Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

List the six hipaa defined permissions

06/12/2021 Client: muhammad11 Deadline: 2 Day

Judson, K., & Harrison, C. (20 16). Law and ethics for the health professions. (7th ed. ). New York: McGraw- Hill.

Law&Et cs FOR HEALTH PROFESSIONS

KAREN JUDSON CARLENE HARRISON

Key Terms

204

Privacy, Security, and Fraud

LEARNING OUTCOMES After studying this chapter, you should be able to:

LO 8. I Discuss U.S. constitutional amendments and privacy

laws that pertain to health care.

LO 8.2 Explain HIPAA's special requirements for disclosing

protected health information.

LO 8.3 Discuss laws implemented to protect the security

of health care information as health records are

converted from paper to electronic form.

LO 8.4 Discuss the federal laws that cover fraud and abuse

within the health care business environment and the

role of the Office of the Inspector General in finding

billing fraud.

LO 8.5 Discuss patient rights as defined by HIPAA, the Patient Protection and Affordable Care Act, and other health

care entities.

FROM THE PERSPECTIVE OF . ..

ANN, AN R.N. IN A TEXAS HOSPITAL FOR NEARLY 25 YEARS, remembers when patients' names were posted on the doors to their rooms. She and her colleagues once freely informed telephone call- ers and visitors how patients were progressing. Now, Ann remarks, because of federal legislation to protect the privacy and security of health care information, times have changed. "We have to be so care- ful about releasing any information that when my father's dear friend was admitted to my floor in the hospital where I work, I couldn't tell him that his friend had been admitted."

From Ann's perspective, because she cares about her patients, she would like to be able to talk more freely with family members or friends who also care about her patients. But she is duty-bound to follow the law, and she knows the benefits to patients for laws that guard their privacy.

From the perspective of friends and family members who call for infor- mation about a patient, the law is harsh and hard to understand. They are often angry when they cannot learn the status of a friend or loved one.

From the perspective of some patients, the law sometimes feels over- protective and unnecessarily intrusive, but for others-such as the patient who has tried to commit suicide and failed, who doesn't want anyone to know he is in the hospital, or the battered spouse who doesn't want her abusive husband to find her-it's a safety net they can depend on.

The United States Constitution and Federal Privacy Laws Contrary to popular belief, the term privacy (freedom from unauthor- ized intrusion) does not appear in the U.S. Constitution or the Bill of Rights. However, the United States Supreme Court has derived the right to privacy from the First, Third, Fourth, Fifth, Ninth, and Fourteenth Amendments to the Constitution.

LO 8.1 Discuss U.S. constitutional amendments and privacy laws that pertain to health care.

privacy Freedom from unaut horized int rusion.

LANDMARK COURT CASE The Constitution Protects the Right to Privacy

In November 1961, the executive director and the medical

director of a Planned Parenthood clinic in Connecticut were

charged with violating a state statute prohibiting the dis-

pensing of contraceptive devices to a married couple. The

defendants were convicted and fined $1 00 each. The U.S.

Supreme Court heard the case in March 1965 and issued a

written opinion on June 7, 1965. William 0. Douglas, writ- ing the majority opinion for the Court, held that the Con-

necticut statute was an unconstitutional violation of the

right of privacy. Douglas noted that many rights are not

expressly mentioned in the Constitution, but the Court

has nevertheless found that persons possess such a right. In

reviewing the many rights that Americans possess, Douglas

noted the existence of "penumbras" or "zone(s) of privacy

created by several fundamental constitutional guarantees."

As a result of the Supreme Court's decision in Griswold v. Connecticut, patients possess certain rights that affect the delivery of med ical services and health care. For example,

persons have t he right to refuse medical treatment, and

courts now recognize a person 's right to die.

Griswold v. Connecticut, 381 U.S. 479, 85 S. Ct. 1978, 14 L. Ed.2d 510 (1965).

C-c9:er 8! Privacy, Security, and Fraud 205

COURT CASE

First Amendment: Congress cannot prohibit or abridge free speech. In addition, the Establishment and Freedom of Religion clauses of this amendment prohibit the government from funding, showing preference for, or discriminating against any religion.

Third Amendment: Soldiers cannot be quartered in private homes without the consent of the owner.

Fourth Amendment: People have the right to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures.

Fifth Amendment: No person must testify against himself, be tried twice for the same offense, or be deprived of life, liberty, or property without due process of law. The Miranda warning ("You have the right to remain silent ... ")as read during criminal arrests, derives from this amendment.

Ninth Amendment: If certain rights are not explicitly mentioned in the Constitution, that does not mean they do not exist.

