Management Alert Final HIPAA Regulations Issued

Similar documents
Compliance Steps for the Final HIPAA Rule

AFTER THE OMNIBUS RULE

CLIENT UPDATE. HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

Compliance Steps for the Final HIPAA Rule

The wait is over HHS releases final omnibus HIPAA privacy and security regulations

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

Highlights of the Omnibus HIPAA/HITECH Final Rule

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

HIPAA OMNIBUS FINAL RULE

Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

Changes to HIPAA Under the Omnibus Final Rule

Long-Awaited HITECH Final Rule: Addressing the Impact on Operations of Covered Entities and Business Associates

HIPAA Omnibus Final Rule Has Important Changes for Business Associates and Covered Entities

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

OMNIBUS RULE ARRIVES

ARRA s Amendments to HIPAA Privacy & Security Rules

HEALTH LAW ALERT January 21, 2013

To: Our Clients and Friends January 25, 2013

Getting a Grip on HIPAA

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule

HIPAA Compliance. PART I: HHS Final Omnibus HIPAA Rules

BREACH NOTIFICATION POLICY

HHS, Office for Civil Rights. IAPP October 11, 2012

GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

Interim Date: July 21, 2015 Revised: July 1, 2015

Omnibus HIPAA Rule: Impact on Covered Entities

New HIPAA-HITECH Proposed Regulations Issued

Preparing to Comply With the HITECH Final Rule Tuesday, March 19, 2013

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

Business Associate Agreement

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

HIPAA Omnibus Final Rule and Research

HIPAA Compliance Under the Magnifying Glass

ACC Compliance and Ethics Committee Presentation February 19, 2013

HIPAA Privacy Overview

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

MEMORANDUM. Kirk J. Nahra, or

Changes to HIPAA Privacy and Security Rules

FACT Business Associate Agreement

SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE

PATTERSON MEDICAL SUPPLY, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT WITH CUSTOMERS

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners

HIPAA: Impact on Corporate Compliance

The American Recovery Reinvestment Act. and Health Care Reform Puzzle

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

H E A L T H C A R E L A W U P D A T E

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

Containing the Outbreak: HIPAA Implications of a Data Breach. Jason S. Rimes. Orlando, Florida

ALERT. November 20, 2009

Interpreters Associates Inc. Division of Intérpretes Brasil

SATINSKY CONSULTING, LLC FINAL OMNIBUS HIPAA PRIVACY AND SECURITY RULE

Determining Whether You Are a Business Associate

Health Law Diagnosis

HIPAA. What s New & What Do I Have To Do? Presented by Leslie Canham, CDA, RDA, CSP (Certified Speaking Professional)

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT BUSINESS ASSOCIATE TERMS AND CONDITIONS

HIPAA & The Medical Practice

Business Associate Agreement Health Insurance Portability and Accountability Act (HIPAA)

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off

GUIDE TO PATIENT PRIVACY AND SECURITY RULES

NPRM: Modifications to the HIPAA Privacy, Security, and Enforcement Rules under HITECH

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

BUSINESS ASSOCIATE AGREEMENT

Nancy Davis, Ministry Health Care Peg Schmidt, Aurora Health Care Teresa Smithrud, Mercy Health System

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information

HIPAA BUSINESS ASSOCIATE AGREEMENT

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

New HIPAA Rules and Implications for the Industry January 29, 2013

O n Jan. 25, the Office for Civil Rights (OCR) of the. Privacy and Security Law Report

HIPAA Breach Notification Case Studies on What to Do and When to Report

"HIPAA RULES AND COMPLIANCE"

HIPAA Omnibus Rule Compliance

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013

The HIPAA Omnibus Rule

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS

AROC 2015 HIPAA PRIVACY AND SECURITY RULES

ARTICLE 1. Terms { ;1}

Fifth National HIPAA Summit West

Central Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4

HIPAA Basic Training for Health & Welfare Plan Administrators

BUSINESS ASSOCIATE AGREEMENT

Welcome to today s Webinar

Business Associate Agreement

HIPAA Privacy Compliance Checklist

UNITED WORKERS HEALTH FUND 50 CHARLES LINDBERGH BLVD. SUITE 207 UNIONDALE, NY 11553

Colorado Medical Society. June 3, Presented by David A. Ginsberg President, PrivaPlan Associates, Inc.

