Legal Risks and Ethical Problems for Lawyers under the HITECH

advertisement
Legal Risks and Ethical Problems
for Lawyers under the
HITECH Business Associate Rules
Washington State Bar Association Health Law Section
Critical Issues in Heatlhcare
June 13, 2013
© 2013 Christiansen IT Law
Presenter CV
John R. Christiansen, J.D. - Christiansen IT Law
•
Special Assistant Attorney General to Washington State Health Care Authority, health care information issues
related to HIPAA, HITECH, and related issues
•
Privacy and Security Expert, ONC/OCR Comprehensive Campaign for Communication and Education About
the HITECH Act (2010 – pres.); Consultant, ONC State Health Policy Consortium (2010 – pres.); Technical
Advisor, ONC Health Information Security and Privacy Collaboration (2005 – 2009)
•
Chair, ABA HITECH Megarule/Business Associates Task Force (2009 – pres.); Committees on Healthcare
Privacy, Security and Information Technology (2004 – 06); on Healthcare Informatics (2000 – 04); and PKI
Assessment Guidelines Health Information Protection and Security Task Group (2000 – 2003)
•
Executive Committee/Secretary, Washington State Bar Association Health Law Section (2012 – pres.)
•
Adjunct Faculty, University of Washington Information School (2008 – 2012); Oregon Health and Sciences
University Division of Medical Informatics and Outcomes Research (2000 – 2003)
•
Publications include State and Federal Consent Laws Affecting Health Information Exchange (Nat’l
Governors Association 2011); Policy Solutions for Advancing Interstate Health Information Exchange (Nat’l
Governors Association 2009); An Integrated Standard of Care for Healthcare Information Security (2005);
Electronic Health Information: Security and Privacy Compliance under HIPAA (2000); etc.
© 2013
Christiansen IT Law Privacy/Security/Compliance
2
Our Agenda
•
•
•
•
Review of HIPAA Business Associate Concepts
HITECH Changes to Business Associate Concepts
Business Associate Compliance for Attorneys
Business Associate Contracting for Attorneys
© 2013
Christiansen IT Law Privacy/Security/Compliance
3
Your Obligation
RPC 1.1: “A lawyer shall provide competent representation to a client.
Competent representation requires the legal knowledge, skill,
thoroughness and preparation reasonably necessary for the
representation.”
• If you work in health law you need to know at least enough about
HIPAA and HITECH to spot potential issues and possible traps, to
avoid compliance failures for both you and your clients
© 2013
Christiansen IT Law Privacy/Security/Compliance
4
HIPAA BA Review
HIPAA Jurisdictional Limitations and the Business Associate
Workaround
•
•
HIPAA Administrative Simplification intent: Require implementation of
electronic health claims transactions
– Privacy and Security Rules: Ancillary trust builders which grew beyond
expectation
Covered Entities (CE):
– Organizations directly involved in health claims transactions
• Any health care provider which gets paid electronically, health
plans, health care clearinghouses
• Directly regulated under HIPAA – subject to regulatory obligations
and penalties
© 2013
Christiansen IT Law Privacy/Security/Compliance
5
HIPAA BA Review
The Business Associate Workaround
•
•
CEs don’t/can’t perform all functions and activities involving use or
disclosure of PHI by themselves
How to protect PHI when non-CEs must access or control it?
© 2013
Christiansen IT Law Privacy/Security/Compliance
6
HIPAA BA Review
Business Associate (BA): A “person” who is not a CE workforce
member and:
•
© 2013
“Performs or assists in the performance of” a function or activity
involving the use or disclosure of PHI on behalf of a CE
•
Official examples: Claims processing or administration; data
analysis, processing or administration; utilization review; billing;
quality assurance; benefit management; practice management,
repricing
•
Any other “function or activity “ regulated under HIPAA
•
My examples: PHI disclosure to other CEs, individuals, public
health, research, marketing, etc.; security management and
administration; etc.
•
Provides legal, actuarial, accounting, consulting, etc. services to
or for CE involving disclosure of PHI to BA.
• 45 CFR § 160.103
Christiansen IT Law Privacy/Security/Compliance
7
HIPAA BA Review
BA status is “definitional,” does not depend on existence of BAC
•
•
•
If it does what a BA does, it’s a BA
Knowledge or intent of CE or BA are irrelevant
Presence or absence of a contract is irrelevant
© 2013
Christiansen IT Law Privacy/Security/Compliance
8
HIPAA BA Review
Business Associate Contracts (BACs)
•
CE may disclose PHI to/allow BA to create or receive PHI on CE’s behalf
upon “satisfactory assurance” BA will “appropriately safeguard” PHI
•
•
45 CFR § 164.502
“Satisfactory assurance” is BAC including required provisions (or equivalent
memorandum of understanding if governmental entities, plan document
provisions if group health plan)
•
© 2013
45 CFR § 164.504(e)
Christiansen IT Law Privacy/Security/Compliance
9
HIPAA BA Review
If you provide legal services as a BA to a CE, you must have a BAC
•
“A complaint alleged that a law firm working on behalf of a pharmacy chain
in an administrative proceeding impermissibly disclosed the PHI of a
customer of the pharmacy chain. OCR investigated the allegation and
found no evidence that the law firm had impermissibly disclosed the
customer’s PHI. However, the investigation revealed that the pharmacy
chain and the law firm had not entered into a Business Associate
Agreement, as required by the Privacy Rule to ensure that PHI is
appropriately safeguarded. Without a properly executed agreement, a
covered entity may not disclose PHI to its law firm. To resolve the matter,
OCR required the pharmacy chain and the law firm to enter into a business
associate agreement.”
