2012 Christiansen IT Law

advertisement
HIPAA and HITECH:
An Update on the
New Enforcement Rules
Washington State Bar Association
Critical Issues in Health Care
June 14, 2012
© 2012 Christiansen IT Law
Presenter CV
John R. Christiansen, J.D. - Christiansen IT Law
Information Technology Law: Privacy, Security, Compliance
Contracting, and Risk Management & Due Diligence
•
Chair, ABA HITECH Megarule Task Force (2012 – present); Business Associates Task Force
(2009 – 2012); Committees on Healthcare Privacy, Security and Information Technology (2004
– 06); on Healthcare Informatics (2000 – 04); and PKI Assessment Guidelines Health
Information Protection and Security Task Group (2000 – 2003)
•
Special Assistant to Washington State Health Care Authority/HITECH and HIPAA; USDHHS Office
of Coordinator for Health Information Technology; Technical Advisor, State Health Policy
Consortium (2010 – present) and Health Information Security and Privacy Collaboration
(2005 – 2009)
•
Publications include State and Federal Consent Laws Affecting Health Information Exchange
(Nat’l Governors Association 2011); Policy Solutions for Advancing Interstate Health
Information Exchange (Nat’l Governors Association 2009); Legal Speed Bumps on the Road to
Health Information Exchange, Journal of Health and Bioscience Law (2008); An Integrated
Standard of Care for Healthcare Information Security (2005); etc.
June 14, 2012
© 2012 Christiansen IT Law
2
Our Agenda
•
•
•
•
HITECH Update
Criminal Penalties
Civil Enforcement Procedures
Civil Monetary Penalties
June 14, 2012
© 2012 Christiansen IT Law
3
HITECH Update
• HIPAA – the Health Insurance Portability and Accountability Act of
1996
– Privacy Rule
– Security Rule
– Transactions Rule
– Enforcement and Civil Monetary Penalties Rules
• HITECH – the Health Information Technology for Economic and
Clinical Health Act; part of 2009 American Recovery and Relief Act
(ARRA) stimulus legislation; supplements and amends HIPAA
June 14, 2012
© 2012 Christiansen IT Law
4
HITECH Update
• Current status of HITECH Regulations
– HITECH Breach Notification Interim Final Rule [IFR], 74 Fed.Reg.
42740 (August 24, 2009)
– HITECH Enforcement Interim Final Rule, 74 Fed.Reg. 56123
(October 30, 2009)
– HITECH Notice of Proposed Rule Making [NPRM] re
Remuneration Disclosure, Minimum Necessary, Provision of
Electronic Records and Business Associates, 75 Fed.Reg. 40868
(July 14, 2010)
– HITECH Accounting of Disclosures NPRM, 76 Fed.Reg. 31426
(May 31, 2011)
June 14, 2012
© 2012 Christiansen IT Law
5
HITECH Update
• Coming HITECH Attractions
– “Modifications to the HIPAA Privacy, Security, Enforcement, and
Breach Notification Rules”
• Submitted to OMB March 24, 2012; technically due for publication
no later than June 22, 2012
– Publication “by the end of summer.” Farzad Mostashari, National
Coordinator for Health Information Technology (June 6, 2012)
June 14, 2012
© 2012 Christiansen IT Law
6
HITECH Update
• Coming HITECH Attractions
– Included:
• Business Associate (BA), Subcontractor Security Rule and limited
Privacy Rule compliance and liability
• New penalty levels
• Updated/revised breach notification
• Privacy Rule amendments per Genetic Information
Nondiscrimination Act of 2008 (GINA)
• Also guidance on business associate contracts, de-identification, and
conduct of risk assessments to determine security breach
June 14, 2012
© 2012 Christiansen IT Law
7
HIPAA Penalties
Two types of penalty: Civil and criminal
• A HIPAA violation which “constitutes an act punishable” as a HIPAA
criminal offense may not be grounds for civil penalties
• 42 USC § 1320d-5(b)(1)
• Criminal penalty enforcement by U.S. Dep’t of Justice (DOJ)
• Civil monetary penalty (CMP) enforcement by DHHS Office of Civil
Rights (OCR)
June 14, 2012
© 2012 Christiansen IT Law
8
Criminal Penalties
Expansion of Criminal/Civil Penalties to Business Associates (BAs)
• In the case of a business associate that violates any provision of
subsection (a) or (b), the provisions of sections 1176 and 1177 of
the Social Security Act (42 U.S.C. 1320d–5, 1320d–6) shall apply
to the business associate with respect to such violation in the
same manner as such provisions apply to a person who violates
a provision of part C of title XI of such Act.
