions Telemedicine is the practice of medicine using electronic communications, information technology or other means between a licensee in one location, and a patient in another location with or without an intervening health care provider. (Federation of State Medical Boards) Telehealth is a broader term than telemedicine because the term does not always refer to clinical services. Telehealth includes remote monitoring, telepharmacy, regional health information sharing, and non-clinical services, such as education programs, administration, and public health. 7

Basic Principles Telemedicine vs. Telehealth Types of Telemedicine: - Non-simultaneous: involve after-the-fact interpretation or assessment, such as teleradiology services - Simultaneous: involve real-time interpretation or assessment, such as telestroke and teleicu services (Generally) NOT Telemedicine: - Informal consultations between practitioners - Telephone conversation, e-mail/instant messaging conversation, or fax Telemedicine and telehealth are tools in medical practice, not a distinct service. 8

Basic Principles Telemedicine Participants Patient On Site Provider health care provider that is with the patient at the time of service - Treating Provider - Allied Health Professionals Remote Provider - Treating Provider provider that has a treatment relationship with the patient at the originating site - Consulting Provider provider at a distant site that is being consulted by the treating provider; often specialty telemedicine consultations 9

Basic Principles Telemedicine Participants Technology Vendor - Device the hardware that is being used to conduct the telemedicine session (e.g. ipad, cell phone, computer) - Software/Application the program or application that is being used to conduct the telemedicine session Telecom Carrier Payor Medicare, Medicaid, private payors 10

Privacy and Security Considerations HIPAA/HITECH Privacy and Security Laws & Regulations Health Insurance Portability and Accountability Act of 1996 (HIPAA) Health Information Technology for Economic and Clinical Health Act (HITECH) (American Recovery and Reinvestment Act of 2009) HIPAA Rules: 45 C.F.R. Parts 160, 162, 164 (Final Omnibus Rule: 01/25/13, Compliance date: 09/23/13) Enforcement - Civil and criminal penalties - HHS/OCR, DOJ, SAG 11

Privacy and Security Considerations What is PHI? individually identifiable health information (IIHI), including demographic information collected from an individual, that: - is created or received by a health care provider, health plan, employer or health care clearinghouse, and - relates to: (a) the past, present, or future physical or mental health or condition of an individual; (b) the provision of health care to an individual; or (c) the past, present or future payment for the provision of health care to an individual; and - identifies the individual OR there is a reasonable basis to believe the information can be used to identify the individual; and - is transmitted or maintained by electronic media or in any other form or medium 12 12

Privacy and Security Considerations What is Not PHI? Exception for de-identified information - Information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be used to identify an individual is not PHI - Safe harbor for de-identification of PHI Removal of 18 specified direct identifiers (e.g., name, DOB, SSN, medical record number, phone number, etc.) Medical information expert determination Guidance Regarding Methods for De-Identification of Protected Health Information (November 2012) 13 13

Privacy and Security Considerations Who is Responsible? Covered Entity (CE) - Health care provider who conducts electronic transactions Institutional providers Non-institutional providers any other person or organization who furnishes, bills, or is paid for health care in the normal course of business - Health plan - Health care clearinghouse 14 14

Privacy and Security Considerations Who is Responsible? Business Associate (BA) - Creates, receives, maintains or transmits PHI on behalf of a Covered Entity OR - Provides certain services (identified in the Rule) involving PHI, to or for, a Covered Entity Examples: actuarial, legal, accounting, consulting, management, administrative, financial Data transmission providers - Routine access to PHI versus mere conduit 15 15

Privacy and Security Considerations Subcontractor Business Associates Business associate includes: (iii) a subcontractor that creates, receives, maintains, or transmits protected health information on behalf of the business associate Subcontractor person to whom a business associate delegates a function, activity, or service, other than in the capacity of a member of the workforce of such business associate 16

Privacy and Security Considerations Down the Chain Covered Entity Business Associate Subcontractor 1 Subcontractor 2 Subcontractor 3 All are HIPAA Business Associates 17 17