– Pharmacy Chain Enters into Business Associate Agreement with
Law Firm, hhs.gov Health Information Privacy website
© 2013
Christiansen IT Law Privacy/Security/Compliance
10
HIPAA BA Review
BAC Penalties
•
CE may be penalized if CE “knew of a pattern of activity or practice” of the
BA “that constituted a material breach or violation” of the BAC, unless:
• The CE took “reasonable steps to cure the breach or end the violation”
and, “if such steps were unsuccessful:”
• Terminated the BAC, if “feasible,” or if not “feasible” reported the
problem to DHHS
• 45 CFR §.504(e)(1)(ii)
•
No jurisdiction to penalize BAs for BAC violation, or any HIPAA regulatory
violation
© 2013
Christiansen IT Law Privacy/Security/Compliance
11
HIPAA BA Review
BA Subcontractor/Agent Workaround
•
•
•
BAs don’t/can’t perform all functions and activities for/on behalf of CEs
involving use or disclosure of PHI by themselves
BAs may also need to permit other parties to have access to, use, disclose
PHI for BA’s own functions and activities
How to protect PHI when non-BAs must access and/or control it?
© 2013
Christiansen IT Law Privacy/Security/Compliance
12
HIPAA BA Review
BA Subcontractor Workaround
•
Mandatory provision: BA may disclose PHI to “any agent, including a
subcontractor” which agrees to:
– “Implement reasonable and appropriate safeguards” for the PHI, and
– “The same restrictions and conditions which apply to” the BA with
respect to the PHI
• 45 CFR §§ 164.314(a)(2)(i)(B), .502(e)(2)(ii)(D)
© 2013
Christiansen IT Law Privacy/Security/Compliance
13
HIPAA BA Review
BA Subcontractor Workaround
•
•
•
•
•
Vaguely articulated concept: BA delegates “subcontractor” performance of
function, activity or service for ultimate benefit or use of CE
No “subcontractor” definition
“Subcontract” is kinda/sorta like BAC, maybe
BA penalty for noncompliance: Potential BAC termination, if CE finds out
and cares enough
No jurisdiction to penalize BA or subcontractor – or CE
© 2013
Christiansen IT Law Privacy/Security/Compliance
14
HIPAA BA Review
HIPAA
BA/Subcontractor Chain
© 2013
Christiansen IT Law Privacy/Security/Compliance
15
HIPAA BA Review
BA Services Provider Workaround
•
Optional provision: BA may disclose PHI for purposes of the BA’s “proper
management and administration” and to “carry out legal responsibilities,” if
recipient provides “reasonable assurances” that:
– It will hold the PHI “confidentially,”
– The PHI will be used or further disclosed only as required by law or for
purposes for which it was disclosed, and
– The recipient will notify BA of any “breach of confidentiality”
• 45 CFR § 164.504(e)(4)
© 2013
Christiansen IT Law Privacy/Security/Compliance
16
HIPAA BA Review
BA Services Provider Workaround
•
•
•
•
•
Even more vaguely articulated concept: BA can use third parties to perform
limited functions, activities or services for benefit or use of BA
No associated definitions
No meaningful detail re “assurances”
BA penalty for noncompliance: Potential BAC termination, if CE finds out
and cares enough
No jurisdiction to penalize BA, services provider – or CE
© 2013
Christiansen IT Law Privacy/Security/Compliance
17
HIPAA BA Review
HIPAA BA/Services
Provider Relationship
© 2013
Christiansen IT Law Privacy/Security/Compliance
18
HIPAA BA Review
When do lawyers “obtain PHI on behalf of a CE?”
•
•
•
•
•
•
•
Privacy/security compliance support for CEs: Probably yes
Some other kinds of compliance support: Sometimes yes
Fraud and abuse/false claims: Probably yes
Healthcare professional discipline: Probably yes
Risk management for CEs: Probably yes
Due diligence for some types of CE transactions
Representing CE in any case involving individual patient diagnosis or
treatment, individual health benefits: Yes
•
Even if PHI is already public record
•
Even if subject individual is plaintiff
•
Even if subject individual has authorized disclosure by CE
•
Not an exhaustive list
© 2013
Christiansen IT Law Privacy/Security/Compliance
19
HIPAA BA Review
When lawyers don’t “obtain PHI on behalf of a CE.”
•
•
•
•
•
Representing any party which is not a CE
•
Including individual plaintiffs
Workers compensation cases
Social Security cases
Employment law matters
•
Except for representation of group health plans
Not an exhaustive list
© 2013
Christiansen IT Law Privacy/Security/Compliance
20
HITECH BA Expansion
Health Information for Clinical and Economic Health Act (HITECH)
•
•
•
HITECH § 13401(a) mandates application of HIPAA Security Rule to BAs
“in the same manner” as to CEs, requires that HITECH security
requirements applicable to CEs apply to BAs, and requires that all such
provisions “shall be incorporated” into the BAC
HITECH § 13404(a) mandates application of HIPAA BAC regulations (45
CFR § 164.504(e)) to BAs as regulatory requirements, requires that
HITECH privacy requirements applicable to CEs apply to BAs, and
requires that all such provisions “shall be incorporated” into the BAC.
