Health Insurance Portability and Accountability Act: Difference between revisions
imported>Howard C. Berkowitz m (reference typo) |
imported>Howard C. Berkowitz m (duplicte refs) |
||
Line 142: | Line 142: | ||
==Training requirements== | ==Training requirements== | ||
HIPAA presents your most extensive training requirements. It has the most external interfaces, using EDI for claiming reimbursement. Security checklists that you build will have the greatest number of requirements for physical inspection of equipment, focused on preventing unauthorized changes and letting unauthorized people see clinical data being displayed. | HIPAA presents your most extensive training requirements. It has the most external interfaces, using EDI for claiming reimbursement. Security checklists that you build will have the greatest number of requirements for physical inspection of equipment, focused on preventing unauthorized changes and letting unauthorized people see clinical data being displayed. | ||
==References== | ==References== | ||
{{reflist|2}} | {{reflist|2}} |
Revision as of 18:06, 3 May 2008
As with so many other laws, the actual title of the Health Insurance Portability and Accountability Act, also known as the Kennedy-Kassebaum Act, [1] [2] is not the subject of its greatest impact. Its emphasis is less on insurance and more on protecting the security (confidentiality) and privacy of health-case data by establishing and enforcing standards for the many organizations that handle data of that type. [3]
While HIPAA does have some rules covering health insurance, its major impact is its Title II, which provides detailed regulations, including penalties, for safeguarding Protected Health Information (PHI).[4]
Title II has five main rules:
- Privacy Rule
- Transactions and Code Sets Rule
- Unique Identifiers Rule
- Security Rule
- Enforcement Rule
The Privacy and Security rules are the chief external constraints, although the Transaction and Code Sets and Unique Identifiers will have to be part of your applications.
Proving that government can have a sense of humor, the most complex parts of Title II of HIPAA are the five "Administrative Simplification" rules. In one sense, these actually do simplify many of the technical aspects of safeguarding PHI. To the health professionals under its jurisdiction, the day-to-day operational rules became more complex. Think of the last time you filled a prescription. You had to sign a HIPAA-mandated form, often electronically, allowing information release, offering you consultation, etc. The rules truly attempt to improve privacy and the opportunity for consumers to get health information.
Many health professionals are frightened about prosecution for some HIPAA violation, and it is true that felony prosecution is possible. HIPAA implementation and enforcement, however, can be relatively painless when designed by competent architects, and there is a top management commitment to education and enforcement.
HIPAA privacy rule
The most important rule established the category of "Protected Health Information" (PHI). PHI is any information associated with the health care of an individual, including all of the medical and medical payment records. With the exception of certain mental health information that the appropriate therapist certifies would be unwise for the patient to see, patients are entitled to see all information pertaining to them. Practitioners, however, can impose copying costs. It is customary, but not required, that practitioners provide other clinicians, with patient approval, all relevant information, usually with no charge. Of course, the privacy becomes relevant with the standard authorization for full disclosure to insurers. The employer paying for health care, however, does not have a right to the information.
The basic principle is that the patient usually has ultimate control of the data. The healthcare organization may reasonably require patients (or their representatives) to sign releases.
Mandated disclosure
Heath care providers may be required to disclose certain PHI to law enforcement or public health organizations. All US states require physicians to report suspected child abuse. Gunshot wounds usually must be reported to police. Not all infectious diseases have the same public health significance. The incidence of some, such as venereal diseases, is mostly of statistical interest. Outbreaks of diseases with epidemic potential, such as typhoid, cholera, and plague, need urgent reporting. Outbreaks of potential biological warfare agents (e.g., anthrax, tularemia) listed in the Centers for Disease Control Select Agent Program, diseases with significant epidemic or pandemic potential (e.g., highly pathogenic influenza), or of extreme lethality (Ebola hemorrhagic fever) get very quick reporting.
Perhaps the most frightening would be an outbreak of smallpox. The disease caused by Variola major is said to be the first eradicated from the human race. An outbreak would constitute a world emergency and probable biological warfare attack.
