Top Banner
CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1
121

CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

Dec 25, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

1

CCPA Seminar: A HIPAA UPDATE

September 11, 2012

Pamela H. Del Negro

Robinson & Cole LLP

Page 2: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

2

Agenda• HIPAA Overview• HIPAA Audit Protocols• What to include in your HIPAA Policies and

Procedures Manual• HIPAA Training for Employees and Staff• Recent Enforcement Efforts and Upcoming

Regulatory Updates

Page 3: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

3

HIPAA PRIVACY

Page 4: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

4

WHAT INFORMATION IS PROTECTED UNDER HIPAA?

• Protected Health Information (“PHI”) is individually identifiable health information in any form that relates to the health or condition of an individual or the payment for health care

• Does not include de-identified information or employment records

Page 5: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

5

PERMITTED USES AND DISCLOSURES OF PHI

• To the individual• Treatment, payment & health care

operations• Pursuant to valid authorization• Business associates

Page 6: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

6

DISCLOSURE PERMITTED AFTER OPPORTUNITY TO AGREE OR OBJECT

• Facility directory (sign in sheet/hospital log)– Disclose limited information (i.e., name,

location in facility, general description of condition, religious affiliation, etc.)

• Persons involved in care– If patient is present, ask whether disclosure is

permitted– If patient is not present, use professional

judgment, infer from circumstances– Limit disclosure to information directly

relevant to such person’s involvement

Page 7: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

7

USES AND DISCLOSURES WITHOUT AUTHORIZATION

Under limited circumstances, the following uses and disclosures do not require authorization or opportunity to object:

• Decedent’s Information• Organ/Tissue Donation• Avert a Serious Threat to Safety• Specialized Government Functions• Research (if IRB waives requirement)• Workers’ Compensation

• Public Health Activities• Reporting Victims of Abuse, Neglect, or

Domestic Violence• Health Oversight• Judicial or Administrative Proceedings• Law Enforcement Purposes

CONSULT STATE LAW!

Page 8: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

8

AUTHORIZATION

• A more specific and detailed form of permission designed to allow other uses or disclosures of PHI

• Required for all uses and disclosures not specifically permitted by HIPAA and required for uses or disclosures of certain sensitive information

• Individual has a right to revoke the authorization• Generally cannot condition treatment on the

individual providing an authorization• Not necessary if special circumstances (i.e.

emergency) apply

Page 9: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

9

HOW MUCH PHI CAN I USE OR DISCLOSE?

• In general, must make reasonable efforts to limit the use or disclosure of PHI to the minimum necessary

• Comply with policies and procedures that limit the amount of information to the minimum necessary to perform your job

• Your job description may limit your level of information access

Page 10: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

10

HOW MUCH PHI CAN I USE OR DISCLOSE?

• Special rules:– Treatment purposes – no limits– Authorized disclosures - limited to the terms of the

authorization – To the individual – no limits– Compliance purposes – no limits– Other legally required disclosures – as limited by law

Page 11: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

11

PERSONAL REPRESENTATIVES

• Person with authority to act on behalf of individual, for example:– Parent of a minor– Court appointed guardian/conservator

• Has all rights of individual with respect to relevant PHI

Page 12: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

12

• May choose not to treat an individual as a personal representative if:– Not in the individual’s best interest, and– The individual suspected to be victim of abuse or

neglect by the personal representative, or– Treating the individual as the personal representative

could endanger the individual

ABUSE, NEGLECT, AND ENDANGERMENT

Page 13: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

13

VERIFICATION

• Verify the identity of a person requesting information and determine that the person has the authority to receive the information

Page 14: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

14

PRIVACY OFFICER

• DUTIES OF THE PRIVACY OFFICER (OR AS DELEGATED)

– Develop Privacy Policies and Procedures– Coordinate with administration to implement privacy

requirements– Develop administrative, technical, and physical safeguards– Maintain documentation and records for required time periods– Conduct periodic audits– Serve as a privacy consultant– Serve as liaison to government oversight agency– Receive (as contact person) and respond to individual complaints – Attempt to mitigate harm caused by improper disclosures

Page 15: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

15

NOTICE OF PRIVACY PRACTICES

• Must be provided to all individuals prior to service delivery

• Identifies the types of uses and disclosures that are permitted and required by you

