HITECH Poses Important Challenges... Are You Compliant?

Size: px
Start display at page:

Download "HITECH Poses Important Challenges... Are You Compliant?"

Transcription

1 Presents a Webinar HITECH Poses Important Challenges... Are You Compliant? A program for Clinic and Hospital Administrators, Risk Managers, and other interested staff. Joint Sponsor Kansas Hospital Association

2 KaMMCO Benefits & Services C LAIMS Strong defense of non-meritorious claims and early disposition of meritorious claims. Member involvement in claims defense team. Post-claim follow up, including loss prevention tips. Litigation support program (C.A.R.E.) for members and spouses. Case reviews to develop new ideas and strategies in member defense. L OSS PREVENTION/EDUCATION Statewide meetings to educate health care professionals regarding timely and important topics, such as: HIPAA and other regulatory issues. Coding certification. Medical record documentation, release, and filing. Front office operational efficiency. Use of physician extenders. Systems and their effectiveness in the practice of medicine. On-site clinic and hospital reviews that include assessment of such areas as: Waiting rooms, surgical suites, and exam rooms. Patient scheduling, process for termination of the physician/patient relationship, and billing and collections. Credentialing and governing bylaws. Medical records. Education meetings for student and residency programs. Publications. Toll-free telephone and website access to medical/loss prevention advice and information. To learn more about the benefits and services available from KaMMCO, call or visit

3 About Our Speaker Yolanda Sims, JD, MHA Loss Prevention and Risk Management Advisor, KaMMCO Ms. Sims provides KaMMCO members with an understanding of loss prevention and risk management issues in the health care field through education and information based on legal research. Other responsibilities include developing and presenting education programs, assisting with litigation support services, and writing newsletter and website articles. Ms. Sims received her Juris Doctorate degree from St. Louis University, School of Law and a Master of Health Administration from St. Louis University, School of Public Health. She previously worked at Truman Medical Center and has served internships at Jesse Brown Veterans Administration Hospital and the U.S. Department of Health and Human Services. Prior to KaMMCO, she was employed in a Kansas City law firm where she handled a broad range of legal issues. Ms. Sims is a member of the Missouri and American Bar Associations, Kansas City Metropolitan Bar Association, Association of Corporate Counsel, Kansas Association of Risk and Quality Management, and a member of the American Health Lawyers Association. Disclaimer The recommendations in this handout are not intended to establish a standard of care, nor are they a substitute for legal advice. The recommendations should be tailored to meet the needs of each particular health care setting. Any implementation of these recommendations should be reviewed by appropriate staff and, if necessary, legal counsel. The fact that a health care professional varies from these guidelines does not establish that the health care professional failed to meet the required standard of care. There may be legitimate reasons to choose another course of action. However, consideration of the information in this handout may reduce the risk of facing a lawsuit and the stress that accompanies even a successful defense in court. Objectives Following participation in this presentation, the learner will be prepared to: 1. Understand the impact of HITECH laws and regulations on hospitals, clinics, physicians, and other affected operations. 2. Comply with HITECH requirements by using checklists showing the steps that should be considered. 3. Obtain the tools and information needed to develop a compliance plan for HITECH. Contents of this handout are produced for the benefit of KaMMCO members and are protected by 2010 copyright. No one other than KaMMCO members may reproduce the contents of this handout without written permission from KaMMCO. Send all communication to KaMMCO, 623 SW 10 th Avenue, Topeka, Kansas

4 Table of Contents I. Introduction... 1 A. Breach Notification Rule...1 B. What is a Breach?...2 C. Investigative Steps for a Breach...2 D. Exceptions to Breach...3 E. Methods for Notification Timeliness of Notification Content of Notification Methods of Notification to Individuals Notification to Media if More than 500 Affected Notification to HHS if 500 or More Affected Law Enforcement Exception...5 F. Breach Risk Assessment Examples...6 Example 1: Patient s Information Mistakenly Mailed to Wrong Person...6 Example 2: A Rogue Employee...7 Example 3: The Stolen Laptop...7 Example 4: A Breach Discovered by a Business Associate...8 G. Granting Individual Requests to Limit Uses or Disclosures...8 Two-Prong Test...9 H. Limit Disclosure or Use of PHI to the Minimum Necessary Standard...9 What is a Limited Data Set?...10 I. Increased Accounting Obligations if Covered Entities Use Electronic Health Records (EHRs)...10

5 J. Effective Dates for the Accounting Requirement...11 K. Content of the Accounting...11 L. Covered Entities Must Make Accounting Available to Individual in Electronic Format...11 Provision of PHI in Electronic Format...11 M. Covered Entities Cannot Receive Remuneration for PHI Prohibition on Sale of PHI Exceptions to Remuneration Effective Date...13 N. Limitations on Marketing Clarification Regarding Marketing Provisions When are Communications Considered Health Care Operations?...13 O. Penalties & Enforcement...14 Increased Civil Penalties...14 P. Enforcement...15 State Attorneys General Enforcement Authority...15 Q. Conclusion...15 Exhibit A Marketing Decision Tree...16

6 HITECH Poses Important Challenges... Are You Compliant? I. Introduction The Health Information Technology for Economic and Clinical Health Act (HITECH ACT), signed into law on February 17, 2009, as part of the American Recovery and Reinvestment Act (ARRA), amends the regulation of the privacy and security of patient health information (PHI). Effective February 17, 2010, the HITECH Act imposed new privacy and security requirements that essentially expanded the original foundation of the Health Information Portability and Accountability Act (HIPAA). Under HITECH, many of the HIPAA standards will apply directly to business associates, and business associates will be subject to the same civil and criminal penalties as covered entities. The HITECH Act also mandates that business associates maintain appropriate security safeguards. These types of safeguards include administrative, physical, and technical safeguards as defined under the Security Rule. A. Breach Notification Rule The Breach Notification Rule places new obligations on both covered entities and business associates regarding business associate notice to the covered entity, patient notification, and maintaining breach logs. Covered entities 1 must notify individuals when the PHI of an individual has been breached. Conversely, business associates must notify covered entities of such breaches. 2 After being notified, covered entities will take the proper steps to notify the affected individuals. When an entity or associate is determining whether notice is required, several things should be considered. First, was the disclosure permitted under HIPAA. If not, the second question is whether a breach occurred according to the definition provided in the regulation. Third, was it a breach of unsecured PHI? Be advised that only breaches of unsecured PHI trigger the notification requirement. When is PHI considered unsecured? HITECH defines the term unsecured PHI as PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary of Health & Human Services (HHS). 3 1 Covered entities include most physicians and health care providers, health care plans, and health care clearinghouses. 2 Business associates, like covered entities, are held accountable under the same breach notification requirement. When a breach is by the business associate they are legally obligated to inform the covered entity, not the individual. 3 See, Guidance Specifying the Technologies and Methodologies that Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals at 74 F.R (August 24, 2009). 1