Individual rights
Individuals have a right to request correction, as well as to impose reasonable requirements for communication, such as designating only one number to call with medical information. Institutions must appoint and identify a Privacy Official responsible for the overall program, as well as contacts. The Office of Civil Rights of the US Department of Health and Human Services investigates reports of HIPAA privacy violations.
Transactions and Code Sets Rule and Unique Identifier Rule
This rule truly does introduce administrative simplification, although with a cost of introducing the measures. Essentially all healthcare providers will have to file reimbursement claims electronically, using standard Electronic Data Interchange (EDI) records conformant with the general family of X12N EDI standards.
The providers will also need unique identifiers for providers and patients. There are also guidelines on anonymizing clinical data, removing a wide range of patient identifiers, so the records may be used in research.
The Security Rule
This Rule provides the administrative, physical, and technical mechanisms to support the Privacy Rule. There is considerable flexibility in implementing the Security Rule, although there are some specific requirements. Other requirements are things reasonably regarded as Best Current Practice.
In a contrary sort of way, the administrative safeguards are the most important, as they define what you are going to do. As with any system where there must be a chain of responsibility, organizations that must be HIPAA-compliant should start by naming a Privacy Officer, with backups and assistants as required. The first task of this team is to draft a set of privacy policies and procedures, and obtain buy-in from the various departments that must accept them.
The broader picture of technical security for healthcare computing
For larger healthcare organizations with multiple applications subject to external drivers, it only makes sense to implement the methods that meet the most stringent safeguards. For example, logging is an important part of HIPAA, and logs really only make sense when timestamped. If the healthcare institution also implements electronic prescribing of substances controlled by the Drug Enforcement Administration (DEA), the timestamp for that function must derive from a known reference. That is more precise a time reference than HIPAA requires, but it adds no cost to implement the same solution for both.
Healthcare security begins with security policy
No institution can implement a reasonable security program without first developing a security policy, which should be short, nontechnical, and with emphatic top management approval. Hospitals often have departments that can be resistant to imposed change, or may be in turf wars with other departments. For example, there are enough cases of kidnapped newborns that most hospitals use hard-to-remove identification tags, and have alarms if anyone tries to carry a baby out the door if not approved with a badge and perhaps a code number on a keypad. In one hospital with which I worked, the nursing director of the nursery and the director of physical plant were fighting madly, the nursing director wanting a dedicated security system for the nursery and the physical plant director wanting it to be part of the overall hospital system. Either would work, but the personalities had long gotten past that point. It may well be that the Privacy Officer, with the backing of top management, may have to force such decisions -- but it is much better to solve them diplomatically.
Medicine is full of special cases for security. For example, while many institutions try to block World Wide Web access to what software filters consider to be pornographic material, specialists in gynecology, urology, breast cancer, and other fields cannot be blocked, by Web content filters, from their professional sites.
Mental health professionals, to understand influences on their patients, occasionally needed to visit hate sites or actual pornographic sites.
Security technology
Comprehensive security systems, after identifying and confirming identity of users, will match the user privileges with the sensitivity labels on protected information in the system. It may well be that the Privacy Officer, perhaps with a second observer, needs access to all PHI in the system. Personnel in the nursery, however, rarely will need access to information in the geriatric unit, and vice versa. The system should enforce the plausible case, but also allow for special overrides. A grandparent, unable to leave a bed in geriatrics, might want to see a child through the hospital television system. In this case, appropriate supervisors need to log the exception to need-to-know, and then manage the exception.
Healthcare security administration
Administrative procedures have to cover the entire staff human resources spectrum as it pertains to privacy and security. The security staff may be involved in verifying the credentials of professionals before they are hired. Once someone is a member of the staff, they need an initial security and privacy briefing and signoff that they understand their responsibilities, and then issued any devices needed for the identification and authentication processes. If any biometric methods are part of this process, security personnel need to take the appropriate measurements. Staff will need periodic retraining, or training on new systems; the Privacy Officer should keep a written record of learning objectives for privacy.
