hipaa security and privacy rules: working together hipaa ... · thank you! tom hanks 630.514.7706...

37
HIPAA Security and Privacy Rules: Working together HIPAA SUMMIT WEST 2001 June 21, 2001 Tom Hanks - WEDi Co-chair Privacy Policy Advisory Group Co-chair Security Policy Advisory Group

Upload: others

Post on 04-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

HIPAA Security and Privacy Rules: Working together

HIPAA SUMMIT WEST 2001June 21, 2001

Tom Hanks - WEDiCo-chair Privacy Policy Advisory GroupCo-chair Security Policy Advisory Group

Page 2: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 2

Working Together:HIPAA Security and Privacy

♦Security NPRM

♦Privacy Rule – final 4/14/2001

♦Final Security rule will be harmonized with the final Privacy rule

♦Final Privacy rule prepares us for the final Security rule

Page 3: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 3

Working Together:HIPAA Security and Privacy

♦Who & what is covered

♦Reasonableness – how much is enough

♦Audit trails

♦Areas of protection

Page 4: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 4

Working Together:HIPAA Security and Privacy

♦Scalability of requirements

♦Access controls

♦Internal use & disclosure

♦What kind of “safeguards” are required

Page 5: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 5

Security vs. Privacy... Definitions

♦Security–ability to control access and

protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss

Page 6: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 6

Security vs. Privacy:Definitions♦Privacy

– defines who is authorized to access information (the right of individuals to keep information about themselves from being disclosed)

– Individual’s rights

Page 7: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 7

DHHS Privacy & Security Rules Commonalities

♦Boundaries

– Who & what is covered

♦Security: Safeguarding PHI

♦Administrative

– Policies & procedures

Page 8: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 8

Security – What is CoveredProtected Health Information

♦Security– Any individually identifiable health

information maintained or transmitted electronically

– Also includes demographics

Page 9: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 9

Privacy – What is CoveredProtected Health Information

♦Privacy - Broader Definition of Protected Health Information– All individually identifiable health

information in ANY form or media

– Includes subsets of health information such as demographics

Page 10: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 10

Privacy – Defines Identifiable

♦De-identified data defined by removing list of elements

♦Statistical determination that the risk of re-identification by the receiving entity is very small

Page 11: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 11

Privacy and Security– Who Are Covered Entities♦Clearinghouses

♦Health Plans

♦Health care providers that transmit covered transactions

Page 12: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 12

Privacy – Expands the Boundaries of Protection

♦Business Associate Contract (BAC) required with any entity that performs services to or on behalf of a covered entity that uses or discloses PHI belonging to the covered entity.

Page 13: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 13

Privacy – Expands the Boundaries of Protection

♦BAC requires the business associate to maintain safeguards necessary to protect PHI from unauthorized disclosure

♦Final Security rule conforming to Privacy BA provisions

Page 14: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 14

Security – Safeguarding PHI

♦ Establish and maintain reasonable and appropriate administrative, technical, and physical safeguards to ensure integrity, confidentiality, and availability of the information

♦ Requirements are technology neutral - -each organization determines the technology to achieve outcome

Page 15: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 15

Security – Safeguarding PHI(cont’d)♦ No proscribed implementation♦ Reasonably required to protect from

intentional or unintentional violation♦ Each health care business determines

their own needs♦ Implementation varies according to size

and type of entity♦ Must consider cost

Page 16: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 16

Privacy – Safeguarding PHI

♦Must have in place appropriate administrative, technical and physical safeguards to protect the privacy of PHI

♦Reasonably safeguard health information

Page 17: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 17

Privacy – Safeguarding PHIReasonably?♦Common sense, flexible and scalable

♦Implementation varies with size and type of activities

♦Must consider cost– Strike a balance between protecting

privacy and the cost of doing so

Page 18: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 18

Privacy – Safeguarding of PHI

♦Not required to guarantee the safety of PHI against all threats

♦Theft of PHI may not be a violation if reasonable policies in place

Page 19: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 19

Security –Need to Know Provision

Need-to-know procedures for

personnel access (a security principle

stating that a user should have access

only to the data he or she needs to

perform a particular function).

