Walking Through the Breach Notification Process

advertisement
Walking Through the Breach
Notification Process Beginning to End
HIPAA COW
Presentation and Panel
April 8, 2011
Panelists

Nancy Davis, Ministry Health Care

Beth Malchetske, ThedaCare

Peg Schmidt, Aurora Health Care

Teresa Smithrud, Mercy Health System
Overview

This presentation and panel discussion
will address operationalizing the breach
notification process within the covered
entity.

Expert panelists will share best practices
and lessons learned in the last year with
compliance to HITECH’s breach
notification requirement.
Objectives

Identify Breach Notification Resources for
Developing an Internal Process and Response

Walk Through the Breach Notification Process
from Beginning to End

Review Any New HITECH Impacts if
Applicable

Panelist Discussion on Lessons Learned and
Best Practices Developed

Audience Participation and Discussion
Resources

HIPAA COW HITECH Breach Notification
Policy

All Inclusive Guidance

American Health Information Management
Association (AHIMA)

North Carolina Healthcare Information and
Communication Alliance (NCHICA)

Google!
Breach

Acquisition, access, use, or disclosure of protected
health information (PHI) in a manner not permitted
under the Privacy Rule which compromises the
security or privacy of the PHI. For purpose of this
definition, “compromises the security or privacy of the
PHI” means poses a significant risk of financial,
reputational, or other harm to the individual.

A use or disclosure of PHI that does not include the
identifiers listed at §164.514(e)(2), limited data set,
date of birth, and zip code does not compromise the
security or privacy of the PHI.
Low-Risk HIPAA Violations –
Exempt from Breach Notification

HITECH Guidance: Breach does not include:

Good faith, unintentional acquisition, access, or use of
PHI by a workforce member of a CE, BA, or BA
subcontractor

Inadvertent disclosure to another authorized person
within the entity or its business associates

Recipient could not reasonably have retained the data

Data is limited to a limited data set that does not
include dates of birth or zip codes
7
Investigation

Review the circumstances regarding the breach,
conduct an investigation, complete a risk
assessment, and determine necessary actions
including involvement of enterprise, local, and legal
counsel resources.

Coordinate communications with all involved in the
investigation, including patients, licensing and
accrediting organizations, state and federal
governmental agencies, etc.
Investigation - Continued

Author, gather, maintain, and retain all related
Breach investigation documentation (to be
maintained for a minimum of six years).

Recommend resolution and corrective action steps
(sanctions) to mitigate potential harm.

Report results of the investigation to involved
persons, entities, and agencies as recommended
and/or required by law.
Risk Assessment



Who impermissibly used or to whom was
the information impermissibly disclosed?
The type and amount of PHI involved?
The potential for significant risk of
financial, reputational, or other harm?
Risk Assessment - Resource
North Carolina Healthcare Information and
Communication Alliance (NCHICA)*

HITECH Act Breach Notification Risk
Assessment Tool



Flow Chart
Report Form
Score Card/Risk Score
*Nationally recognized nonprofit consortium dedicated to “improving
health and care in North Carolina by accelerating the adoption of
information technology and enabling policies.”
Patient Breach Notification Letter

Content – The notice shall be written in plain
language and must contain the following
information:


A brief description of what happened, including the
date of the breach and the date of the discovery of
the breach, if known
A description of the types of unsecured protected
health information that were involved in the breach
(such as whether full name, Social Security
number, date of birth, home address, account
number, diagnosis, disability code or other types of
information were involved)
12
Letter - Continued

Any steps the individual should take to protect
themselves from potential harm resulting from
the breach

A brief description of what the organization is
doing to investigate the breach, to mitigate
harm to individuals, and to protect against
further breaches

Contact procedures for individuals to ask
questions or learn additional information
Breach Notification < 500

Office for Civil Rights

For breaches that affect fewer than 500 individuals,
a covered entity must provide the Secretary with
notice annually. All notifications of breaches
occurring in a calendar year must be submitted
within 60 days of the end of the calendar year in
which the breaches occurred (March 1, 2011).

A separate form must be completed for every
breach that has occurred during the calendar
year.
Breach Notification 500+

Office for Civil Rights


If a breach affects 500 or more individuals, a
covered entity must provide the Secretary with
notice of the breach without unreasonable delay
and in no case later than 60 days from discovery of
the breach. This notice must be submitted
electronically.
Media

Notice shall be provided to prominent media outlets
serving the state and regional area when the
breach affects more than 500 patients.
Panelist Portion
Was Your Organization Ready
for HITECH Breach Notification?
How Did You Prepare?
Policy Development
Staff Training, Education, Awareness
Business Associate Relationships
What Was the Biggest Surprise in
Implementing Breach Notification?
What Was the Most Valuable
Lesson Learned?
What Best Practices Did You
Develop?
What Are Your Ongoing
Concerns?
Audience Participation
Lessons Learned

Totally Underestimated Impact on Daily Job
Responsibilities



2008: 38 Internal Privacy Investigations
2009: 98 Internal Privacy Investigations (48 Last
Q)
2010: 210 Internal Privacy Investigations

Initial Approach to Addressing “Harm” Was
Probably Too Conservative

Partner with Collection Agency to Address
Processes, Policies, Etc.
Lessons Learned - Continued

Reach Out to Peers for Brain-Storming
Best Practices

Be Open to New
Directives/Interpretations
Contacting Patients to Determine “Harm”
 Employee Breach Attestation

Lessons Learned - Continued

Mitigation
Patient Requests
 Organizational Offerings


Bookmark/Print Examples from
Published Breaches
Notices
 Press Releases
 Website Communications
 External Resources (Credit Card Agencies)

Download