“Omnibus Rule” published January 25, 2013
•
Compliance mandatory as of September 23, 2013
© 2013
Christiansen IT Law Privacy/Security/Compliance
21
HITECH BA Expansion
Revised BA Definition (45 CFR § 160.103)
•
A “person” who is not a CE workforce member and (inter alia):
•
Provides legal, actuarial, accounting, consulting, data aggregation,
management, administrative, accreditation, or financial services on
behalf of a CE, involving disclosure of PHI for purposes of the services
to the BA by the CE or another BA; and
•
A subcontractor that creates, receives, maintains, or transmits PHI on
behalf of a BA
© 2013
Christiansen IT Law Privacy/Security/Compliance
22
HITECH BA Expansion
New Subcontractor Definition (45 CFR § 160.103)
•
Subcontractor means a person to whom a BA delegates a function, activity,
or service, other than in the capacity of a member of the workforce of such
BA
– If a BA delegates a function involving PHI to a subcontractor, that
subcontractor becomes a BA
– If the subcontractor/BA in turn delegates a function involving PHI to
another subcontractor, that other subcontractor becomes a BA
– And so on, as far as activities, functions and services involving PHI are
delegated
•
A “chain of trust” for PHI
© 2013
Christiansen IT Law Privacy/Security/Compliance
23
HITECH BA Expansion
•
•
•
•
•
© 2013
“Upstream:” CE, or BA delegating
function
“Downstream:” BA to which
function is delegated
“First tier” BA: BA with direct
delegation from CE
“Second tier” BA: BA with direct
delegation from first tier BA (and
third, fourth tier, etc.)
“Lower tier” BAs: BAs below first
tier
Christiansen IT Law Privacy/Security/Compliance
24
HITECH BA Expansion
Subcontractor/BAs do not include recipients of PHI for BA purposes
•
“We also provide the following in response to specific comments.
Disclosures by a business associate pursuant to § 164.504(e)(4) and its
business associate contract for its own management and administration or
legal responsibilities do not create a business associate relationship with
the recipient of the [PHI] because such disclosures are made outside of the
entity’s role as a business associate.”
– Preamble to Omnibus Rule at 5574
– Not limited to “agents” of BA
– Not a regulation, but an interpretation
• BA Services Provider is not a Subcontractor, so is not a BA
© 2013
Christiansen IT Law Privacy/Security/Compliance
25
HITECH BA Expansion
•
•
•
© 2013
BA retains law firm to perform
legal services involving PHI for
purposes of BA
BA Services Provider may use,
disclose PHI for BA purposes
BA Services Provider may use
other parties to provide
support/related services for BA
purposes
– These parties are also not
BAs
Christiansen IT Law Privacy/Security/Compliance
26
HITECH BA Expansion
© 2013
•
Can a law firm be a
Subcontractor?
•
Yes to another law firm
Christiansen IT Law Privacy/Security/Compliance
27
HITECH BA Expansion
© 2013
•
Can a law firm be a
Subcontractor?
•
No to any non-lawyer entity if
providing legal services
Christiansen IT Law Privacy/Security/Compliance
28
HITECH BA Expansion
Analysis:
•
Covered Entity can delegate legal services functions to law firm Business
Associate
– Non-lawyer cannot provide legal services (unauthorized practice of law).
RCW 2.48.140
– Therefore non-law firm Business Associate cannot be delegated legal
services functions
– And, non-lawyer cannot direct legal services of lawyer. RPC 1.8(f);
5.4(b), (d)
© 2013
Christiansen IT Law Privacy/Security/Compliance
29
HITECH BA Expansion
Can lawyers escape regulated status?
•
•
•
•
GLBA litigation: American Bar Association v. Federal Trade
Commission (2005): Gramm-Leach-Bliley Act (GLBA) did not give Federal
Trade Commission (FTC) jurisdiction to regulate licensed attorneys in
“practice of law by GLBA privacy regulations, based on interpretation of key
GLBA term “financial institutions”
FACTA litigation: American Bar Association v. Federal Trade
Commission (2011: Licensed attorneys in “practice of law” are not
“creditors” required to comply with identity theft protection “Red Flags
Rules” issued by FTC under Fair and Accurate Credit Transactions Act of
2003 (FACTA)
No known HIPAA challenge to lawyers included as BAs
Legal theories behind GLBA and FACTA litigation do not apply under
HIPAA or HITECH
© 2013
Christiansen IT Law Privacy/Security/Compliance
30
HITECH BA Compliance Obligations
Direct regulatory obligations
•
•
•
•
•
•
•
•
•
Full compliance with the Security Rule for ePHI
Use and disclose PHI only as permitted by the upstream BAC
Comply with the Minimum Necessary rule
Notify the CE in case of a security breach
Provide access to a copy of PHI they maintain to the CE or individual, as
specified in their upstream BAC
Provide the information needed for an accounting of disclosures
Maintain and provide access to their records to OCR to investigate the BA’s
compliance
Requirement for implementing BACs with any downstream BA
Terminate BAC for breach by CE
© 2013
Christiansen IT Law Privacy/Security/Compliance
31
HITECH BA Compliance Obligations
Key BAC obligations
•
•
•
•
•
•
•
•
•
Full compliance with the Security Rule for ePHI
Use and disclose PHI only as permitted in the BAC, including Minimum
Necessary policies of CE
Notify the CE in case of a security incidents, breaches, unauthorized
use/disclosure
Provide access to a copy of PHI in their possession to the CE or individual
Provide the information needed for an accounting of disclosures
Maintain and provide access to their records to OCR to investigate the CE’s
compliance
Implementing BACs with any downstream BA
Authorize termination of BAC for breach by CE
Require return/destruction/escrow of PHI upon termination of BAC
© 2013
Christiansen IT Law Privacy/Security/Compliance
32
HITECH BA Compliance Obligations
Many BAC requirements are
redundant to direct
regulatory requirements
• Some are not, and not
well coordinated
© 2013
Christiansen IT Law Privacy/Security/Compliance
33
HITECH BA Compliance Obligations
BAs are:
•
•
•
•
•
Exposed to potential federal criminal penalties for violation of HIPAA
Subject to regulatory jurisdiction of OCR and state attorneys general
Required to cooperate with OCR investigations of CE and BAs
Exposed to potential civil monetary penalties for violation of HIPAA
Exposed to private tort actions by individuals harmed by BA failure to
comply with HIPAA
© 2013
Christiansen IT Law Privacy/Security/Compliance
34
HITECH BA Compliance Obligations
Hold on a minute . . . What about that last one???
