x Major revision of existing policy Reaffirmation of existing policy

Similar documents
OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

BREACH NOTIFICATION POLICY

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

H E A L T H C A R E L A W U P D A T E

Interim Date: July 21, 2015 Revised: July 1, 2015

Changes to HIPAA Privacy and Security Rules

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA Breach Notice Rules New notice requirements for HIPAA covered entities when there is a breach of Protected Health Information (PHI)

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY. Approved by the Montclair State University Board of Trustees on April 3, 2014

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

AFTER THE OMNIBUS RULE

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

Patient Breach Letter Content Requirements

Interpreters Associates Inc. Division of Intérpretes Brasil

HIPAA Basic Training for Health & Welfare Plan Administrators

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

Business Associate Agreement

SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT

BUSINESS POLICY AND PROCEDURE MANUAL

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

Business Associate Agreement

ALERT. November 20, 2009

HIPAA Business Associate Agreement

Texas Tech University Health Sciences Center HIPAA Privacy Policies

HIPAA Privacy & Security Plan October 2016

Compliance Steps for the Final HIPAA Rule

Management Alert Final HIPAA Regulations Issued

HIPAA & The Medical Practice

GUIDE TO PATIENT PRIVACY AND SECURITY RULES

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Business Associate Agreement Health Insurance Portability and Accountability Act (HIPAA)

Central Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

NO , Chapter 7 TALLAHASSEE, January 6, 2014 HIPAA BREACH NOTIFICATION PROCEDURES

Fifth National HIPAA Summit West

HIPAA Compliance Under the Magnifying Glass

ARTICLE 1. Terms { ;1}

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA Breach Notification Case Studies on What to Do and When to Report

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

HIPAA BUSINESS ASSOCIATE AGREEMENT

OMNIBUS RULE ARRIVES

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

HIPAA BUSINESS ASSOCIATE AGREEMENT

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

Getting a Grip on HIPAA

To: Our Clients and Friends January 25, 2013

HIPAA: Impact on Corporate Compliance

Containing the Outbreak: HIPAA Implications of a Data Breach. Jason S. Rimes. Orlando, Florida

ARRA s Amendments to HIPAA Privacy & Security Rules

BUSINESS ASSOCIATE AGREEMENT W I T N E S S E T H:

RECITALS. In consideration of the mutual promises below and the exchange of information pursuant to this BAA, the Parties agree as follows:

HIPAA The Health Insurance Portability and Accountability Act of 1996

CLIENT UPDATE. HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

HIPAA Data Breach ITPC

An Overview of the Impact of the American Recovery and Reinvestment Act of 2009 on the HIPAA Medical Privacy and Security Rules

The HHS Breach Final Rule Is Out What s Next?

HIPAA Omnibus Final Rule Has Important Changes for Business Associates and Covered Entities

March 1. HIPAA Privacy Policy

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

Effective Date: 4/3/17

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

The American Recovery Reinvestment Act. and Health Care Reform Puzzle

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

Practical. PPACA, HIPAA and Federal Health Benefit Mandates:

Determining Whether You Are a Business Associate

HITECH Poses Important Challenges... Are You Compliant?

COMMONWEALTH OF PENNSYLVANIA BUSINESS ASSOCIATE ADDENDUM

BUSINESS ASSOCIATE AGREEMENT

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Highlights of the Omnibus HIPAA/HITECH Final Rule

NOTICE OF PRIVACY PRACTICES

Compliance Steps for the Final HIPAA Rule

HIPAA Privacy and Security Rules

Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance. Agenda. Health Data Exposure National Wellness Conference

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule

The Impact of the Stimulus Act on HIPAA Privacy and Security

HIPAA PRIVACY RULE POLICIES AND PROCEDURES

BUSINESS ASSOCIATE AGREEMENT (for use when there is no written agreement with the business associate)

JOTFORM HIPAA BUSINESS ASSOCIATE AGREEMENT

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Privacy Regulations HIPAA-Administrative Simplification Internal Assessment

BUSINESS ASSOCIATE AGREEMENT

Transcription:

