Privacy & Security: What You Need to Know

Similar documents
The Privacy & Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

HIPAA Training

Information Privacy and Security

DO ASK BUT DON T TELL HIPAA PRIVACY RULE

FCSRMC 2017 HIPAA PRESENTATION

Advanced HIPAA Communications and University Relations

HIPAA Education Program

MCCP Online Orientation

Your Role in Protecting Patient Privacy 2018

Chapter 9 Legal Aspects of Health Information Management

Privacy and Security For Teammates

A general review of HIPAA standards and privacy practices 2016

HIPAA Privacy Training for Non-Clinical Workforce

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living

AGENDA. 10:45 a.m. CT Attendees Sign On 11:00 a.m. CT Webinar 11:50 a.m. CT Questions and Answers

HIPAA THE PRIVACY RULE

Understanding the Privacy and Security Regulations

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

2018 Employee HIPAA Orientation (EHO) Handbook

HIPAA & PRIVACY TRAINING FOR HEALTH PROFESSIONALS: Part 1 Denise M. Hill, JD, MPA

Telemedicine Privacy and Security: Safeguarding Protected Health Information and Minimizing Risks of Disclosure

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

Memorial Hermann Information Exchange. MHiE POLICIES & PROCEDURES MANUAL

HIPAA Privacy and Security Training for Researchers

Preparing for the upcoming 2016 HIPAA audits: Lessons and examples from past breaches and fines

NOTICE OF PRIVACY PRACTICES

Patient Privacy Requirements Beyond HIPAA

HIPAA Privacy & Security Training

Faculty Profile. PART I Privacy Training for Health Professionals. Disclaimer. Always Be Prepared 7/11/2013. Why should you care about Privacy?

MITIGATING BREACH RISK IN AN ERA OF EXPANDING PHI DISCLOSURE POINTS AND REQUESTS FOR HEALTH INFORMATION

HITECH Act. Overview and Estimated Timeline

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology

POTENTIAL LIABILITY: PATIENT HEALTH INFORMATION PORTALS

HCCA Institute Privacy Officer Round Table Discussion

HIPAA Health Insurance Portability and Accountability Act of 1996

Valley Regional Medical Center HIPAA AND HITECH EDUCATION

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS

East Carolina University 2010 Annual HIPAA Privacy Training

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at

Privacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017

Health Information Privacy Policies and Procedures

Meaningful Use Achieving Core Objective #14 Montana HIMMS 2012 Spring Convention

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices

New Employee Orientation HIPAA Privacy. Marcia Matthias, MJ, RHIA, CHPC Corporate Director, Health Information/Privacy Officer

Medicare Compliance and HIPAA Updates With Mario Fucinari DC, CCSP, CPCO, MCS-P, MCS-I Sponsored by NCMIC

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

A self-assessment for GxP and HIPAA concerns

HIPAA Breach Policy & Procedures Handbook

INLAND EMPIRE HEALTH PLAN CODE OF BUSINESS CONDUCT AND ETHICS. Our shared commitment to honesty, integrity, transparency and accountability

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

ExecTech. The following examples help explain why the US Government created the HIPAA Privacy Rule.

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

CAPITAL SURGEONS GROUP, PLLC

WAKE FOREST BAPTIST HEALTH NOTICE OF PRIVACY PRACTICES

HIPAA HAZARDS & SOCIAL MEDIA SNAFUS NARHC MARCH 20, 2018 MARGARET SCAVOTTO, JD, CHC MPA ST. LOUIS, MO

Compliance Program, Code of Conduct, and HIPAA

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office

NOTICE OF PRIVACY PRACTICES

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

HIPAA Privacy & Security Training

Peek-A-Boo: EHR Access and Compliance

Notice of Privacy Practices

Payment: We are permitted to use and disclose your health information to receive payment for our services. For example, we may:

Notice of Privacy Practices for Protected Health Information (PHI)

2514 Stenson Dr Cedar Park TX Fax

HIPAA Compliance and Health IT

The HIPAA privacy rule and long-term care : a quick guide for researchers

HIPAA in DPH. HIPAA in the Division of Public Health. February 19, February 19, 2003 Division of Public Health 1

NOTICE OF PRIVACY PRACTICES

CLINICIAN S GUIDE TO HIPAA PRIVACY

Security Risk Analysis

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020.