•
HIPAA doesn’t provide an individual cause of action?
•
True, but see R.K. v. St. Mary’s Medical Center, 735 S.E.2d 715, 723
(2012) cert. den. __ U.S. __ (April 1, 2013) (reviewing multistate caselaw
holding HIPAA provides standard of care supporting negligence per se and
related types of tort action to hold same for West Virginia)
See RCW 5.40.050: A “breach of duty imposed by statute… or
administrative rule… may be considered by the trier of fact as evidence of
negligence[.]”
•
•
So a law firm BA owes a duty of care to and can be sued by any individual
whose PHI it has in its capacity as a BA, if harmed by the law firm’s failure
to comply with HIPAA requirements applicable to BAs
© 2013
Christiansen IT Law Privacy/Security/Compliance
35
Structuring Law Firm Compliance
Can law firms segregate compliance obligations?
•
HIPAA concept: “Hybrid entity”
• “A single legal entity that is a [CE] . . . whose business activities include
both covered and non-covered functions . . . and that designates health
care components[.]”
• 45 CFR § 164.103
• “If a [CE] is a hybrid entity, the requirements of [the Security and Privacy
Rules] apply only to the health care component(s) of the [CE.]”
• 45 CFR § 164.105(a)(1)
• “Health care components” may include organizational “components” to
the extent that they perform “covered [CE] functions” or “activities that
would make the component” a BA of a component which performs
covered functions
• 45 CFR § 164.105(a)(2)(iii)(C)(2)
© 2013
Christiansen IT Law Privacy/Security/Compliance
36
Structuring Law Firm Compliance
Can law firms segregate compliance obligations?
•
Hybrid entity CE “must ensure that a health care component” complies with
the Privacy and Security Rules; in particular • No disclosure of PHI to other components unless such disclosure would
be permitted to separate entity
• Protect PHI with respect to other components “to the same extent” as
required under the Security Rule if they were separate entities
• Comply with the Privacy Rule as if the component were CE or BA, as
applicable
• Workforce members serving both health care and other components
may not use or disclose PHI obtained “in the course of or incident to”
work in the former while providing services to the latter, except as would
be permitted by the Privacy Rule for separate entity
• 45 CFR § 164.105(a)(2)(ii)
© 2013
Christiansen IT Law Privacy/Security/Compliance
37
Structuring Law Firm Compliance
Can law firms segregate compliance obligations?
•
Hybrid entity CE (not the component) is responsible for compliance; in
particular • Documented designation of components, including all performing CE
and BA functions
• Maintenance of all Security and Privacy Rule policies and procedures
documentation
• CE as a whole is subject to compliance, enforcement obligations and
penalties
• 45 CFR § 164.105(a)(2)(iii)
© 2013
Christiansen IT Law Privacy/Security/Compliance
38
Structuring Law Firm Compliance
Can law firms segregate compliance obligations?
•
Can hybrid entity concepts be applied to BAs?
• No specific reference in HITECH
• No guidance on point
• Functional equivalents can be established by policies and procedures,
where appropriate backed by technical architecture
• Example:
• Firm designates “health law component” – lawyers, paralegals,
support staff – using policy documentation
• Possibly include “BAs” in other “components,” where
appropriate
• Firm establishes policies and procedures for “health law (and BA?)
component,” and for interaction with “other components” of firm
• Possibly including physical, technical separation; certainly at
least physical, technical identification and distinction
© 2013
Christiansen IT Law Privacy/Security/Compliance
39
Attorney BA Security Compliance
Security Rule compliance is (not in-) consistent with ethical obligations
to protect confidential information
•
•
RPC 1.6(a): “A lawyer shall not reveal information relating to the
representation of a client unless the client gives informed consent, the
disclosure is impliedly authorized in order to carry out the representation or
the disclosure is permitted by paragraph (b).”