• HITECH § 13404(c)
• 42 USC § 1320d-6: HIPAA criminal penalties
• 42 USC § 1320d-5: HIPAA civil penalties
June 14, 2012
© 2012 Christiansen IT Law
9
Criminal Penalties
HIPAA criminal penalties
• Criminal penalties may be imposed only upon proof beyond a
reasonable doubt that a “person”:
• Knowingly and
• In violation of HIPAA or any of its regulations,
• Either:
• Uses “or causes to be used” a unique health identifier (as
required by regulation, e.g. plan or provider number);
• Obtains individually identifiable health information; or
• Discloses individually identifiable health information to
another person
• 42 USC 1320d-6(a)
June 14, 2012
© 2012 Christiansen IT Law
10
Criminal Penalties
HIPAA criminal penalties
• Three levels:
• “Simple” offense (proof of all elements)
• Fine of not more than $50,000, not more than one year
imprisonment, or both
• “False pretenses” offense (proof of all elements, plus proof
offense committed “under false pretenses”
• Fine of not more than $100,000, not more than five years
imprisonment, or both
• “Bad intent” offense (proof of all elements, plus proof of “intent
to sell, transfer, or use individually identifiable health information
for commercial advantage, personal gain, or malicious harm”)
• Fine of not more than $250,000, not more than ten years
imprisonment, or both
• 42 USC 1320d-6(b)
June 14, 2012
© 2012 Christiansen IT Law
11
Criminal Penalties
HIPAA criminal penalties
• Proving the elements of the offense
• “Knowingly:” Knowledge of facts indicating the existence of a
violation, including actual and circumstantial knowledge, and
failure to inquire where circumstances are suspicious
• “In violation of” HIPAA provision: Must be required to comply as
of time of offense
• “Obtains” information: Includes any exercise of control, direct or
indirect
• Example: Supervisor instructs subordinate to copy information
• “Disclose” information: Any “release, transfer, provision of access
to or divulging in any other manner”
June 14, 2012
© 2012 Christiansen IT Law
12
Criminal Penalties
Several Prosecutions to Date; A Few Cases of Interest
• U.S. v. Holland, Miller and Griffin (2011)
– Doctor and two hospital employees snooped in celebrity patient file
– Doctor sentenced to one year probation, $50,000 fine, 50 hours community
service educating professionals about HIPAA. Other employees sentenced to one
year probation, $1,500 and $2,500 fine respectively.
• U.S. v. Zhou (2010)
– Terminated physician snooped in co-workers’, other patients medical records
– Four months in prison
• U.S. v. Smith (2008)
– Clinic nurse gave PHI to husband who used it to threaten data subject
– Two years probation, community service
• U.S. v. Gibson (2004)
– Phlebotomist at Seattle Cancer Care Alliance used PHI to obtain credit cards in
patient’s name
June 14, 2012
© 2012 Christiansen IT Law
13
Civil Enforcement
HIPAA Administrative Simplification Enforcement Rule – “one HHS”
consolidation
• Codified at 45 CFR Part 160, General Administrative Requirements
• Subpart C: Compliance and Investigation
• Subpart D: Imposition of Civil Monetary Penalties
• Subpart E: Procedures for Hearings
• Applies to all regulatory requirements: Privacy, Security and
Transactional
• Effective date: March 16, 2006
June 14, 2012
© 2012 Christiansen IT Law
14
Civil Enforcement
Basic principles
• DHHS to “seek cooperation” in “obtaining compliance”
• DHHS “may” provide “technical assistance” to assist with voluntary
compliance
• 45 CFR § 160.304
• CEs must “keep such records” and submit “such compliance reports”
as DHHS determines necessary to determine compliance
• CEs must cooperate with DHHS investigations and permit access
(during “normal business hours”) books and records, etc.