Slide 1 WHO IS THE CLIENT? WHO CONTROLS THE RECORD? ETHICS AND HIPAA. Slide 2. Slide 3. The Four As of Ethical Practice

Chapter 19 Section 3. Privacy And Security Of Protected Health Information (PHI)

CHI Mercy Health. Definitions

IVAN FRANKO HOME Пансіон Ім. Івана Франка

NOTICE OF PRIVACY PRACTICES

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

HIPAA Privacy Rule. Best PHI Privacy Practices

Compliance Hot Topic Issues for Senior Living Communities Wednesday September 30, :45 4:15 p.m.

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE

Notice of Privacy Practices

Status Check On Health IT

Compliance & Privacy For Teammates

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

HIPAA PRIVACY TRAINING

Senior Care Pharmacy Wichita

The future of patient care. 6 ways workflow automation will transform the healthcare experience

Transcription:

Privacy & Security: What You Need to Know DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.

Vicki Bokar RN Sr. Director Corporate Compliance, Cleveland Clinic John DiMaggio Chief Executive Officer, Blue Orange Compliance

Objectives Discuss recent changes to federal patient privacy and security legislation Provide real-life scenarios of patient privacy and security breaches and why nurses may be at risk Review common challenges to HIPAA compliance and some practical tips for overcoming those challenges

Privacy and Security Is it Important? Patients, family members, business partners etc. trust you with information Comply with state and federal laws and regulations Protect important electronic and non-electronic information Meaningful Use Requirement Enforcement

Privacy and Security What can go wrong? Breaches are prevalent, frequent and widely reported Audit Intentional Accidental Reactive - required by HITECH & in response to complaints or breaches Proactive HHS next wave of HITECH audits OR Meaningful Use audits Implications Reputation at stake Forced, time-based remediation Fines, penalties, civil suits How can you prepare? Prevent it from happening Demonstrate compliance with regulations Demonstrate best practice controls & prevention

Privacy and Security What do you have to do? Minimum HIPAA State laws if more strict Any additional company policies of more strict

Ohio State Laws General Access Ohio Revised Code 3721.13(10). All residents have the right to confidential treatment of personal and medical records. Ohio Revised Code 3721.13(8). Residents have the right to access all information in the resident s medical record. If the attending physician determines it is not medically advisable, then the information must be given to the resident s sponsor if the sponsor is authorized to receive such information. Restrictions Breach Ohio Revised Code 3721.13(10). Residents have the right to approve or refuse the release of medical records outside of the facility, unless certain exceptions (release in connection with transfer to another provider or as required by law, rule or third party payment contract). Ohio Revised Code 1349.19. Any person or entity that conducts business in Ohio and owns or licenses computerized data that contains personal information (defined as an individual s name when linked to certain data elements, including social security number, driver s license number or any account number) must disclose any unauthorized access to and acquisition of computerized data that compromises the security or confidentiality of such personal information. Notice must be made within 45 days to the individual whose data was compromised and, if involving more than 1,000 individuals, to consumer reporting agencies. NOTE: there are separate provisions for mental health, HIV, minors, substance abuse

HIPAA Background What is HIPAA? Health Insurance Portability and Accountability Act Why HIPAA? Privacy and Security in Title II (of V) Administrative Simplification Part 164 Subpart C Security Subpart D Breach Subpart E - Privacy

HIPAA Privacy/Security Timeline 2003 HIPAA Privacy 2010 HITECH 2013 Omnibus 2005 HIPAA Security Rule 2012 Test Audits 2015 Audits Resume

HIPAA Who needs to comply? Covered Entity (CE): Health Plans Health Care Providers: Any provider who electronically transmits health information in connection with standardized transactions regulated by HIPAA (e.g., claims transactions, benefit eligibility inquires, etc.). Health Care Clearinghouses: Entities that process nonstandard information they receive from one entity into a standard format (or vice versa). Business Associate (BA): A person or organization (other than a member of the CE s workforce) that performs certain functions or activities on behalf of the CE that involves the use or disclosure of protected information. Create, Receive, Maintain, Transmit

