Columbia University Health Sciences Research under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) HIPAA Overview Health Insurance Portability and Accountability Act (HIPAA) Administrative Simplification Insurance Reform [Portability] [Accountability] Transactions, Code Sets, & Identifiers Compliance Date: 10/16/2002 and 10/16/03 Privacy Security Compliance Date: 4/14/2003 Compliance Date: 4/20/2005 PRIVACY vs. SECURITY PRIVACY Refers to WHAT is protected — Health information about an individual and the determination of WHO is permitted to use, disclose, or access the information SECURITY Refers to HOW private information is safeguarded—Insuring privacy by controlling access to information and protecting it from inappropriate disclosure and accidental or intentional destruction or loss. PRIVACY WHAT does the Privacy Rule COVER? Protected Health Information (PHI) = Individual (Patient) identifiable information relating to the past, present or future health condition of the individual ALL information whether maintained in electronic, paper or oral format PRIVACY WHAT does the Privacy Rule MEAN? Limits the Use and Disclosure of PHI Most uses or disclosures outside of treatment or payment require actual patient authorization or an exception to authorization—e.g., research Establishes Individual’s (Patient) right to control access and use of PHI Right to inspect or copy PHI Right to amend incorrect information, etc… PRIVACY WHAT does the Privacy Rule MEAN? (cont’d) Balances health information protection and individual rights against public health and safety needs Administrative Requirements Privacy Officer Privacy Board to review research Notice Training & Sanctions Safeguards Policies & Procedures RASCAL HIPAA Forms Human subjects research using identifiable health information must meet one of the following criteria: Form A) HIPAA Clinical Research Authorization Form A - Spanish Version HIPAA Clinical Research Authorization Form B) HIPAA Application for Waiver of Authorization Form C) Request for Recruitment Waiver of Authorization Form D) Investigator's Certification for Reviews Preparatory to Research Form E) Investigator's Certification for Research with Decedents' Information Form F) Data Use Agreement for Disclosure of a Limited Data Set for Research Purposes Form G) Investigator's Certification for Research with De-Identified Data HIPAA and Research HIPAA mandates that a Privacy Board ensure institutional compliance with HIPAA The Privacy Board function can be administered by an IRB or as a separate function For research involving human subjects at CUMC, this function is fulfilled by a Privacy Board function separate from the IRB—meets every two weeks HIPAA and Research Privacy Board Exceptions Authorization signed by patient for all clinical research Waiver Criteria applied before records research • Preparatory to research • Decedent • De-identified • Limited Data Set HIPAA Authorization Authorization signed by patient for all clinical research Patient authorization elements The information Who may use or disclose the information Who may receive the information Purpose of the use or disclosure Expiration date or event Individual’s signature and date Right to revoke authorization Right to refuse to sign authorization Redisclosure statement HIPAA Authorization The information Relates to “minimum necessary standard” (we will use only the PHI we need to for the research) Who may use or disclose the information “the PI and the research team” Who may receive the information The sponsor/CRO/central labs/etc. HIPAA Authorization Purpose of the use of disclosure Expiration date or event Short description of research “end of study”; “never” for databases Individual’s signature and date Subject must receive signed copy Must be retained for 6 years HIPAA Authorization Right to revoke authorization Right to refuse to sign authorization Must be made in writing Reliance exception If refusal exercised, research related treatment can be withheld—note you cannot as a provider condition signing an authorization for research on the provision of nonresearch related treatment Redisclosures not protected Statement that redisclosures may happen and their PHI would no longer be protected Problem areas Creation of research databases from treatment encounters Compound authorizations not permitted—e.g., to build a research database and do specific research from that database Future unspecified research cannot be authorized— particular problem with Sponsor requested language Patients general right to their health information—does this extend to research related treatment? HIPAA Waiver of Authorization Waiver Criteria applied before records research Most likely to be used in cases of research involving retrospective chart reviews IRB/Privacy Board may also waive authorization to allow use of PHI by third parties to recruit study subjects—no waiver or authorization needed to recruit a researcher’s patients into a clinical trial HIPAA Waiver Criteria Waiver requires IRB/Privacy Board approval