• Sets forth description of individual’s rights

• States your duties to maintain the confidentiality of the PHI

• Outlines the process for an individual to submit a complaint concerning a suspected privacy violation

Page 16: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

16

ACKNOWLEDGMENT /CONSENT FORM

• Patient acknowledges receipt of Notice of Privacy Practices

• Consent to use for treatment, payment and health care operations

• Not the same as an Authorization

Page 17: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

17

• Basic rights of individuals under HIPAA– Access– Amendment– Accounting of disclosures– Restrictions on use and disclosures– Confidential communications– Complaint process

RIGHTS OF INDIVIDUALS

Page 18: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

18

RETALIATION AND WAIVER

• Retaliation: You may not intimidate, threaten, coerce, discriminate against or take retaliatory action against another person for:– Exercising a right provided by HIPAA– Filing a complaint with OCR– Assisting in a HIPAA-related investigation or hearing– Opposing any act unlawful under HIPAA

• Waiver: You may not require individuals to waive rights to file a complaint under HIPAA as a condition of treatment.

Page 19: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

19

BUSINESS ASSOCIATES

• Perform functions, activities or services on behalf of covered entities involving the use or disclosure of PHI, including:– Functions or Activities

• Claims processing or administration• Data analysis• Utilization Review• Quality Assurance• Billing• Benefit Management• Practice Management

– Services• Legal• Actuarial• Accounting• Administrative • Financial

Page 20: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

20

PENALTIES

• Civil Penalties– Unknowingly - $100/violation– Reasonable cause – at least $1,000/violation– Willful neglect – HHS will conduct an

investigation• If willful neglect but corrected, no less than $10,000,

not to exceed $50,000• If not corrected, $50,000 per violation, not to exceed

$1,500,000/year. – State Attorney General

• Criminal Penalties (e.g. intent to sell)

Page 22: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

22

Breach Notice Requirement• Part of HITECH

• Notify each individual whose Unsecured PHI has been or

is reasonably believed to have been accessed, acquired, used or disclosed as a result of a breach of Unsecured PHI (“Affected Individual”)

• “Unsecured PHI” is any PHI that has not been rendered unusable, unreadable, or indecipherable to unauthorized individuals through encryption or destruction

Page 23: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

23

Definition of Breach

• “Breach” is the unauthorized acquisition, access, use or disclosure of PHI that (i) violates the HIPAA privacy rules and (ii) compromises the security or privacy of such PHI

• “Compromises the security or privacy of PHI” = poses a significant risk of financial, reputational, or other harm to the Affected Individual

Page 24: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

24

Definition of Breach (cont.)• Exclusions to definition of “breach”

– Unintentional acquisition/access/use of PHI by a workforce member or individual acting under the authority of a covered entity or business associate if:• made in good faith • within the course and scope of authority• does not result in further use or disclosure

Page 25: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

25

Definition of Breach (cont.)• Exclusions (cont.)

– Inadvertent disclosures by individual authorized to access PHI to another individual authorized to access PHI at the same entity and such information is not further used or disclosed

– Disclosure with good faith belief that the unauthorized individual to whom PHI has been disclosed would not reasonably have been able to retain the information

• Document the reasons why such use ordisclosure satisfies the respective exception

Page 26: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

26

Risk Assessment

• Fact specific analysis that varies with each impermissible use or disclosure

• If there is less than a significant risk of harm then no notice is required

• Document risk assessments

Page 27: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

27

When a Breach is Considered Discovered

• As of the first day the breach is known or, by exercising reasonable diligence, would have

been known • Knowledge of workforce member or agent is

imputed

Page 28: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

28

Content of NoticeCovered entities must provide breach notices that are written in plain language and include:

• What happened• Types of Unsecured PHI involved (E.g. full name, SSN) • Steps the Affected Individuals should take to protect

themselves from potential harm• Covered entity’s actions to investigate the breach, mitigate

harm to the Affected Individual, and protect against any further breaches

• Contact procedures that Affected Individuals can use to ask questions or learn additional information

Page 29: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

29

Delivery of Notice • Sent by first-class mail (or by electronic mail if the Affected

Individual has specified such preference)

• “Without unreasonable delay,” but no later than 60 days after the discovery of such breach