Transcription:

Management Alert Final HIPAA Regulations Issued After much anticipation, the Department of Health and Human Services (HHS) has issued its omnibus set of final regulations modifying and clarifying the privacy, security and enforcement provisions under the Health Information Portability and Accountability Act (HIPAA). Although the final regulations will require group health plans to make some changes to remain in compliance with HIPAA, many of the changes may not come as a surprise because they were previously announced in proposed regulations or interim final regulations (IFRs). [Click here to view prior alerts explaining this guidance.] This alert focuses on changes to previous guidance. Important Dates Compliance Date. Group health plans and business associates must comply with the final regulations by September 23, 2013. Transition Period for Agreements in Place as of January 25, 2013. Covered entities and business associates with HIPAA compliant business associate agreements (BAAs) in place as of January 25, 2013 (that are not renewed or modified between March 26, 2013 and September 23, 2013) will be deemed to comply with the new regulations for up to 12 months. The deemed compliance period ends the earlier of September 22, 2014, or the date the BAA is renewed or modified on or after September 23, 2013. In addition, covered entities with data use agreements in place with recipients of limited data sets may continue to operate under existing agreements until the earlier of September 22, 2014, or the date the agreement is renewed or modified on or after September 23, 2013. I. Rules for Business Associates Before the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the HIPAA privacy, security and enforcement rules did not apply directly to business associates, although many business associates had contractual obligations under a business associate agreement (BAA). HITECH provided that business associates were separately and directly liable for violations of the security rules for electronic PHI and for uses and disclosures of protected health information (PHI) that do not comply with the BAA or the HIPAA privacy rules. Proposed regulations suggested expanding the definition of business associate and modified the privacy, security and enforcement rules to apply to business associates. The final rule substantially conforms to the proposed rules. Accordingly, the definition of business associate has been expanded to include: (i) health information organizations, e-prescribing gateways or other persons that provide data transmission services routinely for PHI; (ii) a person that offers personal health records on behalf of a covered entity; and (iii) a subcontractor that creates, receives, maintains or transmits PHI on behalf of the business associate. These business associates will need to implement policies and procedures to comply with the security rules. Business Associates will have direct liability for: 1. Violations of the security rules. 2. Uses and disclosures of PHI that are not in accord with its BAA or the privacy rules. 3. Failing to disclose PHI to HHS when required. 4. Failing to disclose PHI as necessary to comply with an individual s request for an electronic copy. 5. Failing to make reasonable efforts to limit PHI to the minimum necessary. 6. Failing to enter into a BAA with subcontractors. January 31, 2013

Under the final regulations, BAAs will be required to provide that the business associate will: Comply with the security rules with respect to electronic PHI; Ensure that any subcontractors agree to comply with the same restrictions and conditions that apply to the business associate; Report security incidents and breaches of unsecured PHI to the covered entity; and To the extent the business associate will carry out a covered entity s obligations under the privacy rule, comply with the requirements of the privacy rule that apply to the covered entity. In addition, the final regulations recognize that a data use agreement may qualify as a business associate s satisfactory assurance that it will appropriately safeguard the covered entity s PHI when the PHI disclosed for a health care operations (HCO) purpose is a limited data set. Covered entities will not need to enter into BAAs with the business associate s subcontractors. The business associates, however, will need to have BAAs with their subcontractors. On January 25, 2013, HHS published sample business associate agreement provisions to help covered entities and business associates more easily comply with the business associate contract requirements. While the sample provisions are written for the purposes of the contract between a covered entity and its business associate, the language may be adapted for purposes of the contract between a business associate and subcontractor. II. Breach Notification Rules HITECH required covered entities to provide notification to affected individuals, to the Secretary of HHS, and in some cases, to the media following the discovery of a breach of unsecured PHI. The IFRs issued in 2009 defined a breach to mean the acquisition, access, use, or disclosure of PHI in a manner not permitted [by the privacy rule] which compromises the security or privacy of the protected health information. The IFRs provided that whether an event compromises the security or privacy of the protected health information meant that it poses a significant risk of financial, reputation or other harm to the individual. In order to determine whether there was a significant harm to the individual, covered entities and business associates were required to perform a risk assessment considering a number of factors set forth in the rules. The IFRs contained three exceptions which had also been enumerated in HITECH. Risk Assessment Factors: 1. What PHI was disclosed? 2. Who used or received the PHI? 3. Was the PHI actually viewed? 4. Did the covered entity or business associate take steps to mitigate the consequences of the use or disclosure? 1. Definition of Breach. The final regulations provide that an impermissible use or disclosure of PHI is presumed to be a breach unless the covered entity or business associate demonstrates that there is a low probability that the PHI has been compromised (or one of the exceptions to the definition of breach applies 1 ). 2. Risk Assessment. Instead of assessing the risk of harm to the individual, covered entities and business associates must now assess the probability that the PHI has been compromised. The final regulations identify specific factors to consider, including: 1 Both the IFRs and the final regulations include three exceptions which encompass situations which do not constitute breaches: (i) an unintentional acquisition, access or use of PHI by a workforce member or person acting under the authority of a covered entity or BA, if such acquisition, access, or use was made in good faith and within the scope of authority and does not result in further impermissible uses or disclosures; (ii) an inadvertent disclosure by a person who is authorized to access PHI at a covered entity or BA to another authorized person; or (iii) a disclosure of PHI where a covered entity or BA has a good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information.

