Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Similar documents
UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION

~Cityof. ~~Corpu~ ~.--=.;: ChnstI City Policies HR29.0 NO.

HILLSBOROUGH COUNTY HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) PROCEDURES

EVMS Medical Group A. RESEARCH USE AND OR DISCLOSURE WITHOUT AUTHORIZATION:

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1

UBMD Policy for HIPAA Compliant Subject Recruitment

COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY

COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD POLICY ON THE PRIVACY RULE AND THE USE OF HEALTH INFORMATION IN RESEARCH

University of Mississippi Medical Center Data Use Agreement Protected Health Information

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA Compliance Guide

Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research. Department: Research

7 ATLzr UNIVERSITY OF CALIFORNIA. January 30, 2014

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

Project Number Application D-2 Page 1 of 8

Effective Date: 4/3/17

Effective Date: 08/2013

HIPAA The Health Insurance Portability and Accountability Act of 1996

ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance

HIPAA Privacy & Security Plan October 2016

Human Research Protection Program (HRPP) HIPAA and Research at Brown

UCLA Health System Data Use Agreement

March 1. HIPAA Privacy Policy

Limited Data Set Data Use Agreement For Research

University of Wisconsin Milwaukee

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES

HIPAA COMPLIANCE. for Small & Mid-Size Practices

104 Delaware Health Care Claims Database Data Access Regulation

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HARVARD CATALYST DATA USE AGREEMENT FOR LIMITED DATA SETS

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

Application for Approval of Projects Which Use Human Subjects

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

AGREEMENT PURSUANT TO THE TERMS OF HIPAA ; HITECH ; and FIPA (Business Associate Agreement) (Revised August 2015)

SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE

COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA

City and County of San Francisco Department of Public Health DPH Health Information Data Use Agreement

USD #262 VALLEY CENTER HIPAA MEDICAL PRIVACY POLICIES AND PROCEDURES. HIPAA Privacy Policies and Procedures -1-

HIPAA. Privacy Compliance Manual

ARE YOU HIP WITH HIPAA?

1. Does the plan exist for purposes of providing or paying for the cost of medical care?

2016 Business Associate Workforce Member HIPAA Training Handbook

HIPAA and Research at UB

Locus Health Privacy Policies and Procedures Rev

Health Insurance Portability and Accountability Act Category: Administration 04/30/2015 Vice President for Legal Prior Effective Date:

(a) Is created by or received from a health care provider, health plan, employer, or health care clearinghouse; and

Executive Policy, EP HIPAA. Page 1 of 25

Interim Date: July 21, 2015 Revised: July 1, 2015

H E A L T H C A R E L A W U P D A T E

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD

RELEASE OF PROTECTED HEALTH INFORMATION ( PHI ) FOR RESEARCH PURPOSES

COLUMBIA UNIVERSITY MEDICAL CENTER INSTITUTIONAL REVIEW BOARD (IRB)

"HIPAA RULES AND COMPLIANCE"

EXCERPT. Do the Right Thing R1112 P1112

UPMC POLICY AND PROCEDURE MANUAL

HIPAA Privacy & Security. Transportation Providers 2017

Georgia Health Information Network, Inc. Georgia ConnectedCare Policies

Palliative Care Quality Network Membership Agreement

AFTER THE OMNIBUS RULE

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

HIPAA Privacy & Security Considerations Student Orientation

Credit Card Handling Security Standards

Data and Specimen Repositories

NMH HIPAA Privacy Training Version

HIPAA Privacy Overview

MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY. Approved by the Montclair State University Board of Trustees on April 3, 2014

JOTFORM HIPAA BUSINESS ASSOCIATE AGREEMENT

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

HIPAA Insurance Portability Act HIPAA. HIPAA Privacy Rule - Education Module for Institutional Review Boards

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry

HIPAA Privacy Rule Policies and Procedures

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

Secondary Use of Data and Specimens

HIPAA Security How secure and compliant are you from this 5 letter word?