Fourteenth Amendment: All states must provide rights for citizens that are at least equal to those in the U.S. Constitution, and under the philosophy called federalism states may grant citizens additional rights not specifically granted in the U.S. Constitution.

Fourth Amendment Rights in Question

The Student Activities Drug Testing Policy adopted by

the Tecumseh, Oklahoma, School District requires all

middle and high school students to consent to urinaly-

sis testing for drugs to participate in any extracurricular

activity. Two Tecumseh High School students and their

parents brought suit, alleging that the policy violates the

Fourth Amendment, which states in part: "The right

of the people to be secure in their persons , houses,

papers, and effects, against unreasonable searches

and seizures , shall not be violated." The district court

granted the school district summary judgment. In

reversing, the court of appeals held that the policy vio-

lated the Fourth Amendment. The appellate court con-

cluded that before imposing a suspicionless drug-testing

program a school must demonstrate some identifiable

drug abuse problem among a sufficient number of those

tested, such that testing that group will actuall y redress

its drug problem , which the school district had failed

to demonstrate.

to submit to drug testing, consistent with the Fourth

Amendment?

The U.S. Supreme Court concluded that the answer to

the question was yes. In a 5-4 opinion delivered by Justice

Clarence Thomas, the Court held that, because the policy

reasonably serves the school district's important interest

in detecting and preventing drug use among its students,

it is constitutional. The Court reasoned that the board of

education's general regulation of extracurricular activities

diminished the expectation of privacy among students

and that the board 's method of obtaining urine samples

and maintaining test results was minimally intrusive on the

students' limited privacy interest. "Within the limits of the

Fourth Amendment, local school boards must assess the

desirability of drug testing schoolchildren. In upholding

the constitutionality of the Policy, we express no opinion

as to its wisdom. Rather, we hold only that Tecumseh's

Policy is a reasonable means of furthering the School Dis-

trict's important interest in preventing and deterring drug

use among its schoolchildren," wrote Justice Thomas. The question before the court was: Is the Student

Activities Drug Testing Policy, which requires all students

who participate in competitive extracurricular activities

206 Part Two I Legal Issues for Working Health Care Practitioners

Board of Education v. Earls, 536 U.S. 822 (2002).

COURT CASE Fourteenth Amendment at Issue William Baird spoke at Boston University on the sub-

ject of birth control and overpopulation. At the end of

his talk, Baird gave away Emko Vaginal Foam to a woman

who approached him. Massachusetts charged Baird with

a felony, distributing contraceptives to unmarried men

or women. Under state law, only married couples could

obtain contraceptives; only registered doctors or phar-

macists could provide them. Baird was not an authorized

distributor of contraceptives.

At issue was: Did the Massachusetts law violate the

right to privacy acknowledged in Griswold v. Connecticut, and did it violate protection from state intrusion granted

by the Fourteenth Amendment?

grounds. The Court held that the law's distinction between

single and married individuals failed to satisfy the "rational

basis test" of the Fourteenth Amendment's Equal Protec-

tion clause. Married couples were entitled to contraception

under the Court's Griswold decision. Withholding that right to single individuals without a rational basis proved the fatal

flaw. Thus, the Court did not have to rely on Griswold to invalidate the Massachusetts statute. "If the right of privacy

means anything," wrote Justice William J. Brennan, Jr., for

the majority, "it is the right of the individual, married or

single, to be free from unwarranted governmental intru-

sion into matters so fundamentally affecting a person as the

decision to whether to bear or beget a child."

The case reached the U.S. Supreme Court, where jus-

tices struck down the Massachusetts law, but not on privacy Eisenstadt v. Baird, 405 U.S. 438 ( 1972).

FEDERAL PRIVACY LAWS

Concern about privacy has led to the enactment of federal and state laws governing the collection, storage, transmission, and disclosure of personal data. Privacy laws are generally based on the following considerations:

1. Information collected and stored about individuals should be limited to what is necessary to carry out the functions of the busi- ness or government agency collecting the information.

2. Once it is collected, access to personal information should be limited to those employees who must use the information in per- forming their jobs.

3. Personal information cannot be released outside the organization collecting it unless authorization is obtained from the subject.

4. When information is collected about a person, that person should know that the information is being collected and should have the opportunity to check the information for accuracy.

A number of federal laws concern privacy, but until the Health Insurance Portability and Accountability Act (HIPAA) of 1996, fed- eral privacy laws have dealt with financial and credit information or the theft or illegal disclosure of electronic information. HIPAA of 1996 was the first federal law to deal explicitly with the privacy of medi- cal records, and to ensure compliance, HIPAA provides for civil and criminal sanctions for violators of the law.

