Friday, 1 September 2017

Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research

The Value and Importance of Health Information Privacy

Ethical health research and privacy protections both provide valuable benefits to society. Health research is vital to improving human health and health care. Protecting patients involved in research from harm and preserving their rights is essential to ethical research. The primary justification for protecting personal privacy is to protect the interests of individuals. In contrast, the primary justification for collecting personally identifiable health information for health research is to benefit society. But it is important to stress that privacy also has value at the societal level, because it permits complex activities, including research and public health activities to be carried out in ways that protect individuals’ dignity. At the same time, health research can benefit individuals, for example, when it facilitates access to new therapies, improved diagnostics, and more effective ways to prevent illness and deliver care.
The intent of this chapter1 is to define privacy and to delineate its importance to individuals and society as a whole. The value and importance of health research will be addressed in Chapter 3.

CONCEPTS AND VALUE OF PRIVACY

Definitions

Privacy has deep historical roots (reviewed by Pritts, 2008Westin, 1967), but because of its complexity, privacy has proven difficult to define and has been the subject of extensive, and often heated, debate by philosophers, sociologists, and legal scholars. The term “privacy” is used frequently, yet there is no universally accepted definition of the term, and confusion persists over the meaning, value, and scope of the concept of privacy. At its core, privacy is experienced on a personal level and often means different things to different people (reviewed by Lowrance, 1997Pritts, 2008). In modern society, the term is used to denote different, but overlapping, concepts such as the right to bodily integrity or to be free from intrusive searches or surveillance. The concept of privacy is also context specific, and acquires a different meaning depending on the stated reasons for the information being gathered, the intentions of the parties involved, as well as the politics, convention and cultural expectations (Nissenbaum, 2004NRC, 2007b).
Our report, and the Privacy Rule itself, are concerned with health informational privacy. In the context of personal information, concepts of privacy are closely intertwined with those of confidentiality and security. However, although privacy is often used interchangeably with the terms “confidentiality” and “security,” they have distinct meanings.Privacy addresses the question of who has access to personal information and under what conditions. Privacy is concerned with the collection, storage, and use of personal information, and examines whether data can be collected in the first place, as well as the justifications, if any, under which data collected for one purpose can be used for another (secondary)2 purpose. An important issue in privacy analysis is whether the individual has authorized particular uses of his or her personal information (Westin, 1967).
Confidentiality safeguards information that is gathered in the context of an intimate relationship. It addresses the issue of how to keep information exchanged in that relationship from being disclosed to third parties (Westin, 1976). Confidentiality, for example, prevents physicians from disclosing information shared with them by a patient in the course of a physician–patient relationship. Unauthorized or inadvertent disclosures of data gained as part of an intimate relationship are breaches of confidentiality (Gostin and Hodge, 2002NBAC, 2001).

Read More: http://snip.ly/tlhw0#https://www.ncbi.nlm.nih.gov/books/NBK9579/

Labels: , , , , , ,

Friday, 4 August 2017

New HIPAA rules: Make sure you are in compliance because your liability has increased

Healthcare providers have until September 23 to put into place internal policies and procedures needed to comply with sweeping changes coming to the Health Insurance Portability and Accountability Act (HIPAA).
In January, the U.S. Department of Health and Human Services (HHS) released a set of rules, known collectively as the omnibus rule, designed to supplement and modify the privacy, security, breach notification, and enforcement rules governing patient health information in HIPAA. HHS has made it clear that the September 23 compliance deadline is final. Penalties can range from $100 to $1.5 million depending on the violation.
For primary care and other physicians in private practice, compliance will mean:
  • conducting and documenting a risk analysis, which HHS defines as “an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability” of electronic protected health information (PHI) in your practice;
  • reviewing the practice’s policies and procedures for when PHI is lost or stolen or otherwise improperly disclosed, and making sure your staff members are trained in them;
  • ensuring that the electronic PHI your practice holds is encrypted so that it cannot be accessed if it is lost or stolen (see “Encrypting your patients’ health information”);
  • modifying the practice’s  electronic health record (EHR) system so that you can flag information a patient does not want shared with an insurance company;
  • having the ability to send patients their health information in an electronic format;
  • reviewing your contracts with any vendors that have access to your practice’s PHI; and
  • updating your practice’s notice of privacy practices.
Other provisions
Other provisions of the omnibus rule include restrictions on selling PHI or using it for marketing and fundraising purposes without obtaining the patient’s permission and loosening some of the restrictions on sharing PHI with family members or other caregivers of deceased patients. Disclosure is only permitted, however, to the extent that the PHI is relevant to the role the family member or caregiver played in the decedent’s treatment. Moreover, release is not permitted in cases in which the individual expressly stated before death that he or she did not want the PHI released.
The omnibus rule also permits doctors in states with compulsory vaccination laws to disclose a child’s immunization records to schools without obtaining formal authorization from parents. Physicians now can do so with only a verbal agreement, provided they document that they obtained the permission. Lastly, the rule prohibits health plans from using or disclosing genetic information for the purpose of insurance underwriting.
The rule also sets and describes the four categories of penalties for violating the rules and the dollar amounts for each.
The omnibus rule is the latest step in a process that began when Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act in 2009. Among other provisions, the HITECH Act required HHS to strengthen HIPAA’s privacy and security protections for health information. HHS adopted interim rules for doing so in 2010 and finalized the rules with adoption of the omnibus rule.
Growth in EHRs drive changes