The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification (e.g., a list of diagnoses only vs. a list containing names or ID numbers as well); The unauthorized person who used the PHI or to whom the disclosure was made (e.g., disclosure within the covered entity or to another covered entity vs. to a non-covered entity); Whether the PHI was actually acquired or viewed; and The extent to which the risk to the PHI has been mitigated (e.g., assurances such as through a confidentiality agreement were obtained that the recipient will not further use or disclose PHI). If after evaluating all of the factors, a covered entity or business associate determines that there is a low probability that the PHI was compromised, breach notification is not required. The final rules do not exempt disclosures between covered entities, or disclosures between a covered entity and a business associate. Each impermissible disclosure must be evaluated as to the probability that the PHI has been compromised based on the risk assessment using the listed factors. The fact that the recipient of a disclosure is a covered entity or business associate is one consideration with respect to assessing the risk. In addition, the exception for a limited data set has been removed and a risk assessment must be performed even if the impermissible use or disclosure involved only a limited data set. 3. Safe Harbor Remains Unchanged. As mentioned above, notice must be provided where there is a breach of unsecured PHI. If PHI is secured, notification is not required in the event of a breach of such information. In order to secure PHI, the information must be rendered unusable, unreadable or indecipherable to unauthorized individuals. Guidance issued by the Secretary of HHS lists encryption and destruction as the two technologies and methodologies for securing PHI. 4. Notice to HHS. The final regulations make it clear that for breaches of unsecured PHI involving less than 500 individuals, notice must be given to HHS within 60 days after the end of each calendar year for breaches discovered (not that occurred) during the preceding calendar year. This correction will be helpful where breaches occur during a calendar year but are not discovered until after the reporting deadline. III. Marketing The HIPAA privacy rules require covered entities to obtain a valid authorization for any use or disclosure of PHI for marketing purposes. Marketing was defined as making a communication about a product or service that encourages recipients of the communication to purchase or use the product or service. The following communications, however, were permitted to be made without an authorization: Group health plan communications related to its covered health-related products or services; Communications made for treatment of an individual; or Communications for case management or care coordination for an individual, or to direct or recommend alternative treatments, therapies, health care providers, or settings of care to that individual. HITECH provided that marketing communications are impermissible if the covered entity receives payment in exchange for making the communication. The proposed regulations revised the definition of marketing by excluding: (i) communications regarding prescription refills if remuneration was related to the cost of making the communication, (ii) communications to describe health related products or services under a plan, as long as no financial remuneration was received in exchange for making this communication, and (iii) written communications from a health care provider for treatment of an individual as long as certain notice and opt out conditions were satisfied if the provider received financial remuneration. Privacy Notices will have to: 1. Inform individuals that they will be notified in case of a breach of their unsecured PHI. 2. Explain that an authorization is required before any use or disclosure of psychotherapy notes; use or disclosure of PHI for marketing purposes where a third party receives compensation; and/ or sale of PHI. 3. If a health plan will use or disclose PHI for underwriting purposes, include a statement that genetic information will not be used for such purposes. 4. If a health plan will use or disclose PHI for fundraising, include a statement that an individual may opt out of receiving related communications. 5. Contain a statement that the plan must agree to restrictions on disclosures of PHI relating to an item or service for which the individual paid for in full out of pocket.

