Outline. Outline. What is HIPAA? I. What is HIPAA? II. Why Should You Care? III. What Should You Do Now? I. What is HIPAA? II. Why Should You Care?

Similar documents
ARE YOU HIP WITH HIPAA?

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

Determining Whether You Are a Business Associate

13th AMC Security & Privacy Conference June 12, 2017

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

HIPAA Compliance Guide

HIPAA and Lawyers: Your stakes have just been raised

HEALTHCARE BREACH TRIAGE

HIPAA Basic Training for Health & Welfare Plan Administrators

March 1. HIPAA Privacy Policy

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

Business Associate Risk

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA, Privacy, and Security Oh My!

503 SURVIVING A HIPAA BREACH INVESTIGATION

HIPAA 102a. Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA Data Breach ITPC

4/15/2016. What we strive for. Reality

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

LEGAL ISSUES IN HEALTH IT SECURITY

HIPAA UPDATE/ OCR ENFORCEMENT

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

HEALTH & HUMAN SERVICES OFFICE FOR CIVIL RIGHTS HIPAA COMPLIANCE AUDITS. What do I need to know?

6/7/2018. HIPAA Compliance Simplified. HHS Wall of Shame. Marc Haskelson, President Compliancy Group

Be Careful What You Wish For: The Final Rule Is Out

Future of Healthcare in Washington April 2, Christiansen IT Law

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc

Key Legal Issues in EMR, EMR Subsidy and HIPAA and Privacy Click Issues to edit Master title style

8/30/2016 HIPAA: WHAT S CHANGED?

How to mitigate risks, liabilities and costs of data breach of health information by third parties

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

RISK TRACK. Privacy and Data Protection

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

HIPAA COMPLIANCE. for Small & Mid-Size Practices

What Does The New Omnibus HIPAA/HITECH Final Rule Really Mean For Employers And Their Service Providers?

"HIPAA FOR LAW FIRMS" WHAT EVERY LAW FIRM NEEDS TO KNOW ABOUT HIPAA

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation

AFTER THE OMNIBUS RULE

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist

The Privacy Rule. Health insurance Portability & Accountability Act

GUIDANCE ON HIPAA & CLOUD COMPUTING

Cyber Insurance 2017:

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA PRIVACY AND SECURITY AWARENESS

Fifth National HIPAA Summit West

Ensuring HIPAA Compliance When Transmitting PHI Via Patient Portals, and Texting

AGREEMENT PURSUANT TO THE TERMS OF HIPAA ; HITECH ; and FIPA (Business Associate Agreement) (Revised August 2015)

The Revolution Will Be Worn on Your Wrist (Part 2) Deven McGraw Deputy Director, Health Information Privacy HHS Office for Civil Rights

HIPAA Basics: IMPORTANT HIPAA CONCEPTS. What We re going to Cover. Training for Employee Benefits Staff

Privacy Rule Primer. 45 CFR Part 160 and Subparts A and E of Part CFR , 45 CFR CFR

BUSINESS ASSOCIATE AGREEMENT

Industry leading Education. Certified Partner Program. Please ask questions Todays slides are available group.

To Notify Or Not To Notify Is No Longer The Question Robin Campbell Chandra Westergaard

HIPAA Background and History

HIPAA Compliance for Business Associates ISBA Health Law Symposium October 10, 2017

2016 Business Associate Workforce Member HIPAA Training Handbook

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

New HIPAA Rules Meeting Requirements for New Patient Rights and New Restrictions on Disclosures

Continuous Compliance: An Operational Approach Must Address HIPAA

HIPAA Privacy Overview

RECITALS. WHEREAS, this Amendment incorporates the various amendments, technical and conforming changes to HIPAA implemented by the Final Rule; and

Interpreters Associates Inc. Division of Intérpretes Brasil

Privacy Rule - Complaint Investigations

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

HIPAA The Health Insurance Portability and Accountability Act of 1996

COMPLIANCE TRAINING 2015 C O M P L I A N C E P R O G R A M - F W A - H I P A A - C O D E O F C O N D U C T

Cyber Risks & Insurance

BUSINESS ASSOCIATE AGREEMENT W I T N E S S E T H:

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

HIPAA Privacy and Security Rules: Overview and Update HIPAA. Health Insurance Portability and Accountability Act ( HIPAA )

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Assessing and Mitigating Risk Under the HIPAA Omnibus Rule

Assessing and Mitigating Risk Under the HIPAA Omnibus Rule

IACT Medical Trust. June 28, Jim Hamilton (317) HIPAA Privacy Training Bose McKinney & Evans LLP

HIPAA Breach Notification Case Studies on What to Do and When to Report

DATA PROTECTION ADDENDUM

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

HIPAA, HITECH & Meaningful Use

HIPAA Security How secure and compliant are you from this 5 letter word?