All states have laws governing the confidentiality of medical records, but laws vary greatly from state to state. Through state preemption, if a state's privacy laws are stricter than HIPAA privacy standards and/or guarantee more patients' rights, the state laws take precedence.

Table 8-1 below lists eight major federal privacy laws passed since 1985.

state preemption If a state's privacy laws are stricter than HIPAA privacy standards, the state laws take precedence.

Chapter 8 1 Privacy, Security, and Fraud 207

COURT CASE HIPAA Preempts State Law in Certain Instances

In July 2013, the U.S. Court of Appeals for the Eleventh

Circuit ruled that HIPAA preempts state law in certain

instances. The case centered on a Florida statute that

allowed nursing homes to release medical records of a

current or former resident to "spouse , guardian , surro-

gate, proxy or attorney in fact" of the individual. How-

ever, many Florida nursing homes refused to disclose

records to surviving spouses who had not been des-

ignated as the personal representative by the probate

courts. The Florida Agency for Health Care Adminis-

tration (AHCA) ordered the various nursing homes to

release the information stating the surviving spouses were

equal to personal representatives. OPIS Management

Resources, an owner of several nursing homes in Florida

filed suit against AHCA, claiming that HIPAA standards

were higher and thus the state law conflicted. The Court

of Appeals held the state statute was fatally flawed and

"authorizes sweeping disclosures, making a deceased

(nursing home) resident's protected health information

available to a spouse or other enumerated party upon

request, without any need for authorization, for any con-

ceivable reason, and without regard to the authority of

the individual making the request to act in a deceased

resident's stead."

OPtS Management Resources LLC v. Secretary Florida Agency for Health Care Administration, No. 12- 12593 (II th Cir. Apr. 9, 20 13).

Table 8-1 Major Federal Privacy Laws

Date Enacted

1986

1994

1996

1999

2005

2009

2010

2010

Law

Electronic Communications Privacy Act (ECPA)

Computer Abuse Amendments Act

Health Insurance Portability and Accountability Act (H IPAA)

Gramm-Leach-Biiley Act

Patient Safety and Quality Improvement Act (PSQIA)

American Recovery and Reinvestment Act (ARRA), commonly called the Stimulus Bill

Patient Protection and Affordable Care Act (PPACA) common ly called the Affordable Care Act orACA

Health Care and Education Reconciliation Act (HCERA)

Purpose

Provides privacy protection for new forms of electronic commu- nications, such as voice mail, e-mail, and cellular telephone

Amends the 1984 act to forbid transmission of harmfu l com- puter code such as viruses

Guarantees that workers who change jobs can obtain hea lth insurance. Increases efficiency and effectiveness of t he U.S. health care system by electronic exchange of administrative and financial data. Improves security and privacy of patient- identifying information. Decreases U.S. health care system transaction costs

Requires all financial institutions and insurance companies to clearly disclose their privacy policies regarding the shar- ing of nonpublic personal information with affiliates and third parties

Helps assess and resol ve patient safety and health care quality issues, encourages reporting and analysis of medical errors, authorizes HHS to impose civil money penalties for violations of patient safety confidentiality

Title XIII, the Health Information Technology for Economic and Clinical Heal th (HITECH) Act, makes substantive changes to HIPAA, including privacy and security regulations, changes in HIPAA enforcement , provisions about hea lth information held by entities not covered by HIPAA, and other miscellaneous changes

Dea ls mostly with the availability of health insurance coverage for all Americans, but also reinforces privacy regarding pro- tected hea lth information

A federal law that adds to regu lations imposed on the insur- ance industry by PPACA

208 Port Two I Legal Issues for Working Health Care Practitioners

Check Your Progress

I. Does the Constitution provide specifically for the protection of privacy? Explain your answer.

2. W hat was the f irst federal law to deal explicitly w ith the pri vacy of medical records?

3.-6. Name four considerations for protecting privacy when federal and/or state legislation is written.

Since HIPAA is the federal legal standard for privacy and security of electronic health information throughout the health care industry, health care employees must follow the law's provisions, which are contained within four standards:

Standard 1. Transactions and Code Sets. A transaction refers to the transmission of information between two parties to carry out financial or administrative activities. A code set is any set of codes used to encode data elements, such as tables of terms, medical con- cepts, medical diagnostic codes, or medical procedure codes.

Required code sets for use under Standard 1 include Current Procedural Terminology (CPT) and International Classification System of Diseases; Clinical Modifications lOth Edition (ICD-10-CM); and International Classification System of Diseases-Procedure Coding System lOth Edition (ICD-10-PCS) (Since the publication of ICD-10 has been delayed to 2015, some coders may still be using ICD-9.).