and documentation of three (3) waiver criteria: 1. Use or disclosure involves no more than minimal risk to privacy of the subject based on, at least: Adequate plan to protect the information from improper use and disclosure; Adequate plan to destroy identifiers; and Written assurances that the PHI will not be disclosed further than as set forth in the waiver HIPAA Waiver Criteria, con’t 2. The research could not practicably be conducted without waiver or alteration 3. The research could not practicably be conducted without access to and use of the PHI Waiver problem areas Case studies or—case studies generally not research must be de-identified Limited # of subject studies Your research involves the disclosure of health information which the patient has to authorize—e.g., HIV status Your requesting a waiver for research where the Privacy Board believes you have ample opportunity to get actual authorization—e.g., research database creation Recruitment Issues PI who is also subjects MD may contact his/her patients directly about research IRB approved recruitment letters ok—should be signed by treating MD—active versus passive consent IRB approved advertisement—subjects call investigator or screening service Not OK—recruiting out of waiting rooms; investigators with no relationship calling patients directly Authorization and Waiver exceptions Exceptions Documented • Preparatory to research There can be no disclosure of PHI to researchers from CU or NYPH without authorization or waiver unless the disclosure is for: 1. 2. Preparatory research—i.e., to assess feasibility of research; formulate a research hypothesis; or define recruitment cohort Or an exception applies—e.g., decedent; deidentified; limited data set Reviews Preparatory to Research CE obtains a representation from the researcher that: Use or disclosure is sought solely to review protected health information as necessary to prepare a research protocol; No protected health information is to be removed from the covered entity by the researcher in the course of the review; and The protected health information is necessary for the research purposes. De-Identified Health Information Research on a decedent De-identified Limited data set 1. If information is “de-identified” in accordance with “generally accepted statistical and scientific principles or methods” 2. If all identifiers listed in a “safe harbor” are removed— this safe harbor requires the removal of 18 identifiers (of limited use) 3. Dummy identifier to facilitate linkage within CE permitted Limited Data Set Permits identifiers not permitted by de-identification safe harbor such as: Zip code, town, city & state, date of birth/death and dates of service Benefit: no need for waiver or authorization if only disclosing a limited data set to a researcher; accounting rule doesn’t apply Requires a “data use agreement” with the intended recipient Limited Data Set Authorized for public health, research, and health care operations purposes: 1. Public health uses—disease registries maintained by private sector or universities or other types of studies for public health purposes 2. Possible health care operations use—hospital sharing of limited data set information with local hospital association 3. Possible research use—establishment of research databases and repositories HIPAA Security Soumitra Sengupta Information Security Officer Columbia University Biomedical and Health Information Services (CUBHIS) HIPAA Recap Health Insurance Portability and Accountability Act (HIPAA) - 1996 Administrative Simplification Transaction code standards (November 2003) Privacy (April 2003) Information Security (April 2005) Definitions Protected Health Information (PHI) Health or medical information identifiably linked to a specific individual, such as information about: their identity – demographic and financial data their medical condition and treatment – clinical data Electronic PHI (EPHI) PHI stored on or transmitted via our computers and networks, including CDs, PDAs, tapes, and clinical equipment Goal of HIPAA Security regulation is to – Secure EPHI Concepts of Info Security Confidentiality Prevent unauthorized access or release of EPHI Prevent abuse of access (identity theft, gossip) Integrity Prevent unauthorized changes to EPHI Availability Prevent service disruption due to malicious or accidental actions, or natural disasters. Regulation specification Administrative Safeguards Physical Safeguards Policies and Procedures Responsibility Awareness and Training Incident Processing, Sanctions Workstation Use and Security Facility Access Control Device and Media Control Technical Safeguards Access Control Audit Control Encryption and Integrity control Action items to compliance Development of Policies and Procedures Information Security Mgmt Process General Info Security Workstation Use and Security Sec: Backup, Device & Media Control Information Access Mgmt & Control Info Sec: Audit and Evaluation Workforce Security Clearance, Term and Auth Info Info Sec: Facility Access Control & Security Info Info Sec: Security Incident Procedure Sec: Disaster Contingency & Recovery Plan Information Security Best Practices Action items to compliance Infrastructure security Computer network and systems security Firewalls, Intrusion Detection/Prevention systems Secure remote access – VPN Assuring availability: Bandwidth restrictions to the Internet Anti-virus (Symantec) Anti-spyware (Pest Patrol) Host Integrity Check (Tripwire) Communication with patients (Relay Health) Facilities Security Data Centers (planned upgrade) Action items to compliance Infrastructure security Workforce Security Authentication and Termination Columbia UNI, CUMC/NYP LDAP, Weill Cornell LDAP Termination from NYP, CU, WC Human Resources, CU Student Information Services, WC Students, Service Corporation, Private/Temp employees, etc. Security Incident Processing and Sanctions Others Responsibility action items Information Asset Owner Responsibility Risk Assessment and management Tier A – More than 20 users – A Detailed Security Questionnaire and a set of formal Documentation about security of the asset Tier B – Less than 20 users – A Limited Security Questionnaire – 11 security questions Implementation of Security Controls Audit and evaluation Disaster Contingency and Recovery Plan Additional information in Policy documents Action items Report EPHI applications with more than 20 users to us to initiate rigorous security risk assessment For applications with less than 20 users, CUBHIS is scheduling for an external agency to conduct security sessions for asset owners to Learn about necessary security methods Help fill out the limited Questionnaire CUBHIS is also available for server and workstation management services for assets that need better management (“Custodial functions”) Action items We will incorporate security training with privacy training; call upon us to discuss HIPAA security to your department. All new Clinical Systems must be technically evaluated and approved by Dr. Randy Barrows Jr., Asst VP, CUBHIS Clinical Resources. Approval criteria includes HIPAA Security check requirements. All EPHI assets are required to be registered We are working with IRB and Privacy Board to incorporate Security checks for research systems, Expect a guidance from IRB about security of all research, not just EPHI research. Responsibility action items Manager responsibility Workforce Clearance, Termination and Authorization Facilities access to sensitive information assets Education, security reminders, sanctions End User responsibility “Acceptable Use” Safe practices Sensitivity towards patient privacy Consequences of Security Failure Disruption of Patient Care Increased cost to the institution Legal liability and lawsuits Negative Publicity Identity theft (monetary loss, credit fraud) Disciplinary action Types of Security Failure Intentional Attacks Malicious Software (Virus, Spyware) Stolen Passwords (Keyloggers, Trojans) Impostors e-mailing to infect and steal info (Phishing) Theft (Laptop, PDA, CD/USB storage devices, etc.) Abuse of privilege (Employee/VIP clinical data) Theft of copyrighted material (Kazaa) Types of Security Failure Employee Carelessness Sharing Passwords Not signing off systems Downloading and executing unknown software Sending EPHI outside the institution without encryption Losing PDA and Laptop in transit Pursuing risky behavior – Improper web surfing, and instant messaging Not questioning, reporting, or challenging suspicious or improper behavior Methods to Protect against Failures Install anti-virus, anti-spyware solutions, Install security patches Update definitions daily Use caution when viewing web pages, e-mail attachments, and using games and programs Chose strong passwords, refuse to share it, change if you suspect a breach Protect your laptop or PDA with a password, and turn on encryption on sensitive folders, including copies in CD, Floppy, USB storage devices, etc. Methods to Protect against Failures Do not abuse clinical access privilege, report if you observe an abuse (if necessary, anonymously) Do not be responsible for another person’s abuse by neglecting to sign off, this negligence may easily lead to your suspension and termination Do not copy, duplicate, or move EPHI without a proper authorization Do not email EPHI without encryption to addresses outside the institution Methods to Protect against Failures Strictly follow principles of ‘Minimum necessary’ and ‘Need-to-know’ for all accesses– the 3 fundamental missions of the institution are Care, Education and Research. Challenge improper behavior, question suspicious behavior, report violations and security problems to proper authorities – email to hipaa@columbia.edu or security@cumc.columbia.edu or call Privacy Office (1-212305-7315) or call CUBHIS Helpdesk (1-212-305-HELP) Communicate with colleagues and staff about secure and ethical behavior More Information Current Website Go to http://www.cumc.columbia.edu/cubhis/ Select Security, and then CUMC HIPAA Email to security@cumc.columbia.edu or sen@columbia.edu