• No current contact information for one or more Affected Individuals, notify through substitute form as soon as reasonably possible– Less than 10 Affected Individuals

• Alternative written means– More than 10 Affected Individuals

• Conspicuous posting for a period of 90 days on home page of Web site or in major print or broadcast media

Page 30: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

30

Notice to HHS and Media Outlets• Less than 500 Affected Individuals

– Maintain a log of breaches– Notify HHS of breaches 60 days after end of calendar year

in manner specified on HHS website

• More than 500 Affected Individuals– Notify HHS contemporaneously with the notice provided to

the Affected Individuals– If reside in the same state

• Notify prominent media outlets serving the state • Written notice to the Affected Individuals • Notify HHS of such breach

• HHS to specify on its Web site the information that covered entities must submit to HHS and how such information should be submitted to HHS

Page 31: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

31

Business Associate Requirements• Notify covered entity upon discovery of breach of Unsecured

PHI

• “Without unreasonable delay” and in no case later than 60 days after discovery of breach

• Identity of each individual subject to breach

• Provide other available information that covered entity is required to include in notice to Affected Individual

• Provide information even if not available until after notifications have been sent to Affected Individuals or after 60-day period has elapsed.

Page 32: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

32

Delaying Notice• Delay if law enforcement official determines that providing

notice would impede a criminal investigation or cause damage to national security

• If notice of delay is provided in writing and includes length of time that notice must be delayed, delay providing notice for time specified

• If notice of delay is given orally, document statement and identity of official and delay notification for no longer than 30 days, unless written statement is provided

Page 33: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

33

Step-by-Step Analysis

• Practical steps when determining whether a breach of Unsecured PHI has occurred:

Step 1: Determine whether there has been an impermissible use or disclosure of PHI that would violate the HIPAA privacy rules

Step 2: Perform a risk assessment to determine harm

Step 3: Determine whether exception to definition of “breach” applies

• If there has been a breach of Unsecured PHI, provide appropriate notice

Page 34: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

34

STATE PREEMPTION

Page 35: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

35

HIPAA or State Law?

• HIPAA is a federal floor of privacy and security protections

• General rule: State laws contrary to HIPAA are preempted by HIPAA

• State laws providing greater protection than HIPAA are not preempted by HIPAA

Page 36: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

36

HIPAA SECURITY

Page 37: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

37

HIPAA Security Rule

• Protects the confidentiality, integrity and availability of protected health information that is maintained or transmitted electronically (“ePHI”)

Page 38: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

38

HIPAA Security Rule

• CONFIDENTIALITY – ePHI must not be made available or disclosed to an unauthorized person or process, including employees who do not have a need to use the information

• INTEGRITY – ePHI must not be altered or destroyed in an unauthorized manner

• AVAILABILITY- ePHI must be accessible and useable by an authorized person at all times

Page 39: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

39

What Information is Protected Under Security Rule?

• Electronic transmissions of ePHI within the company, as well as transmissions to outside entities – Extends to all members of the workforce,

including those who work at home• Exceptions:

– Facsimile– Telephone systems (voice or keypad)– Copy machines– Videoconferencing systems– Voicemail

Page 40: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

40

Who Must Comply with Security Rule?

• Covered entities and business associates are required to comply with the Security Rule

• The HIPAA Security Rule mandates that certain safeguards be implemented to protect ePHI including:– Administrative safeguards– Physical safeguards– Technical safeguards

• Safeguards include:– Controls to limit access to ePHI by workforce– Audits to determine who accessed ePHI and when

ePHI was accessed

Page 41: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

41

Who is Responsible for Implementing Security Safeguards?• “Security Officer” is responsible for:

– Developing and implementing security safeguards to protect ePHI– Addressing security concerns– Periodically auditing and assessing the security of ePHI

• The designation of a Security Officer must be documented and may be the same person as the Privacy Officer

• Security Standards must be addressed

• Implementation Specifications– Required– Addressable

• If not reasonable and appropriate Document reasons

Page 42: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

42

Administrative Safeguards

• Documented policies and procedures for:– Managing day-to-day operations– The conduct and access of workforce members to

ePHI– The selection, development and use of security

controls

Page 43: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

43

• Standard: Security Management Process • Risk analysis (required)• Risk management (required)• Sanction policy (required)• Information system activity overview (required)

• Standard: Security Responsibility

• Standard: Workforce Security• Authorization and/or Supervision (addressable)• Workforce Clearance Procedure (addressable)• Termination Procedure (addressable)

Administrative Safeguards (cont.)