Standard 2. Privacy Rule. Policies and procedures health care providers and their business associates put in place to ensure confi- dentiality of written, electronic, and oral protected health information.

Standard 3. Security Rule. Security refers to those policies and pro- cedures health care providers and their business associates use to protect electronically transmitted and stored PHI from unauthorized access.

Standard 4. National Identifier Standards. Provide unique identifiers (addresses) for electronic transmissions.

By now all four sets of HIPAA standards have been implemented, and most health care practitioners are familiar with the language and rules that make up the requirements for compliance. Anyone needing a refresher course can visit www.hipaa.com for specific information.

Of special concern in this chapter are Standard 2, the Privacy Rule and Standard 3, the Security Rule.

HIPAA's Requirements for Disclosing Protected Health Information HIPAA's Standard 2, the Privacy Rule says that protected health information (PHI) must be protected against unauthorized disclosure, whether it is written, spoken, or in electronic form. PHI refers to infor- mation that contains one or more patient identifiers and can, therefore, be used to identify an individual. Information that includes one or more of the following makes a patient's health care information identifiable:

• Name

• Zip code or other geographic identifier, such as address, city, or county.

LO 8.2 Explain HIPAA's special requirements for disclosing protected health information.

protected health information (PHI) Information t hat contains one or more patient identifiers.

Chapter 8 I Privacy, Security, and Fraud 209

,

de-identify To remove from health care transactions all information that identifies patients.

permission A reason under HlPAA for disclosing patient information.

covered entities Health care providers and clearinghouses that transmit HlPAA transactions electronically, and must comply with HlPAA st andards and rules.

• Date of birth, dates of treatment, or any other dates relevant to the individual.

• Telephone numbers

• Fax numbers

• E-mail addresses

• Social Security number.

• Medical record numbers.

• Health plan beneficiary numbers.

• Birth certificate and driver's license.

• Vehicle identification number and license plate number.

• Web site address.

• Fingerprints and voiceprints.

• Photos

• Any other unique identifying number, characteristic, or code.

It is possible to de-identify health information, by removing the patient identifiers listed above.

Health care providers and plans can use and disclose patient infor- mation (PHl), but to do so legally they must identify a permission-a legal reason for each use and disclosure. To use PHl means that you use patients' protected health information within the facility where you work in the normal course of conducting health care business. To disclose PHI means that patients' protected health information is sent outside of a health care facility for legitimate business or health care reasons.

Permissions: Using and disclosing PHI must fall within the follow- ing six HIPAA-defined permissions:

1. Disclosures to patients. HIPAA requires that PHI be disclosed to any patient who asks to see his or her own medical records (unless the health care provider believes that access will do harm to the patient). This includes talking to the patient about his or her diagnosis, treatment, and medical condition, as well as allow- ing the patient to review his or her entire medical record. Some records, however, such as psychotherapy notes, may be withheld.

2. Use or disclosure for treatment, payment, or health care operations: Health care practitioners need to use PHI within the medical office, hospital, or other health care facility for coordinating care, consult- ing with another practitioner about the patient's condition, pre- scribing medications, ordering lab tests, scheduling surgery, or for other reasons necessary to conduct health care treatment or busi- ness, such as insurance claims and billing. PHI disclosures for these purposes do not require written authorization.

If other covered entities contact you or your employer for access to PHl, such as insurance plans, attorneys, medical survey represen- tatives, and pharmaceutical companies, you must have the patient's written authorization to release PHI. (Covered entities are health care providers and clearinghouses that transmit HIPAA transactions electronically, and must comply with HIPAA standards and rules.)

3. Uses and Disclosures with Opportunity to Agree or Object. Accord- ing to the HHS Web site http://www.hhs.gov/ocr/privacy/hipaa/ understanding/summary/index.html, informal permission may be

210 Part Two I Legal issues for Working Health Care Practitioners

:

I

I

I I

,,

:

obtained by asking the indi idual outright, or by circumstances that clearly give the individual the opportunity to agree, comply silently or without objection, or object. Where the individual is incapacitated, in an emergency situation, or not available, covered entities generally may make such uses and disclosures, if in their professional judgment, the use or disclosure is determined to be in the best interest of the individuaL

4. Incidental uses and disclosures of PHI are permitted without authorization from patients as follow s:

• Nursing care center staff members can talk about patients' care if they take reasonable precautions to prevent unauthorized individuals, such as visitors in the area, from overhearing.

• Health care practitioners can talk to patients on the phone or discuss patients' medical treatments with other providers on the phone if they are reasonably sure that others cannot overhear.