7 B. What is a Breach? A breach is defined in HITECH as the unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security and privacy such that the use of the information poses significant risk of financial, reputational, or other harm to individuals. The new requirement does not intend to require notification every time unsecured PHI is mistakenly accessed or used. For that reason, the definition of breach does include a harm assessment. This assessment would be done on a case-by-case analysis, but it essentially requires entities and associates to determine the likelihood that a breach could cause harm to an individual. The goal is to prevent unnecessary notices to individuals when there is no real need for concern. If the entity or associate determines the harm is insignificant, no notification is required. The Interim Breach Notification regulations suggest covered entities and business associates review the Office and Management Budget (OMB) Memorandum M for examples of the types of factors that may be taken into account in determining whether an impermissible use or disclosure presents a significant risk of harm to the individual. The five factors are: 1. Nature of the data elements breached; 2. Number of individuals affected; 3. Likelihood the information is accessible and usable; 4. Likelihood the breach may lead to harm; and, 5. Ability of the agency to mitigate the risk of harm. The burden of proof is upon the entity or associate to show what factors were taken into consideration. Covered entities and business associates must document their risk assessments. The documentation must demonstrate evidence of a plan that indicates your organization is in compliance with the HITECH requirements. In the event of an audit, you will need to produce demonstrable evidence. C. Investigative Steps for a Breach 1. Does the disclosure violate the HIPAA Privacy Rule? 2. Does it involve unsecured PHI? 3. Does an exception to the breach notification requirements apply? 2

8 Good faith, unintentional acquisition, access, or use of PHI by employee/workforce; Inadvertent disclosure to another authorized person within the entity, covered entity, or business associate; Recipient could not reasonably have retained the data; or, Data is limited to limited data set that does not include date of birth or zip code. See, 45 C.F. R Does the disclosure result in significant risk of financial, reputational, or other harm? D. Exceptions to Breach According to HHS, the following exceptions and examples are not considered a breach and would not be reportable: If an unintentional acquisition, access, or use of PHI made in good faith occurs within the scope of employment or a professional relationship and does not result in further impermissible use or disclosure. o Example: A nurse mistakenly sends an with PHI to a hospital s billing employee. After opening the , the billing employee notifies the nurse and deletes the . If it is an inadvertent disclosure, from an individual who is otherwise authorized to access PHI at a facility operated by a covered entity or business associate to another similarly situated individual at the same facility, and such information received, as a result of such disclosure, is not further acquired, accessed, used, or disclosed without authorization by any person. o Example: A Human Resources Manager who is authorized to access employee health plans inadvertently discloses PHI to another Human Resources employee. If an unauthorized person who receives the health information cannot reasonably retain it; o Example: A covered entity sends out a benefits enrollment form to the wrong individual. If the information is returned by the post office, unopened, the entity would consider it undeliverable. 3

9 Data is limited to limited data set that does not include date of birth or zip code. See, 45 C.F. R o Example: A researcher conducts a clinical trial and uses a limited data set. E. Methods for Notification The methods for notification will vary depending on the number of individuals involved; however, the timeliness standard applies to all of them. 1. Timeliness of Notification. Notification must be made to individuals without unreasonable delay, but no later than 60 calendar days after discovery of the breach. Breaches are considered to be discovered on the first day the breach is known to the covered entity (i.e., known to any member of the covered entity s workforce or agents) or when, by exercising reasonable diligence, the breach would have been known to the covered entity. 45 C.F.R (b). 2. Content of Notification. Notification sent to individuals must be in plain language and include the following: A brief description of what happened, including the date of the breach and the date of discovery of the breach, if known; A description of the types of unsecured PHI involved in the breach; Steps individuals should take to protect themselves from potential harm resulting from the breach; A brief description of the steps the entity is taking to investigate the breach, mitigate harm, and protect against further breaches; and, Contact procedures for individuals to ask questions or obtain additional information, including a toll-free number, address, website, or postal address. 45 C.F.R (c). 3. Methods of Notification to Individuals. Notification to individuals must be sent to an individual s last known address via first-class mail, or by if the individual has agreed to and has not withdrawn such agreement. If the contact information is outdated or insufficient, a substitute notice reasonably calculated to reach the individual must be made. If there is outdated or insufficient information for fewer than 10 individuals, substitute notice may be provided by an alternative written notice, telephone, or other means. If the contact information for 10 or more individuals is found to be 4

10 Conspicuous posting on the home page of the covered entity s website for a period of no less than 90 days; or, Conspicuous notice in major print or broadcast media in the geographic areas where the affected individuals likely reside. In addition, the substitute notice when 10 or more individuals are involved on the website, in print, or by broadcast media must include a toll-free telephone number which will remain active for at least 90 days where individuals can learn whether their unsecured PHI was included in the breach. 45 C.F.R In the event the affected individual is a minor or lacks the legal capacity to receive notice, a breach notification should be sent to the individual s parent or personal representative. In addition, if the breach affects an individual who is deceased, an entity still has an obligation to send a breach notification. The notice should be sent to the address of the next of kin. See, 45 C.F.R (d)(1)(ii) 4. Notification to Media if More than 500 Affected. If the breach affects more than 500 residents of a particular state or jurisdiction, the covered entity also must notify prominent media outlets serving the state or jurisdiction of the breach without unreasonable delay, but no later than 60 calendar days after discovery of the breach. 45 C.F.R (a). 5. Notification to HHS if 500 or More Affected. A covered entity must notify the Secretary of HHS following the discovery of a breach of unsecured PHI. 45 C.F.R (a). If the breach affects 500 or more individuals, notice must be made to Health and Human Services (HHS) contemporaneously with the notification to the affected individuals and in the manner specified by HHS or its website. If fewer than 500 individuals are affected, the covered entity must maintain a log of any such breaches, and submit the log annually to HHS no later than 60 days following the end of the calendar year. 45 C.F.R (b)(c). 6. Law Enforcement Exception. If a law enforcement official states to a covered entity that notification of a breach would impede a criminal investigation or cause damage to national security, a covered entity shall delay the notification if the law enforcement s request is in writing and specifies a time for the delay. If the statement is oral, the covered entity must document the statement, identify the official, and delay notification no longer than 30 days from the oral statement unless the official submits the statement in writing during this period. 45 C.F.R

