surviving hipaa -2016 - rmgmarmgma.org/wp-content/uploads/surviving-hipaa-2016-j.-ball.pdf ·...

30
Jeremy A. Ball Surviving HIPAA - 2016

Upload: others

Post on 23-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

Jeremy A. Ball

Surviving HIPAA - 2016

Page 2: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

222

Outline

> HIPAA Basics – A Refresher

> Avoiding the Threats

> Fundamentals of Compliance

> Responding to a Breach

> 2016 OCR Audits

Page 3: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

333

HIPAA Basics – A Refresher

> Privacy Rule

– Requires covered entities and business associates to protect the confidentiality of protected health information (PHI)

– Limits the use and disclosure of PHI

– Gives patients certain rights concerning PHI

> Security Rule

– Requires covered entities to implement safeguards to ensure the confidentiality and security of e-PHI

> Breach Notification Rule

– Requires covered entities and business associates to self-report breaches of unsecured PHI

Page 4: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

444

Avoiding the Threats

Date Fine Provider Allegations

Jun. 2015 $218,400 St. Elizabeth’s Medical Center

Storage of PHI in cloud without risk assessment; Failure to investigate

Aug. 2015 $750,000 Cancer Care Group, P.C.

Stolen laptop with unencrypted PHI; No policies; No risk assessment

Dec. 2015 $750,000 Univ. of Washington Medicine

Failure to implement a securitypolicy; Inadequate risk assessment

Feb. 2016 $25,000 Complete P.T. Posted patient names, photos, and testimonials to website without permission; No policies

Apr. 2016 $750,000 Raleigh OrthopaedicClinic, P.A.

Failure to execute a BAA – 17,300 records disclosed to vendor

Apr. 2016 $2,200,000 N.Y. Presbyterian Hospital

Disclosure of PHI to movie film crews

Recent HIPAA Settlements*

* OCR News Releases & Bulletins, HHS.gov

Page 5: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

555

Fundamentals of Compliance

Page 6: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

666

Fundamentals of Compliance

> Appoint a HIPAA Privacy & Security Officer

> Conduct a security risk assessment

> Implement policies and procedures

– Notice of Privacy Practices

– Written policies and procedures for privacy & security

> Address technical safeguards, physical safeguards, and administrative safeguards

> Train employees, and document the training

> Obtain and maintain business associate agreements

> Investigate and report breaches

> Maintain required records – 6 years

Page 7: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

777

Fundamentals – Risk Assessment

> No methodology prescribed by Security Rule

> Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of e-PHI

> This is the starting point for developing safeguards!

– Vulnerability – a flaw or weakness in system security procedures, design, implementation, or controls that could result in breach

– Risk – the net mission impact considering the probability of a threat triggering a vulnerability, and the resulting impact on the organization

Page 8: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

888

Page 9: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

999

Physician Breach

> “Stung by Yelp Reviews, Health Providers Spill Patient Secrets”

– ProPublica/Washington Post, May 27, 2016

Yelp post by dentist-

“Due to your clenching and grinding habit, this is not the first molar tooth you have lost due to a fractured root.”

Page 10: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

101010

Fundamentals – Risk Assessment

> Elements of the assessment

– Scope – all forms of e-PHI, regardless of storage medium or location

– Data collection – identify e-PHI subject to analysis

– Identify and document potential threats and vulnerabilities

– Assess current security measures

– Determine the likelihood of potential threats

– Determine the impact of potential threats

– Assign levels of risk to threat/impact combinations

Page 11: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

111111

Document Results of Risk Assessment

> Goal is to document the findings from the risk analysis into an official document

> Presents a systematic and analytical approach to assessing risk with three objectives:

– Gain understanding of the risks in the environment

– Identify resources to reduce or correct threats to e-PHI

– Demonstrates compliance with HIPAA Security requirements

> Must maintain HIPAA documentation for 6 years

Page 12: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

121212

Risk Assessment References

> OCR’s Guidance on Risk Analysis Requirements

> OCR Security Rule FAQ’s

> SRA Tool – http://www.healthit.gov

Page 13: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

131313

Responding to a Breach

Page 14: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

141414

1. Stop the Breach!

Page 15: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

151515

2. Report to Privacy Officer

> All covered entities must have a privacy officer and security officer designated in writing

> Train staff to immediately report suspected breaches

– Immediate response may help avoid breach reporting obligations

– May avoid penalties if violation corrected within 30 days

– Must report breach within 60 days

> Privacy officer or legal counsel should investigate

Page 16: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

161616

3. Check on Insurance

> Cyber Liability Insurance or Data Breach Insurance may cover response costs, as well as penalties

> Check with insurance broker

> When in doubt, report

– Delayed reporting can result in denial

– Insurer may provide resources for response

> Document communications with the insurer

Page 17: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

171717

4. Investigate Promptly

> Confirm facts with person(s) involved

– Person “responsible” for breach

– Person who received PHI

– Witnesses

> Confirm reason for use or disclosure

> Confirm what information accessed, used, or disclosed

> Confirm scope of access, use or disclosure

> Determine steps to mitigate or correct situation

> Document investigation

Page 18: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

181818

Investigative Process

> Does HIPAA apply?