• Health care practitioners can discuss lab results with patients and among themselves in a joint treatment area if they take reasonable precautions to ensure that others cannot overhear.

• Health care practitioners can leave messages on answering machines or with family members, but information should be limited to the amount necessary for the purpose of the calL (For detailed messages, simply ask the patient to return the call.)

• You can ask patients to sign in, call patients by name in waiting rooms, or use a public address system to ask patients to come to a certain area. A patient sign-in sheet, however, must not ask for the reason for the visit.

• You can use an X-ray light board at a nursing station if it is not visible to unauthorized individuals in the area.

• You can place patient charts outside exam rooms if you use reasonable precautions to protect patient identity: face the chart toward the wall or place the chart inside a cover while it is in place.

5. Public Interest and Benefit Activities. The Privacy Rule permits use and disclosure of protected health information, without an individual's authorization or permission, for 12 national priority purposes, as listed on the HHS Web site at http://www.hhs.gov/ ocr/privacy/hipaa/understanding/summary/index.html:

• If required by law.

• As part of public health activities.

• For victims of abuse, neglect, or domestic violence.

• In health oversight activities.

• For judicial and administrative proceedings.

• For law enforcement purposes.

• For decedents when cause of death is released to funeral home, coroners, or medical examiners.

• For cadaveric organ, eye, or tissue donation.

• For research

• In the event of serious threat to health or safety.

Chapter 81 Privacy, Security, and Fraud 211

,,

,,

.I

limited data set Protected hea lth inform atio n from which ce rta in pat ient identifiers have been removed.

• For essential government functions.

• In claims for Workers' Compensation.

6. Limited data set. A limited data set is protected health informa- tion from which certain specified, direct identifiers of individuals and their relatives, household members, and employers have been removed . A limited data set may be used and disclosed for research, health care operations, and public health purposes, pro- vided the recipient enters into an agreement promising specified safeguards for the PHI within the limited data set.

The HIPAA Privacy Rule does not give patients the express right to sue. Instead, the person must file a written complaint with the secre- tary of Health and Human Services through the Office for Civil Rights. The HHS secretary then decides whether or not to investigate the complaint. Patients may have other legal standings to sue under state privacy laws. (See Court Case, "EMT Liable for Violating Patient's Privacy.") See Table 8-3 on page 222 for a list of patients' rights under the HIPAA Privacy Rule.

COURT CASE EMT Liable for Violating Patient's Privacy

An EMT employed by a volunteer fire department pro-

vided emergency treatment to a female patient for a

possible drug overdose. The unresponsive patient was

transported to a hospital. The EMT returned home and

later spoke to a friend, telling her that she had assisted in

taking a specific patient to the hospital emergency room

for treatment for a possible drug overdose.

Prior to the emergency, the EMT had never met the

patient. However, about two weeks prior to the incident,

the EMT had heard about the patient and her medical

problems at a social event. The woman who spoke about

the patient was apparently a friend, and it was th is person

whom the EMT telephoned, after the patient 's overdose.

The patient sued the EMT and her insurance company,

alleging that she had defamed her and violated her privacy

by publicizing information concerning her medical condi-

tion and making untrue statements indicating that she had

7. Define protected health information.

8. Define de-identify.

attempted suicide. The patient claimed that she had been

and was continuing to undergo medical care due to illness,

and that the apparent overdose she suffered was a "reac-

tion to medication."

The insurance company claimed the EMT's actions

were with in the scope of her employment. The EMT

argued that she had not acted recklessly or unreasonably

in contacting the patient 's friend regarding her care.

The EMT offered to settle for $5,000, but the plaintiff

refused and the matter went to a jury trial. The jury found

that the EMT had vio lated the plaintiff's right of privacy,

as alleged . The jury also awarded the plaintiff/patient

$37,909.86 in compensatory damages and attorney fees.

The EMT and her insurance company appealed. An

appeals court upheld the judgment of the lower court.

Pachowitz v. Ledoux, 2003 WL 21221823 ('Nis. App., May 28, 2003).

9. Which law usually prevails, federal or state, if a state law provides greater privacy protection than a

federal law? Explain your answer.

I 0. What is the process illustrated in question 9 called?

II. One can only legally release PHI under six HIPAA-defined __ .

212 Part Two J Legal issues for Working Health Care Prac titi o ners

li

Laws Implemented to Protect the Security of Health Care Information As listed in Table 8-1, the American Recovery and Reinvestment Act (ARRA), commonly called the Stimulus Bill, made substantive changes to HIPAA, including privacy and security regulations, changes in HIPAA enforcement, provisions about health information held by enti- ties not expressly covered by HIPAA, and other miscellaneous changes. The ARRA also mandated a deadline-January 1, 2014-for all public and private health care providers and other eligible professionals across the country to have adopted and demonstrated "meaningful use" of elec- tronic medical records (EMR) in order to keep their existing Medicare and Medicaid reimbursement levels. ("Meaningful use" is explained below.)

