The
HIPAA Omnibus Rules, released in January 2013, will dramatically affect how you
manage and deal with the impermissible disclosure and use of Protected Health
Information (PHI). Indeed, the new HIPAA
Omnibus rules place a burden on your healthcare organization to analyze and
document your review of potential PHI breaches.
As a practical matter, your healthcare organization could be looking at substantial problems complying with these requirements unless you strengthen
your monitoring strategy.
Under
the “old” HIPAA/HITECH Breach rules, a breach required a significant risk of financial,
reputational, or other harm to the individual.
Under the “new” HIPAA Omnibus rules, a breach is based on a much lower
standard of PHI disclosure or use that does
not have a low probability that the PHI has been compromised. As important, you can now evaluate potential
breaches and document your “good faith evaluation” and “reasonable conclusion.” Alternatively, you can just assume that the
event is a breach.
The evaluation is based on four factors:
PHI Nature and Extent – You can evaluate the sensitivity of the impermissible
disclosure as well as the ability to identify the patient or even the presentation
options. For example, a list of dated deidentified
lab results disclosed with a separate list of patient appointments for the day
of the lab would present a higher probability of impermissible disclosure or
use. Similarly, PHI scanned images may
include patient identifiers and present a higher probability of disclosure.
Unauthorized
Person Received or Used PHI – You must evaluate the recipient of the impermissible
disclosure or use to determine the extent of the problem. For example, impermissible disclosure to a
party that has been properly trained in HIPAA Privacy and Security who works
for a Covered Entity or Business Associate may present a lower probability than
the impermissible disclosure of PHI to an employee of your own organization
that has not been trained on proper HIPAA Security and Privacy standards.
Actual Acquisition or Viewing of PHI – In
evaluating the problem, you can determine if there was an opportunity to access
the PHI. For example, a file of information that requires a special reading
program presents a lower probability than a patient record in a PDF file. Similarly, if a device was lost, but upon
recovery, you can determine that the device was not accessed, you have a low
probability of disclosure or use.
Mitigation Factors – In the final step of you
evaluation, you can determine if there were mitigating issues that leads you to
a good faith and reasonable conclusion that the information was not
disclosed. For example, a thumb drive
containing PHI on a patient lost in the HCO, but recovered in a nonpublic area
may present a mitigating factor. Indeed,
you may reasonably rely on the promises of the party to whom the information
was improperly disclosed.
The evaluation of these four factors has to
be documented as well as your good faith and reasonable conclusion. If you determine that the probability of compromised
PHI is low, you do not have a problem.
Otherwise, you have a breach and have to respond according to the breach
notification requirements.
However, you should seriously consider the implications
of the impermissible disclosure and use on your organization. You should:
Examine the
events that lead to the impermissible disclosure and use in light of your HIPAA
Privacy and Security policies and procedures.
Indeed, the impermissible disclosure or use should trigger an analysis
of the relevant policies, and procedures as well as supervision and training of
employees.
Track all impermissible
disclosures (including breaches) to support analysis of problems that may lead
to more serious issues in the future.
For example, just because you have not graduated to a breach for a
number of impermissible disclosures and uses does not mean that you do not have
a weakness. Indeed, continuing PHI
disclosure and use problems could be an indication of a potential problem and
higher risk profile than your breach log shows.
The updated breach rules in the HIPAA Omnibus
Rules lower the barriers for a breach and increase the work that you need to do
to track impermissible uses and disclosures of PHI. The analysis of impermissible disclosures and
use can help you identify weakness and strengthen your Privacy and Security
strategies. Alternatively, a history of impermissible
uses and disclosures may unfavorably reflect on your effort to protect PHI even
if you have avoided an actual breach.
For more posts on HIPAA Security and Privacy, click here.
For expert advice and training on HIPAA Omnibus to comply with the Security and Privacy requirements by September 23, 2013, contact Sterling Solutions at (800)967-3028 or click here.
(c) Sterling Solutions, Ltd, 2013
For more posts on HIPAA Security and Privacy, click here.
For expert advice and training on HIPAA Omnibus to comply with the Security and Privacy requirements by September 23, 2013, contact Sterling Solutions at (800)967-3028 or click here.
(c) Sterling Solutions, Ltd, 2013
No comments:
Post a Comment