Page 44: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

44

• Standard: Information Access Management– Access Authorization (addressable)– Access Establishment and Modification (addressable)

• Standard: Security Awareness and Training– Security Reminders (addressable)– Protection from Malicious Software (addressable)– Log-in Monitoring (addressable)– Password Management (addressable)

• Standard: Security Incident Procedures– Response and Reporting (required)

Administrative Safeguards (cont.)

Page 45: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

45

• Standard: Contingency Plan– Data Backup Plan (required)– Disaster Recovery Plan (required)– Emergency Mode Operation Plan (required)– Testing and Revision Procedures (addressable)– Applications and Data Criticality Analysis (addressable)

• Standard: Evaluation

• Standard: Business Associate Contracts and Other Arrangements– Written Contract or Other Arrangement (required)

Administrative Safeguards (cont.)

Page 46: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

46

Physical Safeguards

Physical measures and policies and procedures that protect electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion

Page 47: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

47

• Standard: Facility Access Controls– Contingency Operations (addressable)– Facility Security Plan (addressable)– Access Control and Validation Procedures (addressable)– Maintenance Records (addressable)

• Standard: Workstation Use

• Standard: Workstation Security

• Standard: Device and Media Controls– Disposal (required)– Media Re-use (required)– Accountability (addressable)– Data Backup and Storage (addressable)

Physical Safeguards (cont.)

Page 48: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

48

Technical Safeguards

The technology and the policy and procedures that protect ePHI and control access to it

Page 49: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

49

• Standard: Access Control– Unique User Identification (required)– Emergency Access Procedure (required)– Automatic Logoff (addressable)– Encryption and Decryption (addressable)

• Standard: Audit Controls

• Standard: Integrity– Mechanism to Authenticate ePHI (addressable)

Technical Safeguards (cont.)

Page 50: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

50

• Standard: Person or Entity Authentication

• Standard: Transmission Security– Integrity Controls (addressable)– Encryption (addressable)

• Standard: Policies and Procedures

• Standard: Documentation Requirements– Time Limit (required)– Availability (required)– Updates (required)

Technical Safeguards (cont.)

Page 51: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

51

Documentation Requirements

• Retain documentation in paper or electronic format for 6 years or longer if required by state law, including:– Policies and procedures related to Security Rule

compliance – Documentation of any activity, action or

assessment required by the Security Rule• Policies and procedures must be reviewed and updated

periodically in order to address environmental or operational changes affecting the security of ePHI

Page 52: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

52

HIPAA Audit Protocols

Page 53: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

53

Stimulus Act – Generally

Effects on HIPAA Expanded protection of PHI

Increased privacy and

security obligations for covered

entities and business associates

Generally effective February 17, 2010

Page 54: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

54

HITECH Act: HIPAA Audits

• Requires HHS to conduct periodic audits on covered entities and business associates to ensure compliance with:– Privacy Rule– Security Rule– Breach Notification

• Congressional mandate is the floor. OCR has discretion.

• Up to 150 audits originally planned, at this time adjusted to 115

Page 55: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

55

Objectives of the Audit Program

• Consider methods of compliance• Ascertain best practices• Identify risks/vulnerabilities not identified

through previous enforcement efforts• Foster compliance efforts

Page 56: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

56

Previous HIPAA Enforcement Efforts

• Complaints – large volume, but generally did not result in formal action

• Compliance Reviews – incident-based• Breach Reports

Reactive in nature, Congress wanted to be more proactive.

Page 57: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

57

OCR Uses Contractors for Audits

Source: http://csrc.nist.gov/news_events/hiipaa_june2012/day2/day2-2_lsanches_ocr-audit.pdf

Description Vendor Status/Timeframe

Audit program development study

Booz Allen Hamilton

Closed 2010

Covered entity & business associate identification and catalog

Booz Allen Hamilton

Closed 2012

Develop audit protocol and conduct audit

KPMG, Inc. Open 2011 – 2012

Evaluation of Audit Program

TBD To be Awarded – Conclude in 2013

Page 58: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

58

The Audit Protocols

• Developed by contractor• Three areas:

– Privacy– Security– Breach Notification

• Focus on:– Management inquiries– Reviewing policies and procedures– Evidence of implementation– Documentation of reasons why not implemented

• Currently located at: http://ocrnotifications.hhs.gov/hipaa.html

Page 59: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

59

Who Can be Audited?