First, note the difference between electronic medical records (EMR) and electronic health records (EHR), because, according to www.healthit.gov, an online source of information about information technology in the health industry, the two terms are not interchange- able. The electronic medical record (EMR) is the electronic form of a patient's medical history from just one practice. It lets health care pro- viders in one facility:

• Track data over time.

• Identify with a glance which patients are due for screenings or check-ups.

• Check patients' progress within certain parameters, such as blood pressure, cholesterol and blood sugar readings, and vaccinations.

• Monitor and improve overall patient care within the practice.

By contrast, the electronic health record (EHR) is a more compre- hensive electronic patient history, focusing on the total health of the patient and including a broader view of a patient's care. This more detailed record allows for:

• A record that travels with the patient so that emergency depart- ment clinicians who see a patient in his home city or traveling across the country will know about any life-threatening allergies, or clinicians treating people injured in a disaster will know which medications the patient is taking.

• The opportunity for the patient to log on to her own record and see trends in lab results over time, which can help her plan for staying healthy.

• Specialists to see what tests, X-rays, and other procedures have already been done on a patient, thus avoiding unnecessary dupli- cation when possible.

• Notes from any hospital stays that can help inform discharge instructions and follow-up care for the patient and can let patients

! move smoothly from one care setting to another.

"Meaningful use" of electronic health records, as defined by HealthiT .gov, consists of using digital medical and health records to achieve the following:

• Improve quality, safety, and efficiency of health care, and reduce health disparities.

LO 8.3 Discuss laws implemented to protect the security of health care information as health records are converted from paper to electronic form.

electronic medical record (EMR) Contains all patient medical records for one practice.

electronic health record (EHR) A more comprehensive record than the EMR, focusing on the total health of the patient and t raveling with the patient.

Chapter 8 1 Privacy, Security, and Fraud 213

breach Any unauthorized acquisition, access, use, or disclosure of personal health information which compromises the security or privacy of such information.

firewalls Hardware, software, or both designed to prevent unauthorized persons from accessing electron ic information.

FIGURE 8-1 How Breaches Happen

• Engage patients and family in comprehensive health care plans.

• Improve care coordination and the health of populations and also improve public health practices.

• Maintain the privacy and security of patient health information.

HIPAA'S SECURITY RULE

HIPAA's Standard 2, the Privacy Rule, details procedures for maintain- ing the privacy of protected health information. The act's Standard 3, the Security Rule, explains the requirements for maintaining the security of electronic health records, both in transmission and storage. Lack of compliance with HIPAA security measures can lead to substan- tial fines and in extreme cases even loss of medical licenses. According to www.hipaa.com, medical practices can follow 5 steps to ensure compliance to HIPAA standards and to avoid data breaches. (A breach is any unauthorized acquisition, access, use, or disclosure of personal health information which compromises the security or privacy of such information.)

1. Run a complete risk assessment of the medical practice. There are many electronic health recording systems, but practices need to use a system that meets HIPAA guidelines and standards. A risk assessment against HIPAA guidelines can reveal those areas where changes are needed, and should include evaluating how well each person protects passwords. Passwords should not be posted for anyone to see, should not be unnecessarily divulged to others, and should be changed regularly, and firewalls should be in place to protect against outside intrusion (see Figure 8-1) . Are security measures reasonable and appropri- ate for the health care practice and are they periodically reviewed? Have security breaches occurred in the past? If so, what caused the breaches and have causes been remedied? Are internal sanctions in place for security breaches, and have staff members been informed of such sanctions?

2. Be prepared for a disaster. One of the best ways to ensure against loss or corruption of medical data is to back up all data regularly. Data is most safely backed up in offsite locations, so that fires, water leaks, and other incidents at the practice site do not threaten

HOW BREACHES HAPPEN Employees report the following as common causes of data breaches:

31%

roi (} :::; ::l () " ~

33%

Source: Data from ProPublica: http://www.propublica.org/

42% oom ::J 3 8:.-o c:~

(1)

2. s- ~ :2: a. ~ :::1. '<

46%

214 Part Two I Legal issues fo r Wor ki ng Health Care Practitioners

data. Antivirus programs should also be installed on all computers and regularly updated so that computer viruses and hackers are not a threat to data.