Page 20: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 20

Privacy -Minimum Necessary Provision

Except for treatment…– Disclosure of any patient

information is limited to the minimum amount necessary to accomplish the purpose of the disclosure

– Internal & external

Page 21: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 21

Security – Access Controls

♦Context based

♦User based

♦Role based

Page 22: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 22

Privacy – Access Controls

♦Privacy rule establishes access♦Role based♦Identify persons or class of

persons that need access to PHI♦Limit access to only the PHI

needed to perform their job

Page 23: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 23

Privacy – Access ControlsReasonable Efforts

♦Takes into account the ability of the entity to configure its record system to allow selective access

♦Practicality of organizing systems to allow this capacity

♦Recognizes limitations on parsing paper records

Page 24: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 24

Security – Audit Trails

♦ Audit trails required – no implementation provision

♦ The data collected and potentially use to facilitate a security audit

♦ Internal audit requirement to review records of system activity – audit trail

Page 25: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 25

Privacy – Accounting for Disclosure – No Audit Trail

1. Date of each disclosure2. Name and address, if known, of

person or entity receiving the PHI3. Brief description of information

disclosed4. Purpose for disclosure or copy of

individual’s authorization

Page 26: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 26

Privacy – Defines Audit Trail Expectations

u Audit trails do not usually record each time a record is used or reviewed

u Audit trails typically record each time a sensitive record is altered

u Important to coordinate Accounting for Disclosure with Audit Trails in Security

Page 27: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 27

Security – Training Requirements

♦ Security awareness training– All employees, agents and contractors– Customized to job responsibilities– Focus on issues: e.g. use of PHI,

confidentiality and security– Specifics such as: password

management, virus control and incident reporting

– On-going reminders

Page 28: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 28

Privacy – Training Requirements

♦ Provide training to entire workforce– Policies and procedures used to protect

PHI under Privacy– Completed by compliance date and then

for all new members of workforce Re-train affected employees on any changes in privacy policies

– Policies and procedures must be implemented to both provide training and document completion

Page 29: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 29

Security – Policies & Procedures

♦General security policies

♦Audit, assessment & risk analysis

♦Audit trails & monitoring

♦Change control Media controls

♦Contingency planning and disaster recovery

Page 30: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 30

Security – Policies & Procedures(cont’d)

♦Termination and orientation♦Access controls♦Personnel clearance♦Formal record processing

♦Security incident

♦Workstation location

Page 31: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 31

Privacy – Polices & Procedures

♦ Reasonably designed and developed to comply with rule -taking into account size and nature of the activities

♦ Documented in writing – keep for 6 years

Page 32: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 32

Privacy – Polices & Procedures (cont’d)

♦ Process in place for revision to promptly reflect changes in applicable laws or regulations

– Ensure that revisions of privacy practices comply with the Privacy rule and that revisions are promptly reflected in privacy policies

– Process to revise notices and inform individuals of the revision

Page 33: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 33

Wrap-Up

♦ Security & Privacy rules are interwoven♦ Both Security and Privacy address

safeguarding health information♦ No material changes to Security NPRM

expected♦ Final Security rule is being aligned with

final Privacy rule♦ Final Privacy rule gives us guidance to what

to expect from final

Page 34: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 34

Resources

♦WEDI web site– www.wedi.org

♦AFEHCT web site– www.afehct.org

♦EHNAC web site– www.ehnac.org

Page 35: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 35

Resources

♦DHHS - administrative simplification– aspe.dhhs.gov/admnsimp/index.htm

♦DHHS data council web site– aspe.dhhs.gov/datacncl/

♦ NCVHS Web Site– ncvhs.hhs.gov

Page 36: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Workgroup for Electronic Data InterchangeTom Hanks Copyright 2001, all rights reserved 36

Resources

♦HIPAA Comply web site – www.HIPAAcomply.com

♦HIPAAlive web site– www.HIPAAlive.com

Page 37: HIPAA Security and Privacy Rules: Working together HIPAA ... · Thank you! Tom Hanks 630.514.7706 TomHanks@ameritech.net

Thank you!

Tom Hanks [email protected]