– “A lawyer must act competently to safeguard information relating to the
representation of a client against inadvertent or unauthorized disclosure
by the lawyer or other persons who are participating in the
representation of the client or who are subject to the lawyer’s
supervision.” ABA Ethics 2000, Comment 16 to Model Rules of
Professional Conduct 1.6.
Also implicates obligation to provide competent representation. See RPC
1.1
© 2013
Christiansen IT Law Privacy/Security/Compliance
40
Attorney BA Security Compliance
Anticipated Model Rule updates
•
•
•
“To maintain the requisite knowledge and skill, a lawyer should keep
abreast of changes in the law and its practice, including the benefits and
risks associated with technology.” Comment 6 to Model Rule 1.1
Unauthorized access to/inadvertent or unauthorized disclosure of,
confidential information does not violate Model Rule 1.6 if the lawyer has
made reasonable efforts to prevent the access or disclosure, including
security risk analysis and selection of appropriate safeguards. Comment 16
to Model Rule 1.6.
Client may give informed consent to forego security measures that would
otherwise be required by Model Rule. Id.
© 2013
Christiansen IT Law Privacy/Security/Compliance
41
Attorney BA Security Compliance
•
Attorney required to take “competent and reasonable steps to assure that
the client’s confidences are not disclosed to third parties through theft or
inadvertence” and “competent and reasonable measures to assure that the
client’s electronic information is not lost or destroyed,” and “must either
have the competence to evaluate the nature of the potential threat to the
client’s electronic files and to evaluate and deploy appropriate computer
hardware and software to accomplish that end, or if the attorney lacks or
cannot reasonably obtain that competence, to retain an expert consultant
who does have such competence.”
– State Bar of Arizona, Opinion No. 05-04
© 2013
Christiansen IT Law Privacy/Security/Compliance
42
Attorney BA Security Compliance
•
“Whether an attorney violates his or her duties of confidentiality and
competence when using technology to transmit or store confidential client
information will depend on the particular technology being used and the
circumstances surrounding such use. Before using a particular technology
in the course of representing a client, an attorney must take appropriate
steps to evaluate: 1) the level of security attendant to the use of that
technology, including whether reasonable precautions may be taken when
using the technology to increase the level of security; 2) the legal
ramifications to a third party who intercepts, accesses or exceeds
authorized use of the electronic information; 3) the degree of sensitivity of
the information; 4) the possible impact on the client of an inadvertent
disclosure of privileged or confidential information or work product; 5) the
urgency of the situation; and 6) the client’s instructions and circumstances,
such as access by others to the client’s devices and communications.”
– State Bar of California, Formal Opinion No. 2010-179
© 2013
Christiansen IT Law Privacy/Security/Compliance
43
Attorney BA Use and Disclosure of PHI
Basic Principles
•
•
•
•
•
Scope of PHI which BA may obtain is determined by underlying agreement
between CE and first tier BA
Authorized uses and disclosure of PHI are determined by underlying
agreement
CE may not authorize BA to use or disclose PHI in any way not permitted to
CE
BA must comply with CE minimum necessary policies
BA must pass along restrictions on PHI use or disclosure which no less
stringent than those in its BAC, to downstream BAs and Services Providers
© 2013
Christiansen IT Law Privacy/Security/Compliance
44
Attorney BA Use and Disclosure of PHI
Scope of authorization
•
•
•
CE must ensure that its own policies, notices, PHI use and disclosure
restrictions do not preclude appropriate obtaining, use, disclosure of PHI
First tier and other upstream BACs must allow for full scope of PHI to be
obtained, used, disclosed for purposes of engagement
Upstream BACs must not prohibit obtaining, use, disclosure of PHI for
purposes of engagement
• Attorney BA may want to confirm in some cases, with some clients
• Red flag for downstream attorney BAs, Services Providers: Upstream
BACs must include optional provision allowing Services Providers
to obtain, use, disclose PHI for BA legal services purposes
© 2013
Christiansen IT Law Privacy/Security/Compliance
45
Attorney BA Use and Disclosure of PHI
•
•
•
© 2013
Assume BAC between CE and BA
Health IT Vendor does not include
optional BA services provider
provisions
BA may not authorize law firm to
obtain, use or disclose PHI to
provide legal services to BA
Examples: Dispute with CE
alleging BA misuse of PHI, breach
of BAC, breach response and
notification analysis, etc.
Christiansen IT Law Privacy/Security/Compliance
46
Attorney BA Use and Disclosure of PHI
Minimum necessary rule
•
•
•
•
CE or BA must make reasonable efforts to limit PHI requested, used or
disclosed to the minimum necessary to accomplish the intended purpose of
the use, disclosure, or request.
– 45 CFR § 164.502(b)(1)
Minimum necessary policy requirements include functional workforce
classifications relative to PHI needed for routine functions, criteria for nonroutine disclosures
– 45 CFR § 164.514(d)
CE (or upstream BA?) may rely on documented representations that PHI
requested in minimum necessary for professional services purposes, from
professional providing services
– 45 CFR § 164.514(d)(3)(iii)(C)
Attorney BA should have:
– Minimum necessary policies
– Standard form for representations to clients
© 2013
Christiansen IT Law Privacy/Security/Compliance
47
Attorney BA Breach Notification
CE Has the Obligation to Notify Individuals and OCR
•
•
“A CE shall, following the discovery of a breach of unsecured PHI, notify
each individual whose unsecured PHI has been, or is reasonably believed
by the CE to have been, accessed, acquired, used, or disclosed as a result
of such breach.”
