HIPAA Flashcards

1
Q

Sector

A

Medical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Year Passed/Amended

A

1996;
Privacy Rule promulgated in 2000 and amended 2002;
Security Rule promulgated 2004;
HITECH passed 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Original Purpose

A

Improve efficiency of healthcare delivery by requiring a shift to electronic format for certain types of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Primary Requirements

A

Restricts use or disclosure of health information, beyond the minimum necessary for a particular list of uses (chiefly TPO: treatment, payment and operations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Entities subject to the law

A

Two types of entities:

  1. “Covered entities:”
    (a) healthcare providers that conduct certain transactions (namely billing and insurance) electronically;
    (b) healthcare plans (i.e. insurers);
    (c) healthcare clearinghouses;
  2. “Business associates” (i.e. data processors), pursuant to HITECH: Any person or organization, other than a covered entity’s workforce, that performs services and activities for, or on behalf of, a covered entity, if such services involve the use or disclosure of PHI. Note: this covers employers who acts as intermediaries between their employees and a health care provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Term for relevant PII or regulated data

A

PHI (Protected Health Information); ePHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition of relevant PII or regulated data

A

(a) individually identifiable;
(b) health information;
(c) held by a covered entity or its business associate;
(d) which identifies the individual or offers a reasonable basis for identification; and
(e) relates to
(i) a past, present or future medical condition,
(ii) provision of health care, or
(iii) payment of health care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enforcing Authority - Civil

A

General: HHS - Department of Health and Human Services

Privacy Rule: HHS OCR - Office of Civil Rights

Non-preempted state law: state AGs

Non-preempted FTC rules: FTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Penalties - Civil

A

Up to $1.6 million per type of violation

Examples: $3.9 million settlement in 2016 for PHI stolen from employee’s laptop; $1.7 million in 2013 for not implementing required policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enforcing Authority - Criminal

A

DOJ - Department of Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Penalties - Criminal

A

Prison sentences up to 10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Preemption

A

Does not preempt stricter state laws (but does preempt less strict state law); does not preempt FTC Section 5 authority over the same conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Private Right of Action?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FIP Individual Rights Provided

A

Notice, opt-in consent, access (Privacy Rule), list of disclosures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Notice Requirements - non-breach

A

Must provide detailed privacy notice at the date of first service delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Notice Requirements - breach

A

HITECH requires notice of breach unless there is a low probability that the security or privacy of the PHI has been compromised:

(a) must notify individuals within 60 days of discovery of breach;
(b) if breach affected more than 500 people, must notify HHS immediately; and
(c) if breach affected more than 500 people in the same jurisdiction, must notify the media.

Breach notification rules apply only to “unsecured” (read: unencrypted) data

17
Q

Exceptions to notice requirements

A

Non breach:

(a) medical emergencies;
(b) Indirect treatment relationship

Breach:

(a) data is “secured,” i.e. encrypted;
(b) low probability that the security or privacy of the PHI has been compromised

18
Q

Choice and consent

A

Opt-in (written authorization) for most uses.

Cannot be a condition for treatment

19
Q

Consent Exceptions

A

(a) Essential healthcare purposes - Treatment, Payment and Operations (TPO);
(b) De-identified information (remove listed elements, or get certification);
(c) Research;
(d) Public health activities;
(e) to report abuse;
(f) in judicial and administrative proceedings;
(g) to HHS, to investigate compliance with HIPAA

20
Q

Access rights

A

Privacy Rule provides the right to access and copy PHI

21
Q

FIP Controls Addressed

A

Information Security, Information Quality

22
Q

Information Security Requirements

A

Privacy Rule: must implement administrative, physical and technical safeguards

Security Rule: “reasonable” safeguards (effectively a negligence standard?), proportionate to entity’s size and capabilities and the type of PHI. Some safeguards are required; others are “addressable:”
Required:
(a) ensure confidentiality, integrity and accessibility of PHI;
(b) protect against reasonably anticipated threats;
(c) protect against reasonably anticipated impermissible use or disclosure;
(d) ensure compliance by employees/agents;
(e) conduct ongoing risk assessments and adjust based on the results

23
Q

Information Quality Requirements

A

Security Rule: must ensure CIA (confidentiality, integrity and availability)

Privacy Rule: right to amend

24
Q

FIP Information Lifecycle Categories Covered

A

Use and Retention, Disclosure (not Collection/Disposal)

25
Q

Use and Retention

A

Privacy Rule: “Minimum necessary” use and disclosure to accomplish the intended purpose.
Stricter rules for psychotherapy notes.

26
Q

Disclosure

A

Privacy Rule: “minimum necessary” use and disclosure to accomplish the intended purpose.
Stricter rules for psychotherapy notes.
“Compassionate sharing” exception for mental health disorders and alcohol/substance abuse (Cures Act)

27
Q

Redisclosure

A

Requires separate consent

28
Q

Right to list of disclosures

A

Yes, for a reasonable fee

29
Q

FIP management categories covered

A

Administration, Monitoring and Enforcement

30
Q

Administration Requirements

A

Must appoint a data quality officer. Staff must be trained in requirements.

Security Rule: must implement a security awareness and training program.

31
Q

Monitoring and Enforcement Requirements

A

Must appoint a data quality officer. Must have established complaint procedures.

Security Rule: staff must be disciplined if they fail to comply.