Privacy and Security Considerations What is a Business Associate Agreement? Business Associate Agreement (BAA) = Contract between a CE and a BA (or a BA and a Subcontractor) that defines the BA s (Subcontractor s) obligations to protect PHI Business Associates/Subcontractors must execute a BAA with the Covered Entity/upstream Business Associate: - prior to the use/disclosure of PHI from a Covered Entity to the business associate, and - prior to the use/disclosure of PHI to a subcontractor 18

Privacy and Security Considerations Key Concept: Minimum Necessary Limit the data to be used/disclosed to the minimum necessary to accomplish the intended purpose of the use, disclosure or request (45 C.F.R. 164.502(b)(1)) - Exceptions include Disclosures to, or requests by, health care provider Use/disclosure to individual (including for accounting) Use/disclosure made pursuant to authorization Use/disclosure required by law Disclosures to HHS as required by HIPAA HITECH required guidance from HHS 19

Privacy and Security Considerations Key Concept: What goes into Business Associate Agreements? Required provisions include: - All uses/disclosures must be permitted by contract or required by law - BA will use appropriate safeguards, including compliance with the Security Rule - BA must comply with Privacy Rule to extent BA carries out CE s privacy obligations - BA required to report to the CE (or upstream BA) breaches of unsecured PHI - Must have a BAA with Subcontractors that is as (or more) restrictive Other Negotiable provisions Transition period September 22, 2014 20

Privacy and Security Considerations Key Concept: Individual Rights and Notice of Privacy Practices HIPAA provides individuals with certain rights regarding their health information maintained by a Covered Entity - Right of access - Right of amendment - Right to request privacy protections restrictions communication by alternate means - Right to an accounting of disclosures Notice of Privacy Practices 21

Privacy and Security Considerations Key Concept: HIPAA Security Privacy Rule includes mini security rule - administrative, technical and physical safeguards to protect privacy of PHI Security Rule regulations for secure storage, maintenance and transmission of ephi Security Rule requirements: - administrative, technical and physical safeguards for e-phi - document requirements of policies, procedures, etc. - required and addressable implementation specifications Key administrative safeguard: - implement a Security Management process Risk assessment a critical component 22

Privacy and Security Considerations Key Concept: Breach Notification A Breach of PHI = the acquisition, access, use or disclosure of PHI in a manner that: - Is not permitted by HIPAA, and - Compromises the security or privacy of PHI A non-permitted use, disclosure, etc. of PHI is presumed to be a breach, unless a risk assessment shows that there is a low probability that PHI has been compromised Notification required for breaches of unsecured PHI 23

Privacy and Security Considerations State Law Issues Laws requiring private or government entities to notify individuals of security breaches of personally identifiable information are on the books in 47 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands States with no security breach law: AL, NM, SD Many (not all) of the applicable laws are listed here: http://www.ncsl.org/research/telecommunications-andinformation-technology/security-breach-notificationlaws.aspx (National Conference of State Legislatures) 24

Telemedicine in Action Practical Goals from CMS Telemedicine Rule 1. Enable patients to receive medically necessary interventions in a more timely manner 2. Enhance patient follow-up in the management of chronic disease conditions 3. Provide more flexibility to small hospitals and CAHs in regions with a limited supply of primary care and specialized providers 4. Create a more cost-effective alternative to traditional service delivery approaches 5. Improve patient outcomes and satisfaction 25 25

Telemedicine in Action Recent Telemedicine Trends Arrangements between two health care entities Partnerships between health insurers and integrated health care delivery systems connecting specialists to rural communities Agreements between telemedicine entities and health insurers/employers to include coverage for virtual visits Agreements among retail pharmacies, vendors, and health care entities or physician groups Concierge and on-demand virtual clinical encounters Rapid development of mobile technology and mobile medical applications 26 26

Telemedicine in Action Scenarios: Web/Mobile App Patient Physician Telecom Provider Telecom Provider Website / Mobile Application 27

Telemedicine in Action Scenarios: Web/Mobile App Does HIPAA apply? - Is there PHI? - Are there Covered Entities? Are there Business Associates? Other considerations - State law - FTC Section 5 - Data collection, transmission, access/use, disclosure, storage, ownership 28

Telemedicine in Action Scenarios: Teleradiology Patient Software (Vendor) Hospital ED Teleradiology Physician 29