11 F. Breach Risk Assessment Examples Example 1: Patient s Information Mistakenly Mailed to Wrong Person During a routine mailing, an employee inadvertently inserted a patient s billing statement into the wrong patient s envelope. Upon receiving the statement in the mail, the unintended patient contacted the medical office. The statement contained the following information: Patient name; Address including zip code; Date of birth; and, Dates of treatment. Investigation Evaluate and document the risk assessment conducted to determine the risk of financial, reputational, or other harm to the affected individual. The risk of harm to the patient is high because of the following factors: The PHI contained in the statement; The method of disclosure was paper; The unintended recipient was a member of the general public; and, The information could not be retrieved because it was outside of the facility nor could the unintended patient provide reasonable assurances it was properly destroyed. Outcome The office manager notified the affected individual about the inadvertent disclosure by sending the patient a first-class letter with the required contents. In this situation, the matter can be deemed urgent and you can provide telephone notice in addition to the letter. This would be helpful to mitigate any potential harm that could result from the breach. Maintain the breach in a breach notification log. 6

12 Example 2: A Rogue Employee Dr. Jane Doe, a first-year resident assigned to City Hospital, was shot in the parking lot of a local grocery store and became a patient at the hospital. A hospital employee, not a member of the patient s care team, accessed, examined, and disclosed Dr. Doe s medical record. The impermissible use and disclosure was discovered because of the software used at the facility. Investigation Evaluate and document the risk assessment conducted to determine the risk of financial, reputational, or other harm to the affected individual. The breach did not fall within an exception because the employee intentionally accessed the record without authorization. Outcome An employee s medical record is protected by the Privacy Rule, even though employment records held by a covered entity, in its role as employer, are not. An administrator notified the affected individual. Employee should receive training on the appropriate use of the medical information of a fellow employee. An additional corrective measure may include placing a letter of reprimand in the employee s personnel file and receive training about the Privacy Rule. Example 3: The Stolen Laptop An IT manager at a major health care entity regularly took his workplace laptop home. Over the weekend, he drove his car to a local shopping plaza with his laptop in the backseat. While shopping, his car was vandalized and the laptop was stolen. The laptop was ultimately recovered. Forensic analysis of the computer showed that it contained unsecured PHI, but the information was not opened, altered, transferred, or otherwise compromised. Investigation Evaluate and document the risk assessment including the circumstances surrounding the theft and recovery of the laptop. 7

13 Outcome The breach likely does not pose a significant risk of harm to the individuals and therefore notification is probably not required. Example 4: A Breach Discovered by a Business Associate Casey is the administrator of a medical group practice that outsources its transcription. The practice has a valid business associate agreement with a transcription service. A local attorney s office that uses the same transcription service has just notified the transcription service that they mistakenly received and opened a batch of the practice s transcriptions. The transcriptions contain PHI of 770 patients. The transcription service notifies the administrator immediately. Investigation Evaluate and document the risk assessment. Determine if the impermissible use/disclosure poses a significant risk for financial, reputational, or other harm to the individual. The breach falls within an exception. The breach would be considered an unintentional, good faith acquisition access, or use by an individual acting under the business associate s authority. Outcome Notification is not required because the sender and the recipient are similarly situated. The attorney s office provided reasonable assurance there was no further use or disclosure. G. Granting Individual Requests to Limit Uses or Disclosures HITECH expands patient privacy rights and provides more patient input when disclosing their PHI. In essence, the restriction has strengthened the privacy and security rules currently in place. Pre-HITECH, if an individual requested a covered entity to limit disclosure of PHI that exceeded HIPAA s requirements, covered entities had no corresponding obligation to agree to that request. Post- HITECH, in a very limited circumstance described below, a covered entity must grant the request. 8

14 Two-Prong Test Covered entities must agree to restrict the disclosure or uses of PHI if the following requirements are met: The disclosure is to a health plan for the purpose of carrying out payment or health care operations (not for treatment); and, The PHI pertains solely to a health care service or item for which the provider has been paid out-of-pocket expenses in full. See, HITECH Act If an individual desires to pay for a procedure or testing rather than filing an insurance claim, they have the right to restrict disclosure of those services. o Example: A patient would like for her family to be tested for genetic abnormalities. She has the right to pay for it out of pocket and keep the results for her insurance record. H. Limit Disclosure or Use of PHI to the Minimum Necessary Standard Under HITECH, covered entities, when permitted, must disclose only the minimum necessary to accomplish the intended purpose for such use or disclosure. Minimum necessary is a concept that requires the covered entity to provide/obtain the minimum amount of information required to accomplish the intended purpose of the use, disclosure, or request for information when: Employees use information within the facility; The facility discloses information to an outside entity; or, The facility requests information from an outside entity. Covered entities are charged with the responsibility of making a determination of minimum necessary for disclosure, rather than relying on business associates or vendors when releasing information. The Secretary of Health and Human Services (HHS) will issue guidance on what constitutes minimum necessary for purposes of disclosure under HITECH no later than August Until the Secretary issues this guidance, covered entities should use a limited data set to protect patient privacy to the extent practicable. Once implemented, all requests will have to comply with the new minimum 9

15 necessary guidance issued by the Secretary. This new guidance will not affect exceptions to disclosures defined by 45 C.F.R (b)(2). 4 What is a Limited Data Set? A limited data set 5 must have all directed identifiers removed, including the following: Name and Social Security number; Street address, address, telephone and fax number; Certificates/license numbers; Vehicle identifiers and serial numbers including license plate numbers; Account numbers; Health plan beneficiary numbers; Device identifiers or serial numbers; URL s Internet Protocols (IP) address numbers; Biometric identifiers (including finger and voice prints); and, Full face photographic images and any comparable images. I. Increased Accounting Obligations if Covered Entities Use Electronic Health Records (EHRs) HITECH changes the requirements for generating an accounting of disclosures per patient request for covered entities using EHRs. As defined by the HITECH Act, an EHR is an electronic record of health-related information on an individual that is created, managed, and consulted by authorized health care clinicians and staff. 6 Under HITECH, accountings must include disclosures made through electronic health record for treatment, payment, or health care operations in addition to the accounting requirements pre-hitech. Covered entities and business associates 4 The following exceptions to the minimum necessary standard continue to apply under 45 C.F.R (b)(2): Disclosures/requests by a health care provider for treatment, uses/disclosures to the patient, uses/disclosures made pursuant to an authorization, disclosures to the HHS Secretary, uses/disclosures required by law; and uses/disclosures required for HIPAA compliance. 5 See also, 45 C.F.R (e) 6 See, HITECH Act