• Every type and size of covered entity is eligible for an audit

• Randomly selected based on type, size and geography, not prior incidents. Criteria includes:– Public vs. Private– Level of assets/revenue– Number of patients/employees

• To date, approximately 50% of audited entities have been health care providers

• Business associates may be included in future audits

Page 60: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

60

What is the audit process?

• Entity receives notice of audit from OCR. Notice includes a request for documentation– By registered mail– Addressed to CEO – redirect as soon as it arrives!– In some instances, you may know in advance of

written notice– Audit response team takes action

• Walk-throughs, mock interviews– Notify support team (internal/external)

Page 61: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

61

What is the audit process? (con’t)

• Assemble and submit documentation by deadline• Documentation may include:

– Policies and procedures• Breach notification process• Risk assessments• Security incident management plan• Business continuity/disaster recovery plan• Disaster recovery exercise documentation • Information security training and awareness• Organizational chart

– Forms– Previous audit reports and assessments

Page 62: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

62

What is the audit process? (con’t)

• Auditor reviews documentation (min. 15 days)• On-site visit

– Conducted 30-90 days from receipt of notice– Lasts 3-10 business days (5-10 days is most common)– Personnel interviews (all levels, clinical and non-

clinical)– Walk-throughs– Operational reviews– Requests for additional information

The Audit Protocols are a guideline,

each audit is unique

Page 63: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

63

What is the audit process? (con’t)

• Draft Audit Report – 20-30 days after on-site visit– Follow-up questions and additional requests for

information are likely

You will likely know what many of the findings will be, and should focus on preparing a response

Page 64: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

64

What is the audit process? (con’t)

• Review and Respond to Draft Report– Report includes findings and recommendations– 10 business days to respond– Review closely!– Identify mitigating information – Consider plan for remediation– Consult with consultants/legal counsel (e.g. legal

arguments re: how rules are applied)– Challenge findings if warranted (e.g., inaccuracies,

justification of approach for implementation)

Page 65: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

65

What is the audit process? (con’t)

• Final Report– Submitted to OCR– Within 30 days of covered entity’s response– Includes steps taken to resolve compliance issues

• Action by Covered Entity– Consider implementing recommendations for

compliance– Ongoing compliance efforts– Cooperation with OCR

Page 66: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

66

What happens next?

• OCR reviews final report• Primarily a compliance improvement tool• Not intended to investigate particular violations• Best practices will be shared• Targeted compliance guidance will be published• Serious compliance issues may trigger separate

investigation and enforcement action

Page 67: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

67

Initial 20 Findings Analysis Overview

Page 68: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

68

Initial 20 Findings Analysis Overview

Page 69: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

69

Initial 20 Findings Analysis Overview

Page 70: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

70

Initial 20 Findings Analysis Overview

Page 71: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

71

Initial 20 Findings Analysis Overview

Page 72: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

72

Initial 20 Findings Analysis Overview

Page 73: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

73

Initial 20 Findings Analysis Overview

Page 74: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

74

Initial 20 Findings Analysis Overview

Page 75: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

75

Initial 20 Findings Analysis Overview

Page 77: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

77

Why is this important?

• Likelihood of being chosen for audit is small, but short turnaround time if chosen

• Ongoing audit efforts, increased enforcement• Reason to review policies, procedures and actual

operations• Identify/resolve weaknesses and concerns

Page 79: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

79

Where is your PHI?

• Paper• Electronic, even if no EHR • Computers, laptops, smart phones• On-site/Off-site• Movement within organization• To/from third parties

Page 80: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

80

Written Policies and Procedures

• Implement policies and procedures for HIPAA compliance including privacy, security and breach notification

• Organized, easy to search/find

• Centralized index for compliance documents

• Review for completeness, ensure they are up-to-date

• Maintain for 6 years and make available to HHS upon request

Page 81: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

81

Privacy Policies: What to Include?

