37
8/20/2013 1 Understanding Your Data Privacy & Security Vulnerabilities with the Electronic Health Record (EHR) Electronic Health Record (EHR) NAHC Annual Meeting November 1, 2013 4:15 PM – 5:45 PM PRESENTERS: JOAN L. USHER, BS, RHIA, COSC, ACE JLU Health Record Systems, Pembroke, MA Cherrylyn Simmons, BSN, RN Homefront Health Care, Providence, RI 1 LEARNING OBJECTIVES: This program is designed to further the attendees knowledge of Electronic Health Record requirements. At the conclusion of this program, the participant will be able to: program, the participant will be able to: Examine the latest requirements for privacy & data security Identify what policies & trainings are needed to protect and support the EHR Examine EHR vulnerabilities & common documentation errors 2

508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

1

Understanding Your Data Privacy & Security Vulnerabilities with the

Electronic Health Record (EHR)Electronic Health Record (EHR)

NAHC Annual MeetingNovember 1, 20134:15 PM – 5:45 PM

PRESENTERS:JOAN L. USHER, BS, RHIA, COS‐C, ACE 

JLU Health Record Systems, Pembroke, MACherrylyn Simmons, BSN, RN 

Homefront Health Care, Providence, RI 

1

LEARNING OBJECTIVES:This program is designed to further the attendees knowledge of  Electronic Health Record requirements.  At the conclusion of this program, the participant will be able to:program, the participant will be able to:

• Examine the latest requirements for privacy & data security

• Identify what policies & trainings are needed to protect and support the EHR

• Examine EHR vulnerabilities & common documentation errors

2

Page 2: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

2

HIPAA Mega Rule

• Rule was released January 17, 2013

ff d h

To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.

• Effective date March 26, 2013

• Compliance date Sept 23, 2013

• Modifications to HITECH also called Omnibus Rule

• Enhances patient privacy protections & provides patients with new rights toprovides patients with new rights to access health records

3

HIPAA Privacy & Security

• Modifies HIPAA privacy & security rule to addModifies HIPAA privacy & security rule to add strength to the rules & enforcement

• Modifies the Breach Notification Rule from risk of harm to presumption of reportable breach

• Makes Business Associates directly liable for compliance with HIPAAcompliance with HIPAA 

4

Page 3: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

3

What is PHI?• Protected Health Information (“PHI”):

– Individually identifiable health informationy– Transmitted or maintained in any form or medium

• Held or transmitted by Covered Entities or their Business Associates

• Not PHIDe identified information– De‐identified information

– Employment records• However is covered by state law

5

What is the “Record” under HIPAA?

• Designated record set includes the following i f ti di d i iinformation regarding care decisions:– Medical records

– Billing records

– Claims information

6

Page 4: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

4

Breach Notification Rule

• Presumption of reportable breach, unless low probability the PHI has been compromisedafter risk assessment

• Description of what compromised meansp p– “inappropriately viewed, re‐identified, re‐disclosed, or otherwise misused”

7

Now is the time to dusttime to dust off the HIPAA Manual

8

Page 5: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

5

HIPAA Self AuditsRisk Assessments

• Privacy Audit 45 CFR §164.530y §

• Security Audit  45 CFR §164.308

1. Administrative Safeguards

2. Physical Safeguards

3 Technical Safeguards3. Technical Safeguards

• Document any risks

• Develop a compliance action plan9

Administrative Safeguards

• Risk analysis and management of e‐PHI l t d t kf it lrelated to workforce security, employee 

access to electronic info systems, employee training & awareness, protocols for incidents and emergencies, and contractual relationships with business associates

10

Page 6: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

6

Administrative Safeguards

• Does the agency maintain an inventory of all of its computer hardware and software?H th id tifi d ll l ti i hi h PHI i• Has the agency identified all locations in which ePHI is stored? 

• Do the agency's disciplinary policies include sanctions for security violations?

• Are ePHI access rights promptly terminated for workforce members that leave the agency or when access is no longer required to perform their jobs?access is no longer required to perform their jobs?  

• Does the agency provide security training to its workforce members? 

11

Administrative Safeguards

• Are security incidents formally reported to anyone in the agency?agency? 