HIPAA What is protected? Individually Identifiable Health Information (IIHI) Name, Social Security Number, diagnosis, telephone number, the fact that a person is a resident Anything that can identify the resident and/or health conditions IIHI protected under HIPAA is PHI PHI in electronic form is EPHI

HIPAA What has changed? - Omnibus Business Associates Liability Subcontractors Compliance Dates Breach Guilty until proven innocent Analyze by Risk Assessment Sale of PHI Uses/Disclosures for Marketing, Fundraising Purposes Individuals may restrict disclosure to health plan if paid out of pocket CE s must provide electronic record to individuals if requested Notice of Privacy Practices disclose new rules

HIPAA Uses and Disclosures Required Disclosures: To individuals requesting access to their own PHI or an accounting of disclosures. To HHS to investigate possible violations Permitted Uses and Disclosures Treatment Health Care Operations Payment Public Policy Exceptions Deceased Persons (Revised) Fundraising (Revised)

HIPAA What is Security? Confidentiality Integrity Availability

HIPAA Security Threat Examples Malicious Outsider Hackers Phishers Malicious Insider Disgruntled employees Employees leaving Human Error Lost laptop Didn t secure firewall properly Inadvertent email or fax Environmental Fire, Flood Loss of power Loss of connectivity Confidentiality Integrity Availability

Protecting Information Security Safeguards Access Control Security Awareness Contingency Planning Personnel Security Risk Assessment Media Protection Physical and Environmental Transmission Integrity Audit and Accountability System Integrity System Maintenance Types of Safeguards Physical Administrative Technical

HIPAA Some Controls in Place Around You Administrative Risk Assessment, Security Plan Training Policies and Procedures Documentation Contingency Planning Technical Antivirus Firewall Encryption Account Lockout, Screensaver Username/Passwords complexity, change regularly Physical Keys/KeyCard Restricted access Monitors positioned

Breach An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected information. Presumed a breach unless proven otherwise Risk Analysis A breach is discovered on the first day it is known to the Covered Entity or the Business Associate Exceptions: Unintentional Inadvertent Unauthorized person was unable to retain information If you think there is any possibility a breach has occurred, contact your Privacy Officer

Recent Breaches and Causes Community Health Systems HHS Wall of Shame Breaches affecting 500 or more individuals http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html

FBI Flash Alert August 25, 2014 20

We re Not in Kansas Anymore! Armed robbery: Boston Massachusetts 9/24/14 Physician s laptop and cell phone were stolen The assailants were armed with a gun and a knife The physician, was reportedly tied to a tree and forced to disclose passwords for both devices Protected Health Information belonging to 999 individuals was compromised

22 HIPAA Violations: Consequences Loss of patient trust, disciplinary action (including termination), adverse licensure action by state boards, private tort & class action litigation Individual workers have been prosecuted for violating HIPAA 2004 - Richard Gibson, phlebotomist, stole demographic info from a cancer patient and opened 4 credit cards. Sentenced to 16 months jail and 9k restitution (per plea Agreement) 2010 Huping Zhou, a UCLA researcher, was sentenced to 4 months in federal prison for snooping. UCLA agreed to pay an $865,000 fine 2014 - Joshua Hippler, East Texas hospital employee, indicted on charges of Wrongful Disclosure of PHI. If convicted, he faces up to 10 years in prison

23 Private Tort Litigation Hinchy v. Walgreen Co. et al A Walgreen pharmacist was informed by her husband of past sexual conduct with Hinchy & possibility of a sexually transmitted disease The pharmacist intentionally accessed Hinchy s prescription information while at work The pharmacist s husband sent a text message to Hinchy, causing her to suspect that her information was impermissibly accessed. In July 2013, jury awarded $1.44 M to Hinchy

24 Then There s the Untrained Employee Penn State Hershey Medical Center Data breach affecting 1801 individuals Lab Tech authorized to work with PHI after hours from home Transported PHI on unencrypted flash drive Entered PHI into a test log using personal devices and systems that weren t secure Used his personal email account to send the updated test log to two Penn State doctors

Why is HIPAA Compliance So Challenging? People want to reduce HIPAA to a list of do s and don ts (it doesn t work that way)! Unique nomenclature differs from that used in the industry Typically need to apply both the Privacy Rule and Security Rule to any given situation! Each Rule consists of numerous standards and implementation specifications Which standards apply will depend on the underlying facts Change one fact, the answer could be completely different