Transcription:

1 Outline Florida Society of Dermatologic Surgeons September 19, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. What is HIPAA? II. Why Should You Care? A. B. Regulatory Pressure Points C. III. What Should You Do Now? 2 Outline I. What is HIPAA? II. Why Should You Care? A. B. Regulatory Pressure Points C. III. What Should You Do Now? What is HIPAA? o Health Insurance Portability and Accountability Act of 1996 Applies to Covered Entities Business Associates Subcontractors Covers Protected Health Information PHI is any information that allows someone to link an individual with his or her physical or mental health condition or provision of healthcare services 3

2 What is HIPAA? o Modified by the HITECH Act in 2009 Expanded scope of coverage direct enforcement against BAs and Subcontractors Mandatory penalties Who is Regulated? Business Associate IT Management Company Covered Entities healthcare providers, health plans, etc. Business Associate EHR Vendor Business Associate Billing Provider Business Associate Law Firm Subcontra Subcontra ctor Subcontractor ctor Data Destruction Vendor Subcontrac Subcontractor tor Interface Developments Subcontrac Subcontractor tor Data Center Subcontrac Subcontractor torcourt Reporting Firm Regulatory Framework o HIPAA Implementing regulations 4 Rules: Security Rule Enforcement Rule Privacy Rule Breach Notification Rule Regulatory Framework o State level HIPAA sets baseline protection and disclosure requirements State laws can be more restrictive Mental health, STDs

3 Outline I. What is HIPAA? II. Why Should You Care? A. B. Regulatory Pressure Points C. III. What Should You Do Now? LIS Internet of Things EHR, PHR Security Challenges Increasing BYOD, BYOC Free Wi-Fi Social Networks Telehealth 9

4 o Data breaches are expensive to handle o Data breaches are expensive to handle Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis (May 2014) Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis (May 2014) Regulatory Pressure Points $3.3M Average lost business costs $5.85M - Average total organizational cost of data breach o Enforcement is increasing HHS Office of Civil Rights State s Attorneys General Consumers $509,237 Average data breach notification costs $1.6M Average post data breach costs Federal Trade Commission State Boards Insurance Regulators Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis (May 2014)

5 Regulatory Pressure Points Regulatory Pressure Points Class Actions Individual Claims HHS Office of Civil Rights Connecticut AG sued HealthNet State s Attorneys General Federal Trade Commission Massachusetts sued a Rhode Island hospital HHS Negligence Office of Civil Rights Breach of warranty HIPAA becoming the standard of care in some states (Florida) State s Attorneys General Negligence Consumers State Boards Insurance Regulators Federal Trade False advertising Commission State Boards Intentional infliction of emotional distress Insurance Regulators Vermont AG sued HealthNet Minnesota AG sued Accretive Indiana AG sued WellPoint Unreasonable delay in notification / remedying breach Invasion of privacy Regulatory Pressure Points Class Individual Actions Claims Abigail E. Hinchy v. Walgreen Co. et Consumers al. (Indiana Superior Ct., 2013) HIPAA becoming the Negligence Breach of warranty False advertising Unreasonable delay in notification / remedying breach standard of care in some states (Florida) Pharmacist improperly accessed medical records of one patient Negligence Patient reported the incident to Walgreens and Walgreens did not disable the pharmacist s access Intentional infliction of emotional distress Jury awarded $1.8 million, with $1.4M of that to be paid by Walgreens Invasion of privacy Regulatory Pressure Points? Abigail E. Hinchy v. Walgreen Co. et al. (Indiana Superior Ct., 2013)? Does your EHR Pharmacist improperly software permit accessed you medical? records of one to disable patient the access Patient reported of one the individual incident to to Walgreens and Walgreens did not disable the pharmacist s one patient? access Jury awarded?? $1.8 million, with $1.4M of that to be paid by Walgreens