• If requested information is in possession of another who refuses to
cooperate, certify efforts to DHHS
• 45 CFR § 160.310
June 14, 2012
© 2012 Christiansen IT Law
15
Civil Enforcement
Initiation of Compliance Investigation
• Any “person who believes a [CE] is not complying with the
administrative simplification regulations” may file a complaint with
HHS
• 45 CFR § 160.306
• Every complaint is reviewed and the allegations are analyzed for
compliance implications. – Susan McAndrew, OCR Deputy Director
• HHS may conduct “compliance reviews” on own initiative
• 45 CFR § 160.308
• May be triggered by security breach notification
• Every breach involving more than 500 individuals is reviewed for privacy
and security compliance. - Susan McAndrew
June 14, 2012
© 2012 Christiansen IT Law
16
Civil Enforcement
Initiation of Compliance Investigation
• HITECH requires DHHS to provide for “periodic audits” of
compliance by CEs and BAs
• HITECH § 13411
• HITECH requires DHHS to “formally investigate” a complaint if
“preliminary investigation of the facts . . . indicate[s] . . . a possible
violation due to willful neglect”
• HITECH § 13410(a)(2)
• State attorneys general granted civil penalties jurisdiction – and
attorneys fees for successful action
• Requires notice to DHHS and opportunity to assume jurisdiction
June 14, 2012
© 2012 Christiansen IT Law
17
Civil Enforcement
Investigation of complaints
• DHHS to “describe acts or omissions which are basis of complaint at
the time of initial written communication with the CE about the
complaint”
• Need not provide copy of the complaint
• Need not include complainant’s identity
• 45 CFR § 160.306(c)
• Investigations initiated by complaint need not be limited to issues
raised by complaint – and often are not
• OCR may issue subpoenas for witnesses, production of evidence
June 14, 2012
© 2012 Christiansen IT Law
18
Civil Enforcement
Investigations in general
• Target may not “threaten, intimidate, coerce, harass, discriminate
against, or take any other action” against witness or complainant
(may be penalized separately)
• Testimony to be recorded and transcribed
• 45 CFR §§ 160.314, 316
• May result in “resolution agreements,” including payment of
“resolution amount”
• Providence Health & Services, $100,000
• CVS, $2.25 million
June 14, 2012
© 2012 Christiansen IT Law
19
Civil Enforcement
Penalty proceedings
• If informal resolution not “satisfactory,” OCR to notify CE in writing.
Burden on CE to satisfy OCR. If not satisfied, OCR may issue notice
of proposed determination of civil monetary penalties
• Notice to include findings of fact which are penalty basis
• Target must pursue administrative appeal, through administrative
law judge and internal DHHS Board of Appeals, before lawsuit
June 14, 2012
© 2012 Christiansen IT Law
20
Civil Monetary Penalties
• Pre-HITECH
– Civil monetary penalty (CMP) maximum is $100/violation, to calendar
year (Jan. 1 – Dec. 31) $25,000 maximum for “all violations of an
identical requirement or prohibition”
• Core Concepts:
– Single acts/events can implicate multiple requirements or prohibitions
– Continuing violations – “a requirement or prohibition that is of an
ongoing nature” – are counted at one per day of continuation
June 14, 2012
© 2012 Christiansen IT Law
21
Civil Monetary Penalties
• HITECH requires CMPs and monetary settlements to be used by
OCR for enforcement or distribution to affected individuals
• Distributions to “individuals harmed” by a violation to be
determined by rule per methodology to be established by GAO
– GAO report due August 2010, status unknown
– Distribution rule due February 2012, status unknown (not included in
NPRMs or IFRs)
June 14, 2012
© 2012 Christiansen IT Law
22
Civil Monetary Penalties
HITECH Penalties
– Effective February 2009 per Enforcement IFR
– “Willful neglect” definition revisions expected in Megarule
Table 1 – Categories of Violations and Respective Penalty Amounts Available
Violation Category – Section 1167(a)(1)
Each violation
All such violations of an identical
provision in a calendar year
(A) Did Not Know
$100 - $50,000
$1,500,000
(B) Reasonable Cause
$1,000 - $50,000
$1,500,000
(C) Willful Neglect - Corrected
$10,000 - $50,000
$1,500,000
(D) Willful Neglect - Corrected
$50,000
$1,500,000
June 14, 2012
© 2012 Christiansen IT Law
23
Civil Monetary Penalties
Penalty determination
• Affirmative defenses: Violation due to “reasonable cause,” not
“willful neglect,” and under correction
• 45 CFR § 160.410
• Penalty aggravation/mitigation factors: Nature, harm caused by
violation; intentional violation vs. violation “beyond control;”
compliance history; financial factors
• 45 CFR § 164.408
June 14, 2012
© 2012 Christiansen IT Law
24
Civil Monetary Penalties
• Reasonable cause means circumstances that would make it
unreasonable for the covered entity, despite the exercise of ordinary
business care and prudence, to comply with the administrative
simplification provision violated.