The Good News! Most of HIPAA aligns with old fashioned common sense HIPAA respects - and often defers to - professional judgment The word reasonable appears 51 times in the Security Rule it s truly not meant to impede the provision of healthcare The Risk Analysis is your compliance north star

Some Risk Analysis Considerations Though it seems to get the most media attention, EMR Snooping is not the only risk to ephi! Need to think beyond the EMR and mainstream billing systems: Clinical photography - security of camera and stored images Operational Registries, databases (even Excel spreadsheets) Networked medical devices (e.g. smart pumps, etc.) Laptops connected to diagnostic equipment Patient safety MUST be factored into your risk analysis and risk management process always involve personnel from clinical, administrative and financial operations

Designated Record Set(s) Is not limited to information maintained in the electronic medical record Is broader than the Legal Medical Record A Designated Record Set is: the medical records and billing records about individuals maintained by or for a covered health care provider; the enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or, used, in whole or in part, by or for the covered entity to make decisions about individuals. With some exceptions, the individual s Right to Access applies to PHI maintained in the covered entity s designated record set(s)

Smart Computers; Dumb Users All employees (including students/volunteers) need to understand: Social media policies De-identification requires more than just stripping 18 identifiers Posting any work-related information can land them in hot water with HIPAA and beyond HIPAA applies not just to PHI of patients, but to all individuals, including colleagues and co-workers who are patients of the employer How to avoid disclosing PHI via prayer chains and other well-intentioned support mechanisms (e.g. caringbridge etc.)

Achieving the Right Balance Share PHI Protect

PHI is the New Currency of Healthcare Research CMS RACs Public Health OIG Safety Quality P4P PHI Providers HIE s BAs Meaningful Use Friends Family Patient TJC

Data Integrity Doesn t get enough attention, but is just as important as privacy/security Health reform has prompted numerous initiatives involving the collection, analysis, use or disclosure of PHI Everyone needs to be singing from the same hymnbook (Silos are risky) Example: eliminating a data field for security purposes The pressure of cost-containment can also lead to unintended risks (e.g. shortcuts, unsecure work-arounds etc.)

Some Practical Take-Aways Policies/procedures alone are not enough they need to be communicated and understood Your weakest link is the employee you hired yesterday training is not a one-time-only deal Business Associate Agreements and Confidentiality Statements are not enough. What happens when the ink dries? Are the contractual terms communicated to those with day-to-day responsibility? Compliance must be monitored and consistently enforced Nursing Informatics & IT Security professionals have the opportunity to translate, educate & develop core competencies for all workers

34 Practice What You Preach! Never send PHI to a personal email address (yours or someone else s) If patient insists you transmit PHI via regular email, be sure to explain risks Do not use Auto-Forwarding for email Avoid saving/downloading PHI. If you must save, only save to secure network drive or encrypted flash/usb drive Only use mobile devices that are encrypted Never upload or scan PHI in online tools (read terms & conditions) Never use apps that are not officially approved by IT Security Report privacy & security incidents promptly

35 Practice What You Preach Do NOT disable anti-virus software or install unapproved software. Never introduce new hardware or media without approval from your organization s IT Security personnel Be suspicious of any email that you didn t expect to receive (and never click on a link or attachment) Beware of phishing emails Keep up with Security Awareness training

Additional Resources Office for Civil Rights http://www.hhs.gov/ocr/privacy/index.html Office of the National Coordinator for Health Information Technology (ONC) http://www.healthit.gov/ Healthcare Information and Management Systems Society (HIMSS) http://www.himss.org/

Objectives (Review) Discuss recent changes to federal patient privacy and security legislation Provide real-life scenarios of patient privacy and security breaches and why nurses may be at risk Review common challenges to HIPAA compliance and some practical tips for overcoming those challenges

Vicki Bokar RN Sr. Director Corporate Compliance, Cleveland Clinic bokarv@ccf.org 216 445 8274 John DiMaggio Chief Executive Officer, Blue Orange Compliance John.dimaggio@blueorangecompliance.com 614 567 4109