HIPAA Policy 5032 Statement of Policy on Use and Disclosure of Protected Health Information for Research Purposes

Compliance Steps for the Final HIPAA Rule

HIPAA: Impact on Corporate Compliance

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

HIPAA PRIVACY AND SECURITY AWARENESS

BUSINESS POLICY. TO: All Members of the University Community 2016:07. Credit Card Processing and Security Policy (Supersedes Policy 2009:05 & 2012:12)

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

HIPAA: What Researchers Need to Know

HIPAA. What s New & What Do I Have To Do? Presented by Leslie Canham, CDA, RDA, CSP (Certified Speaking Professional)

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

HIPAA Privacy, Breach, & Security Rules

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

March 1. HIPAA Privacy Policy. This document includes: HIPAA Privacy Policy Statement, HIPAA Manual and HIPAA Forms

Cover option 2. The Interplay of HIPAA, Privacy and Data Security Principles, and Health Information Interoperability. Subtitle or Company Name

HIPAA & The Medical Practice

Transcription:

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017

Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected by Policy 3 Who Should Know Policy 4 Exclusions 4 Website Address for Policy 4 Definitions 4 Responsibilities 6 Documentation 6 Training 6 IT Administration 6 IT Administrative Functions 7 Data Access 8 Data Handling 8 Data Transmission 9 Communications 9 Security 9 Retention 10 Disposal 10 Breach 10 Termination 11 Reviews 11 Disaster Recovery 12 2

Statement of Policy Purdue s Regenstrief Center for Healthcare Engineering (RCHE), a HIPAA-designated Purdue Covered Component as of August 1, 2010, is responsible for maintaining the confidentiality and security of project-specific provider and patient health information. The center conducts applied research to determine how to practically and effectively improve healthcare delivery and to develop areas of knowledge for future healthcare engineering advancements. The projects seek to be multi-disciplinary in nature and can span a number of collaborating organizations, both on and off campus. It is the policy of RCHE that all employees who have been designated as covered by HIPAA are responsible for maintaining the confidentiality and security of patient health information. Special protections exist for Protected Health Information (PHI), and this policy specifies appropriate procedures and security to be used by RCHE staff to safeguard this information. This policy applies to the individually identifiable health records that are accessed or maintained by RCHE and protected by HIPAA. The policy is consistent with existing University handling requirements and HIPAA compliance policies. If any differences do arise, the University and HIPAA compliance policies supersede this policy. Reason for Policy RCHE has established this compliance policy to ensure that all staff, faculty and researchers involved with identifiable health records are properly informed. This policy shall serve as a guideline for the handling of data, security and the appointment of those to administer HIPAA related documentation. HIPAA Liaison The HIPAA Liaison is responsible for the implementation and maintenance of HIPAA resources and compliance. The role of the liaison is of utmost importance in ensuring that the HIPAA regulations are followed in each of the covered entities at Purdue. Good communication and coordination with Purdue s HIPAA Privacy Officer and IT Security Risk Analyst are necessary to ensure that procedures are up-to-date with changes and regulations and that issues and questions are resolved expeditiously. The liaison is to act as the primary point of contact for questions, audits, training and communication. The liaison is also responsible for identifying others to administer duties as required. RCHE s HIPAA Liaison is Rich Zink, zinkr@purdue.edu. A detailed description and list of responsibilities can be found at: http://www.purdue.edu/push/hipaa/liaisons/files/liaisonexpectations.pdf. Individuals and Entities Affected by Policy RCHE workforce members who are designated as covered by HIPAA and assigned a center project are affected by this policy. All staff are required to know this policy and abide by the confidentiality described. Inappropriate use or disclosure of individually identifiable health information shall be reported to the RCHE HIPAA Liaison or Purdue s Privacy Officer. The University may apply sanctions to employees who violate HIPAA policies and procedures. 3

Who Should Know Policy RCHE staff and researchers may encounter health information protected by HIPAA through various sources including but not limited to interoffice communications, data, electronic media, verbal interactions, etc. All RCHE staff and researchers who have access to PHI or the center s information storage areas or have involvement with projects that make use of PHI shall know RCHE s HIPAA policy and shall sign a confidentiality agreement. Exclusions RCHE workforce members whose space is within RCHE but do not have either direct or indirect access to PHI or any involvement with a RCHE project that makes use of PHI may be excluded from signing the confidentiality agreement. Website Address for Policy RCHE s HIPAA Compliance Policy is located on the RCHE website at www.purdue.edu/rche. University HIPAA related information and forms can be found at www.purdue.edu/hipaa. Definitions HIPAA = Health Insurance Portability Accountability Act of 1996 Individually Identified Health Information = Information that is a subset of health information, including demographic information collected from an individual. This information is created or received by a healthcare provider, health plan or employer and relates to past, present or future condition of an individual. Protected Health Information (PHI) = all individually identifiable health information that is a subset of health information, including: demographic information collected from an individual is created or received by a covered health care provider, health plan, employer or health care clearinghouse; and relates to the past, present or future physical or mental health or condition of an individual the provision of health care to an individual the past, present or future payment for the provision of health care to an individual that identifies the individual or where there is a reasonable basis to believe the information can be used to identify the individual Designated Record Set = data which contains individually identifiable data, in any medium, accessed or maintained for RCHE. The content may be in multiple locations and media, including paper and electronic form. Limited Data Set = PHI that excludes the following identifiers of the individual, individual s relatives, employers or household members of the individual: 4