Name of Policy: Reporting of Security Breach of Protected Health Information including Personal Health Information Policy Number: 3364-90-15 Approving Officer: Executive Vice President of Clinical Affairs THE UNIVERSITY OF TOLEDO Responsible Agent: Scope: VP Information Technology, Privacy and Security Officer, Legal Hybrid and Affiliated Covered Entity of University of Toledo Effective Date: 10/16/2017 Initial Effective Date: 11/15/2010 New policy proposal Minor/technical revision of existing policy x Major revision of existing policy Reaffirmation of existing policy --- --- --- (A) Policy Statement The hybrid and affiliated covered entity is committed to ensuring the privacy and security of protected health information (PHI) and are aware of the inherent vulnerabilities that exist in the maintenance of such information. The University of Toledo recognizes the need for safeguards to protect PHI and the imp01iance of notifying individuals when their unsecured PHI is subject to a breach. (B) Purpose of Policy The purpose of this policy is to outline the processes and procedures to: 1. Determine whether the security or privacy of PHI has been compromised 2. Ensure compliance with notification and reporting requirements A report of an unauthorized use, access, disclosure or acquisition of "unsecured" PHI which has occmted or which is reasonably believed to have occurred will be investigated, notifications provided and the incident(s) rep01ied in compliance with federal and state laws. Please refer to Policy# 3364-90-01, Release of Health Information, for guidance for permissible uses and disclosure of PHI or contact the Privacy Office. (C) Procedure 1. Initial Rep01i of Suspected Breach a. All unauthorized access/acquisition or impermissible use/disclosure, whether actual or suspected, must be reported to the Privacy Office or IT Security Office. Any access, acquisition, use or disclosure which violates the Health Insurance Portability and Accountability Act (HIP AA), privacy and/or security rules, may constitute a breach and must be investigated. The Privacy Office, with the assistance of IT security, Health Science Campus Security and other relevant departments, will conduct an initial investigation into the reported violation. Depending on the nature of the assessment, other employees of the University may be called upon to assist in the investigation. General

Policy #3364-90-15 Reporting of Security Breach of Protected Page 2 Counsel will perform a risk assessment based on information gathered from the investigation to determine the probability of compromise to PHI. 2. Breach and Risk Assessment a. Generally, all unauthorized acquisition/access or impermissible use/disclosure must be presumed to be a breach unless the outcome of a risk assessment determines otherwise. b. Risk Assessment. A risk assessment must determine the following: 1. Whether there was an acquisition/access or impermissible use/disclosure of PHI. 11. Whether the reported acquisition/access or impermissible use/disclosure of PHI does not fall under any of the exceptions provided by law. 111. The probability that the PHI that has been compromised is low using the following factors: a) The nature and extent of PHI involved, including the types of identifiers and likelihood of re-identification b) The unauthorized person who used or to whom the disclosure was made c) Whether the protected information was actually viewed or acquired d) The extent to which the risk to the PHI has been mitigated e) Any other relevant factors c. Exception to breach. Where the acquisition/access or use/disclosure of PHI falls under any of the categories below, there is no breach. Sufficient documentation must be maintained to support the categorization. 1. Any unintentional acquisition, access, or use of identifiable health information by a workforce member or person acting under the authority of the hybrid and affiliated covered entity, if it was in good faith and within the scope of employment and the information is not further acquired, accessed, used or disclosed in a manner not permitted by law. 11. Any inadvertent disclosure by a person who is authorized to access PHI at the hybrid and affiliated covered entity to another person authorized to access PHI at the same healthcare component or business associate or organized healthcare airangement in which UT participates, and the information received as a result of such disclosure is not further used or disclosed in a manner not permitted. 111. Where there is a good faith belief that the unauthorized recipient of the unsecured PHI would not reasonably have been able to retain such information.

Policy #3364-90-15 Reporting of Security Breach of Protected Page 3 d. Outcome of Risk Assessment. If the outcome of a risk assessment determines that a breach has occurred, notification must be provided. If the outcome of a risk assessment determines that there is no breach, notification is not required, however, sufficient documentation must be maintained to support the basis for a finding of no breach. 3. Notification a. Generally 1. If the outcome of a risk assessment indicates that a breach has occurred, notification must be provided. Notification must be provided to the individual and to the office of the Secretary of the US Health and Human Services (HHS). Under ce1iain circumstances, notification must also be given to the media. 11. Notification must be provided without umeasonable delay. In all cases, notification must be provided within the time frame specified by law. The time frame should be measured from the first day the act(s) constituting the breach was noticed or should have been noticed through exercise of reasonable diligence by a workforce member or agent of the University other than the one whose action(s) brought about the breach. 111. The time frame for notification should not be measured from the date a risk assessment determined that a breach had occurred except where a determination of breach was made on the same day the action(s) constituting the breach was noticed or should have been noticed as described in the preceding paragraph. 1v. Risk Management should be consulted to dete1mine the need to notify the current cyber liability insurance carrier. The carrier can provide advice on notification issues. If the breach is covered within the terms of policy, notification and resolution services will be provided within the limits of the insurance coverage. The Privacy Officer will notify appropriate administrative executives, including the chief compliance officer, after a conclusive determination that a breach event occmted. b. Notification to Individuals 1. Timelines - Each individual whose PHI has been breached or is reasonably believed to have been breached must be notified. Notification of a breach shall be provided without umeasonable delay and in no case later than 60 calendar days from the date referenced in (C) 3.a.ii above except where a law enforcement agency or official has requested a delay. 11. Contents of notification - Notifications shall be written in plain language and include to the extent possible the following elements: a) A brief description of what happened, including the date of the breach and the date of the discovery of the breach (C)3.a.ii) above if known