“A CE shall, following the discovery of a breach of unsecured PHI . . . notify
[OCR].”
– 45 CFR §§ 164.404(a), .408(a)
© 2013
Christiansen IT Law Privacy/Security/Compliance
48
Attorney BA Breach Notification
Each BA in a Chain Has an Obligation to Notify the CE
•
•
•
“A BA shall, following the discovery of a breach of unsecured PHI notify the
CE of such breach.”
– 45 CFR § 164.410(a)(1)
Required BAC provision that BA must “report to the CE any security incident
of which it becomes aware, including breaches of unsecured PHI as
required by § 164.410.”
– 45 CFR § 164.314(a)(2)(i)(C)
CE may delegate notification to BA
– Omnibus Rule at 5651.
© 2013
Christiansen IT Law Privacy/Security/Compliance
49
Attorney BA Breach Notification
Each BA in a Chain Has an Obligation to Notify the CE
•
•
No regulatory obligation for lower tier BAs to notify upstream BAs
– Only applicable if provided for in non-required BAC provision
– Does notification of upstream BA count as CE notification?
No regulatory obligation for BA Services Providers to notify CE
– BA “assurances” from Services Providers must include notification of
“breach of confidentiality”
– Is that the same as a “breach” under the Breach Notification Rule?
© 2013
Christiansen IT Law Privacy/Security/Compliance
50
Attorney BA Breach Notification
Each BA in a Chain Has an Obligation to Notify the CE
•
Timing of BA notification to CE
– 60 days if BA is not agent of CE
– ASAP if BA is agent of CE, as breach is deemed “discovered” by CE
upon “discovery” by BA, even if BA has not notified CE
• Either avoid making BA an agent, or hold BA to rapid notification to
allow timely CE notification
• Can a lower tier BA be considered CE’s agent?
© 2013
Christiansen IT Law Privacy/Security/Compliance
51
Attorney BA Breach Notification
When is an attorney an “agent?”
•
Agency determined by federal common law. Preamble to Interim Final Rule
• “Agency is the fiduciary relationship that arises when one person (a
"principal") manifests assent to another person (an "agent") that the
agent shall act on the principal's behalf and subject to the principal's
control, and the agent manifests assent or otherwise consents so to
act.” §1.01 Restatement (Third) of Agency
• “An agent has actual authority to take action designated or implied in
the principal's manifestations to the agent and acts necessary or
incidental to achieving the principal's objectives, as the agent
reasonably understands the principal's manifestations and objectives
when the agent determines how to act.” § 2.02(1) Restatement (Third)
of Agency
© 2013
Christiansen IT Law Privacy/Security/Compliance
52
Attorney BA Breach Notification
Limiting attorney “agency”
• RPC 1.2
• “Subject to paragraph[] (c) . . . a lawyer shall abide by a client's
decisions concerning the objectives of representation and . . . shall
consult with the client as to the means by which they are to be pursued.”
• “(c) A lawyer may limit the scope of the representation if the limitation is
reasonable under the circumstances and the client gives informed
consent.”
• Comment 6: “The scope of services to be provided by a lawyer may be
limited by agreement with the client or by the terms under which the
lawyer's services are made available to the client. . . . In addition, the
terms upon which representation is undertaken may exclude specific
means that might otherwise be used to accomplish the client's
objectives. Such limitations may exclude actions that the client thinks
are too costly or that the lawyer regards as repugnant or imprudent.”
© 2013
Christiansen IT Law Privacy/Security/Compliance
53
Access to PHI Maintained by Attorney BAs
Individual rights to access, get copies, request amendment
•
•
Do not apply to “information compiled in reasonable anticipation of, or for
use in, a civil or administrative action or proceeding.”
• 45 CFR § 164.524(a)(1)(ii), .526(a)(2)(iii)
Apply only to “designated record sets”
– A “group of records maintained by or for” a CE, including (i) medical,
billing, payment, claims, case or medical management, or (ii) “used, in
whole or in part, by or for the [CE] to make decisions about individuals.”
• 45 CFR § 164.501
© 2013
Christiansen IT Law Privacy/Security/Compliance
54
Access to PHI Maintained by Attorney BAs
Individual rights to access, get copies, request amendment
•
•
•
RPC 1.6: Attorney may not disclose confidential information of client
without client’s informed consent
When would legal services include or require development of records “used
by or for a CE to make decisions about individuals,” which were not
compiled in “reasonable anticipation of or for use in a civil or administrative
action or proceeding?”
– Consider issues at start of engagement; if potentially problematic get
client’s informed consent
Does inclusion of required access provisions in BAC waive confidentiality
and privilege?
– Consider specifying that access/amendment are not permitted (if
applicable)
– Require CE approval of any access (should probably be done anyway)
© 2013
Christiansen IT Law Privacy/Security/Compliance
55
Accounting of Disclosures by Attorney BAs
Individual right to accounting of disclosures of PHI
•
•
•
•
Specific exceptions: Disclosures for treatment, payment, health care
operations; to, or as authorized by, individuals themselves; facility directory;
national security, correctional facility or law enforcement; limited data set
No exception for information compiled for use in civil or administrative
proceedings
Not restricted to designated record sets
Must include date of disclosure, name of recipient, description of PHI and
statement of the purpose of the disclosure
© 2013
Christiansen IT Law Privacy/Security/Compliance
56
Accounting of Disclosures by Attorney BAs
Accounting of disclosures may include confidential information
•
•
•
RPC 1.6: Attorney may not disclose confidential information of client
without client’s informed consent
This could include information such as identity of experts consulted,
services obtained, which might be embarrassing or detrimental to client. Cf.