• Does the agency currently have an emergency operations plan in place? 

• Does the agency have a disaster recovery plan in place?

• Are security measures evaluated when there are changes in agency operations or systems? 

• Does the agency have agreements in place with all business• Does the agency have agreements in place with all business associates as a result of its Privacy Rule compliance efforts? 

12

Page 7: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

7

Physical Safeguards

• Implement policies and procedures to limit h i l t l t i i f tiphysical access to electronic information 

systems and the facility in which they are housed, while ensuring that proper authorized access is permitted.

13

Physical Safeguards

• Does the agency have procedures in place addressing access to offices in emergency situations?offices in emergency situations? 

• Does more than one tenant/organization occupy the building in which the office is located?

• Are all entrances to agency offices secured? • Is an alarm system installed? • If the agency's clinician's utilize point of care devices,

how are remote workstations secured?D i h l h h di d f i• During the last year, has the agency disposed of any equipment on which ePHI was stored? 

14

Page 8: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

8

Technical Safeguards

• Implementation of technical polices for l t i i f ti t th t t ielectronic information systems that contain e‐PHI to allow access only to those persons or software programs that have been granted access rights

15

Technical Safeguards

• Is ePHI retained in files on location?D th tili ft th t i t l h t d?• Does the agency utilize software that is remotely hosted?

• What approach, if any, does the agency utilize to control access to ePHI? Does the agency have procedures in place to facilitate emergency access to its information systems by repair personnel and others not normally requiring access?

• Are user sessions automatically terminated after a specified period of inactivity?period of inactivity?    

16

Page 9: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

9

Technical Safeguards

• Does the agency encrypt any of the ePHI stored on its ffi k t ti ?servers or office workstations?

• Does the agency regularly capture and review network activity data? 

• Does the agency review audit trails on a regular basis?

• Does the agency employ intrusion detection technology?

• How does the agency validate the identity of system users?

• Does the agency exchange ePHI with any outside organizations electronically? 

17

OIG: Corporate Compliance

• Focus of OIG for Work Plan & updated HIPAA Regulations

• Existence of an active corporate compliance plan

• Incorporation of compliance plans into their day‐to‐day operations and determine whether the plans contain elements identified in OIG’s compliance program guidance 

• http://oig.hhs.gov/authorities/docs/cpghome.pdf

18

Page 10: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

10

Tips for Revisiting HIPAA

Update your Privacy ProgramR t i W kfRetrain WorkforcePerform Administrative, Physical & Technical Review for Security

• Analyze areas of vulnerabilities and mitigate

Review Corporate Compliance ProgramReview all policies related to HIPAA & CCBe serious about sanctions for violationsFocus on compliance activities

19

Who Is a Business Associate (BA)?

• New definition of business associate–Creates, receives, maintains, or transmits protected health information

20

Page 11: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

11

BA Agreements

• Need to include the following– HIPAA Compliance

– Safeguards: physical, administrative, technical

– Training: all employees

– Notification of Breach

– IndemnificationIndemnification

– Subcontractor extensions

21

Liability of Business Associates

• Impermissible uses and disclosures

• Breach notification to covered entityBreach notification to covered entity

• Ability to provide e‐copy of ePHI as specified in the business associate contract

• Ability to disclose PHI to HHS for HIPAA investigation

• Ability to provide an accounting of disclosures

l l h h l bl• Failure to comply with the applicable requirements of the Security Rule

22

Page 12: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

12

Business Associate Contracts• Must specify compliance with Breach Notification Rule

• Should specify to whom BA provides electronic access• Should specify to whom BA provides electronic access

• If CE delegates HIPAA responsibility, must specify that BA will comply with HIPAA

• If on 1/25/13  a valid BAA is in place, parties have an extra year to comply 

S l ti il bl• Sample notice available• http://www.hhs.gov/ocr/privacy/hipaa/understanding/covere

dentities/contractprov.html

23

Changes to Notice of Privacy Practices

• Prohibition on sale of PHI• Duty to notify affected individuals of a breach ofDuty to notify affected individuals of a breach of unsecured PHI

• Right to opt out of fundraising (if applicable)• Right to restrict disclosure of PHI when paid out of pocket

• Limit use of genetic information (certain health plans only)only)

• Deleted appointment reminders

24

Page 13: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

13

Action Items

• Begin process of updating BA agreements

Consider who is BA– Consider who is BA

– What safeguards does the BA have in place?