Use and disclosure of PHI Patient’s rights

Notice of uses and disclosures of PHI Access to PHI Request for amendment of PHI

Page 82: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

82

Privacy Policies: What to Include? (cont.)

• Patient’s Rights (cont.)– Accounting for disclosures of PHI– Request for restriction on use or disclosures of PHI– Request for confidential communication of PHI

• Use and disclosure of PHI subject to an authorization

• Use and disclosure of PHI subject to minimum necessary

• Use and disclosure of PHI for fundraising• Personal representation of individuals

Page 83: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

83

Privacy Policies: What to Include? (cont.)

Use and disclosure of PHI not subject to an individual’s authorization or opportunity to agree or object

Accounting for disclosures of PHI – tracking disclosures

Use and disclosure of PHI for research purposes Use and disclosure of PHI to persons involved in the

individual’s care and for notification purposes Use and disclosure of de-identified health

information

Page 84: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

84

Privacy Policies: What to Include? (cont.)

Use and disclosure of PHI within a limited data set Safeguarding against wrongful uses and disclosures

against PHI Human Resources Complaints regarding privacy practices HIPAA Recordkeeping Verification of entities or persons to whom protected

health information may be disclosed Use and disclosure of PHI by business associates Notification of breach of PHI to individuals, media

and HHS.

Page 85: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

85

Privacy Policies: What to Include? (cont.)

Privacy Officer’s Name and Contact Information, Job Description

Off-site disposal procedures (e.g. shredding of paper records or return to home office for shredding).

Forms, including: Request for Access Request for Amendment Request for Accounting of Disclosures Request for Restrictions on Uses and Disclosures Request for Confidential Communications

Page 86: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

86

Privacy Policies: What to include? (cont.)

Forms (cont.) Authorization for Release of Protected Health

Information Notices re: Approval/Denial of Requests, Extensions

of Time, Additional Rights Privacy Practices Complaint Form Business Associate Agreement Disclosure Tracking Log Form

• Patient Name• Medical Record Number

Date Request Received

Name of Requestor

Address (if known)

Written Request (Y/N)

Purpose of Disclosure

Description of PHI

Disclosed

Date Disclosed

Disclosed by

Page 87: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

87

Privacy Policies: What to include? (cont.)

Sanction Guidelines for HIPAA Violations– Violation/Possible Sanction– Example 1:

• Violation: Obtaining, using or disclosing PHI under false pretenses, such as if workforce member misrepresents a fact in order to obtain, use or disclose an individual’s PHI.

• Possible Sanction: Termination– Example 2:

• Violation: Unintentionally violating privacy practices.• Possible Sanction: First offense – formal letter of

reprimand and applicable training. Second offense – suspension for a period of time commensurate with violation. Third offense – termination.

Page 88: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

88

Security Policies: What to Include?

Administrative Safeguards Security management

Risk analysis and mitigationRisk managementSanctionsInformation system activity

review Security responsibility –

Assignment of security responsibility

Page 89: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

89

Security Policies: What to Include? (cont.)

Administrative Safeguards (cont.) Workforce security

Access authorization an supervisionWorkforce clearanceWorkforce termination

Information access management Access authorizationAccess establishment and modification

Security awareness and trainingSecurity remindersMalicious software

Page 90: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

90

Security Policies: What to Include? (cont.)

Administrative Safeguards (cont.) Security awareness and training (cont.)

Login monitoringPassword management

Security Incident Procedures – response and reporting

Contingency PlanData backupDisaster recoveryEmergency mode operationsTesting and revision

Page 91: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

91

Security Policies: What to Include? (cont.)

Administrative Safeguards (cont.) Contingency Plan

Application and data criticality analysis Evaluation – Compliance evaluation

Physical Safeguards Facility Access Controls

Facility contingency operationsFacility security Facility access control and validationFacility maintenance records

Page 92: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

92

Security Policies: What to Include? (cont.)

Physical Safeguards (cont.) Workstation Use – Workstation Security Device and Media Controls

Device disposalMedia re-use/transferAccountabilityData backup and storage

Technical Safeguards Access Control

Unique user identificationEmergency Access

Page 93: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

93

Security Policies: What to Include? (cont.)