Washington State Bar Association Formal Opinion 183, Disclosure of
Information Relating to the Representation of a Client by a Legal Service
Office to the Legal Service Corporation or Other Third Party
– Consider issues at start of engagement; if potentially problematic get
client’s informed consent
Does inclusion of required access provisions in BAC waive confidentiality
and privilege?
– CE should provide the accounting (should probably be done by CE
anyway)
© 2013
Christiansen IT Law Privacy/Security/Compliance
57
Governmental Access to Attorney BA Records
Access to BA records for compliance investigations
•
•
•
•
Access to investigate BA compliance required by rule
Access to investigate CE compliance required by mandatory BAC provision
Production of records for government agency audit may waive both
attorney-client privilege and work product doctrine protection
• U.S. v. Massachusetts Institute of Technology, 129 F.3d 681 (1st Cir.
1997)(waived for purposes of other governmental agency access),
Westinghouse Electric Corp. v. Republic of Philippines, 951 F.2d 1414
(3d Cir. 1991)(waived for purposes of private litigant access)
Waiver is at time of entry into contract with standard access provision
• U.S. v. Massachusetts Institute of Technology, supra
© 2013
Christiansen IT Law Privacy/Security/Compliance
58
Governmental Access to Attorney BA Records
Suggestions for dealing with potential waiver issues
•
•
•
•
Raise potential issues with CE client (informed consent)
Draft BAC provisions carefully
• Limit, condition OCR access rights to records for investigation of CE
client to minimize risk of waiver
• Limit, condition OCR access rights to investigate BA law firm
BA may disclose records, etc. with respect to its own compliance in general,
without reference to particular clients or matters – may be workable
negotiating position with OCR for informal resolution (or at least show good
faith)
Design practice scope, processes and systems to “firewall” matters
potentially subject to investigation from other matters
© 2013
Christiansen IT Law Privacy/Security/Compliance
59
Governmental Access to Attorney BA Records
Investigation of BA compliance - potential for conflict of interest
•
•
•
RPC 1.7(a): “Except as provided in paragraph (b), a lawyer shall not
represent a client if the representation involves a concurrent conflict of
interest. A concurrent conflict of interest exists if . . . there is a significant
risk that the representation of one or more clients will be materially limited
by . . . a personal interest of the lawyer.”
RPC 1.7(b): “Notwithstanding the existence of a concurrent conflict of
interest . . . a lawyer may represent a client if: (1) the lawyer reasonably
believes that the lawyer will be able to provide competent and diligent
representation . . . and (4) each affected client gives informed consent,
confirmed in writing[.]”
When would a conflict present? When should you get consent?
© 2013
Christiansen IT Law Privacy/Security/Compliance
60
BAC Termination Due to Violation
Mandatory BAC provision allowing either party to terminate BAC (and
therefore engagement if other party violates BAC
•
•
•
•
Omnibus Rule removed specific provision for reporting violator to OCR if
termination not feasible
• Still permissible to report, of course
Failure to terminate if violation or breach is uncured may be grounds for
penalizing non-terminating party
Draft termination provisions carefully
• Allow for cure periods, etc.
• Do not apply to provisions not required in a BAC – e.g. breach
notification specifics
Ensure termination provision allows for “escrow” of PHI instead of requiring
return or destruction
• PHI may be retained under protection if return/destruction not “feasible”
• May need to be retained for risk management, related purposes
© 2013
Christiansen IT Law Privacy/Security/Compliance
61
BAC Termination Due to Violation
Ethical obligations upon discovery of BAC noncompliance by client
•
RPC 1.2(d): “A lawyer shall not counsel a client to engage, or assist a
client, in conduct that the lawyer knows is criminal or fraudulent, but a
lawyer may discuss the legal consequences of any proposed course of
conduct with a client and may counsel or assist a client to make a good faith
effort to determine the validity, scope, meaning or application of the law.”
© 2013
Christiansen IT Law Privacy/Security/Compliance
62
BAC Termination Due to Violation
Ethical obligations upon discovery of BAC noncompliance by client
•
RPC 1.16(b): “If a lawyer for an organization knows that an officer,
employee or other person associated with the organization is engaged in
action, intends to act or refuses to act in a matter related to the
representation that is a violation of a legal obligation to the organization, or
a violation of law that reasonably might be imputed to the organization, and
that is likely to result in substantial injury to the organization, then the lawyer
shall proceed as is reasonably necessary in the best interest of the
organization. Unless the lawyer reasonably believes that it is not necessary
in the best interest of the organization to do so, the lawyer shall refer the
matter to higher authority in the organization, including, if warranted by the
circumstances, to the highest authority that can act on behalf of the
organization as determined by applicable law.”