• Amend Notice of Privacy Practices

• Train staff 

– on HIPAA changes

– What is a breach

25

Electronic Copy of PHI

• Form and format requested, if readily d iblproducible

– If not readily producible and maintained in paper, then readable hard copy

– May charge for labor and electronic media

26

Page 14: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

14

Electronic Copy of PHI

• Individual may designate third party to receive copy– Must be in writing

– Clearly identify the designated person

– Clearly identify where to send the copy

27

Restriction for Out‐of‐Pocket Payments

• Covered entity must agree to individual’s t t t i t di l t h lth lrequest to restrict disclosure to health plan

– For payment or health care operations

– Unless required by law

– Individual or person on individual’s behalf pays for item or service out of pocket in full

28

Page 15: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

15

Increased Enforcement

• Willful neglect: Conscious, intentional failure or reckless indifferencereckless indifference

• OCR will investigate all cases of possible willful neglect

• OCR will impose penalty on all violations due to willful neglect

G OCR di i d di l l• Greater OCR discretion to proceed directly to penalty without seeking information resolution

29

Action Items– Policies:

• Release of Information Policy

• Notice of Privacy Practice 

• Device & Media Destruction • Reporting a Potential Breech of PHI

– State & Federal Requirements– Procedure for investigating, steps taken– Risk Analysis

• Information Access Management• Integrity of Electronic PHI• Integrity of Electronic PHI• Protection against loss, tampering or unauthorized use• Laptop, Notebook, Other Equipment Use & Security

• Workstation Use & Security• HIPAA Privacy & Security Policies

30

Page 16: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

16

HIPAA Climate

• 77,190+  HIPAA Complaints

• 18,559+ Covered Entities Affected 

31

New HIPAA Audits

• The first of 150 HIPAA audits began in December 2011• OCR is randomly selecting organizations for the first HIPAA privacy y g g p y

and security audits mandated under the HITECH Act • OCR’s focus is on auditing a variety of covered entities  functions in 

the initial round, with Business Associates (BA) being included in future audits 

• Another 130 organizations were be audited by the end of 2012 • The contract was awarded to KPMG, LLP 

http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/index.htmlml

32

Page 17: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

17

OCR Audit Findings

Privacy Issues

• Review process for denials of

Security Issues

• Conduct Risk AssessmentReview process for denials of patient access to records

• Failure to provide appropriate patient access to records

• Policies & procedures

• Uses & Disclosures of decedent information

Conduct Risk Assessment

• Grant, modify user access

• Incident response

• Contingency planning

• Media reuse & destruction

• Encryption

U ti it it i• Business associate contracts

• Use activity monitoring 

• Authentication

• Physical access controls 

33

BREACH

34

Page 18: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

18

Common Data Breach Scenarios

• Unintended Breaches– Improper disposal

– Lost laptops

• Employee/Ex‐Employee

• Hackers & Thieves / Organized Crime

C titi E i• Competitive Espionage

35

Top 5 Security Risks/Potential Breach

1. Portable Devices

2. Theft

3. Transfer and Disposal

4. System Security

5. Business Associates

36

Page 19: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

19

Security Risks

Portable Devices Theft

• Includes: Laptops, flash drives, smart phones

• Need encryption

• Know the steps to follow if Portable Media stolen

• Largest number of b h• No BYOD breaches

37

Transfer & Disposal Risk

• South Shore Hospital, MA has agreed to pay $750,000 to resolve allegations that it failed to protect the personal and confidential health information of more than 800,000 consumers, In February 2010, South Shore Hospital shipped three boxes containing 473 unencrypted back‐up computer tapes with 800,000 individuals’ personal information and protected health information off‐site to be erased. The hospital contracted with Archive Data Solutions to erase the back‐up tapes and resell them.

• The hospital did not inform Archive Data, however, that personal information and protected health information was on the back‐up computer tapes nor did South Shore Hospital determine whether Archivecomputer tapes nor did South Shore Hospital determine whether Archive Data had sufficient safeguards in place to protect this sensitive information. 