Driving many of the changes in the omnibus rule is the proliferation of EHRs and the accompanying digitization of patient information, says Jeffrey J. Cain, MD, FAAFP, president of the American Academy of Family Physicians (AAFP).
“The [original] HIPAA legislation is 15 years old now and was enacted at a time when EHRs were nothing more than a gleam in Microsoft’s eye, but now everyone’s using them, and the rules were seen to be in need of tightening up,” he says.
Angela Dinh Rose, director of health information management excellence for the American Health Information Management Association, says, “HITECH was a huge factor in pushing the adoption of health information technology, so along with that, Congress saw the need for improved privacy and security practices to protect patient information now that so much of it is becoming electronic.”
According to a study of breaches reported on the HHS Web site by Kaufman Rossin & Co., an accounting and consulting firm based in Miami, Florida, the number of individuals affected by data breaches doubled from 2010 to 2011, even though the number of entities involved in a breach declined (see “Summary of health breach information reported to HHS, 2010 to 2011,” below). The largest cause of breaches was theft (53%), followed by unauthorized access (20%) and loss (14%).
New rules for data breaches
The changes likely to have the greatest effect on medical practices are those concerning how PHI should be secured and kept private and what practices must do in case of a  breach—meaning the PHI is lost, stolen, or otherwise made available to someone who should not have it. Why? Whereas before the omnibus rule, breaches only had to be reported if they involved a “significant risk of harm,” now the presumption is that virtually any unauthorized disclosure of PHI may be a breach, unless the practice can demonstrate a low probability that the information has been compromised, explains Kenneth Rashbaum, JD, a health law attorney with Rashbaum Associates in New York, New York.
“These changes are a big deal because  the standard [of what constitutes a reportable breach] is much lower, and as a result there’s now a presumption of harm to the patient by virtue of the breah by the entity that made the disclosures,” Rashbaum says.

Given the new standard, the most important action practices can take to protect themselves against penalties, experts emphasize, is to encrypt patient data, both within the practice itself and when they are taken outside the practice in a laptop computer, smartphone, or other portable device.  Why? “In the [omnibus] rule now, they’re defining a breach as the loss of unsecured PHI,” explains Juli A. Ochs, CPA, healthcare engagement director for the consulting and accounting firm CliftonLarsonAllen LLP. “So anything that renders the data ‘unusable, unreadable, or undecipherable’ is now not considered a breach.”  (See “Encrypting your patient’s health information” below for suggestions on how to encrypt data in a way that meets HHS requirements.)
Determining risk of harm