16 alike must comply with the new accounting obligation relating to disclosures through an EHR. Under the new accounting obligations: Covered entities must provide an accounting for the electronic disclosures through an EHR for payment, treatment, or health operations made by the covered entity or business associate during the three years prior to the request; or, The covered entity may provide the accounting as described above and a list of all business associates for the individual to contact directly. The list should contain necessary contact information such as name, address, telephone number, and . J. Effective Dates for the Accounting Requirement The effective dates for the new accounting requirement correlate to the date the covered entity implemented an EHR system. For a covered entity that acquired an EHR before January 1, 2009, the accounting requirement applies to disclosures made on or after January 1, For a covered entity that acquired an EHR on or after January 1, 2009, the provision will be effective for disclosures made on or after January 1, 2011 or the date the covered entity obtained the EHR. See, HITECH Act 13405(c). K. Content of the Accounting HHS is scheduled to issue regulations regarding the content of an accounting of disclosures for treatment, payment, and health care operations through EHRs. According to HHS, the regulations will provide guidelines for educating individuals about the uses and disclosures of their PHI and address administrative burdens associated with providing the accounting. The anticipated deadline regarding the content of the accounting is scheduled to be issued by June L. Covered Entities Must Make Accounting Available to Individual in Electronic Format Provision of PHI in Electronic Format HITECH requires covered entities and business associates that use or maintain EHRs to provide a copy in electronic format if chosen by the 11

17 individual. 7 The electronic format can be transmitted to another person or entity upon proper authorization from the patient. The authorization must be clear, conspicuous, and specific. The covered entity may charge a fee when honoring this request. The fee is limited to labor costs and will vary depending on whether the request is a copy of a particular transaction or an explanation of the entire EHR. As provided by HIPAA, the timeframe for responding to requests for electronic copies under HITECH is still within a reasonable time, no later than 30 days. M. Covered Entities Cannot Receive Remuneration for PHI 1. Prohibition on Sale of PHI Under HITECH, covered entities and business associates are prohibited from receiving indirect or direct remuneration in exchange for PHI of an individual without obtaining the authorization of the individual. The authorization must specify that the covered entity may exchange the individual s PHI for remuneration. See, HITECH Act 13405(d). 2. Exceptions to Remuneration No authorization will be needed for a covered entity to receive remuneration in exchange for providing PHI for any of the following purposes: Public health activities; or, Research, as long as the remuneration reflects only the cost to prepare and transmit the PHI to the researcher; or, Treatment of the individual; or, A health care provider as defined in 6(iv) of health care provider under 45 C.F.R ; or, Payment to a business associate for activities that involve the exchange of PHI at the request of, and on behalf of, the covered entity pursuant to a business associate agreement; or, Providing a copy of PHI to an individual who has exercised the right to access the individual s PHI; or, Such similarly necessary and appropriate information as determined in HHS regulations. 7 The right to an electronic copy is information in the electronic health record. 12

18 3. Effective Date The Secretary of HHS must adopt regulations to facilitate this provision no later than August 18, The prohibition on remuneration for a transmission of PHI will become effective and apply to exchanges of PHI occurring on or after six months after HHS issues the final regulations for this provision. N. Limitations on Marketing 1. Clarification Regarding Marketing Provisions The definition of marketing includes a number of exceptions. HIPAA defines marketing as a communication about a product or service that encourages the purchase or use of the product or service, except for communications made: To describe a health-related product or service (or payment for such product or service) that is provided by, or included in, a plan of benefits of the covered entities making the communication, including communications about the entities participating in a health care provider network or health plan network; replacement of, or enhancements to, a health plan; and health-related products or services available only to a health plan enrollee that add value to, but are not part of, a plan of benefits; or, For treatment of the individual; or, For case management or care coordination or to direct patients to alternative treatments, therapies, providers, or settings of care 8. The communications described above are deemed to fall within the definition of health care operations under HIPAA, and thereby permissible without obtaining an individual s authorization. The provision also makes clear that the term payment does not include any payment for treatment of an individual. 2. When are Communications Considered Health Care Operations? Under HITECH, if the covered entity has received payment in exchange for making one of the communications described in the section above, the communication may no longer be considered health care operations unless: 8 45 C.F.R , Marketing Definition (1)(i)-(iii). 13

19 The communication describes only a drug or biologic that is currently being prescribed for the recipient of the communication and any payment is reasonable in amount; 9 The communication is made by the covered entity and individual authorization is obtained; or, The communication is made by a business associate of a covered entity, on behalf of the covered entity and the communication is made consistent with the business associate agreement. See, Attachment A, Marketing Decision Tree. O. Penalties & Enforcement Increased Civil Penalties Civil penalties may be assessed for violations caused by willful neglect. Examples of willful neglect may include 10 : The organization does not have any processes in place to support your policies and procedures; The organization has no demonstrable evidence that staff training has been done as required by the regulations; The organization is a covered entity that does business with a number of business associates and have no contracts in place with them, or if old contracts are still being used; Employees have passwords on sticky notes that are readily visible; The organization has an EHR system running on a local server and the server room is not secured; and, The organization has no plan for notifying patients when unsecured PHI has been breached. 9 The meaning of what constitutes payment that is reasonable in amount is to be set by the Secretary of HHS in forthcoming regulation. 10 See, What does willful neglect mean under HITECH/HIPAA? 14

20 The new minimum civil penalties are tiered according to the entity s perceived culpability for the HIPAA violation, as follows: Tier A: If the offender did not know, and by exercising reasonable diligence would not have known, that he or she violated the law: $100 per violation, except that the total amount imposed on the person for all such violations of an identical requirement or prohibition during a calendar year may not exceed $25,000. Tier B: If the violation was due to reasonable cause and not willful neglect: $1,000 for each violation, except that the total amount imposed on the person for all such violations of an identical requirement or prohibition during a calendar year may not exceed $100,000. Tier C: If in year of violation and due to willful neglect, if corrected within thirty days from knowledge of violation: $10,000 for each violation, except that the total amount imposed on the person for all such violations of an identical requirement or prohibition during a calendar year may not exceed $250,000. Tier D: If the violation was due to willful neglect and was not corrected: $50,000 for each violation, except that the total amount imposed on the person for all such violations of an identical requirement or prohibition during a calendar year may not exceed $1,500,000. P. Enforcement State Attorneys General Enforcement Authority Q. Conclusion Under HITECH, state attorney generals are authorized to pursue actions against persons who violate HIPAA if the attorney general has reason to believe that the violation threatens or adversely affects any resident in the state. However, the state attorney general cannot bring an action as long as an action or the same violation is pending by the Secretary of HHS. The new HITECH requirements will have an impact on the way covered entities and business associates conduct relationships. The materials in this presentation were developed to help covered entities ensure their policies and procedures are HITECH-compliant. Covered entities should review how they document data breaches, know when an exception to notification applies, and make an effort to share their policies and procedures with business associates. 15