Telemedicine in Action Scenarios: Teleradiology Does HIPAA apply? - Is there PHI? - Are there Covered Entities? Who are the Business Associate(s)? - Telecom provider? - Software / Equipment vendor(s)? Business Associate Agreement v. Service Agreement Data collection, transmission, access/use, disclosure, storage, ownership 30

Telemedicine in Action Scenarios: Walk-In Clinic/Video Exam AHPs data data Walk-In Clinic Video Exam Physician Patient 31

Telemedicine in Action Scenarios: Walk-In Clinic/Video Exam Does HIPAA apply? - Is there PHI? - Are there Covered Entities? Who are the Business Associate(s)? - Equipment vendor(s)? - Clinic site? Business Associate Agreement v. Service Agreement Data collection, transmission, access/use, disclosure, storage, ownership Security issues 32

Telemedicine in Action Scenarios: Non-Clinical/Residential Location AHPs data data Residential Facility Mobile Device / Application Physician Patient 33

Telemedicine in Action Scenarios: Non-Clinical/Residential Location Does HIPAA apply? - Is there PHI? - Are there Covered Entities? Who are the Business Associate(s)? - Mobile device/app vendor? - Joint arrangement with non-clinical site? Business Associate Agreement Data collection, transmission, access/use, disclosure, storage, ownership Physical security issues 34

Telemedicine in Action Other Considerations Telemedicine vs. mhealth - Chat messaging software between patients and health care providers - Health applications with patient-entered data - Remote patient monitoring devices and privacy collection Is it a HIPAA issue? - Federal Trade Commission Internet of Things - Food and Drug Administration - Federal Communications Commission 35

Best Practices Preparing for the Relationship Telemedicine Policies and Procedures - Licensing and credentialing of health care providers - Patient privacy during the telemedicine session - Scope of telemedicine encounters and types of transactions that will be permitted at the facility - Patient intake and consent process - Medical record documentation requirements for telemedicine sessions - Clinical guidelines - Equipment safety - Updating and revising policies and procedures Internal risk assessment/data mapping/technology inventory of your current operations 36

Best Practices Preparing for the Relationship Develop and implement policies and procedures to comply with federal and state privacy and security laws. - HIPAA and HITECH (administrative, physical, and technical safeguards) - Breach Notification Requirements - FTC Guidance (transparency and clear notice to consumers) - State-specific rules Understand what entities are covered entities or business associates. Create compliant business associate agreements and implement required business associate practices. Remember: All subcontractors having access to protected health information (no matter how far down the chain) must now comply with the full spectrum of requirements applicable to business associates. 37 37

Best Practices Preparing for the Relationship Understand who will have access to information, including vendors and subcontractors Determine how information should be shared and where it will be stored Understand what information is being collected, communicated, and stored and for what purpose Understand if and how distant-site telemedicine practitioners will use, store, and maintain patient health records for patient care and health care liability purposes 38 38

Best Practices Setting up the Relationship Types of Telemedicine Agreements - Provider / Telemedicine Service Agreement - Equipment Agreement - Technology / Software Licensing Agreement - Business Associate Agreement - Management Services Agreement - Collaborative or Supervising Agreement - Terms of Use 39 39

Best Practices Setting up the Relationship Managing contract relationships - Business Associate Agreement Issues Identifying business associates in the telemedicine chain General issues between covered entities and business associates Service Agreement issues between covered entities - Data mapping - Risk assessment Ensuring the risk assessment addresses the lifetime of the PHI in the telemedicine relationship 40

Best Practices Managing the Relationship Periodic audits/assessments Breach notification Communication and Training 41

Best Practices Terminating the Relationship Reasons for termination - Poor performance in security audit - Frequent security incidents or breaches - Failure to mitigate a breach Post-termination obligations - Access to medical records for health care professionals - Destruction of protected health information for business associates 42

Questions? Claire Marblestone, Esq. cmarblestone@foley.com 213.972.4822 Rebekah Monson, Esq. monsonr@pepperlaw.com 215.981.4031 Dayna Nicholson, Esq. nicholsond@pepperlaw.com 213.928.9807 43