The final regulations require authorizations for all treatment and HCO communications where the covered entity receives financial remuneration from a third party whose product or service is being marketed. According to the final regulations, marketing does not include: Prescription refill reminders, provided that the covered entity s financial remuneration is reasonably related to the covered entity s cost of making the communication; Except where the covered entity receives financial remuneration, communications made: g by a provider for the treatment of an individual; g by a plan to describe a health-related product or service under the plan, including communications about participating network providers, replacement of or enhancements to a health plan, and healthrelated products or services available only to a health plan enrollees that add value to but are not part of the benefit plan, or g by a provider or a plan for case management or care coordination, like treatment alternatives, to the extent the activities do not fall within the definition of treatment. IV. Genetic Information The Genetic Information Non-Discrimination Act of 2008 (GINA) prohibited discrimination based on an individual s genetic information in both health coverage and employment contexts. In addition, GINA contained privacy protections for genetic information and required the Secretary of HHS to revise the privacy rules to clarify that genetic information is health information and to prohibit group health plans and insurance issuers from using or disclosing genetic information for underwriting purposes. Proposed regulations issued in 2009 added various definitions to HIPAA and a prohibition on health plans using or disclosing PHI that is genetic information for underwriting purposes even if the individual signs an authorization. 1. Underwriting Purposes. HIPAA allows covered entities and business associates to use or disclose PHI for HCO. As defined, HCO includes underwriting activities, which means that PHI can typically be used for underwriting. The final regulations add a definition of underwriting purposes that provides a health plan may not use or disclose PHI that is genetic information for underwriting purposes. For these purposes, underwriting purposes means: Rules for determining eligibility or benefits under a plan (including changes in deductibles or other cost-sharing mechanisms in return for activities such as completing a health risk assessment (HRA) or participating in a wellness program); The computation of premium or contribution amounts under the plan (including discounts, rebates, or premium differential mechanisms in return for activities such as completing an HRA or participating in a wellness program); The application of any pre-existing condition exclusion under the plan; and Other activities related to the creation, renewal, or replacement of a contract of health insurance or health benefits. The final regulations allow health plans to continue to provide incentives for completing HRAs or for participating in wellness programs in manners that do not involve the disclosure of genetic information. For example, information about an individual s use of tobacco, alcohol and drug use is not genetic information and thus, may be used by health plans for underwriting purposes. Further, the DOL has issued guidance which makes clear that plans may continue to collect family health history through the use of HRAs that are not tied to any reward.

2. Long-Term Care Plans. Although the nondiscrimination provisions of GINA do not apply to excepted benefits, the final regulations apply the prohibition on using and disclosing PHI that is genetic information for underwriting to all health plans that are subject to the privacy rules, except long-term care policies. Notably, although long-term care plans are not subject to the underwriting prohibitions, they are bound by the other privacy rules and must protect genetic information from improper uses and disclosures. To-Do List 1. By the compliance date, covered entities should update their privacy policies and procedures to reflect the new regulations, including GINA s prohibition on using genetic information for underwriting purposes, the new definition of marketing, when an authorization is required, the new definition of breach of unsecured PHI and the new risk assessment procedures. 2. Within a reasonable period of time after the compliance date, covered entities should retrain their workforce members on the updated policies and procedures. Although business associates are only required by law to train their workforce on the security rules, they are contractually obligated to comply with the HIPAA privacy rules and, as a practical matter, should also train their workforce on the privacy rules. 3. By the compliance date, covered entities should revise their privacy notices as indicated above. Revised notices must be posted on a health plan s website by the effective date of the revisions and provided to covered individuals in the next annual mailing. If a plan does not maintain a website, revised notices must be provided (or information as to how to obtain a revised notice) to covered individuals within 60 days of the revision. 4. Covered entities should identify their business associates and make sure BAAs are in place. For those business associates who do not have agreements, covered entities will need to enter into new BAAs containing the new provisions by September 23, 2013. For those BAAs currently in effect, update the existing BAAs for changes prompted by these final rules by the end of the transition period. 5. Business associates should identify their subcontractors and enter into BAAs with them. 6. Covered entities and business associates who have unsecured PHI should consider taking advantage of the safe harbor to secure as much PHI as posible, thus potentially avoiding the breach notification requirements. 7. By the compliance date, covered entities and business associates should implement new risk assessment procedures, and ensure that all assessments are properly documented. By: Joy Sellstrom and Nicole Bogard Joy Sellstrom is senior counsel Nicole Bogard is a partner in Seyfarth s Employee Benefits & Executive Compensation practice group. If you would like further information, please contact your Seyfarth attorney, Joy Sellstrom at jsellstrom@seyfarth.com or Nicole Bogard at nbogard@seyfarth.com. www.seyfarth.com Attorney Advertising. This Management Alert is a periodical publication of Seyfarth Shaw LLP and should not be construed as legal advice or a legal opinion on any specific facts or circumstances. The contents are intended for general information purposes only, and you are urged to consult a lawyer concerning your own situation and any specific legal questions you may have. Any tax information or written tax advice contained herein (including any attachments) is not intended to be and cannot be used by any taxpayer for the purpose of avoiding tax penalties that may be imposed on the taxpayer. (The foregoing legend has been affixed pursuant to U.S. Treasury Regulations governing tax practice.) 2013 Seyfarth Shaw LLP. All rights reserved. Breadth. Depth. Results.