21 16

22 NOTES

23 KaMMCO Offices Topeka Wichita Hays Kansas City 623 S.W. 10 th Ave. #2 Brittany Place 1010 Downing 6950 Squibb Rd. Suite N. Woodlawn Suite 60 Suite 440 Topeka, KS Suite 300 Hays, KS Mission, KS Wichita, KS (Fax) (Fax) (Fax)

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES SALISH BHO HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES Policy Name: BREACH NOTIFICATION REQUIREMENTS Policy Number: 5.16 Reference: 45 CFR Parts 164 Effective Date:

More information

BREACH NOTIFICATION POLICY

BREACH NOTIFICATION POLICY PRIVACY 2.0 BREACH NOTIFICATION POLICY Scope: All subsidiaries of Universal Health Services, Inc., including facilities and UHS of Delaware Inc. (collectively, UHS ), including UHS covered entities ( Facilities

More information

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information 45 CFR Part 164 Interim Final Rule Breach Notification for Unsecured Protected Health Information Full Preamble and Rule at http://edocket.access.gpo.gov/2009/pdf/e9-20169.pdf The Interim Final Rule also

More information

Changes to HIPAA Privacy and Security Rules

Changes to HIPAA Privacy and Security Rules Changes to HIPAA Privacy and Security Rules STEPHEN P. POSTALAKIS BLAUGRUND, HERBERT AND MARTIN 300 WEST WILSON BRIDGE ROAD, SUITE 100 WORTHINGTON, OHIO 43085 SPP@BHMLAW.COM PERSONNEL COUNCIL FRANKLIN

More information

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC Audit Type Section Key Activity Established Performance Criteria Audit Inquiry 12 Samples Requested Breach 164.414(a) Administrative 164.414(a) 164.414(a) 5 Inquiry of Mgmt Requirements Administrative

More information

H E A L T H C A R E L A W U P D A T E

H E A L T H C A R E L A W U P D A T E L O U I S V I L L E. K Y S E P T E M B E R 2 0 0 9 H E A L T H C A R E L A W U P D A T E L E X I N G T O N. K Y B O W L I N G G R E E N. K Y N E W A L B A N Y. I N N A S H V I L L E. T N M E M P H I S.

More information

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

NOTIFICATION OF PRIVACY AND SECURITY BREACHES NOTIFICATION OF PRIVACY AND SECURITY BREACHES Overview The UT Health Science Center at San Antonio (Health Science Center) is required to report all breaches of protected health information and personally

More information

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS Franklin J. Hickman Janet L. Lowder David A. Myers Elena A. Lidrbauch Judith C. Saltzman Mary B. McKee Amanda M. Buzo Lisa Montoni Garvin Andrea Aycinena Penton Building 1300 East Ninth Street Suite 1020

More information

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below. Subject: Protected Health Information Breach Notification Policy Department: Enterprise Risk Management Services Executive Sponsor: SVP/Chief Risk Officer Approved by: Rod Hochman, MD President/CEO Policy

More information

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule Breach Policy To provide guidance for breach notification when impressive or unauthorized access, acquisition, use and/or disclosure of the ephi occurs. Breach notification will be carried out in compliance

More information

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure Purpose To provide for notification in the case of breaches of Unsecured Protected Health Information ( Unsecured PHI )

More information

Interim Date: July 21, 2015 Revised: July 1, 2015

Interim Date: July 21, 2015 Revised: July 1, 2015 HIPAA/HITECH Page 1 of 7 Effective Date: September 23, 2009 Interim Date: July 21, 2015 Revised: July 1, 2015 Approved by: James E. K. Hildreth, Ph.D., M.D. President and Chief Executive Officer Subject:

More information

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel HIPAA Training HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel Agenda HIPAA basics HITECH highlights Questions and discussion HIPAA Basics Legal Basics Health Insurance Portability

More information

AFTER THE OMNIBUS RULE

AFTER THE OMNIBUS RULE AFTER THE OMNIBUS RULE 1 Agenda Omnibus Rule Business Associates (BAs) Agreement Breach Notification Change Breach Reporting Requirements (Federal and State) Notification to Care1st Health Plan Member

More information

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP dthrasher@constangy.com (205) 226-5464 1 Reasons for HIPAA Privacy Rules Perceived need for protection

More information

Fifth National HIPAA Summit West

Fifth National HIPAA Summit West Fifth National HIPAA Summit West Privacy and Security under the HITECH Act W. Reece Hirsch Paul T. Smith, Partner, Partner, Hooper, Lundy & Bookman 1 Developments The Health Information Technology for

More information

The wait is over HHS releases final omnibus HIPAA privacy and security regulations

The wait is over HHS releases final omnibus HIPAA privacy and security regulations The wait is over HHS releases final omnibus HIPAA privacy and security regulations The Department of Health and Human Services (HHS) published long-anticipated (and longoverdue) omnibus regulations under

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school ASPPR The omnibus rule greatly enhances a patient s privacy protections, provides individuals new rights to their health information, and strengthens the government s ability to enforce the law. The changes

More information

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V. HIPAA Compliance: Privacy and Security Changes under HITECH Mary V. Bauman www.millerjohnson.com The materials and information have been prepared for informational purposes only. This is not legal advice,

More information

ALERT. November 20, 2009

ALERT. November 20, 2009 ALERT HIPAA PRIVACY FOR EMPLOYERS HAS CHANGED. IMMEDIATE ACTION IS REQUIRED. November 20, 2009 The American Recovery and Reinvestment Act of 2009 ( ARRA ) also known as the Economic Stimulus Bill made

More information

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government HITECH and HIPAA: Highlights for Health Departments Aimee Wall UNC School of Government When Congress enacted sweeping legislation in February designed to stimulate the nation s economy, it incorporated

More information

ARRA s Amendments to HIPAA Privacy & Security Rules

ARRA s Amendments to HIPAA Privacy & Security Rules ARRA s Amendments to HIPAA Privacy & Security Rules Georgina L. O Hara Jessica R. Bernanke April 29, 2009 www.morganlewis.com Amended HIPAA Privacy and Security Rules HIPAA Amendments are in The Health