Technical Safeguards (cont.) Access Control (cont.)

Automatic logoffEncryption & decryption

Audit Controls Integrity Controls Person/Entity Authentication Transmission Security

Transmission integrity controlsTransmission encryption

Page 94: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

94

Security Policies: What to include? (cont.)

Security Officer’s Name and Contact Information, Job Description

Risk Assessment for entity and ePHI systems Plans (or where to find them)

Security incident management plan Business continuity/disaster recovery plan Data backup and recovery procedures

Page 95: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

95

Security Policies: What to include? (cont.)

Forms, e.g.: Maintenance request form Equipment/Media Disposal and Sanitation Log Access Authorization and Supervision Form used by

Security Officer to grant/establish/modify access rights to systems, applications, etc.:

Name Position Access Level based on Job Description

Supervision Level

Supervisor Approval

Page 96: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

96

Breach Notification: What to include?

Internal reporting requirements and processes Written incident response plan Breach Evaluation Form

Description of incident Analysis or Risk Assessment List of individuals who participated in analysis or risk

assessment Other risk assessment documentation

Page 97: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

97

Additional Considerations: Transmission of Emails Containing ePHI

• E-mails sent from one employee to another do not need to be encrypted or password protected

• E-mails should only be sent to employees who need to know the information

• E-mails sent outside of the company must be password protected or encrypted

• Unsolicited ePHI received in an unsecure manner must be appropriately secured once it is in the possession of the covered entity or business associate

• ePHI should never appear in the subject matter line of an e-mail

Page 98: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

98

Other Documentation

• Policies are not enough! Need evidence of implementation and ongoing compliance– Risk assessment – document the process!– Disclosure logs– Logs of security breaches– Documentation of access rights, periodically updated

to reflect changes in workforce– Evidence of systems activity review– Training documentation for each employee– Evidence of responses to violations (sanctions,

updated risk assessments, revisions to policies)

Page 99: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

99

Other Documentation (con’t)

– List of all business associates, including contact information, phone and email address, what the relationship is, name of applicable agreement

– Custodial Staff• Not generally regarded as business associates, consider

confidentiality agreement, procedures for inadvertent encounters with PHI, termination for breach of confidentiality

Page 100: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

100

INTERNAL DISCIPLINARY SANCTIONS

• Have them• Apply them• Document them• You will be penalized if you violate applicable

privacy policies or HIPAA• Depending on your violation, you may receive a

warning letter, suspension or termination

Page 101: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

101

Be consistent with

what is in your policies

and

what occurs in practice!

Page 103: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

103

Training Overview

• Every person accessing data holds a position of trust. Each individual must recognize his or her responsibility to protect the privacy and security of this information.

• All levels of the workforce need HIPAA awareness and training

• Training should be consistent, ongoing and documented

Page 104: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

104

Initial Training -- Fundamentals

• What is HIPAA?• What does HIPAA cover?

– Privacy• What is PHI?• What is excluded from the definition of PHI?

– Security• What is ePHI?• What is excluded from the definition of ePHI?

Page 105: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

105

Initial Training – Fundamentals (cont.)

• How does HIPAA affect us? • What is required of us under HIPAA?

– Uses and disclosures– Rights of individuals– Appropriate safeguards– Administrative requirements

• Report impermissible uses or disclosures that you become aware of either to the Privacy Officer or other designated individual

Page 106: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

106

Initial Training – Fundamentals (cont.)

• Who do I contact with questions?– Employees need to know who to contact!– Who advises on HIPAA implementation?– Who handles requests for access, complaints, etc.?– Who monitors system activity?– Who is responsible for business associate

agreements?– Who keeps the forms?

Page 107: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

107

Training Considerations

• Make training simple, easy to understand• Depending on level of access, consider an

evaluation of individual’s understanding at end of training session

• Promote culture of compliance through understanding that training is not an obstacle, protects employee as much as it protects the organization

• Employees should understand their role in the process. Security measures are not effective if they are not followed.

Page 108: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

108

Training Considerations (cont.)

• Initial training is not enough! Additional training and security reminders should be provided. – Source compliance plan, HIPAA policies and

procedures for ideas– Pay attention to news media for violations

involving other organizations, use them as training opportunities• E.g. 2011 news article re: Rhode Island physician who

was reprimanded by state regulators for posting information that led to the identification of a patient

• E.g. 2010 article re: negative comments about a patient posted on Facebook

• Inform them that usage will be monitored and audits will be performed.