Whenever a breach does occur, it is presumed to be reportable to HHS unless the practice can demonstrate a low risk of probability that the PHI will be compromised, meaning that anyone will be harmed as a result. Demonstrating the risk contains four components:
  • The nature and extent of the data involved. “Was the information just a list of patients? Did it include identifying data like Social Security numbers or other financial information? Were there intimate medical or psychotherapy records? Those are the types of questions that need to be asked,” says Aldo Leiva, JD, a data security and privacy attorney in Coral Gables, Florida.
  • The unauthorized person who used the PHI or to whom it was disclosed (something you can’t know if the breach resulted from a device being lost or stolen).
  • Whether the PHI was actually acquired or viewed.
  • The extent to which the risk has been mitigated after the fact. An example, Leiva says, might be having a contractor to whom the PHI accidentally was sent sign a non-disclosure agreement.
In addition, the rule requires practices to notify patients whose PHI has been breached within 60 days of discovery of the breach. If the breach affects more than 500 patients, then HHS and the local news media must be notified within the same 60-day timeframe. Practices must keep a log of all breaches regardless of the number of patients affected, and they must submit the log annually to HHS.
Another requirement of the rule is that practices and other covered entities conduct a risk analysis. The purpose of the exercise is to discover where the practice might be vulnerable to having its patient information lost or stolen—through theft of a laptop computer on which data are stored, for example—and putting in place policies and procedures to reduce those vulnerabilities.
“People get overwhelmed by this, because they think it needs to be a formal process,” Ochs says, “but it can be just everyone in the practice sitting down to talk about where are we vulnerable, assessing the risk of each vulnerability, deciding how to address it, and then documenting that they’ve gone through the process.”
In addition, practices should appoint a privacy and security officer with the responsibility for making sure the practice has policies and procedures for complying with the rules and that staff members are trained in them. Practices can—and often do—assign the responsibilities to a current employee rather than hire someone new, Ochs says. “The main thing is just that it’s assigned,” she adds.
Violators of the privacy and security rules will be fined in amounts ranging from $100 to $50,000 per violation (see “HIPAA rule violation categories and penalty amounts”). The maximum a practice or other covered entity can be fined in a year is $1.5 million.
Relations with business associates
After changes to the PHI security and breach notification rules, the omnibus rule changes of greatest interest to practices are those affecting their relationships with “business associates,” vendors that have access to a practice’s PHI. Such vendors are now directly responsible to HHS for securing and guarding the privacy of PHI in the same way that practices are, and they are subject to the same penalties.
“Before [the omnibus rule], physicians and medical organizations might be protecting patient data the way they were supposed to, but their third-party providers were not obligated except under the terms of their contract with the providers,” notes Jorge Rey, CISA, CISM, director of security and compliance for Kaufman, Rossin & Co. “Now the rules say that if you have access to patient healthcare-related information, you need to comply with all the privacy requirements.” The rule also puts subcontractors to practice vendors under HHS jurisdiction.
The increased responsibility of business associates does not let doctors off the hook entirely. That’s because even if the business associate loses PHI or has it stolen, the medical practice ultimately is responsible for notifying affected patients and reporting the breach to HHS.
Leiva notes that many health information technology (HIT) vendors and consultants include boilerplate language in their contracts absolving them from liability for data loss. Consequently, he advises reviewing all contracts with HIT vendors to ensure that their wording conforms with the omnibus rules governing relations between covered entities and their business associates. (A sample business associate agreement is available from the government at http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/contr…)
Greater patient control
The third part of the omnibus rule affecting doctors’ practices concerns patients’ rights related to their own health information.
The rules gives patients the right to:
  • obtain copies of their health information in an electronic format within 30 days of requesting it, with one 30-day extension permitted, and
  • instruct his or her doctor not to share information about a test or treatment for which the patient has paid out-of-pocket with his or her insurance company.
In addition, the rule requires practices to update their notice-of-privacy practices (NPPs) to reflect the changes to patients’  rights included in the omnibus rule and requires sending the updated NPP to all patients and posting it prominently in the practice and on the practice’s Web site.
Complying with the changes likely will be challenging for doctors due to the limitations of EHR systems. “EHRs were designed so that you could share information easily between healthcare providers and insurance providers,” notes the AAFP’s Cain. “Now we have this law saying that if a patient pays cash, the condition won’t be revealed to insurance providers, which is problematic for the way most EHRs are built.”
The design of EHRs also makes it difficult to share information with individuals who don’t have EHRs, Cain notes. “That’s going to be a problem and something the vendors will have to help us with,” he says.
In the meantime, possible alternatives include joining a private health information exchange network or a one of the regional or statewide networks many states are establishing. Regional extension centers and state and local medical societies are good sources of information about health information exchange networks.
Doctors should ask their EHR vendors about a timetable for implementing a function that allows them to meet the requirement by the September 23 deadline, advises Lisa Gallagher, CISM, vice president of technology solutions for the Healthcare Information and Management Systems Society.  If a vendor won’t be ready to provide such a feature, then the practice will have to still find a way to meet the requirement, maybe through a different way of recording the patient’s data until the function is available, Gallagher says.
“Sometimes regulatory requirements are misaligned,” she adds. “What’s happened here is the requirement for the provider to do something, and the requirement hasn’t made its way down to the vendor. But the important thing for everyone to realize is that HHS has said this requirement is going into effect and you have to meet it.”
Cain says that most AAFP members understand the need to provide patients with greater control over who can see their information and the need to guard confidentiality generally. Nevertheless, “it does add another layer of administrative complexity to managing an office practice,” he says.
 “All the rules are well-intentioned, but they may interact in ways that aren’t understood when they are developed,” Cain adds. “The law of unintended consequences is challenging for office-based physicians.”