More information

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule Office of the Secretary Office for Civil Rights () HIPAA/HITECH Omnibus Final Rule April 12, 2013 HHS Office for Civil Rights Omnibus Components Final Rule on HITECH Privacy, Security, & Enforcement Provisions

More information

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 The Impact of Final Omnibus HIPAA/HITECH Rules Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 0 Disclaimer The material in this presentation is not meant to be construed as legal advice

More information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule 1 IMPORTANCE OF STAFF TRAINING HIPAA staff training is a key, required element in a covered entity's HIPAA

More information

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013 HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013 Pat Henrikson, Banner Health HIPAA Compliance Program Director, Chief Privacy Officer Agenda Background

More information

HIPAA Basic Training for Health & Welfare Plan Administrators

HIPAA Basic Training for Health & Welfare Plan Administrators 2010 Human Resources Seminar HIPAA Basic Training for Health & Welfare Plan Administrators Norbert F. Kugele What We re going to Cover Important basic concepts Who needs to worry about HIPAA? Complying

More information

To: Our Clients and Friends January 25, 2013

To: Our Clients and Friends January 25, 2013 Life Sciences and Health Care Client Service Group To: Our Clients and Friends January 25, 2013 Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules under the Health

More information

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT HIPAA OMNIBUS FINAL RULE HITECH GINA TERMINOLOGY OMNIBUS FINAL RULE Issued January 23, 2013 Effective March 26, 2013 Modified HIPAA privacy and security

More information

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13 North Shore LIJ Health System, Inc. Facility Name POLICY TITLE: HIPAA Marketing and Sale of Protected Health Information Policy ADMINISTRATIVE POLICY AND PROCEDURE MANUAL POLICY #: 800.43 System Approval

More information

HIPAA Breach Notice Rules New notice requirements for HIPAA covered entities when there is a breach of Protected Health Information (PHI)

HIPAA Breach Notice Rules New notice requirements for HIPAA covered entities when there is a breach of Protected Health Information (PHI) HIPAA Breach Notice Rules New notice requirements for HIPAA covered entities when there is a breach of Protected Health Information (PHI) On August 24, 2009, the Department of Health and Human Services

More information

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Legal and Privacy Implications of the HIPAA Final Omnibus Rule Legal and Privacy Implications of the HIPAA Final Omnibus Rule February 19, 2013 Pillsbury Winthrop Shaw Pittman LLP Faculty Gerry Hinkley Partner Pillsbury Winthrop Shaw Pittman LLP Deven McGraw Director,

More information

Compliance Steps for the Final HIPAA Rule

Compliance Steps for the Final HIPAA Rule Brought to you by The Alpha Group for the Final HIPAA Rule On Jan. 25, 2013, the Department of Health and Human Services (HHS) issued a final rule under HIPAA s administrative simplification provisions.

More information

The American Recovery Reinvestment Act. and Health Care Reform Puzzle

The American Recovery Reinvestment Act. and Health Care Reform Puzzle The American Recovery Reinvestment Act and Health Care Reform Puzzle Carolyn Heyman-Layne Alaska HCCA Conference March 1, 2012 Comparison of Breach Notification Provisions in the HITECH Act 1 and the Alaska

More information

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Gina Campanella, JD HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, Esq.

More information

Changes to HIPAA Under the Omnibus Final Rule

Changes to HIPAA Under the Omnibus Final Rule Changes to HIPAA Under the Omnibus Final Rule Kimberly J. Kannensohn and Nathan A. Kottkamp, McGuireWoods 1 The Long-Awaited HIPAA Final Rule On Jan. 17, 2013, the Department of Health and Human Services

More information

An Overview of the Impact of the American Recovery and Reinvestment Act of 2009 on the HIPAA Medical Privacy and Security Rules

An Overview of the Impact of the American Recovery and Reinvestment Act of 2009 on the HIPAA Medical Privacy and Security Rules Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. An Overview of the Impact of the American Recovery and Reinvestment Act of 2009 on the HIPAA Medical Privacy and Security Rules Alden J. Bianchi Updated

More information

Management Alert Final HIPAA Regulations Issued

Management Alert Final HIPAA Regulations Issued Management Alert Final HIPAA Regulations Issued After much anticipation, the Department of Health and Human Services (HHS) has issued its omnibus set of final regulations modifying and clarifying the privacy,

More information

HIPAA Privacy Overview

HIPAA Privacy Overview HIPAA Privacy Overview Benefit Advisors Network Stacy H. Barrow sbarrow@marbarlaw.com February 8, 2017 2017 Marathas Barrow Weatherhead Lent LLP. All Rights Reserved. 1 Overview of Presentation HIPAA Overview

More information

HIPAA & The Medical Practice

HIPAA & The Medical Practice HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, JD, MHA, CHA Founder & Principal, Campanella Law Office Of Counsel, The Beinhaker Law Firm BEINHAKER,

More information

GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do

GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do By D Arcy Guerin Gue, Phoenix Health Systems, a division of Medsphere Systems Corporation With Steven J. Fox, Post & Schell Originally commissioned

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

Effective Date: 08/2013

Effective Date: 08/2013 POLICY/GUIDELINE TITLE: HIPAA Marketing and Sale of Protected Health Information Policy POLICY #: 800.43 System Approval Date: 5/18/18 Site Implementation Date: 6/17/18 Prepared by: ADMINISTRATIVE POLICY

More information

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013 HIPAA Privacy & Security 2013 Omnibus Final Rule update Dan Taylor, Infinisource Copyright 2013 All rights reserved. Highlights from Final Rules January 25, 2013 Made business associates directly liable

More information

x Major revision of existing policy Reaffirmation of existing policy

x Major revision of existing policy Reaffirmation of existing policy Name of Policy: Reporting of Security Breach of Protected Health Information including Personal Health Information Policy Number: 3364-90-15 Approving Officer: Executive Vice President of Clinical Affairs

More information

The Impact of the Stimulus Act on HIPAA Privacy and Security

The Impact of the Stimulus Act on HIPAA Privacy and Security The Impact of the Stimulus Act on Webinar March 12, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer The American

More information

HIPAA / HITECH. Ed Massey Affiliated Marketing Group

HIPAA / HITECH. Ed Massey Affiliated Marketing Group HIPAA / HITECH Agent Understanding And Compliance Presented By: Ed Massey Affiliated Marketing Group It s The Law On February 17, 2010 the Health Information Technology for Economic and Clinical Health

More information

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP UNDERSTANDING HIPAA & THE HITECH ACT Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP 1 Objectives of Presentation Learn what HIPAA is Learn the purpose of HIPAA Understand who HIPAA regulates