• Reasonable diligence means the business care and prudence
expected from a person seeking to satisfy a legal requirement under
similar circumstances.
• Willful neglect means conscious, intentional failure or reckless
indifference to the obligation to comply with the administrative
simplification provision violated.
• 45 CFR § 160.401
June 14, 2012
© 2012 Christiansen IT Law
25
Civil Monetary Penalties
Example 1: Unauthorized access
•
CE allows unauthorized employee to access PHI on 20 individuals in
[single?] computer file
•
•
•
CE has separate obligation to each individual
Unauthorized access to PHI of 20 individuals = 20 violations
If CE could not have known about this violation in the exercise of due
diligence (unlikely?): $100/violation = $2,000 penalty
If CE permitted this due to reasonable cause (what would that be?):
$1,000/violation = $20,000 penalty
If CE permitted this due to willful neglect (attended this seminar but failed
to implement): $500,000/violation = $1.5 million penalty ($10 million,
capped)
•
•
June 14, 2012
© 2012 Christiansen IT Law
26
Civil Monetary Penalties
Example 1 continued: Unauthorized access constitutes security breach
•
Unauthorized access is discovered during OCR investigation of unrelated
complaint two years after event
•
CE failed to notify 20 affected individuals for two years
– One or 20 separate continuing violations? 730 violations (2 x 360) or
14,600 violations (2 x 365 x 20)
CE failed to notify OCR within 60 days of end of calendar year of breach
– One continuing violation for ten months: 300 violations
•
•
•
•
“Could not have known:” Probably not acceptable
“Reasonable cause:” Probably not acceptable
Willful neglect, not corrected: $500,000/violation
– $3 million penalty
• 730 x $500,00 = $3.65 billion, capped at $1.5 million
• 300 x $500,000 = $1.5 billion, capped at $1.5 million
June 14, 2012
© 2012 Christiansen IT Law
27
Civil Monetary Penalties
Example 2: Defective business associate contract
•
CE enters into five business associate contracts authorizing PHI uses not
permitted by Privacy Rule and not including required safeguards provision
•
•
5 violations each of 2 separate provisions = 10 violations
If CE could not have known about this violation in the exercise of due
diligence (probably not acceptable): $100/violation = $1,000 penalty
If CE permitted this due to reasonable cause (what would that be?):
$1,000/violation = $10,000 penalty
•
•
Probably would be held CE permitted this due to willful neglect:
$500,000/violation = $1.5 million penalty
– 10 x $500,000 = $5 million, capped at $1.5 million
June 14, 2012
© 2012 Christiansen IT Law
28
Civil Monetary Penalties
Example 3: Negligent disposal of media
•
CE re-sells 100 used computers without scrubbing hard drives containing
PHI on 1,000 individuals.
•
Potential violations:
– Security Rule media re-use specification (100 violations)
– Privacy Rule “little security rule” safeguards specification (1,000
violations)
– Security Rule information access management standard (100 or 1,000
violations?)