At termination, especially involuntary, security must disable accesses and collect authentication devices. The security officer must revoke all passwords and digital certificates, as well as identification badges and tokens. Depending on the circumstances, an exit security interview may be appropriate.
If the healthcare organization outsources services, it must verify that the contractor's PHI protection is at least as strong as the facility outsourcing the work. Think long and hard about outsourcing PHI to a country not under the United States privacy laws, or the sometimes stronger European Union rules. If the outsourcing firm is multinational and does business in the United States, and it has resources under the jurisdiction of US courts, your position is much stronger. The contract must include the right to approve any further outsourcing of PHI.
Emergency plans should be in effect for protecting PHI in the case of an attack, accident, or catastrophe. If there are mutual backup arrangements with other facilities, be sure PHI protection systems are compatible, and if providers bring patients from the other facility, that usually should not grant access to your patients' PHI.
Balancing security in disasters
In major disasters, there may come a time where medical efficiency has to override PHI protection. An early blood transfusion system that checked the patient against the unit of blood products, to avoid transfusion errors. With the technology of the 1970s, this could add several minutes. Several hospitals preferred the safeguards, but the major trauma centers were very hesitant to have anything that could slow them down in a major emergency. At a planning conference, disaster plan directors were polled to find the number of patients at which their emergency departments would go to disaster mode, and perhaps disable the safety feature.
Numbers from four to twenty patients were mentioned, until it was the turn of the United States Army Medical Department (AMEDD) representative. He smiled sadly, and suggested if people wanted to get an idea what they considered a massive casualty load, they should watch several episodes of M*A*S*H.
Healthcare security auditing
Internal audit, generally performed with the knowledge of the Privacy Officer but distinctly not by the Privacy staff, is an important quality control measure. As long as it does not jeopardize safety, surprise audits may be appropriate. Surprise audits are likely to be in use at most hospitals, as with checks of drug inventories. A potential intrusion should trigger an immediate audit.
Among the most important aspects of auditing is having a top management buy-in that audits are a needed part of quality control. If there were problems, and no malice was involved, there needs to be an after-audit conference, applying all ideas to solving the problem. PHI needs appropriate physical access control. To begin with, workstations and servers with access to PHI need to be in restricted areas. When you release or retire equipment that contained PHI, thoroughly erase all storage in the equipment. Identify people with access to hardware and software that protects PHI, and briefed or monitored in their work. Sign-in logs are mandatory.
As a general principle, display screens should not be visible to the public. In practice, however, there are situations, such as in intensive care and post-anesthesia recovery, where real-time physiological data is on screens visible to anyone in the area. For the staff, instant access to that data is literally a matter of life or death. It is advisable, whenever possible, to have these screens identify bed ID rather than patient name, as long as there is positive mechanism of associating patients with beds.
There are very legitimate reasons to have PHI in portable devices such as PDAs with clinical applications, but such devices must have adequate protection, such as strong authentication, and files kept in encrypted form. The physical size of a PDA precludes most biometric safeguards, so much of the security may center around strong passwords, perhaps at multiple levels. Always encrypt their communications.
Physical security is required for all technical means
All the security software in the world cannot guard against someone physically stealing the equipment. Having the files encrypted in storage, however, still protects the PHI. The more portable the device, the more the files need encryption.
Technical security
Technical safeguards protect PHI stored in computer systems and transmitted between them. There is also an expectation of privacy for telephone and facsimile communications.
Access control
t is highly desirable that users should authenticate themselves with digital certificates and/or two-factor authentication. The information systems themselves need to be physically secure from intrusion, typically in a locked room with access controls.
Transmission security
When information flows over a public network, encrypt it. The current best practice would require at least 128-bit Advanced Encryption System (AES) protection. HIPAA does allow it to flow unencrypted on private networks, which is very questionable. Above all, always encrypt information transmitted by wireless media. Before the electronic communication starts, the parties must use strong authentication to confirm their identity.
Data integrity
While it is not required, it is good practice to encrypt files in storage, especially those in historical rather than real-time databases. Files should use a cryptographic checksum providing sequential integrity ) and record-level integrity.