More information

HHS, Office for Civil Rights. IAPP October 11, 2012

HHS, Office for Civil Rights. IAPP October 11, 2012 HHS, Office for Civil Rights IAPP October 11, 2012 Enforce federal civil rights laws and the HIPAA Privacy and Security Rules HQ and 10 Regional Offices Region IX has jurisdiction over covered entities

More information

Compliance Steps for the Final HIPAA Rule

Compliance Steps for the Final HIPAA Rule Compliance Steps for the Final HIPAA Rule On Jan. 25, 2013, the Department of Health and Human Services (HHS) issued a final rule under HIPAA s administrative simplification provisions. The final rule

More information

HITECH and Stimulus Payment Update

HITECH and Stimulus Payment Update HITECH and Stimulus Payment Update David S. Szabo Agenda HIPAA Breach Notification Rules HITECH and Meaningful Use Open Question Period 2 Data Security Breaches A total of 245,216,093 records containing

More information

OMNIBUS RULE ARRIVES

OMNIBUS RULE ARRIVES AFTER THE OMNIBUS RULE 1 Agenda Omnibus Rule is here Business Associates (BAs) Agreement Breach Notification Change Breach Reporting Requirements (Federal and State) Notification to Care1st Health Plan

More information

Patient Breach Letter Content Requirements

Patient Breach Letter Content Requirements Patient Breach Letter Content Requirements The final breach regulations, effective September 23, 2009, required that the patient whose information was accessed, used or released in an inappropriate manner

More information

GUIDE TO PATIENT PRIVACY AND SECURITY RULES

GUIDE TO PATIENT PRIVACY AND SECURITY RULES AMERICAN ASSOCIATION OF ORTHODONTISTS GUIDE TO PATIENT PRIVACY AND SECURITY RULES I. INTRODUCTION The American Association of Orthodontists ( AAO ) has prepared this Guide and the attachment to assist

More information

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know 1801 California Street Suite 4900 Denver, CO 80202 303-830-1776 Facsimile 303-894-9239 MEMORANDUM To: Adam Finkel, Assistant Director, Government Relations, NCRA From: Mel Gates Date: December 23, 2013

More information

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA The Health Insurance Portability and Accountability Act of 1996 Results Physiotherapy s policy regarding privacy and security of protected health information (PHI) is a reflection of our commitment

More information

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013 HITECH/HIPAA Omnibus Final Rule: Implications for Hospices Elizabeth S. Warren May 3, 2013 Final Rule is Finally Here Published January 25, 2013 (78 Fed. Reg. 5566) Effective March 26, 2013 Compliance

More information

Highlights of the Omnibus HIPAA/HITECH Final Rule

Highlights of the Omnibus HIPAA/HITECH Final Rule Highlights of the Omnibus HIPAA/HITECH Final Rule Health Law Whitepaper Katherine M. Layman 215.665.2746 klayman@cozen.com Gregory M. Fliszar 215.665.7276 gfliszar@cozen.com Judy Wang Mayer 215.665.4737

More information

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T COMPLIANCE TRAINING 2015 QUALITY MANAGEMENT COMPLIANCE DEPARTMENT 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T Compliance Program why? Ensure ongoing education

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda New HIPAA Breach Rules NAHU presents the WHAT and WHYs Presenters: David Smith JD, Vice President, Ebenconcepts Tom Jacobs JD, co-ceo eflexgroup Moderator: Ric Joyner CEBS CFCI, co-ceo, eflexgroup 1 Agenda

More information

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 References: http://www.hhs.gov/ocr/hipaa TTUHSC El Paso HIPAA website: http://elpaso.ttuhsc.edu/hipaa/ Policy Statement

More information

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights HIPAA Update Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights New Mexico Health Information Management Association Conference April 11, 2014 Albuquerque, NM Recent Enforcement

More information

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners 2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners Providers, and Partners 2 Editor s Foreword What follows are excerpts from the U.S. Department of Health and

More information

HIPAA Privacy & Security Plan October 2016

HIPAA Privacy & Security Plan October 2016 HIPAA Privacy & Security Plan October 2016 Page 1 HIPAA Privacy & Security Plan Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations restrict

More information

Health Law Diagnosis

Health Law Diagnosis February Page 1 of 2013 11 Health Law Diagnosis HHS Releases Final HITECH Omnibus Rule After waiting over two years from the publication of the Notice of Proposed Rulemaking to implement provisions of

More information

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1 UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1.12 DATE: 04/01/2003 REVISION: 3/1/2004; 12/28/2010; 01/02/2013 PAGE: 1 of 18 SECTION: HIPAA AREA: HIPAA PRIVACY/SECURITY POLICIES SUBJECT: HIPAA RESEARCH POLICY PURPOSE

More information

The HHS Breach Final Rule Is Out What s Next?

The HHS Breach Final Rule Is Out What s Next? The HHS Breach Final Rule Is Out What s Next? Webinar September 16, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer

More information

Determining Whether You Are a Business Associate

Determining Whether You Are a Business Associate The HIPAApotamus in the Room: When Lawyers and Law Firms are Subject to HIPAA Enforcement, And How to Comply with the Law by Leslie R. Isaacman, J.D., M.B.A. The Omnibus Final Rule 1 of the Health Information

More information

New HIPAA-HITECH Proposed Regulations Issued

New HIPAA-HITECH Proposed Regulations Issued July 2010 New HIPAA-HITECH Proposed Regulations Issued On Thursday July 14, 2010, the Department of Health and Human Services (HHS) published proposed regulations in the Federal Register on many provisions

More information

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Texas Tech University Health Sciences Center HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 Reviewed Date: August 7, 2017 References: http://www.hhs.gov/ocr/hippa HSC HIPAA website http://www.ttuhsc.edu/hipaa/policies_procedures.aspx

More information

LEGAL ISSUES IN HEALTH IT SECURITY

LEGAL ISSUES IN HEALTH IT SECURITY LEGAL ISSUES IN HEALTH IT SECURITY Webinar Hosted by Uluro, a Product of Transformations, Inc. March 28, 2013 Presented by: Kathie McDonald-McClure, Esq. Wyatt, Tarrant & Combs, LLP 500 West Jefferson

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

Getting a Grip on HIPAA

Getting a Grip on HIPAA Getting a Grip on HIPAA Privacy and Security of Health Information in the Post-HITECH Age Jean C. Hemphill hemphill@ballardspahr.com 215.864.8539 Edward I. Leeds leeds@ballardspahr.com 215.864.8419 Amy

More information

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

AMA Practice Management Center, What you need to know about the new health privacy and security requirements 1. HIPAA Security Rule Johns, Merida L., Information Security, in Johns, Merida L. (ed.) Health Information Management Technology, an Applied Approach, AHIMA: Chicago, IL, 2nd ed. 2007, chapter 19, pp.