Page 109: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

109

NO PEEKING!

Employees must know that if they do not have a bona fide medical or administrative reason to access

a patient’s medical record, then they should not access the record!

Page 110: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

110

Recent Enforcement Efforts

And

Upcoming Regulatory Updates

Page 111: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

111

Recent Enforcement Efforts

Source: http://www.hhs.gov/ocr/privacy/hipaa/enforcement/data/historicalnumbers.html#resol

Page 112: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

112

Recent Enforcement Efforts (cont.)• Blue Cross Blue Shield of Tennessee (“BCBST”)

– First enforcement action under HITECH’s breach notification rule

– 2009: BCBST submitted breach report to OCR • 57 unencrypted hard drives stolen• Hard drives were located in storage closet leased by

BCBST• Contained audio/video recordings of customer service

calls, including PHI– 2012: OCR and BCBST entered into Resolution

Agreement. BCBST did not admit liability, OCR did not concede that BCBST did not violate HIPAA.

Page 113: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

113

Recent Enforcement Efforts (cont.)

• BCBST (cont.)– $1,500,000 payment– Corrective Action Plan, including updating policies

and procedures, training workforce in Security Rule measures regarding ePHI.

Page 114: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

114

Recent Enforcement Efforts (cont.)• OCR Enforcement Action Against Alaska’s

Department of Health and Human Services– In 2009, submitted a breach report to OCR stating

that a portable storage device containing PHI had been stolen from the vehicle of a computer technician.

– OCR determined that AK-HHS failed to comply with five HIPAA requirements:• No risk analysis• Insufficient risk management precautions• Failure to train workforce members• Failure to implement device/media controls• Failed to address device/media encryption

Page 115: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

115

Recent Enforcement Efforts (cont.)• OCR Enforcement Against AK-HHS (cont.)

– June 2012: OCR and AK-HHS entered into Resolution Agreement. AK-HHS did not admit liability, OCR did not concede that AK-HHS did not violate HIPAA.

– $1,700,000 payment– Corrective action plan, including requirement to

develop, review and revise HIPAA Security Rule policies and train workforce in Security Rule measures regarding ePHI.

Page 116: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

116

Recent Enforcement Efforts (cont.)

• United States v. Zhou– U.S. Attorney General for Central District of

California charged Huping Zhou with violating HIPAA by accessing patient records without authorization.

– 2003: Hired University of California at Los Angeles Health System (“UHS”) as research assistant in rheumatology. Terminated in same year for poor performance.

– After termination, accessed patient records at least 4 times.

Page 117: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

117

Recent Enforcement Efforts (cont.)

• United States v. Zhou (cont.)– Government alleged that Zhou violated 1320d-6(a)

(2), which applies to persons who “knowingly and in violation of HIPAA” obtain PHI.

– Zhou moved to dismiss charges, stating no assertion that his actions were illegal.

– District Court denied. Sentenced to 4 months in prison plus 1 year of supervised release, $2,000 fine…

– Zhou appealed to Ninth Circuit Court of Appeals. Stated that he did not know his actions were illegal, government misapplied “knowing” requirement of the statute.

Page 118: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

118

Recent Enforcement Efforts (cont.)

• United States v. Zhou (cont.)– Court: “knowingly and in violation” of the statute =

two separate elements: (1) must knowingly obtain an individual’s PHI; and (2) must obtain the information in violation of HIPAA. Do not need to know that your conduct was in violation of HIPAA.

Page 119: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

119

Upcoming Regulatory Updates

• A final “omnibus” rule was expected to be released in July, 2012. Has since been delayed. Expected to include:– Final Enforcement Rule– Final Beach Notification Rule– Changes to HIPAA Privacy and Security

Standards

Page 120: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

120

Disclaimer

Consult with legal counsel!

Page 121: CCPA Seminar: A HIPAA UPDATE September 11, 2012 Pamela H. Del Negro Robinson & Cole LLP 1.

121

Questions???

Pamela H. Del Negro

Robinson & Cole LLP

[email protected]

(860) 275-8261