Policy #3364-90-15 Reporting of Security Breach of Protected Page 4 b) A description of the types of PHI involved in the breach such as full name, social security number, date of birth, home address, account number, diagnosis, disability code and other types of information c) Any steps the individual should take to protect themselves from potential harm d) A brief description of what UTMC is doing to investigate the breach, mitigate harm and protect against further breaches e) Contact information for individuals to ask questions and learn additional information. The contact information shall include: a toll free telephone number, an e-mail address, web site or postal address. 111. Method of notification - Notification must be in writing and delivered by first class mail to the individual's last known address. Where the individual is known to be deceased, the notification must be sent to the address of the next of kin or legally recognized personal representative. If the individual has agreed to receive electronic notice and has not withdrawn such agreement, notification by electronic mail is appropriate. Notification may be provided in one or more mailings as information becomes available. 1v. Substitute notice - In a situation where there is insufficient or out-of-date contact information that precludes written notification, a substitute notification must be provided. Substitute notification must be reasonably calculated to reach the individual. Substitute notice is not required in a case where there is insufficient or outof-date contact information for the next of kin or legally recognized representative of the individual. The means of substitute notification given will depend on the number of individuals who cannot be contacted through first class mail. a) If 10 or more individuals are unable to be contacted due to insufficient contact information or out-of-date contact information then substitute notice will be in the form of a conspicuous posting on the home page of the web site of UT for a period of 90 days or a conspicuous notice in a major print or broadcast media in geographic areas where the individuals likely affected by the breach reside. The posting must contain a toll-free number which will remain active for at least 90 days where an individual can learn whether his/her PHI is included in the breach. b) If less than 10 individuals are unable to be contacted due to insufficient or out-ofdate contact information then such substitute notice will be provided by an alternative form of written notice, telephone, or other means. c. Urgent Notice If the University deems the situation to be urgent, the individuals may be notified by telephone or other means, as appropriate, in addition to providing written notice. d. Notification to the Media If a breach of PHI affects more than 500 individuals residing in a particular state, the University shall notify prominent media outlets serving the area. The University shall provide notification without unreasonable delay and no later than 60 calendar days after

Policy #3364-90-1 S Reporting of Security Breach of Protected Page S discovery as described in section 3.a.ii unless a law enforcement delay is requested. The notification shall follow the same format that is set forth in section (C) 3.b.ii above. Notification of media outlets will be provided in addition to individual notification requirements and should not be regarded as a substitute for individual notification. e. Notification to Secretary of Health and Human Services The Secretary of HHS must be notified of all breaches of PHI. Notification must be provided without unreasonable delay except at the request of a law enforcement officer and will be provided as follows: 1. If the breach affects 500 or more individuals, notification must be provided contemporaneously with notification of the individuals affected as set forth in section (C) 3.a.ii of this document. Notification must be submitted online using the website* and following the instructions. 11. If the breach affects less than 500 individuals, UT will report such occurrences to the Secretary of HHS at approximately the same time the individual is notified. UT will maintain sufficient documentation of the occurrence and ensure that the Secretary is notified of all breaches which occur in a given calendar year within 60 days of the start of a new calendar year. The report will be submitted online using the and following the instructions. f. Notification by a business associate A business associate (BA) must notify the University following the discovery of a breach of unsecured PHI. Discovery of a breach by a BA follows the guideline outlined in (C) 3.a.ii above. The BA must notify the University within 60 calendar days after the date of discovery except where law enforcement delay is requested. The BA shall provide the University with available information that is required to include in the notification to the individual (s) affected by the breach. The notification of the individuals follows the same procedures as outlined within this Policy (e.g., law enforcement delay). g. The University will delay a notification, notice or posting of a breach of PHI at the request of a law enforcement official where not doing so will impede a criminal investigation or cause damage to national security 1. If a request is made in writing and specifies the time period for which delay is required, the University will delay the notification, notice or posting by the specified time period requested in the writing. 11. If the statement is made orally, the University will document the statement, including the identity of the official making the request. The notification, notice, or posting will be delayed temporarily for a period no longer than 30 days from the date of the oral request, unless a written request is submitted during that time. * Accessible at:- http://www. h hs.gov / ocr /privacy /hi paa/ad min istrative/breachnotificationru le/bri nstruction. htm I