More information

Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance. Agenda. Health Data Exposure National Wellness Conference

Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance. Agenda. Health Data Exposure National Wellness Conference Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance 2015 National Wellness Conference Barbara J. Zabawa, JD, MPH Center for Health Law Equity, LLC Agenda Health Data Exposure ADA,

More information

HIPAA OMNIBUS FINAL RULE

HIPAA OMNIBUS FINAL RULE HIPAA OMNIBUS FINAL RULE Webinar Series Part 3 Breach Notification April 16, 2013 I. BACKGROUND 2 1 Background > HIPAA Omnibus Final Rule: Announced on January 17, 2013 Published in Federal Register on

More information

Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates

Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates November 7, 2013 Brad M. Rostolsky Partner Reed Smith LLP brostolsky@reedsmith.com Nancy

More information

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4 Addendum II [Name of Organization] HIPAA Incident/Breach Investigation Procedure 4 I. Purpose To distinguish between (1) cases in which our HIPAA policy was not correctly followed but such violation did

More information

UBMD Policy for HIPAA Compliant Subject Recruitment

UBMD Policy for HIPAA Compliant Subject Recruitment UBMD Policy for HIPAA Compliant Subject Recruitment Approved by Executive Committee on December 5, 2016 I. Statement of Purpose This policy is applicable in the situation where the Principle Researcher

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule NOTE: Make sure your computer speakers are turned ON. Audio will be streaming through your speakers. If you do not have computer speakers, call the ACCMA at 510-654-5383 for alternatives.

More information

Limited Data Set Data Use Agreement For Research

Limited Data Set Data Use Agreement For Research Limited Data Set Data Use Agreement For Research This Data Use Agreement is dated,, and is between the ( Recipient ) and University of Miami, ( Covered Entity ). This Data Use Agreement is made in accordance

More information

Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates

Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates March 7, 2013 Brad M. Rostolsky Partner Reed Smith LLP brostolsky@reedsmith.com Nancy E.

More information

Executive Policy, EP HIPAA. Page 1 of 25

Executive Policy, EP HIPAA. Page 1 of 25 Executive Policy, EP 2.217 HIPAA Page 1 of 25 Executive Policy Chapter 2, Administration Executive Policy EP 2.217, HIPAA Policy Effective Date: June 2017 Prior Dates Amended: None Responsible Office:

More information

Interpreters Associates Inc. Division of Intérpretes Brasil

Interpreters Associates Inc. Division of Intérpretes Brasil Interpreters Associates Inc. Division of Intérpretes Brasil Adherence to HIPAA Agreement Exhibit B INDEPENDENT CONTRACTOR PRIVACY AND SECURITY PROTECTIONS RECITALS The purpose of this Agreement is to enable

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS This HIPAA Business Associate Agreement ( BAA ) is entered into on this day of, 20 ( Effective Date ), by and between Allscripts

More information

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES Effective: November 8, 2012 Terms used, but not otherwise defined, in this Policy and Procedure have

More information

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 Update 2-17-2016 CROOK COUNTY RECORD OF CHANGES 2 TABLE OF CONTENTS Introduction HIPAA

More information

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013! Coping with, and Taking Advantage of, HIPAA s New Rules!!! Deven McGraw Director, Health Privacy Project April 19, 2013! Status of Federal Privacy Regulations! Omnibus Rule (Data Breach, Enforcement, HITECH,

More information

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform Preparing for a HIPAA Audit & Hot Topics in Health Care Reform 2013 San Francisco Mid-Sized Retirement & Healthcare Plan Management Conference March 17-20, 2013 Elizabeth Loh, Esq. Copyright Trucker Huss,

More information

The HIPAA/HITECH Final Rule: Time to Get More Serious About Compliance. Patricia A. Markus, Esq.

The HIPAA/HITECH Final Rule: Time to Get More Serious About Compliance. Patricia A. Markus, Esq. The HIPAA/HITECH Final Rule: Time to Get More Serious About Compliance I. INTRODUCTION Patricia A. Markus, Esq. AHLA Hospitals and Health Systems Law Institute February 13, 2013 On January 17, 2013, the

More information

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim) Group Insurance Regulations Administrative Supplement No. 19 April 2003 University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim) The University

More information

SATINSKY CONSULTING, LLC FINAL OMNIBUS HIPAA PRIVACY AND SECURITY RULE

SATINSKY CONSULTING, LLC FINAL OMNIBUS HIPAA PRIVACY AND SECURITY RULE SATINSKY CONSULTING, LLC FINAL OMNIBUS HIPAA PRIVACY AND SECURITY RULE This newsletter summarizes the highlights of the Final Omnibus HIPAA Privacy and Security Rule announced by the Department of Health

More information

Containing the Outbreak: HIPAA Implications of a Data Breach. Jason S. Rimes. Orlando, Florida

Containing the Outbreak: HIPAA Implications of a Data Breach. Jason S. Rimes. Orlando, Florida Containing the Outbreak: HIPAA Implications of a Data Breach Orlando, Florida www.lowndes-law.com Jason S. Rimes 2013 Lowndes, Drosdick, Doster, Kantor & Reed, P.A. All Rights Reserved Protected Health

More information

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD HIPAA Redux 2013 Presented by: Kim Cavitt, AuD Moderated by: Carolyn Smaka, Au.D., Editor-in-Chief, AudiologyOnline Expert e-seminar TECHNICAL SUPPORT Need technical support during event? Please contact

More information

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Training Module provided as a component of the Stericycle HIPAA Compliance Program Goals for Training Understand how Texas

More information

BUSINESS POLICY AND PROCEDURE MANUAL

BUSINESS POLICY AND PROCEDURE MANUAL 06/10 1 of 1 01-13 GENERAL STATEMENT OF HIPAA Compliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA regulates health care providers (Covered Entities) that electronically maintain

More information

HIPAA: Impact on Corporate Compliance

HIPAA: Impact on Corporate Compliance HIPAA: Impact on Corporate Compliance AAPC HEALTHCON April 2014 Stacy Harper, JD, MHSA, CPC Disclaimer The information provided is for educational purposes only and is not intended to be considered legal

More information

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by HIPAA Omnibus Rule Critical Changes for Providers Presented by Susan A. Miller, JD Hosted by agenda What the Omnibus Rule includes + Effective and Compliance Dates Security Breach Notification Enforcement

More information