What would you like to know about HIPAA? Post your questions to our Facebook page at www.facebook.com/MedicalEconomics or email us at medec@advanstar.com. We’ll present answers in future articles.

HIPAA rule violation categories and penalty amounts
The Health Insurance Portability and Accountability Act omnibus rule establishes four “tiers” of violations, based on what it terms “increasing levels of culpability,” with a rage of fines for each tier.
Violations of the same requirement or prohibition for any of the categories are limited to $1.5 million per calendar year.
The language of the rule states that actual dollar amounts will be based on “the nature and extent of the violation, the nature and extent of the resulting harm, and other factors…includ[ing] both the financial condition and size of the covered entity or business associate.”

Labels: , , , , ,

Wednesday, 14 June 2017

HIPAA compliance expectations from Small Healthcare Providers

For The Health Information Portability and Accountability Act (HIPAA), the Business Associate is a major component. According to HIPAA, a Business Associate (BA) is an organization or a person who works with or provides service to a Covered Entity. A CE is one who handles or discloses Protected Health Information (PHI). This makes a Business Associate any person or entity that is involved in creating, receiving, maintaining or transmitting PHI to a CE for a purpose or activity or function as mandated and regulated by the HIPAA Privacy Rule.
Small businesses struggle with meeting HIPAA requirements
There are specific requirements that small healthcare practices need to put in place and to show that their program is current and meets the regulatory requirements set out in HIPAA. They need to conceive and implement a HIPAA compliance program that meets the requirements set out in this legislation. The compliance program should not only be adequate; it should be robust and resilient enough to withstand HIPAA’s strict scrutiny at various levels.
Helping small healthcare providers with the knowledge and skill needed for meeting HIPAA requirements is the purpose of a two-day seminar that is being organized by GlobalCompliancePanel, a leading provider of professional trainings for all the areas of regulatory compliance. At this seminar, Jay Hodes, who is a leading expert in HIPAA compliance and President of Colington Consulting, which provides HIPAA consulting services for healthcare providers and Business Associates, will be the Director.
Want to get a complete understanding of the requirements that small healthcare providers need to meet to comply with HIPAA requirements? Just register for this learning session by visiting HIPAA compliance expectations from Small Healthcare Providers.
Full explanation of what all a small business provider needs to do
This seminar is particularly created for small healthcare providers who have a difficulty in understanding the HIPAA compliance requirements and meeting them. It will be useful for those of various business sizes, but is primarily focused on the small healthcare provider. Jay will impart the kind of teaching with which organizations will be able to meet all of the HIPAA, HITECH, and Omnibus Rules.
The basis to implementing the requirements of compliance program is to first fully understand them. This is the learning that this seminar will offer. At the end of two days of intense learning that will be interspersed with lively presentations; participants will have inculcated a full grasp of all of the requirements for a comprehensive HIPAA compliance program. They will also have got a clear understanding of the kind of steps that they need to take to mitigate risk.
Steps needed to develop, review and amend HIPAA
The Director will include practical exercises over these two days that will help participants know all that is needed for developing, reviewing, and amending HIPAA policy and procedure. He will equip the participants with a clear roadmap for what needs to be place when it comes to all of the HIPAA regulations.
Over the two days, Jay will cover the following areas:
o  Why was HIPAA created?
o  Who Must Comply with HIPAA Requirements?
o  What are the Consequences of being a Business Associate
o  What is a HIPAA Compliance Program for a Business Associate?
o  What is a HIPAA Risk Management Plan?
o  What is a HIPAA Risk Assessment?
o  What is the Role of the HIPAA Security Official?
o  What are HIPAA training requirements?
o  What is a HIPAA data breach and what happens if it occurs?
o  What are the penalties and fines for non-compliance and how to avoid them
o  Case Examples of HIPAA Data Breaches
o  Creating a Culture of Compliance
o  Q&A.

Labels: , , , ,

Wednesday, 26 October 2016

Application of concepts and theories of clinical research

Protection of human subjects and everything relating to it is of paramount importance for those involved in or wanting to be involved in research dealing with human subjects or an individual's private identifiable information. For these individuals, professionals and companies, it is extremely important to understand that there are federal regulations that must be followed.

There are also state statutes, institutional policies, federal guidance documents, and ethical codes that guide the conduct of the research. This is done to ensure that the research not only meets the regulatory requirements but also that it is conducted in an ethical manner, coming with adequate protections for the individuals who elect to enroll in the research or allow their information to be used for research.