Policy #3364-90-15 Reporting of Security Breach of Protected Page 6 4. Training The University shall train all employees whose functions are affected by this policy on the requirements of the notification of an unsecured breach. 5. Complaints Complaints regarding breaches of unsecured PHI and failure to follow this policy and procedures shall be addressed to the privacy officer and shall be handled in the same manner as any other privacy-related complaint as set forth in University policy. 6. Reporting See Policy #3364-15-05, Anonymous Reporting Line. 7. Sanctions Employees and other members of the University workforce who fail to comply with these policies and procedures will be disciplined in the same manner as set f01ih in applicable University policies. 8. Non-retaliation/Waiver The university shall not intimidate, threaten, coerce, discriminate against, or take any other retaliatory action against any individual who exercised his or her rights under these policies and procedures. The University shall not require any individual to waive his or her rights under this policy as a condition to receiving treatment, payment, enrollment in a plan, or benefits. See Non-Retaliation policy# 3364-15-04. 9. Revision This policy shall be revised as necessary to comply with the law or reviewed every three years as required by UT policy 10. Definitions a. "Access" and "acquisition" are synonymous with the regulatory definitions of "use" and "disclosure" set forth in the Privacy Rule. b. Breach - the acquisition, access, use, or disclosure of unsecured protected health information in a manner not permitted by the HIP AA privacy and/or security rules that compromises the security or privacy of the protected health information. c. Destroyed - PHI in paper form that has been shredded or otherwise destroyed such that the PHI cannot be read or otherwise be reconstructed; and if in electronic form, it has been cleared, purged or destroyed consistent with the standards set f01ih by National Institute of Standards and Technology (NIST). d. Encrypted - PHI, through the use of an algorithmic process, has been transformed into a form in which there is a low probability of assigning meaning without use of a confidential process or key and such process or key has not been breached.

Policy #3364-90-15 Reporting of Security Breach of Protected Page 7 e. Law enforcement official - An officer or employee of any agency or authority of the United States, a state, a territory, a political subdivision of a state or territory, or an Indian tribe who is empowered by law to: 1. Investigate or conduct an official inquiry into a potential violation of law, or 11. Prosecute or otherwise conduct a criminal, civil, or administrative proceeding arising from an alleged violation of law f. Protected Health Information - Information including demographic and genetic information relating to the past, present or future physical or mental health or condition of an individual, the provision of healthcare to an individual or the past, present or future payment for the provision of healthcare to an individual and is: 1. Created or received by a healthcare provider, health plan, employer, or health care clearinghouse 11. Transmitted or maintained in electronic or any other form m. Used to identify the individual or where there is a reasonable basis to believe that it can be used to identify the individual. 1v. Except: a) Employment records held by a covered entity under HIP AA acting in a capacity as an employer b) Where the information concerns an individual who is known to be deceased for more than 50 years V. c) The information is contained in education records covered by the Family Educational Rights and Privacy Act (FERP A) g. Unsecured - Information that is rendered usable, readable or decipherable to unauthorized persons through encryption or destruction of the media containing the information as approved by the NIST guidelines. h. Workforce member - Employees, volunteers, trainees, and other persons whose conduct in the performance of work for the University or a business associate of the University is under the direct control of the University or a business associate of the University. Approved by: rzlzo/ 1 7 Date Review/Revision Date: 09/01/2013 09/01/2016 10/16/2017

Policy #3364-90-15 Reporting of Security Breach of Protected Page 8 Executive Vice President of Clinical Affairs Review/Revision Completed By: HAS Legal Affairs, HSC Compliance and Privacy Officer Policies Superseded by This Policy: Next Review Date: 10/16/2020