– Privacy Rule prohibited PHI use standard (1,000 violations)
– Assume/hope there’s no indication of unauthorized access, e.g. buyer
viewing, using, selling data – security breach violations
June 14, 2012
© 2012 Christiansen IT Law
29
Civil Monetary Penalties
Example 3 continued: Negligent disposal of media
•
•
•
Security Rule media re-use specification (100 violations)
•
Didn’t know:
$10,000
•
Reasonable cause:
$100,000
•
Willful neglect:
$1.5 million ($50 million, capped)
Privacy Rule “little security rule” specification (1,000 violations)
•
Didn’t know:
$25,000 ($100,000, capped)
•
Reasonable cause:
$100,000 ($1 million, capped)
•
Willful neglect:
$1.5 million ($500 million, capped)
Security Rule information access management standard (100 or 1,000
violations? – assume 100)
•
Didn’t know:
$10,000 ($100,000, capped)
•
Reasonable cause:
$100,000 ($1 million, capped)
•
Willful neglect:
$1.5 million ($50 million, capped)
June 14, 2012
© 2012 Christiansen IT Law
30
Civil Monetary Penalties
Example 3 continued: Negligent disposal of media
• Privacy Rule prohibited PHI use standard (1,000 violations)
•
Didn’t know:
$25,000 ($100,000, capped)
•
Reasonable cause:
$100,000 ($1 million, capped)
•
Willful neglect:
$1.5 million ($500 million, capped)
• Total
• Didn’t know:
• Reasonable cause:
• Willful neglect:
June 14, 2012
$70,000
$400,000
$6 million
© 2012 Christiansen IT Law
31
Civil Monetary Penalties
Privacy Rule enforcement from April 2003 (start of enforcement)
through April 30, 2012:
• Over 70,107 complaints
– 39,283 not eligible for enforcement (no jurisdiction, etc.)
– 16,105 resolved with corrective action plans
– 8,310 finding no violation
Security Rule enforcement from October 2009 (start of enforcement
reporting) through March 31, 2012:
• 559 complaints
– 377 resolved with corrective action plans
– 257 still pending
June 14, 2012
© 2012 Christiansen IT Law
32
CMP Cases of Interest
•
Phoenix Cardiac. Small physician practice permitted its physicians to use
unencrypted, standard commercial email and cloud-based online
calendaring for communications and scheduling including unencrypted PHI.
$100,000 fine and a corrective action plan
•
Blue Cross Blue Shield of Tennessee. Health insurer experienced theft of
57 hard drives, unencrypted information on over one million individuals.
$1.5 million settlement payment and corrective action plan
Cignet Health. 41 patients of this four clinic health care provider
complained to OCR Cignet would not grant access to their records. Cignet
ignored OCR investigative requests. OCR court order for production of the
records, to which Cignet responded by producing records on some 4,500
patients, rather than the relevant 41. CMPs of $4.3 million, largely based on
continuing violations for failing to provide individuals with record access
and failing to cooperate with DHHS
•
June 14, 2012
© 2012 Christiansen IT Law
33
State Attorney General Enforcement
•
•
•
State of Minnesota v. Accretive Health (filed January 2012): Action
against debt collection agency – i.e., Business Associate – based on loss of
laptop storing unencrypted PHI on 23,531 patients of two hospital systems.
HIPAA, state privacy law violations, state debt collection violations. Seeking
penalties and injunctive relief.
State of Vermont v. Health Net (settled January 2011): Action against
health insurer based on disappearance of hard drive storing unencrypted
PHI on 1.5 million individuals, “including 525 Vermonters,” and not notifying
affected individuals for six months. HIPAA, state law violations. $55,000 fine,
consent decree including mandatory audit and reporting to State for two
years.
State of Connecticut v. Health Net (settled July 2010): Action based on
same incident as Vermont, 500,000+ Connecticut residents affected. HIPAA,
state law violations. $250,000 fine, corrective action plan.
June 14, 2012
© 2012 Christiansen IT Law
34
Avoiding/Mitigating Penalties
•
•
•
•
•
•
•
•
Well-managed compliance program
Accountable program management
Policies and Procedures
Training and awareness
Internal auditing, testing and reporting
Services provider due diligence, tight contracting, oversight
Readiness to respond to security incidents and breaches
Readiness to respond to regulatory inquiries
June 14, 2012
© 2012 Christiansen IT Law
35
Avoiding/Mitigating Penalties
Document, Document, Document!
June 14, 2012
© 2012 Christiansen IT Law
36
Questions? Thanks!
June 14, 2012
© 2012 Christiansen IT Law
37
Download