Guidelines lack clarity

However, the challenge that this position presents is that the guidelines –which also provide interpretation of the regulations –are not always as clear as they might appear upon first reading them.

A two-day seminar from GlobalCompliancePanel, a leading provider of professional trainings for all the areas of regulatory compliance, will impart understanding on all these grey areas of human subjects. It will clarify on these regulations. To enroll for this highly educative session, just log on to http://www.globalcompliancepanel.com/control/globalseminars/~product_id=900671SEMINAR.

The Director of this seminar is the highly regarded expert on the subject, Sarah Fowler-Dixon, Education Specialist and instructor with Washington University School of Medicine. Sarah has developed a comprehensive education program for human subject research which has served as a model for other institutions.

Ways of applying concepts and theories

This two-day seminar will provide the foundation for the application, concepts and theories of clinical research.

The speaker will not only provide a refresher of the regulations; she will also provide attendees with the opportunity to discuss and learn how these regulations, ethical codes and guidance documents get applied in different situations. This information can then be used to help attendees in their day-to-day decision making when confronted with situations or questions regarding how to handle issues that do arise (e.g. a participant not showing for a scheduled appointment, an event that is unexpected occurs, someone who does not speak wishes to enroll in the study, a participant signing an outdated consent document, etc.) when conducting human subjects.

Outcomes of the seminar

The learning acquired over these two days will help attendees learn about the historical evolution of research, and current regulations and guidelines including the Common Rule, FDA regulations and HIPAA. This session will discuss site and study staff responsibilities in the conduct and reporting of research, types of studies and the regulatory requirements that apply to different study designs. It will also discuss a variety of research including genetic, drug, device, and studies that use off-site or community partners. Current examples will be used and the audience will be invited to share their experiences and information. 

Labels: , , , , , , ,

Monday, 26 September 2016

Get your HIPAA compliance right in six simple steps

The most important element that Covered Entities and Business Associates must keep in mind while carrying out HIPAA audits is best summarized in the words of Jocelyn Samuels, the top Federal official in charge of HIPAA enforcement. To quote her own words, Covered Entities and Business Associates must ensure compliance through “... a comprehensive and thorough approach to assessing and addressing the risks to all of the Protected Health Information (PHI) they maintain”.

Although Risk Analysis is mandatory; HIPAA audits of 2012 showed that as many as four fifths of health care providers failed to comply with this mandatory requirement. Covered Entities and Business Associates are under severe pressure to do a HIPAA Risk Analysis of all the PHI’s they maintain. Most of this, they are expected to do on their own. This explains perhaps just why 80% of health care providers failed to do the Risk Analysis, a fact discovered by the HHS. In fact, the incidence of HIPAA violations has been increasing so steeply that 2015 was sardonically referred to in HIPAA circles as the “Year of the Breach”. This fact leads to the next important point: higher and greater number of government enforcement and private lawsuits.

Learn the ways of getting HIPAA compliance right in just six simple steps

The above facts make it absolutely imperative for Covered Entities and Business Associates to get every aspect of the HIPAA compliance right, in the manner suggested by Jocelyn Samuels. This is precisely what GlobalCompliancePanel, a highly renowned provider of professional trainings for all areas of regulatory compliance, will be imparting at a two-day, in person seminar. To enroll for his event, just visit


The Director of this highly meaningful and valuable seminar is the well-known expert on HIPAA compliance, Paul Hales. Paul’s credentials get augmented by the fact that he has, with a team of expert advisors and practical field testers, created a method of making all HIPAA regulations accessible to the everyday person. Paul’s method explains all the aspects of HIPAA in uncomplicated and simple language and carries the exact citations to each regulation. This method is directed at organizations’ legal counsel who may not be well versed or experienced in HIPAA, and will be a major part of this seminar. 

Major benefits by learning from the expert

Organizations that are required to carry out HIPAA audits will gain enormously from this seminar. It will help them to save money, time, and research. Paul will discuss how Business Associates and Covered Entities can grow their practice and be compliant. His method will serve as the very foundation on which organization can implement their HIPAA Compliance Program. Most importantly, he will teach how they can grow what is most valuable to their business: Their patients. Paul’s HIPAA compliance method, which consists of six easy steps, will create a level of quality to the advice that the legal counsel provides.

He will take participants of this seminar through a Risk Analysis for their organization and will also delve into the Privacy, Breach, and Security Rules as applicable to their particular organization. 

Labels: , , , , , , , , ,