6 o Enforcement by HHS Office of Civil Rights As of Aug. 7, 2014, 21 organizations have paid out a total $22,446,500 in settlements (with one fine) o Cignet Health ($4.3M) (fine) o General Hospital Corp. & Physicians Org. ($1M) o UCLA Health System ($865,500) o Blue Cross Blue Shield of TN ($1.5) o Phoenix Cardiac Surgery ($100K) o Alaska Dept. of Health & Human Services ($1.7M) o o o o o o Massachusetts Eye and Ear Infirmary ($1.5M) Adult & Pediatric Dermatology ($150K) Skagit County, Washington ($215K) New York & Presbyterian Hospital ($3M) (settlement) Columbia University ($1.5M) Parkview Health System ($800K) Failure to conduct a Risk Analysis in response to a new environment BCBSTN Changed offices WellPoint Installed software upgrade Alaska Dept. of Health & Human Services Never conducted an assessment Failure to conduct a Risk Analysis of the entire environment New York & Presbyterian Hospital - failed to conduct an accurate and thorough risk analysis that incorporates all IT equipment, applications, and data systems utilizing ephi Columbia University - failed to conduct an accurate, and thorough risk analysis that incorporates all IT equipment, applications and data systems utilizing ephi, including the server accessing New York & Presbyterian Hospital ephi $3M $1.5M Failure to address issues with Workforce members Phoenix Cardiac Surgery - Failure to train and train on an on-going basis Adult & Pediatric Dermatology Failure to train on the Breach Notification Rule UCLA Failure to apply appropriate sanctions (workforce members repeatedly snooping on patients) Skagit County - Failure to install and implement security measures and policies to monitor unauthorized access

7 Portable devices Lack of encryption/security measures Lack of policies and procedures to address Incident identification, reporting, and response Restricting access to authorized users Reasonable means of knowing whether or what type of portable devices are being used to access an organization s network Massachusetts Eye and Ear Infirmary ($1.5M), Concentra Health Services ($1,725,220), QCA Health Plan, Inc. of Arkansas ($250K), and others Other issues Use of Email - Phoenix Cardiac Surgery failure to implement appropriate and reasonable administrative and technical safeguards as evidence by sending ephi from an Internet-based email account to workforce members personal Internetbased email accounts Photo Copiers - Affinity Health Plan failure to properly erase photocopier hard drives prior to sending the photocopiers to a leasing company o OCR Corrective Action Plans Comprehensive Risk Analysis A written implementation report describing how entity will achieve compliance Revised policies and procedures Additional employee training Monitoring Internal and 3 rd Party Term is 1 3 years, with document retention period of 6 years o Federal Trade Commission Works for consumers to prevent fraudulent, deceptive, and unfair business practices Section 5 - "unfair or deceptive acts or practices in or affecting commerce...are... declared unlawful. Has authority to pursue any company o Has pursued companies across a number of industries Hotels, mobile app vendors, clinical labs, medical billing vendor, medical transcription vendor

8 o Practices the FTC finds problematic Improper use of data Retroactive changes Deceitful data collection Unfair data security practices o FTC v. LabMD, Inc. Medical testing laboratory Two cases: Federal lawsuit Administrative action Allegations: company failed to reasonably protect the security of consumers personal data, including medical information. two separate incidents collectively exposed the personal information of consumers billing information for over 9,000 consumers was found on a peer-to-peer (P2P) file-sharing network documents containing sensitive personal information of at least 500 consumers were found in the hands of identity thieves For a more detailed analysis, see Daniel J. Solove & Woodrow Hartzog, The FTC and the New Common Law of Privacy, Columbia Law Review (2014) o What did the FTC allege LabMD did wrong? No Security Program - did not develop, implement, or maintain a comprehensive information security program to protect consumers personal information No Monitoring or Testing - did not use readily available measures to identify commonly known or reasonably foreseeable security risks and vulnerabilities on its networks (e.g., by not using measures such as penetration tests, LabMD could not adequately assess the extent of the risks and vulnerabilities of its networks). No Intrusion Detection -did not employ readily available measures to prevent or detect unauthorized access to personal information on its computer networks Did not use appropriate measures to prevent employees from installing on computers applications or materials that were not needed to perform their jobs Did not adequately maintain or review records of activity on its networks

9 Failed to Limit Employee Access to Data - did not use adequate measures to prevent employees from accessing personal information not needed to perform their jobs Failed to adequately train employees to safeguard personal information records stored in clear text no policy on who should have access to records, access granted ad hoc, resulting in most employees receiving administrative access to servers information transmitted from doctor s offices unencrypted informal policy that doctors offices would get unique access credentials, but credentials would then be shared amongst multiple users at a practice Did not require employees, or other users with remote access to LabMD s networks, to use common authentication-related security measures, such as periodically changing passwords prohibiting the use of the same password across applications and programs using two-factor authentication implementing credential requirements mechanism to assess the strength of users passwords Did not maintain and update operating systems of computers and other devices on its networks Failed to patch system even though solutions readily available (some since 1999) Used operating systems were unsupported by vendor Could have corrected its security failures at relatively low cost using readily available security measures o FTC will also take action against individual owners GMR Transcription Services, Inc. (2014) Provides medical transcription services Exposed PHI online Settled with company (20 years) and two principal owners (10 years)