38

Page 20: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

20

In the News… Breach less than 500

• HHS announces first HIPAA breach settlement involving less than 500 patients ‐ Hospice of North Idaho settles HIPAA security case for $50,000 

• The HHS Office for Civil Rights (OCR) began an investigation after HONI reported to HHS that an unencrypted laptop computer containing the electronic protected health information (ePHI) of 441 patients had been stolen in June 2010. 

• Over the course of the investigation, OCR discovered that HONI had not conducted a risk analysis to safeguard ePHI and did not have in place policies or procedures to address mobile device security as required by the HIPAA Security Rule.

39

Timeline for Breach

January 2013 Fine

June 2012

January 2013 Fine $50K & 

Resolution Agreement

Idaho reported breach 

February 2011  

June 2012 

OCR Began investigation

40

Page 21: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

21

Breaches• Reminder to submit breaches less than 500 to OCR by 

February 28, 2014 for calendar year 2013. 

• A new educational initiative, Mobile Devices: Know the RISKS. Take the STEPS. PROTECT and SECURE Health Information, has been launched by OCR and the HHS Office of the National Coordinator for Health Information Technology (ONC) 

• Offers HC providers practical tips on ways to protect PHI when using mobile devices such as laptops, tablets, and g p p , ,smartphones. www.HealthIT.gov/mobiledevices

41

Breach Checklist for Covered Entities

1. Has there been an impermissible use or disclosure as e e bee a pe ss b e use o d sc osu eof PHI?

2. Perform risk assessment – determine and document whether the impermissible use or disclosure compromised the security or privacy of PHI and whether any financial, reputational, or other harm to the individual resulted

3. Determine if the incident falls under any of the exceptions to the definition of breach

4. Was the PHI unsecured?

42

Page 22: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

22

Breach Risk Assessment Factors

1. Nature and extent of PHI involved

2. The unauthorized person who used the PHI or to whom the disclosure was made

3. Whether the PHI actually was acquired or viewed

4 The extent to which the risk to the PHI has4. The extent to which the risk to the PHI has been mitigated

43

Notification of Data Breach• When an entity experiences a data breach it 

must give notice of the breach to the Statesmust give notice of the breach to the States Attorney General, Office of Civil Rights, affected consumers

• Notice required when:a) A breach of security; orb) PHI/Personal information compromisedb) PHI/Personal information compromised

• State Attorneys General authorized to bring civil lawsuits for HIPAA violations

44

Page 23: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

23

Enforcement• When a government agency learns of a breach it will examine several factors including:– Was Proper Notification Made?– Did the owner of the data make false or misleading representations concerning the security of data?

– Was the data stored or maintained in a manner so that it was not reasonably protected and therefore susceptible to a breach?

– Did the owner of the data have either no policies or pinadequate policies in place with respect to protection of PHI?

– If reasonable policies were in place were they followed?

45

Report…Report…Report

• Report Immediately– Type of breach and # of individual affected

– Better to report than have media report

• Begin internal investigation – Need to include IT, MR and forensic review

46

Page 24: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

24

An ounce of prevention is worth a pound of cure. –

Benjamin FranklinBenjamin Franklin

47

EHR Vulnerabilities

48

Page 25: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

25

Legal Medical Record• The record contains the information needed to support the patient’s diagnosis and conditionsupport the patient s diagnosis and condition

– Evidence of what occurred in the care of the patient and justifies treatment & services provided

• Legible

• Appropriate Authentication (Signed & Dated) 

• Clear & concise language

49

Electronic Health Record (EHR)

If data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately is considered an “original”.  