> Is PHI involved?

> Was the PHI secured, i.e., encrypted or destroyed?

> Proper access, use, disclosure?

> Minimum necessary?

> Any exceptions apply?

> “Low probability of data compromise”?

– Requires risk analysis

Page 19: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

191919

Breach – Risk Assessment

> Determine the probability, i.e., likelihood, that the data has been “compromised”

– Nature and extent of PHI involved?

– Unauthorized person who used or accessed PHI, or to whom PHI was disclosed?

– Was the PHI actually acquired or viewed?

– Extent to which the risk of harm has been mitigated?

– Other factors as appropriate

Page 20: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

202020

5. Mitigate Harm

> A covered entity must mitigate, to the extent practicable, any harmful effect that is known to the covered entity of a use or disclosure by the covered entity or its business associate

– Retrieve, delete, and/or destroy disclosed PHI

– Contact recipients to confirm confidentiality and limited use

– Terminate access; change passwords

– Remote wipe of lost or stolen devices

– Retrain employees

Page 21: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

212121

5. Sanction Employees

> A covered entity must have policies and apply appropriate sanctions against members of its workforce who fail to comply with HIPAA rules or privacy policies

> The sanction should fit the crime:

– Written warning

– Suspension

– Mandatory training

– Termination

– Report to Department of Health Professions

> Consider intent, seriousness of breach, cooperation, other misconduct or poor performance

Page 22: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

222222

6. Correct the Violation

THIS IS REALLY IMPORTANT!!

> It is an affirmative defense to HIPAA civil penalties if the covered entity or business associate:

– Did not act with willful neglect, and

– Corrected the violation within 30 days.

> HHS examples of willful neglect:

– Failure to implement policies and procedures

– Failure to respond to reported breach/violation

> “Correct the violation” is interpreted broadly, permitting a wide variety of mitigating actions to minimize harm and prevent a future breach.

Page 23: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

232323

6. Log the Improper Disclosure

> Create a HIPAA log that includes the following:

– Date of disclosure

– Name and address of the entity that received the PHI

– Brief description of the PHI disclosed

– Brief statement of the purpose of the disclosure

Page 24: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

242424

6. Report per Breach Notification Rule

> Not every breach requires a report

> No breach notification required if:

– No violation of the Privacy Rule

– PHI is secured, i.e., encrypted or destroyed

– Exception applies

– Low probability that data has been compromised

> Covered entity has burden of proof

Page 25: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

252525

Breach – Notification Not Required

> If a report is required, must report to:

– Each individual whose unsecured PHI has been or reasonably believed to have been accessed, acquired, used, or disclosed

• “Without unreasonable delay” and no later than 60 days

• Content and method of notice detailed in rules

– HHS• >500 persons – contemporaneous with individual notices

• <500 persons – not later than 60 days after end of calendar year

– Local “prominent media outlets,” if breach involves >500 persons in state or jurisdiction

• “Without unreasonable delay” and no later than 60 days

Page 26: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

262626

Beware of Audits

> 2016 Phase 2 HIPAA Audit Program

– Purpose is to “enhance industry awareness of compliance obligations and enable OCR to better target technical assistance regarding problems identified through the audits.”

– Starts with an email from OCR verifying contact information

Page 27: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

272727

2016 Phase 2 HIPAA Audit Program

> Pre-audit screening questionnaire

– Requires list of business associates

> OCR will use random sampling of audit pool

> Process begins with desk audits – completed by December 2016

> Auditors will share draft findings with the entity, and the entity’s written responses will be included in the final report

> “Serious compliance issues” may result in a further OCR “compliance review”

Page 28: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

282828

OCR Audits – Prepare Now!

> Start with an internal audit – the Big Seven

1. Designated HIPAA Privacy and Security Officer?

2. Current Notice of Privacy Practices?

3. Recent completion/update of Security Risk Assessment?

4. Written policies and procedures covering the Privacy, Security, and Breach Notification Rules?

5. Documentation of employee training on policies and procedures?

6. Current business associate agreements?

7. Active HIPAA documentation file

Page 29: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

292929

OCR – HIPAA Guidance Materials

> Understanding Some of HIPAA’s Permitted Uses and Disclosures

> Guidance on Significant Aspects of the Privacy Rule

> Guidance on Individuals' Right to Access Health Information

> Guidance on HIPAA and Workplace Wellness Programs

> Provider Guide: Communicating With a Patient's Family, Friends, or Other Persons Identified by the Patient

> Frequently Asked Questions About Family Medical History Information

> Frequently Asked Questions About the Disposal of Protected Health Information

Page 30: Surviving HIPAA -2016 - RMGMArmgma.org/wp-content/uploads/Surviving-HIPAA-2016-J.-Ball.pdf · >Document investigation . 1818 Investigative Process >Does HIPAA apply? ... >Consider

303030

Please note: This presentation contains general, condensed summaries of actual legal matters, statutes and opinions for information purposes. It is not meant to be and should not be construed as legal advice. Individuals with particular needs onspecific issues should retain the services of competent counsel.

Surviving HIPAA 2016

Questions?

Jeremy A. Ball

[email protected]

(804) 420-6406