Names Postal address information (other than town or city, state, and ZIP code) Telephone numbers Fax numbers Electronic mail addresses Social security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web Universal Resource Locators (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images De-identified Data Set = PHI that excludes the following identifiers of the individual, individual s relatives, employers or household members of the individual: Names All geographic subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code if, according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older Telephone numbers Fax numbers Electronic mail addresses Social security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web Universal Resource Locators (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images Any other unique identifying number, characteristic or code 5

Responsibilities All RCHE employees who have been designated as covered by HIPAA are responsible for maintaining the confidentiality and security of PHI. This applies to PHI that are accessed or maintained by RCHE and are protected by HIPAA and is consistent with university handling requirements. All RCHE staff are responsible for the security of this information. The HIPAA Liaison shall be responsible for determining that the appropriate workforce members have access to the necessary PHI and that the required security processes are in place. The liaison shall also be responsible for implementing procedures to terminate access to HIPAA protected information and the storage of this information. Documentation RCHE is required to implement policies and procedures with respect to PHI that are designed to comply with the standards, implementation specifications or other requirements of HIPAA. These policies and procedures take into account the size and the type of activities that relate to PHI undertaken by RCHE to ensure such compliance. All HIPAA-related documentation shall adhere to the following standards, at a minimum: 1. Policies and procedures shall be maintained in written or electronic form. 2. All communications shall be in written or electronic form. 3. If an action, activity or designation is required to be documented, a written or electronic copy shall be maintained. All RCHE PHI shall be listed in the RCHE Designated Record Set. Training RCHE shall be responsible to ensure that its staff and affiliated researchers are trained annually regarding the HIPAA regulations, privacy policies, and security procedures. Training shall include but not be limited to: HIPAA training on-line or with a HIPAA training officer (certificate of completion required) CITI, if research involves human subjects (test scores and verification required) HIPAA Compliance Policy Confidentiality Agreement (must be signed) Follow-up to ensure compliance with this training shall be done annually. All certifications and paperwork shall be maintained by the RCHE HIPAA Liaison or assigned designee. IT Administration PHI acquired in support of center projects is made available to researchers in accordance with this policy, Purdue s Internal Review Board (IRB), and HIPAA. 6

The servers housing PHI are managed and maintained by Information Technology at Purdue (ITaP) on Purdue s HIPAA-aligned servers. These databases are made available to researchers and staff through user-registered, password-protected accounts or on-line hub applications, such as CatalyzeCare.org, that support the project team s specific collaboration, analysis and development needs. IT Administrative Functions Project PI Shall be HIPAA certified. Shall maintain a current list of project researchers who have access to the project data. Shall notify the Data Manager of the researchers who shall have access to the above data. Shall audit researchers use of the data throughout the project to ensure minimum necessary access and proper compliance with RCHE s HIPAA policies. Shall track project progress to ensure no access to the data is allowed past project completion. Shall notify the Data Manager of project completion and request termination of all access to the project data and removal of all project data from the system. Data Manager Shall be HIPAA certified. Shall make requests to the Server Manager to establish appropriate directories on the HIPAA-aligned server for the project- specific PHI. Shall make requests to the Server Manager to establish and manage access to the project data per the direction of the Project PI. Shall import, add, delete, change, update, export, desensitize, store and document the project-specific PHI per the direction of the Project PI. Shall act as a RCHE Liaison to the Server Manager regarding issues related to RCHE s HIPAAaligned servers. Upon direction from the Project PI, shall erase or destroy all project-related data and accounts on RCHE s HIPAA-aligned servers according to RCHE s PHI data handling and disposal policies. Shall notify the Server Manager of project completion and request termination of all access to the project data and removal of all project data from the system. Semi-annually, review user accounts to ensure staff and researchers have appropriate access to data Server Manager Shall be HIPAA certified. Shall establish appropriate directories on the HIPAA-aligned server for the project-specific PHI. Shall establish and manage access to the project data per the direction of the Data Manager. Shall support RCHE s HIPAA-aligned infrastructure, including server maintenance and storage of project-specific PHI. Shall create, maintain, and enforce separate HIPAA policies for ITaP Shall administer the environment, including the updating and configuring of server operating systems, utilities and firewalls to ensure appropriate data protection. 7