© 2013
Christiansen IT Law Privacy/Security/Compliance
63
Attorney BA Contracting
Potential points of conflicts in BA contracting
•
•
Does entry into a BAC constitute or create a “business transaction” or
pecuniary interest” potentially adverse to a client? See RPC 1.8 (Conflict of
Interest: Current Clients).
– RPC 1.8 “does not apply to ordinary fee arrangements between client
and lawyer, which are governed by Rule 1.5[.]” Comment 1 on RPC 1.8
• RPC 1.5 deals only with reasonableness of fees – not helpful here
Note that even if there is no conflict at time of entry into BAC, subsequent
events could create conflict
– Compliance failure where both parties may be at fault
– Security breach with attendant costs of notification
– Civil damages action where plaintiffs make both CE and BA defendants
© 2013
Christiansen IT Law Privacy/Security/Compliance
64
Attorney BA Contracting
Potential points of conflicts in BA contracting
•
•
Do mandatory BAC provisions set up potential for conflict in case of BAC
violation or security breach?
– Provisions which do not allocate, limit or shift liability perhaps do not
create a conflict?
Non-mandatory provisions allocating, limiting, shifting liability might?
– “Agreements prospectively limiting a lawyer's liability for malpractice are
prohibited unless permitted by law and the client is independently
represented in making the agreement because they are likely to
undermine competent and diligent representation. Also, many clients
are unable to evaluate the desirability of making such an agreement
before a dispute has arisen . . . “
• Comment 14 on RPC 1.8
• Is failure to comply with a BAC “malpractice?”
– Is attorney indemnification of client defense costs limited by RPC
1.8(e)(1) (attorney may not advance or guarantee litigation costs)?
© 2013
Christiansen IT Law Privacy/Security/Compliance
65
Attorney Services Provider Contracting
Remember: Not a BA if providing services to a BA, for the BA’s own
purposes
•
•
•
How do you identify services for BA purposes?
Is it permitted under the upstream BACs?
Services Provider contract minimum mandatory content:
– “Assurance” that PHI will be held confidentially
– “Assurance” that PHI will only be used or further disclosed by Services
Provider as required by law, or for purpose for which it was disclosed to
the Services Provider
– Services Provider will notify BA of any “security incident” or “instance of
which it is aware in which the confidentiality of the PHI has been
breached”
– Services Provider will “agree to implement reasonable and appropriate
safeguards to protect” PHI
© 2013
Christiansen IT Law Privacy/Security/Compliance
66
Attorney Services Provider Contracting
A few questions about Services Provider contract content
•
•
•
•
•
Is “confidentiality” equivalent to legal ethics definition? Does it matter?
Does full Security Rule compliance apply by contract?
How do “security incident” and “breach of confidentiality” reporting link to
Breach Notification Rule?
Can Services Providers ever use or disclose PHI for their own
management, administration, legal responsibilities (compare to BAC
provision)?
– If not prohibited by law, must it be explicitly authorized in upstream
BACs?
Can Services Providers retain PHI upon termination of engagement (like
BAC “escrow” provision)?
© 2013
Christiansen IT Law Privacy/Security/Compliance
67
Attorney Contracting: Special Problem
Outsourcing to data storage/cloud services
•
•
•
OCR has stated that data storage vendors are BAs, even if:
– The vendor does not have a contractual right or authority to access
stored PHI
– The vendor does not need to and never does access stored PHI
– The vendor cannot access stored PHI because it is encrypted and the
vendor does not have access to the key
I think OCR is wrong, but I’m not the regulatory authority
Some cloud services vendors take the position they are not BAs
– Use of such a vendor as a BA would entail violation of both regulations
and upstream BAC
– Could attorney Services Provider to BA use non-BA data storage
vendor? Should it?
© 2013
Christiansen IT Law Privacy/Security/Compliance
68
Attorney Contracting
Summary: Provisions and perspectives on attorney BACs
•
•
•
•
•
•
•
•
Know your client: CE? First tier BA? Lower tier BA?
Know your engagement: Are you a first tier BA? Lower tier BA? BA Services
Provider?
Know your engagement: Does it involve PHI? Is it an activity not covered by
HIPAA/HITECH?
Know your PHI constraints: Upstream BACs and minimum necessary
policies
Define engagement scope to minimize risk of “agent” status for breach
notification
Draft PHI access, accounting of disclosure and governmental access
provisions carefully to minimize risks of confidentiality, privilege waiver
Avoid risk shifting provisions to minimize conflict potential
Consider if any circumstances or conditions make informed consent to any
provision prudent
© 2013
Christiansen IT Law Privacy/Security/Compliance
69
Attorney Contracting
Compliance timing and BACs
•
•
No “grandfathered” contracts as proposed
Some BACs “deemed compliant” until September 22, 2014
– To be “deemed compliant” a BAC must be:
• In compliance with pre-HITECH HIPAA BAC requirements
• In effect before January 25, 2013,
• Not apply to agreements or arrangements which are renewed (for
evergreen contracts) or amended before September 23, 2013
– In other words, if the underlying agreement of a BAC is
renewed or amended, the BAC is no longer deemed compliant,
even if the BAC is not amended
– “Deemed compliant” status terminates on the earlier of:
• Renewal or amendment of the underlying agreement, or
• September 22, 2014
© 2013
Christiansen IT Law Privacy/Security/Compliance
70
Questions? Thanks!
© 2013
Christiansen IT Law Privacy/Security/Compliance
71
Download