Federal Rules of Evidencef

50

Page 26: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

26

Federal Rules of Evidence (803) (6)• Establishes Admissibility• Federal Rules of Civil Procedure• Uniform Business and Public Records Act• Uniform Business and Public Records Act • Exception Hearsay Rule

1.Documented in a normal course of business2.Kept in the regular course of business3.Made near or at the time of the matter recorded4.Made by a person within the business with knowledge of the acts, events, conditions, opinions, or diagnosesof the acts, events, conditions, opinions, or diagnoses appearing on it

51

Electronic Audit Trails

• Definition– Is a business record of all transactions and activities, including access, associated with medical record

• Purpose– To establish integrity of EHR 

• Critical legal functionality

• Do not allow “back door” access by system administrator to makes corrections without an audit trail

52

Page 27: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

27

Auditing of the EMR

• Facilitated by running queries to identify ifi d ti d fi d tspecific records meeting defined parameters

• Running reports on key metrics associated with defined protocols 

• Specific to patient 

• Specific to staff/labor• Specific to staff/labor

53

Other E‐Policies Needed

54

Page 28: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

28

Checklist e‐Policies

Contents of the Legal RecordProcedures for creation & maintenance of reliable 

drecordsAuthentication of entries in medical record (e‐signature)Information Access ManagementPrinting the Legal EHRAmendments, Corrections, Deletions, ,Authorization to release information electronically

55

Checklist e‐Policies

Use of Abbreviations  (Do not use)Copy & Paste Functionality (Carry forward)py y ( y )Importing/Scanning photographsBack up ProceduresDowntime Procedure DocumentationProtection from malicious software

56

Page 29: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

29

Current Efficiencies of EHR• Point of Care documentation• Generation of orders

E f i f i f & h di i li• Ease of access to information for same & other disciplines• Ability to tract 485, CTI, Physician orders• Matching of visits to frequency of orders• Scheduling capabilities• Collection of data for case conferences, IDT • Ability to provide reminders, prompts & alerts • Clinician Work lists• Audit capabilities for clinical record reviewAudit capabilities for clinical record review• Automatic creation of payroll data• Flow through of information to billing system• QA, PI, IC  data collection

57

Current Vulnerabilities EHR

• Protection of patient information

• Increased access to information

• Audit trials

• Cut & Paste Functionality

• Ease in documentation

• Flow through of information to billing system

58

Page 30: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

30

EPHI Vulnerability Sources

• Current staff 

• Per Diem Staff

• Receive e‐mail from patient with PHI listed

• Portable Storage Devices– Without Encryption 

59

Encryption• Encrypted PHI is not subject to the breach rule –encrypt where possible

• “the use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key” Federal definition

• Encrypted, the transformation of data into a form in which meaning cannot be assigned without the use of a confidential process or key. 

60

Page 31: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

31

Standards for Encryption

• Consistent with National Institute of Standards and Technology (NIST) Special Publication 800‐and Technology (NIST) Special Publication 800111, Guide to Storage Encryption Technologies for End User Devices

• Valid encryption processes for data moving through a network, including wireless, which comply with requirements of Federal Information Processing Standard 140‐2Processing Standard 140 2

• http://csrc.nist.gov/publications/nistpubs/800‐111/SP800‐111.pdf

61

Timely Documentation• Documentation should be completed at or as close to Point of Care as possibleclose to Point of Care as possible– In the Home

– In the Car

• Tip:  Completing the documentation in the patient’s home allows for the most comprehensive note that encompasses what was seen, heard and done for the visit

62

Page 32: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

32

Documentation Errors• Addendums

– New documentation is used to add information to the original entry• AmendmentsAmendments

– Documentation meant to clarify information within the record• Corrections

– A change in information meant to clarify inaccuracies after the original document is complete

• Deletions/Retractions– The action of eliminating information from previously closed 

documentation without substituting new information• Entry wrong patient record• Entry wrong admission• Late entry

– Documentation entered after the point of care

63

Correction of Clinical Records• State Operations Manual• The HHA is encouraged to create policies and procedures that govern 

correction of clinical records. 

Wh h i t i t d th HHA t i t i• When a comprehensive assessment is corrected, the HHA must maintain the original assessment record as well as all subsequent corrected assessments in the patient’s clinical record for five years, or longer, in accordance with the clinical record requirements at 42 CFR 484.48. 

• It is acceptable to have multiple corrected assessments for an OASIS assessment, as long as the OASIS and the clinical record are documented in accordance with the requirements at 42 CFR 484.48, Clinical records.  