Data Access Shall log server access by users and maintain these records for six years. Shall make the logs available when necessary for incident investigation. Shall conduct regular backups. Shall maintain the ability to recover the data. Shall adhere to a policy of minimum necessary access as directed by the Project PI. Only required data shall be accessed by the covered workforce who are participating in a particular project and are authorized to access the data. The data shall be accessed for legitimate business purposes and during the time the project is active. In accessing PHI, only unique user identifications (i.e., Purdue Career Account ID) shall be used. There shall be no sharing of one s user identification. The process to gain access to data is to complete the RCHE Account Request form. Upon approval by the HIPAA Liaison, the Data Manager will request the Server Manager to provide the requested access. Access to data will be reviewed semi-annually to ensure that access is still required. Data Handling Researchers interested in using project-specific PHI must be recognized members of an RCHE project. The project PI shall maintain the current list of recognized members. Interested researchers shall contact the Project PI for access to the project data. Only data specific to that project shall be provided to the project researchers. Upon approval, the project PI shall submit the researcher s name to the Data Manager to allow the researcher access to the appropriate data set. Throughout the project, researchers shall have access to the project data at the sole discretion of the Project PI and must consider all project information, even though possibly de-identified, as confidential. Only those researchers with the need to know to properly perform the project shall have access to this information. A workforce member with a need to know is defined as someone who requires information because the information is directly related to the duties and activities the person is required to perform as described in their job description. Researcher access to data will be granted at the lowest level needed for the project, meaning access to de-identified data is preferred to limited datasets which is preferred to full PHI data. RCHE employees who are patients of the providers offices or hospitals that are subject of a particular study or who have dependents, family members, co-workers or friends who are patients of the providers offices or hospitals must follow standard procedures, applicable to all patients, for accessing their own patient information or the information of others. Inappropriate use or disclosure of the data shall be reported to the RCHE HIPAA Liaison. Research documentation shall be maintained by the Project PI, and the date of research completion shall be tracked. The project completion date shall be periodically reviewed by the Project PI to ensure that access to the data is not provided past the project end date without prior IRB approval. All abstracts, presentations and manuscripts shall be submitted to the Project PI for approval prior to 8

submission for publication. The Project PI may request a recommendation from other key project personnel prior to issuing a decision. Publication approval from the Project PI shall be provided to the researcher within two weeks of submission. Upon completion of the project, the Project PI shall request from the Data Manager that all system access be terminated and that all project data be appropriately erased or destroyed beyond the ability to recover. Data Transmission A secure file and data transmission method is required for transmitting PHI. Transfer of PHI using electronic mail is not allowed. RCHE researchers shall use Filelocker to transmit PHI securely. Filelocker is an open source program that has been adopted by Purdue for use by faculty and staff to securely share data with others, both inside and outside Purdue. It is a temporary and secure storage system for this purpose. Access to and additional information on the use of Filelocker is available at https://filelocker.purdue.edu (a Purdue career account and password are necessary for access). A provider s secure file and data transmission method and/or tool may be used in lieu of Filelocker. Communications When using or requesting PHI, RCHE shall make reasonable efforts to limit the use or disclosure of PHI to the minimum necessary to accomplish the intended purpose. Appropriate security measures for the form of communication being used shall be applied, for example: Be aware of who is around and could be listening. Speak only to intended receiver. Use fax cover sheet with confidentiality on it. Remain at the copier while information is being copied and take all papers when you leave. Only use Purdue s Filelocker when sending PHI and other sensitive information electronically. Do not mark mailed documents (campus mail or external carrier) indicating its contents. Seal envelope in such a way that tampering would be noticed upon receipt. RCHE workforce members shall not discuss patient information with their friends, family members, spouses, religious leaders, or any other individuals unless allowable by HIPAA. Inappropriate use or disclosure of individually identifiable health information shall be reported to the RCHE HIPAA Liaison or Purdue s HIPAA Privacy Officer. The University may apply sanctions to employees who violate HIPAA policies and procedures. Security RCHE shall support the efforts of Purdue to maintain computer and transmission security. This includes but is not limited to: Changing passwords every 3 months and not allowing others to use one s career account or password at any time Configuring all workstations with password-protected screensavers with no more than 15- minute timeouts Using recommended antivirus or other security software (software downloads are available at http://www.purdue.edu/securepurdue/download/) 9