3. Train all employees in proper computer use. Access controls such as passwords and PIN numbers, are HIPAA Security Rule require- ments, and encryption systems provide an additional level of security. Encrypting stored information means that PHI cannot be read or understood except by someone who can decrypt it using a special decryption key provided only to authorized individuals. A medical practice can have a secure encryption system, but if employees don't use their passwords to securely access records and files, the encryption system is useless, and records are open to unauthorized intrusion. Training should be ongoing, so that new employees are informed and long-term employees are reminded of proper use.

4. Buy products with security compliance and compatibility in mind. When purchasing any new medical computer software or other medical products, check to be sure the new purchase meets HIPAA security rules and will be compatible with other products already in use.

5. Collaborate with all compliance-affected parties. All depart- ments within a practice are affected when compliance changes are made, and employees should be informed and consulted.

ProPublica data reveals that new technology trends threaten patient data in that 91 percent of hospitals surveyed are using cloud technology (Internet, off-medical-facility-site storage capability) to store data, yet 47 percent of these hospitals were not confident they could keep the data secure in the cloud. In addition, 81 percent of organizations let employ- ees use their own mobile devices (BYOD), yet 46 percent of these orga- nizations don't ensure that employee devices are secure (see Figure 8-2).

ProPublica estimates that data breaches have cost the health care industry $7 billion to date, both in fraudulent schemes and in identity theft, where criminals use health care data to assume a person's iden- tity and make unauthorized purchases in that person's name.

NEW TECHNOLOGY TRENDS THREATEN PATIENT DATA

Source: Data from ProPublica: http://www.propublica.org/

encryption The scrambling or encoding of information before sending it electronical ly.

FIGURE 8-2 New Technology Trends Threaten Patient Data

Chapter 81 Privacy, Security, and Fraud 215

Health Information Technology for Economic and Clinical Health Act (HITECH) A section of the American Recovery and Reinvestment Act (ARRA) that strengthened certain HIPAA privacy and security provisions.

American Recovery and Reinvestment Act (ARRA) A 2009 act that made substantive change to HIPAA's privacy and security regulations.

HITECH RULE

The Health Information Technology for Economic and Clinical Health (HITECH) Act, part of the American Recovery and Reinvest- ment Act (ARRA) of 2009, strengthened the privacy and security pro- tections for health information established under HIPAA. Provisions under HITECH carried a September 23, 2013 enforcement date.

The HITECH Rule strengthens privacy and security by:

• Extending compliance with HIPAA privacy and security rules to business associates and their subcontractors.

• Prohibiting the sale of protected health information without appropriate authorization.

• Expanding individual rights to electronically access one's pro- tected health information (PHI).

• Prohibiting the use of genetic information for insurance under- writing purposes.

• Finalizing breach notification requirements.

• Expanding individuals' rights to obtain restrictions on certain dis- closures of protected health information to health plans if services are paid for out of pocket.

• Establishing new limitations on the use and disclosure of protected health information for marketing and fund-raising purposes.

• Providing easier access to immunization records by a school.

• Removing HIPAA Privacy Rule protections for PHI of an individ- ual deceased for more than 50 years.

A provision of the law states that breaches must be reported, not just to the Office of Civil Rights (OCR), which has federal enforce- ment authority, but also to the media. A quick search of the Internet will reveal that breaches occur frequently. Since October 2009 through November 2013, there have been 768 complaints alleging a violation of the Security Rule. The HHS/OCR closed 579 complaints after investi- gation and appropriate corrective action and as of November 30, 2013 had 254 open complaints and compliance reviews.

While maintaining privacy and security of PHI are vital consider- ations in today' s health care environment, fraud is claiming a huge portion of the health care dollar, and has necessitated federal interven- tion in the form of legislation and anti-fraud measures.

12.-13. Briefly distinguish between the electronic medical record (EMR) and the electronic health record (EHR).

14. What is a breach of PHI?

15.-17. If you use computers in the course of your daily work, what are three important rules for you to remember, in order to protect the security of electronic medical records?

18. Briefly explain the purpose of HITECH.

216 Port Two I Legal Issues for Working Health Care Practitione rs

Controlling Health Care Fraud and Abuse According to the following figures, as published by The Sentinel, for fiscal year 2011 (the latest FY for which statistics were available) esti- mates for dollar losses, including fraud, abuse, and waste in all health care arenas included:

• $1.2 trillion a year, based on a 2008 report by Pricewaterhouse- Coopers' Health Research Institute.

• $600 to $850 billion a year, according to a Thomson Reuters report that broadly defined "waste" as "healthcare spending that can be eliminated without reducing the quality of care."