• Some agencies use a manual corrections form for one or more OASIS• Some agencies use a manual corrections form for one or more OASIS items that can be acceptable after confirming the correction with the original clinician or as described in the agency’s policies and procedures  

64

Page 33: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

33

New England Journal Medicine

• “Many times, physicians have clearly cut and pasted large blocks of text, or even complete pasted large blocks of text, or even complete notes, from other physicians; we have seen portions of our own notes inserted verbatim into another doctor’s note. This is, in essence, a form of clinical plagiarism with potentially deleterious consequences for the patient ”deleterious consequences for the patient.

• Pamela Hartzband, MD, and Jerome Groopman, MD, Beth Israel Deaconess Medical Center

65

Cut & Paste Functionality

• For organizations that  • Copying forward clinical allow carrying forward clinical documentation, auditing its use is a key part of ensuring document integrity.   AHIMA

documentation is the process of copying existing text in the record and pasting it in a new destination

AHIMA • Also called cloning

66

Page 34: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

34

Cloned Documentation • Providers need to be aware that EHR can inadvertently cause 

documentation pitfalls 

– such as making the documentation appear clonedsuch as making the documentation appear cloned. 

– Cloned documentation could cause payment to be denied in the event of a medical review audit of records.

• Documentation is considered cloned when it is worded exactly like or similar to previous entries. 

– Also when the documentation is exactly the same from patient to patient

I di id li d ti t t f h ti t i it i d– Individualized patient notes for each patient visit are required. 

– Documentation must reflect the patient’s condition necessitating treatment, the treatment rendered and the overall progress of the patient to demonstrate medical necessity.

67

Standardized Records• Standardized MR entries can create problems when 

used improperly.  – Standardized entries are statements that describe usually routine care.  

• Clinicians may select a standardized entry from a menu in an EHR software program.

• Paper documents use check off boxes.• Use of these entries saves time but if clinician selectsUse of these entries saves time but if clinician selects 

the wrong entry or does not confirm the language of the entry is appropriate for the patient, an inaccurate or incomplete record may result.

68

Page 35: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

35

Drop Down Menus• Condition: Client condition is_______

– UnchangedUnchanged

• POC: Client is______________– Partially participating in POC– Up as tolerated, no activity restrictions 

• Homebound: M i Ad l D H l h– Max assist;  Adult Day Health

• Teach:  Topic #   Who ‐ How ‐ Response– Medications Pt Verbal Verbalized understanding

69

Tips for Clinicians

• Document clearly… S lli C– Spelling Counts

• Do not assume a drop down menu does not require a narrative

• Checking off homebound alone does not prove homebound status– Document rationale for homebound

• Be aware of any documentation inconsistencies among clinicians in same patient record

70

Page 36: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

36

Secure your E‐PHIDecrease your Vulnerabilities

• Stay current with HIPAA• Stay current with HIPAA changes

• Ensure policies are in place for compliance

• Begin reviewing audit g gtrails

• Revisit HIPAA Security 

71

Helpful Websites• Federal Breach Notification

– http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/guidance breachnotice htmls/guidance_breachnotice.html

• HIPAA Privacy– http://www.hhs.gov/ocr/privacy/

• HIPAA Security– http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/in

dex.html• AHIMA EHR Issues

– http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1 034289 df1_034289.pdf

– http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_042564.pdf

72

Page 37: 508-Understanding Your Data Privacy & Security · 8/20/2013 2 HIPAA Mega Rule • Rule was released January 17, 2013 ff d h To help protect your privacy, PowerPoint prevented this

8/20/2013

37

Questions?????

73

About the Speakers

Joan L. Usher, BS, RHIA, COS‐C, ACE

Cherrylyn Simmons, BSN, RNCherrylyn is Director of ClinicalACE

Joan is President & CEO of JLU Health Record Systems, Pembroke Ma, a consulting firm specializing in record management including EHR, OASIS, and Coding. She has a degree in Health Information Management and is OASIS certified. She is member 

Cherrylyn is Director of Clinical Services for Homefront Health Care in Providence, RI.  She was instrumental in the agency’s start‐up, Joint Commission Accreditation and conversion to EHR.  She has over 30 years experience in nursingof the Board of Directors for Home 

Care Alliance of MA and Hospice & Palliative Care Federation of MA.   

experience in nursing.   

74