Locking workstations when unattended Not transferring files containing PHI to a laptop or mobile device, especially flash or hard drives Not storing PHI on C: drive if network drive is available Encrypting all laptops and removable media, such as USB flash or hard drives Locking file cabinets where data is stored Keeping confidential information in one s workspace out of sight Requesting quarterly MVM scan of servers and networks Retention RCHE is required to maintain the required HIPAA documentation for six years from the date of creation or the date it was last in effect whichever is later. HIPAA retention requirements apply to specific documentation retained by Purdue s HIPAA Covered Components. The information to be retained includes, but is not limited to: Name of researcher Contact information for researcher Name of study Description and purpose of the study Type of PHI used Timeframe of disclosures Disposal RCHE employs the following disposal techniques approved by the Information Technology at Purdue (ITaP) security group and HIPAA: Documents maintained at RHCE that require disposal shall be shredded or placed in a locked confidential recycling container. Employees shall never copy files containing PHI to a laptop or mobile device (flash or hard drive) unless other means are unavailable. Prior approval from the RCHE HIPAA Liaison and Project PI must be obtained if this is necessary. PHI shall not be stored on A or C drives if a network drive is available. Data stored on CDs or other removable storage devices shall be erased or destroyed beyond the ability to recover. When an employee leaves his or her position in the center, their computer shall be reimaged by ITaP to remove all possibility of information recovery Breach A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of PHI such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. There are three exceptions to the definition of breach. The first exception applies to the unintentional acquisition, access, or use of PHI by a workforce member acting under the authority of a covered entity or business associate. The second exception applies to the inadvertent disclosure of PHI from a person authorized to access PHI at a covered entity or business associate to another person authorized to 10

access PHI at the covered entity or business associate. In both cases, the information cannot be further used or disclosed in a manner not permitted by the Privacy Rule. The final exception to breach applies if the covered entity or business associate has a good faith belief that the unauthorized individual, to whom the impermissible disclosure was made, would not have been able to retain the information by another means. When a breach occurs: Notice is to be made to the HIPAA Liaison of RCHE of an inadvertent disclosure. The Liaison shall notify Purdue s HIPAA Privacy Officer. ITaP s IT Networks and Security shall notify Purdue s HIPAA Privacy Officer should the breach include PHI. Business associates of the covered components are required within the Business Associate Agreement, to notify Purdue of any unauthorized use or disclosure by the business associate or its workforce, agents or subcontractors and the remedial action taken or proposed to be taken with respect to the use or disclosure. Notification of a potential breach needs to occur immediately upon discovery. The breach notification should include (as much as possible): Description of the event Description of types of unsecured PHI that were involved do not list actual data and avoid including sensitive information Any steps taken to prevent harm to others Any steps the covered entity is taking to investigate breach Contact procedures for individuals affected for notification Termination Upon termination of any RCHE staff or researcher, RCHE shall follow the guideline set forth in their exit checklist, which includes the return of all RCHE-owned computer equipment and the removal of this person s access to RCHE s HIPAA-aligned computer, the center, and Mann Hall. In addition, the person s computer shall be reimaged to be appropriately scrubbed of any data. Reviews RCHE shall annually review its HIPAA Compliance Policy to ensure it meets the regulations for PHI set forth by HIPAA and Purdue. Moreover, risk assessments to identify potential security risks and the vulnerability of any PHI shall be conducted annually and after any major change. These assessments shall include the review of the risk assessment reports of any covered entity that is responsible for storing and maintaining PHI for RCHE. 11

Semi-annually, user accounts shall be reviewed to ensure that terminated staff and researchers no longer have access to any RCHE computer accounts. Any such discrepancies shall be resolved immediately. On an annual basis, RCHE will request a statement from ITaP that they have their own HIPAA policies and are actively maintaining and updating them. Disaster Recovery RCHE researchers need data to complete their work. In the case of a disaster impacting RCHE researchers abilities to access and use HIPAA data, RCHE will request ITaP to implement their disaster recovery plan to recover the data and tools on RCHE s HIPAA-aligned servers. 12