• $64.8 billion in improper payments by Medicare and Medicaid for FY 2011, according to the Government Accounting Office (GAO). ("Improper" meaning the care was not necessary or the bill was wrong. Improper payments may include fraudulent claims, but not all improper payments are fraudulent. Improper payments may be due to honest mistakes.)

• $28.8 billion in improper payments were made to Medicare fee- for-service (Original Medicare) providers in 2011, according to GAO.

• $21.9 billion in improper Medicaid payments in 2011, according to GAO.

• $2.4 billion in health care fraud judgments and settlements were won or negotiated in 2011, according to the 2011 Health Care Fraud and Abuse Control Program report by the Department of Health and Human Services (HHS) and Department of Justice (DOJ).

• $1.2 billion in Medicare and Medicaid audit disallowances (findings of unallowable costs), according to the HHS Office of Inspector General (OIG).

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Instant Homework Helper
Study Master
Write My Coursework
University Coursework Help
Peter O.
Smart Accountants
Writer Writer Name Offer Chat
Instant Homework Helper

ONLINE

Instant Homework Helper

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$35 Chat With Writer
Study Master

ONLINE

Study Master

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$25 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$39 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$37 Chat With Writer
Peter O.

ONLINE

Peter O.

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$21 Chat With Writer
Smart Accountants

ONLINE

Smart Accountants

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$31 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Question : Assignment - Strategic Management - Water Quality Essay - Carr & kleemann funeral directors - Disadvantages of irrigation scheduling - Low carb lasagne sheets coles - Ipv6 implementation in india - Compound inequality to interval notation - Contar 1 contamos 2 - Mass spectrometer ib chemistry - 8th letter of the greek alphabet crossword clue - Like many renaissance composers josquin wrote two kinds of music - Another word for meld - Https www youtube com watch v i47y6vhc3ms - Anthony kiedis personality type - How to calculate ksp value - I need help with my statistics project: - Peter pan broadway script - Sandusky manufacturing company statement of cost of goods manufactured - Single pole double throw relay diagram - 25 callana avenue rostrevor - Stagefright protected textra - Python dissertation - Management Paper Due by 2PM EST 8/9/20 - The lucky chance aphra behn sparknotes - Explain how ahima's data quality management model works - Newman manufacturing is considering a cash purchase - Abductor digiti minimi stretch - Economic - Lee primary school darnall - Ginzberg theory of vocational guidance ppt - Replacing wired thermostat with hive - Citric acid 50 solution - Mastering physics problem 2.16 - Hess law of constant heat summation lab report pdf - Ieee sensors impact factor - National scan inc sells radio frequency inventory tags - Confucius said - Rethink your drink lesson plan - Lorna bailey grotesque birds - Community health assessment definition - Discussion10 - Encounter bay scuba diver death - Module 6 Journal Article Analysis - For what values of p does the integral converge - They say i say 2015 - Project Management , Risk management plan for construction project ( risk identification & risk assessment parts) - How much phenol red to add to media - A temporary matter pdf - Raging rapids game solution - What is a commemorative speech - Marketing essentials assignment examples - Schizophrenia Disorder - Ib math studies ia examples - Immoral management ethics example - History of Art through the Middle Ages (Project) - Preferred loge box 160 dodger stadium - Strata titles regulations wa - Amp super easy growth - Advantages and disadvantages of single step income statement - Yottabyte hard drive amazon - Business strategy articles wall street journal - +91-8306951337 kala jadu specialist astrologer IN Gopalpur - Connected mcgraw hill school c3p0 - Cpt code for bleb revision - Week 2 Discussion - Ns en iso 13702 - 750 word paper - 021 - Principles of management and organisational behaviour book pdf - Associate professor briony rogers - Shell helix ultra extra 5w30 - Barack obama nobel acceptance speech - Exploring science how science works 7 worksheets - The ____ command is used to restore the table’s contents to their previous values. - English Draft template paper - 1 2 cos x graph - Research Paper - Advantages and disadvantages of supercritical boiler - Cpi care welfare safety security - 4 layers of diversity model - Nursing diagnosis for nephrostomy tube - Map of australian deserts - Under the modified accrual basis of accounting - Country manager simulation quiz answers - Cost plus cakes - Project on integers for class 7 - US Census Homeownership Rate - Just a dream chris van allsburg activities - What you pawn i will redeem literary analysis essay - Women's danton faux leather pull on bootie universal thread - Nursing Disaster Planning - Florida southwestern state college online courses - The squire canterbury tales pdf - To build a fire study questions 2a 4a answers - Ambleside primary look cover write check - 2 1 discussion data information and knowledge - Teder corporation stock currently sells for - Cmit 320 network security proposal part 1 - Difference between a monologue and soliloquy