Auditability
Document all security practices for US government audit. Archive configuration files for servers, network elements, etc. Automatic logging of reconfiguration is highly recommended. Each provider must document the risks perceived in that organization, and how the risks are managed and mitigated.
HIPAA Impacts
Ironically, the "simplified" rules, in many cases, present additional complexity to clinicians and patients. There is no question, for example, that there is an additional paperwork requirement, from office to hospital to pharmacy, for informed consent forms.
Effects on research
As a reaction to the Nazi medical "experiments" in WWII, the world's medical community adopted and updated the Declaration of Helsinki [WMA] as the basic ethical document covering medical research. One of the key elements is that competent persons need to give informed consent before they participate in clinical trials. With HIPAA, this extends even to statistical meta-analysis derived from charts where the researchers never see the patient, but the researchers have access to identifying information in the chart.
In addition to HIPAA, US clinical researchers need to comply with the regulations in 21CFR11, the basic rules for human clinical trials. Again, if the institution does research, it should make sure that one underlying technical mechanism meets different email audit trails for HIPAA and 21CFR11.
Bioethicists are very aware of what they consider "research burden", since a single hospitalization often involves multiple informed consents, which can be frightening to someone not familiar with research procedure. One research group is trying to find ways to reduce the burden [5], but, after discussing the project with them, they are not sure they can do anything about the regulatory burden. With HIPAA, the informed consent becomes even longer because the patient has to agree to the privacy safeguards.
An interview with Dr. Roberta Ness, chair of epidemiology at the University of Pittsburgh medical center described the PEPP II retrospective study in obstetrics that recruited 12.4 women per week before HIPAA, but after HIPAA took effect, the average recruitment rate for participation in PEPP II was 2.5 women per week without a waiver, 5.7 women per week with a waiver, and 3.3 women per week since retraction of the HIPAA waiver [6]
Effects on clinical care
Emergency teams can become utterly frustrated, trying to get critically needed data on a patient from a distant facility, while a functionary at the other end wanted consent from the patient faxed to them before releasing the information. This is difficult when the patient is unconscious and no surrogate was available. Hospitals should have legal counsel and senior management contacts available on a 24-hour basis, to deal with potentially life-threating situations.
Clinician-to-clinician contact often is reasonable, which gives your medical professionals the information to document that they believe this is a true emergency.
FUD (Fear, Uncertainty and Doubt) is a major concern in HIPAA implementation, and there are far too many "consultants" eager to sign up for billable hours. Even in complex telemedicine, that either the regulations are not overwhelming to information technologists, with clinical backgrounds of their own, or working with medical specialists, healthcare workers can define reasonable, defensible implementations.
Government offices often are surprisingly helpful in clarifying compliance requirements. The chief problem, in fact, is finding the right government office. At present, it is the Center for Medicare and Medicaid Services (CMMS) [7], which formerly was the Healthcare Financing Administration (HFCA).
Training requirements
HIPAA presents your most extensive training requirements. It has the most external interfaces, using EDI for claiming reimbursement. Security checklists that you build will have the greatest number of requirements for physical inspection of equipment, focused on preventing unauthorized changes and letting unauthorized people see clinical data being displayed.
References
- ↑ Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. 1301
- ↑ Center for Medicare and Medicaid Services, U.S. Department of Health and Human Services, HIPAA General Information
- ↑ Whitman, M. & Mattord, H. (2005), Principles of Information Security, Second Edition, Thomson Course TechnologyA
- ↑ Center for Medicare and Medicaid Services, U.S. Department of Health and Human Services, The HIPAA Law and Related Information
- ↑ Ulrich, CM et al. (2005), "Respondent Burden in Clinical Research: When Are We Asking Too Much of Subjects?", IRB: Ethics & Human Research 27 (4): 17-20
- ↑ Torkarski, Cathy (15 February 2005), "HIPAA Privacy Rule Thwarts Clinical Research Recruitment", Medscape
- ↑ Center for Medicare and Medicaid Services, United States Department of Health and Human Services