10 HIPAA Audits HIPAA Audits o First set Conducted 115 audits through Dec. 2012 Audits conducted by KPMG Entities were selected by Booz Allen Hamilton Protocol 11 Modules Looked at Privacy, Security, and Breach Notification Source: Linda Sanches, Senior Advisor, Health Information Privacy, HHS Office of Civil Rights, HCCA Compliance Institute (Mar. 31, 2014) Source: Verne Rinker, Health Info Privacy Specialist, HHS Office of Civil Rights, 2013 NIST / OCR Security Rule Conference (May 2013) HIPAA Audits HIPAA Audits Revenues / assets < $1B Revenues / assets < $50M Revenues / assets $50M - $300M Revenues / assets $300M - $1B Source: Verne Rinker, Health Info Privacy Specialist, HHS Office of Civil Rights, 2013 NIST / OCR Security Rule Conference (May 2013) Source: Verne Rinker, Health Info Privacy Specialist, HHS Office of Civil Rights, 2013 NIST / OCR Security Rule Conference (May 2013)

11 HIPAA Audits HIPAA Audits Source: Verne Rinker, Health Info Privacy Specialist, HHS Office of Civil Rights, 2013 NIST / OCR Security Rule Conference (May 2013) Source: Verne Rinker, Health Info Privacy Specialist, HHS Office of Civil Rights, 2013 NIST / OCR Security Rule Conference (May 2013) HIPAA Audits Florida Information Protection Act of 2014 o Florida s new data breach law went into effect on July 1, 2014 (SB 1524) o Dual notification to OCR and Florida State Attorney General o Requirements are broad (2) REQUIREMENTS FOR DATA SECURITY. Each covered entity, governmental entity, or third-party agent shall take reasonable measures to protect and secure data in electronic form containing personal information. Source: Verne Rinker, Health Info Privacy Specialist, HHS Office of Civil Rights, 2013 NIST / OCR Security Rule Conference (May 2013)

12 Florida Information Protection Act of 2014 o Florida s new data breach law went into effect A on covered July entity 1, 2014 shall give (SB notice 1524) to each individual in this state whose personal information was, or the covered entity oreasonably Dual notification believes to have to been, OCR accessed and as Florida a result State of the breach. Attorney Notice General to individuals shall be made as expeditiously as practicable and without unreasonable delay, taking into oaccount Requirements the time necessary are broad to allow the covered entity to determine the scope of the breach of security, to identify individuals affected by the breach, and to restore the reasonable (2) REQUIREMENTS integrity of the FOR data system DATA SECURITY. Each that was breached, but no covered later than entity, 30 days governmental after the determination entity, or third-party of a breach agent or reason shall take to believe reasonable a breach measures occurred unless to protect subject and to secure a delay authorized data in electronic under paragraph form containing (b) or waiver personal under paragraph information. (c). Outline I. What is HIPAA? II. Why Should You Care? A. B. Regulatory Pressure Points C. III. What Should You Do Now? 46 o Data breaches are expensive to handle Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis (May 2014) Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis (May 2014)

13 What Should You Do Now? o Conduct a thorough and accurate Risk Analysis When was your last Risk Analysis? Did it include a- vulnerability assessment / penetration test onsite walkthrough evaluation of flow of ephi through the network (e.g., printers, fax machines, BYOD, etc.) review of employee monitoring programs? Is documentation in place? What Should You Do Now? o Conduct a thorough and accurate Risk Analysis CEs and BAs must assess if an implementation specification is reasonable and appropriate based upon: Risk analysis and mitigation strategy Current security controls Costs of implementation Must look at more than just cost What Should You Do Now? o Review your Workforce training materials Address password policy? Discuss sending email? Use of BYOD? Discuss how to spot fishing emails? Cover the breach notification and sanctions policy? Be sure to save copies of the materials! What Should You Do Now? o Review your Master Services and Business Associate Agreements Caps on liability? Should there be? Insurance requirements? Can your organization afford to pay $359 x # of Records =??? Do the terms in the BAA match the Master Services Agreement? Indemnification? Liability? Caps? Breach notification?

14 What Should You Do Now? o Purchase your own cyber liability insurance A data breach is inevitable Be sure to review the policy terms Some policies exclude coverage for damages that arise out of activity that is contrary to your Privacy Policy What does your Privacy Policy say exactly? How much is an indemnification provision from a judgment proof company worth? Disclaimer This slide presentation is informational only and was prepared to provide a brief overview of enforcement efforts related to HIPAA and other privacy laws. It does not constitute legal or professional advice. You are encouraged to consult with an attorney if you have specific questions relating to any of the topics covered in this presentation, and Melnik Legal PLLC would be pleased to assist you on these matters. Any Questions? Tatiana Melnik Attorney, Melnik Legal PLLC 734.358.4201 tatiana@melniklegal.com